Just-In-Time Access is an open source application that lets you implement just-in-time privileged access to Google Cloud resources.
Just-In-Time Access works by introducing the notion of eligible role bindings to Cloud IAM. Unlike a regular IAM role binding, an eligible role binding doesn't grant the user access to a project yet: Instead, a user first has to activate the binding on demand by using the Just-In-Time Access application. As an administrator, you can decide whether activating a role requires approval, or whether users only need to provide a justification (like a bug or case number).
You can use eligible role bindings to grant users privileged (or break-glass) access to resources without having to grant them permanent access. This type of just-in-time privileged access helps you to:
- Reduce the risk of someone accidentally modifying or deleting resources. For example, when users have privileged access only when it's needed, it helps prevent them from running scripts at other times that unintentionally affect resources that they shouldn't be able to change.
- Create an audit trail that indicates why privileges were activated.
- Conduct audits and reviews for analyzing past activity.
As a user, you can activate a role in three steps:
- Select the project you need to access
- Select one or more roles to activate (from your list of eligible roles)
- Enter a justification (like a bug or case number)
After validating your request, the application then grants you temporary access to the project.
For roles that require multi-party approval, you can request access in four steps:
- Select the project you need to access
- Select the role to activate (from your list of eligible roles)
- Select one or more peers to approve your request (peers are users that share the same level of access as you)
- Enter a justification (like a bug or case number)
Your selected peers are notified via email and can approve your request. Once approved, the application grants you temporary access to the project and notifies you via email.
As an administrator, you can grant a role (to a user or group) and make it eligible by adding a special IAM condition:
has({}.jitAccessConstraint)
(no approval required)has({}.multiPartyApprovalConstraint)
(multi-party approval required)
You can create the binding for a specific project, or for an entire folder. Instead of granting eligible access to individual users, you can also use groups.
As an administrator, you can use Cloud Logging to review when and why eligible roles have been activated by users. For each activation, the Just-In-Time application writes an audit log entry that contains information about:
- the user that requested access
- the user's device, including satisfied access levels
- the project and role for which access was requested
- the justification provided by the user
Just-In-Time Access runs on App Engine (standard) and Cloud Run. The application is stateless and uses Identity-Aware-Proxy for authentication and authorization, and the Policy Analyzer API and IAM API to manage access.
For detailed instructions on deploying Just-In-Time Access, see Manage just-in-time privileged access to projects on the Google Cloud website.
Just-In-Time Access is an open-source project and not an officially supported Google product.
All files in this repository are under the Apache License, Version 2.0 unless noted otherwise.