Just In Time Access
From Identity Automation
Identity and Access Management (IAM) systems provide organizations with dynamic, wide-ranging methods for controlling access to their applications, systems, and proprietary resources. Perhaps the most widely known and commonly used methods—Role-Based and Attribute-Based Access Controls (RBAC and ABAC)—let organizations quickly defi ne fi lters or rules that determine access based on a user’s roles or attributes, respectively.
Both methods fi ll unique and important needs in granting and controlling access in many situations. But neither one is the complete, or even the most ideal, solution in every case— particularly when it comes to exception or edge use cases. Identity Automation thinks there is a better way to manage special-case access needs through the approach known as Just In Time (JIT) Access—providing provisional access to users when they request it and for only as long as they need it.
This eBook will explain the needs, motivations, and common use cases for the JIT Access approach. We will also highlight some of the shortcomings of RBAC- or ABAC-only models, and show how a fresh JIT approach can improve access management for users, as well as administrative and support teams, when and where it is needed—with less dedicated administrative and maintenance time, automated deprovisioning, and more robust system security.