The shell waits. Your command hangs in the air. Access is granted only when you need it, for only as long as you need it. This is Just-In-Time Access for Zsh.
With Just-In-Time Access, Zsh sessions start without broad, blanket permissions. Instead, privileges unlock instantly when specific commands require them. The process is automatic, fast, and exact. You reduce standing access. You close attack windows. You remove the risk of unused credentials sitting idle in your environment.
Implementing Just-In-Time Access in Zsh means integration at the shell level. The request triggers at runtime. The system checks identity, policy, and context. Auth happens on demand—no permanent tokens, no long-lived keys. Sessions revert to non-privileged immediately after the task completes.