It is the opposite of standing permissions. No lingering keys. No blanket admin rights. No static credentials hiding in code or configuration. Access is granted only when requested, for the shortest possible time, and then it is gone.
Just-In-Time Access for TTY sessions means the interactive shell—your most sensitive entry point—is locked by default. A user, process, or automation requests access. The system verifies identity, checks policy, logs the event, and grants a narrow, time-limited session. When time runs out, the lock clicks back in place. Every session is ephemeral, audited, and accountable.
With TTY-based workflows, lingering access is an invisible risk. Static SSH keys or perpetual sudo rights introduce vulnerabilities that can spread across your entire stack. Breaches often start with unused but active credentials. Just-In-Time TTY access removes that surface area. It forces real-time validation. It creates a trail that operations and security teams can review without guesswork.