The SSH prompt blinked. You had root. Seconds later, you lost it—and that was the point.
Just-In-Time Access in Mosh is about precision, not permanence. It gives you the control to grant and remove critical privileges exactly when they’re needed. No standing credentials. No lingering attack surface. No guesswork. Just an immediate bridge between the engineer and the system—and instant teardown when the job is done.
Mosh, short for “mobile shell,” is built for resilience. It works over unstable connections, handles roaming networks, and keeps sessions alive through disruptions. Pairing Mosh with Just-In-Time Access turns it into something powerful: a secure, on-demand pathway that exists only in the exact moments it should.
The old way relied on static SSH keys, persistent accounts, and wide-open admin groups. That approach invites risk. Credentials can be stolen. Or forgotten. Or quietly exploited. Just-In-Time Access flips that model. The session begins when approved and ends when complete. No stale keys in the repo. No accounts left active. Every session is fresh, auditable, and temporary.