Access Duration

Require requestors to specify their desired access duration to ensure least privilege

Access duration defines how long access is granted to requestors. When this feature is enabled, admins require requestors to specify how long they need access, up to a maximum duration set within a self-service access flowarrow-up-right.

By enforcing time limits, access duration reduces standing access, improves accountability, and supports just-in-time access aligned with the principle of least privilege.

When a request is submitted, the approver sees the requested duration along with other request details. Once approved, access is granted only for the specified period and is revoked when the access duration expires. If the requestor needs more time, a new access request should be submitted.

circle-info

All Apono access requests, approvals, and expirations are logged and retained for at least 36 months. For longer retention needs, export this data to your organization’s storage tools.


Enable access duration

By default, access duration is disabled. We recommend enabling the following setting so access is granted only for the minimum time required to complete a task.

Require duration for access request toggle

Follow this step to enable access duration:

  1. On the Settingsarrow-up-right page, click the Require duration for access request toggle to on. The toggle will turn green.

Once enabled, requestors must specify a duration, up to the maximum access durationarrow-up-right defined by the access flow. If the requested duration exceeds the limit or is invalid, an error message prompts the requestor to enter a valid duration.


Access duration best practices

Access duration should be based on the risk and sensitivity of an access flow's resources. Use the following recommendations as a starting point to define durations that meet your organization’s security and operational needs.

Typical Requested Duration reflects how long access is usually needed to complete a task. Access Duration defines the upper limit enforced by the access flow.

Use Case
Typical Requested Duration
Access Duration
Approval Type (UI)
Settings (UI) & Guidance

Development / Sandbox / Staging / QA

Quarterly

Conditional, based on role

Automatic Approval

Guidance:

Longer durations are acceptable due to lower risk, especially when tied to developer roles.

Production Systems

Up to 2 hours

4 hours

Approval of

OR

Automatic Approval

Settings:

  • Require MFA

  • Requester and grantee cannot self approve

Guidance:

  • Approval of: Choose an approver from a production team, such as DevOps or Infra.

  • Automatic Approval: Select this approval type for ongoing incidents or during on-call shifts.

Sensitive Data (PII, Financial, Customer)

Up to 1 hour

2 hours

Approval of

Settings:

  • Require Approver Reason

  • Requester and grantee cannot self approve

Guidance:

The approver should be able to authorize sensitive data access such as Security team, GRC, or manager.

Break-glass / Emergency

Up to 1 hour

2 hours

Approval of

OR

Automatic Approval

Setting:

  • Require MFA

Guidance:

  • The request should be reviewed post-incident.

  • Ticket ID may be required to make the request

  • Approval of: Choose an approver from an on-call shift or production team, such as DevOps or Infra.

  • Automatic Approval: Select this approval type for ongoing incidents or during on-call shifts.

circle-check

Last updated

Was this helpful?