ProficientNowTechRFCs

10. Access Management

RFC-DEVELOPER-PLATFORM-0001                                      Section 10
Category: Standards Track                             Access Management

10. Access Management

← Database Provisioning | Index | Next: Tool Library →


10.1 JIT Access Model

10.1.1 Overview

Just-In-Time (JIT) access provides time-limited, audited access to sensitive resources. The portal integrates with RFC-PAM-0001 (Teleport) to provide self-service access requests.

PrincipleDescription
Time-boundedAccess expires after defined period
AuditedAll access session-recorded
Approval-basedSensitive access requires approval
Least privilegeMinimum necessary access granted

10.1.2 Access Types

Access TypeTargetCredential
Database accessPostgreSQL, MongoDB, ClickHouseShort-lived credentials
SSH accessServers, nodesTeleport certificates
Kubernetes execPod shellsTeleport proxy
Port forwardingService portsTeleport tunnel

10.1.3 Invariant Alignment

Per Invariant 13, all privileged access MUST be session-recorded.

RequirementEnforcement
Session recordingTeleport records all sessions
Audit trailAll access requests logged
Time limitsCredentials expire automatically

10.2 Teleport Integration

10.2.1 Integration Architecture

10.2.2 Teleport Capabilities

CapabilityDescription
Access requestsSelf-service access request workflow
Certificate issuanceShort-lived certificates
Session recordingFull session capture
RBACRole-based access control

10.2.3 Integration Points

IntegrationMechanism
AuthenticationKeycloak OIDC (per RFC-IAM-0001)
Access requestsTeleport Access Request API
Session linksDeep links to recordings
Status displayRequest status in portal

10.3 Access Request Workflow

10.3.1 Workflow Overview

10.3.2 Request Parameters

ParameterDescription
ResourceTarget system (database, server, pod)
Access typeRead-only, read-write, admin
DurationRequested access duration
JustificationReason for access

10.3.3 Approval Flow

Access TypeApproval Required
Development databasesNo
Staging databasesNo
Production databasesYes
Server SSHYes
Kubernetes execYes

10.3.4 Request States


10.4 Session Recording

10.4.1 Recording Scope

Per RFC-PAM-0001, all privileged sessions MUST be recorded:

Session TypeRecording
Database queriesQuery log
SSH sessionsTerminal recording
Kubernetes execCommand log

10.4.2 Recording Access

RoleAccess
Session ownerView own recordings
Security teamView all recordings
ComplianceExport for audit

10.4.3 Portal Integration

The portal provides:

FeatureDescription
Session historyList of past sessions
Recording linksDeep links to playback
Audit viewAccess request history

10.5 Access Request UI

10.5.1 Request Form

The portal provides a streamlined access request interface:

FieldInput Type
ResourceEntity picker from catalog
Access typeSelect (read, write, admin)
DurationTime selector
JustificationText area

10.5.2 Request Status

Users can view their request status:

StatusDescription
PendingAwaiting approval
ApprovedCertificate available
DeniedRequest rejected
ActiveCurrently in session
ExpiredAccess period ended

10.5.3 Context-Aware Access

When viewing a catalog entity, the portal shows:

ContextFeature
Database entity"Request Access" button
Access historyPast access to this resource
Active sessionsCurrent sessions for resource

10.6 Credential Delivery

10.6.1 Delivery Methods

MethodUse Case
CertificateSSH, Kubernetes access
Dynamic credentialsDatabase access
Connection stringDirect display (short-lived)

10.6.2 Credential Lifetime

Access TypeDefault DurationMaximum
Database (dev)1 hour8 hours
Database (prod)30 minutes2 hours
SSH8 hours24 hours
Kubernetes exec1 hour4 hours

10.6.3 Credential Revocation

TriggerAction
Duration expiryAutomatic revocation
Manual revocationAdmin-initiated
Security incidentEmergency revocation

Document Navigation


End of Section 10 — RFC-DEVELOPER-PLATFORM-0001