Skip to main content

➡️ JIT Admin Access

Configuration

How to configure JIT admin access for your customer / organization tenant.

JIT for computers settings

Navigate to SettingsJIT access to configure how you want JIT accounts to be managed for your customer / organization.

There are the settings you can change:

  • Technician login mode - choose how you want technicians to login into workstations - with individual accounts or one shared account per organization / customer tenant. Default is individual accounts as that is required by security frameworks.
  • Domain computers login mode - choose how technicians login to domain computers. By default local admin account is used.
    • Local - create local admin account on the workstation
    • Domain - create domain account on DC. For this case you need to install idemeum agent on domain controller
    • Prompt to choose - when you scan idemeum QR-code you will be presented with option to choose what account to use - domain or local. For this option you need to install idemeum agent on domain controller.
  • Choose OU for JIT domain accounts - for domain JIT computer accounts you can choose the Organization Unit (OU) container where these accounts will be created.
    • The default location for each tenant is <your domain>/Users
    • You can choose to create any OU or a set of nested OUs for your JIT accounts, i.e <your domain>/JIT accounts or <your domain>/JIT/MSP accounts etc. You just need to specify the path.
    • If OU path does not exist, idemeum will create the corresponding OU containers.
    • The nested containers under Users are NOT supported. For instance, <your domain>/Users/JIT accounts is not supported
    • If you used the path 1 for your JIT accounts and they were already created, and then you change the path to path 2, next time when JIT login is performed, JIT account will be moved to the new location
  • Account password length - chose the password length for created JIT admin accounts.
  • Enable login via TOTP - by default technicians login by scanning a QR-code with idemeum mobile app. You can also provide on option to login with OTP even when computer is not offline. Technicians retrieve the OTP from mobile app and enter it into the login screen.
  • Enable push notifications for login - enable the option to send a push notification to a mobile app instead of scanning a login QR-code. Technicians enter their email address and then approve a notification on their mobile app.
  • LAPS for local admin account - option to create break-glass accounts on non-domain controller workstations and then rotate passwords every 24 hours. Once enabled, you can specify what account name to use or take over.
  • LAPS for domain admin account - option to create break-glass accounts on domain controllers. Once enabled, you can specify the account name to use or take over.
  • LAPS access control - specify the groups of technicians that can access LAPS accounts.

JIT for Entra ID settings

When setting up just-in-time access to Entra ID tenants you need to connect each customer Entra ID tenant to respective customer / organization in idemeum.

  • Navigate to admin portal of your customer / organization
  • Access ApplicationsAdd appManaged password app
  • Provide the application name, for Application type choose Web application, and for Credentials type choose Entra ID OIDC credentials
  • Click Authorize button. You will need to authenticate with Entra ID admin account and grant permissions to access Entra ID APIs. Once you successfully authorize access, there will be a green checkbox icon next to Authorize button, and we will show what account was used to authorize API access.
  • For Account expiration you can choose how long you want Entra ID JIT account to stay active. After the specified time, the account will be disabled.
  • For Domain choose when you want to create idemeum JIT accounts. We do not support federated domains, only managed or onmicrosoft.com domains.
  • Choose the role that you want to assign to JIT accounts. You can use groups of technicians to assign multiple roles based on the group membership.
  • Optionally you can enable LAPS accounts, so that idemeum can create and manage break-glass accounts for Entra.
  • Save the configuration