The request hits your desk. Access needed. Sensitive system. The clock is ticking. You don’t want blind trust. You want control, auditability, and speed. This is where Just-In-Time Access Approval with Mosh wins.
Mosh, a secure, persistent terminal for remote servers, traditionally runs with preapproved credentials. Combined with Just-In-Time Access Approval, it shifts the security model: no standing privileges, only temporary, purpose-driven authorizations. This stops credentials from being a static attack surface. Access is granted only when needed, for exactly as long as needed.
In a Just-In-Time workflow, Mosh connections trigger an approval request. The request is logged, reviewed, and granted or denied in seconds. Each session has an expiration. Once the time window closes, credentials and permissions vanish. This means no leftover access for attackers to exploit and no reliance on periodic credential rotation to clean up stale accounts.