Announcing the Saviynt Knowledge Exchange unifying the Saviynt forums, documentation, training,
and more in a single search tool across platforms. Read the announcement here.

JIT access for shared accounts on assets

New Contributor II
New Contributor II


We have a use case that requires provisioning of JIT access for shared accounts. We will be implementing a privileged access workflow wherein the requestor will place a request for a particular account on an asset. Once the approver approves the request, the account will be automatically added to an AD group which has privileges/admin permissions. Once the request timeframe expires, the requestor will be automatically removed from the AD group. We are particularly focusing on how to update the AD membership with the user addition/deletion.




Saviynt Employee
Saviynt Employee

@plakhangaonkar Thanks for posting your question. JIT access and shared account access are two different ways of gaining access. Please see this article for more information:

Regarding your use case : You can achieve access elevation using "Emergency Access Roles" that you can define for your ActiveDirectory Endpoint. 

Emergency Access Roles can be created with Admin privileges by following the below article (Role Type would be Emergency Access and in the Entitlement tab you can add the AD Group that has elevated access):

Once role is created, End users can start requesting it by following the Role-Based Access section of this article:


Nagesh K