Matt Miller
January 19, 2026
Small teams don’t need a maze of security tooling. They need guardrails that deploy fast and are hard to bypass. That’s the promise of JIT in an IT-led PAM program: Grant exactly the rights needed, only for the time they’re needed—then revoke them automatically. In the Devolutions stack, PAM is the engine that enforces JIT; RDM and Gateway streamline requesting, launching, and recording—but PAM can also enforce JIT on its own.
Stand up Devolutions PAM in the cloud (Devolutions Hub Business) or on your local server (Devolutions Server) and run the JIT flow in RDM. You’ll see how quickly privileged work becomes intentional, observable, and short-lived, without disrupting daily operations. At the best-in-market pricing for small teams, capable of delivering enterprise-grade outcomes.

Traditional least privilege trims entitlements, but standing permissions still sit around waiting to be abused. JIT goes further: access is requested, time-boxed, and then removed automatically, with no grace periods. This aligns with Zero Standing Privilege (ZSP): no permanent admin rights, only short-lived access when needed. In the Devolutions model, JIT can cover both “who can become privileged” and “how that privilege is used,” with automatic revocation on expiry. Controlled elevation that doesn’t slow the team down.
Why it matters: You reduce windows of opportunity for attackers, cut lateral-movement risk, and turn every elevation into an auditable, short-lived event.
Here’s what governed elevation looks like when it’s embedded in the tools admins already use:

Elevation is intentional, traceable, and fast enough to use every time.
JIT elevation: Briefly grant higher permissions to an existing identity for a defined task/window, then auto-revoke.
JIT provisioning: Provision short-lived access tied to a request window and remove it on schedule, with no manual cleanup. In Devolutions PAM, this can mean creating a dedicated account for the task, time-boxing it, then revoking access and rotating the password at the end of the session. Both eliminate standing privilege; choose the pattern that fits your workflow.
Generally, PAM focuses on the credential: Who can use it, for how long, and under what approval. Remote desktop management adds the “how it’s used” layer without slowing admins down. Requests happen in RDM, policy decides approvals, and the data source controls which sessions a user can launch. Credential injection keeps technicians from ever viewing raw passwords, and Devolutions Gateway handles the connection path end-to-end, so sessions traverse networks cleanly and consistently. Because the guardrails live inside the daily toolset, adoption rises. RDM keeps work moving, while PAM governs the credentials and approvals behind every session.
Approvals shouldn’t feel like a detour. Inside RDM, requests come in and are routed to approvers based on established policy. Windows are preset or customized, and responses are sent. Approved sessions are recorded and tied to the request and approval for a clear evidence trail. When the window ends, access ends. No grace periods, and no “I forgot to remove the user” surprises.
Fast, auditable elevation becomes the default, not the exception.
Auditors want proof, not promises. With Devolutions PAM, your evidence pack can include: the request, the approval trail, the session data or recording (RDP/SSH), and rotation/revocation events—so the story is clear from end to end.

Recent updates also streamline this workflow and make governance easier to demonstrate (e.g., tying tickets to activity and strengthening the “who/what/when/why” linkages in reports).
Reconstruct what happened in minutes, with objective metrics for coverage and SLAs.
We’re continuing to invest in:
And we’re exploring:
Start a free 30-day PAM trial or try Devolutions PAM in a free, browser-based lab session to see how we’re helping IT pros achieve great PAM coverage with less standing access in their organizations.
