mirror of
https://github.com/KelvinTegelaar/CIPP.git
synced 2026-04-25 16:26:09 +03:00
[GH-ISSUE #5326] [Feature Request]: Enforced Default JIT Admin Template per Tenant / Role Authorization #2564
Labels
No labels
API
Feature
NotABug
NotABug
Planned
Sponsor Priority
Sponsor Priority
bug
documentation
duplicate
enhancement
needs more info
no-activity
no-priority
not-assigned
pull-request
react-conversion
react-conversion
roadmap
security
stale
unconfirmed-by-user
unconfirmed-by-user
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/CIPP#2564
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @m365mgmtprd on GitHub (Feb 4, 2026).
Original GitHub issue: https://github.com/KelvinTegelaar/CIPP/issues/5326
Originally assigned to: @Zacgoose on GitHub.
Please confirm:
Problem Statement
In the current CIPP implementation, a JIT Admin Template can be defined as the default for a tenant, but it can still be manually overridden by users with sufficient permissions. This creates an operational and security gap: Operation Services requires JIT Admin access for 2nd- and 3rd‑level support, but they should not be able to freely select any role. The absence of enforcement or an approval workflow makes it impossible to guarantee consistent, controlled role assignments.
Benefits for MSPs
Value or Importance
This feature significantly enhances security posture for MSPs operating in multi‑tenant environments. Enforcing a JIT Admin Template—or introducing an approval process—ensures that privileged access remains predictable, auditable, and compliant with least‑privilege requirements. For organisations with dedicated support teams, it prevents unauthorized escalation and guarantees that JIT Admin roles align with predefined operational responsibilities. Overall, it strengthens CIPP’s role as a secure, enterprise‑ready management platform.
PowerShell Commands (Optional)
No response
@Zacgoose commented on GitHub (Feb 5, 2026):
The current implementation was the intended design, it comes with the ability to enforce a max lifetime of accounts. If a tech is not trusted to make JIT accounts and or enforcing a max lifetime is not enough then my position if that you should restrict them from accessing the JIT account endpoint by making use of the RBAC controls in the admin permissions page.
@m365mgmtprd commented on GitHub (Feb 5, 2026):
Thanks for your feedback, @Zacgoose .
Now I understand your thinking/design.
However, our use case is as follows:
That is why we are asking whether the “Default” feature can be defined as mandatory rather than optional.
Translated with DeepL.com (free version)
@Zacgoose commented on GitHub (Feb 5, 2026):
Okay we can add another switch/s in the admin page to restrict the ability to change the permissions and other aspects of a JIT template
@Zacgoose commented on GitHub (Feb 5, 2026):
I would like to work on this please!
@github-actions[bot] commented on GitHub (Feb 5, 2026):
Great! I assigned you (@Zacgoose) to the issue. Have fun working on it!
@m365mgmtprd commented on GitHub (Feb 12, 2026):
Hello @Zacgoose , I just wanted to ask how things are progressing here? This is my first feature request, is there anything I can do? 😄
@Zacgoose commented on GitHub (Feb 13, 2026):
When I get time haha, I'll have more time soon ™️
@github-actions[bot] commented on GitHub (Feb 23, 2026):
This issue is stale because it has been open 10 days with no activity. We will close this issue soon. If you want this feature implemented you can contribute it. See: https://docs.cipp.app/dev-documentation/contributing-to-the-code . Please notify the team if you are working on this yourself.
@m365mgmtprd commented on GitHub (Feb 23, 2026):
@Zacgoose should I do something about the message from the github action?
@m365mgmtprd commented on GitHub (Feb 23, 2026):
hi @KelvinTegelaar Why has this request been closed? Therefore, this request will not be implemented?