LAPS is a Windows mechanism to upload local admin password to AD in a specific attribute. LAPS related attributes in Active Directory are protected with restrictive ACLs . This way there is a different local admin password on each computer to avoid lateral movement between windows computers. * LAPSv1 uploads the local admin password unencrypted in the msLAPS-Password attribute. It is working properly with Samba-AD [1] * LAPSv2 default option is to encrypt the local admin password before sending it to the Active Directory in the msLAPS-EncryptedPassword attribute. However for the encryption it uses a GKDI MS-RPC endpoint that is not currently implemented in Samba. So it doesn't work with Samba-AD. Windows 11 comes with LAPSv2 by default. LAPSv2 still allows to fallback to unencrypted password upload to Active Directory. So it still work with Samba-AD, but it does not have the same level of security as LAPSv2 on MS-AD. This would help to improve feature parity between Samba-AD and MS-AD. This bugzilla entry refers to the Active Directory part needed for LAPSv2 support, no the client implementation on Linux. [1] https://samba.tranquil.it/doc/fr/samba_advanced_methods-samba_configure_laps.html
https://learn.microsoft.com/en-us/windows-server/identity/laps/laps-overview