Picture this. An engineer grabs access to a staging database at midnight to fix a production configuration. They authenticate, open a shell, patch what they need, and move on. Hours later, that same session is still alive. No one knows if the credentials were reused, shared, or forgotten. That’s