In today’s enterprise environment, security and compliance requirements are becoming increasingly strict. Traditional “permanent authorization” models can no longer meet the needs of modern security management. JumpServer, as a popular open-source bastion host, provides powerful ticket functionality that supports Just-in-time asset access management, allowing enterprises to flexibly manage user access to assets while ensuring security.
What is Just-in-time Asset Access?
Just-in-time asset access is a dynamic permission management strategy where users only request access to specific assets when needed, rather than being pre-granted long-term access permissions. This approach offers several advantages:
Principle of Least Privilege: Users only receive necessary permissions when needed
Time Limitations: Access permissions have clear start and end times
Audit Trail: All access requests have complete approval records
Risk Reduction: Minimizes security risks from long-term permissions
Common Use Cases
1. Emergency Access
When system administrators need immediate access to production servers for troubleshooting critical issues, they can quickly submit a ticket with a short validity period (e.g., 2–4 hours) to gain temporary access.
2. Project-based Access
For specific projects requiring access to certain assets, team members can apply for time-limited access that automatically expires when the project ends, ensuring no lingering permissions.
3. Third-party Vendor Access
When external vendors need temporary access to systems for maintenance or support, they can request access through tickets with clear time boundaries and specific permission scopes.
4. Compliance Audits
During security audits or compliance reviews, auditors can request temporary access to specific systems with detailed justification and approval workflows.
How to Use JumpServer Ticket System
Step 1: Create a Ticket
1. Navigate to the “Tickets” module in the topbar
2. Select “Submitted” to view your ticket history
3. Click “+ New ticket” to create a new access request

Step 2: Fill in Ticket Information
The ticket creation form includes three main sections:
Basic Information:
Title: Descriptive title for the ticket
Organization: Automatically filled based on user’s organization
Authorization Request:
Node: Select the target node (contains multiple assets)
Asset: Choose specific assets to access
Apply Accounts: Select account types (All, Specified, Excluded, or None)
Actions: Choose specific permissions (Connect, Transfer, Clipboard, Share)
Date Range: Set start and expiration times
Other Information:
Description: Explain the purpose and necessity of the access request

Step 3: Submit and Wait for Approval
After filling in all required information, click “Submit” to send the ticket to designated approvers based on the configured workflow.
Step 4: Approval Process
Approvers can review tickets in the “Assigned” section, where they can:
View detailed ticket information
Modify requested permissions if necessary
Approve or reject the request
Communicate with the requester through the ticket system

Approval Workflow Configuration
JumpServer supports flexible approval workflows that can be configured by administrators:
Single or Multi-level Approval: Support for one or two-level approval processes
Role-based Approvers: Configure approvers based on system roles or specific users

Key Benefits
For Organizations
Enhanced Security: Reduces attack surface by limiting permanent access
Compliance: Provides audit trails for regulatory requirements
Flexibility: Adapts to changing business needs and project equirements
Cost Efficiency: Reduces administrative overhead of managing long-term permissions
For Users
Transparency: Clear visibility into access requests and approval status
Efficiency: Streamlined process for obtaining necessary access
Accountability: Clear record of who requested what and when
Communication: Built-in messaging system for coordination with approvers
Conclusion
JumpServer’s ticket system provides a robust solution for Just-in-time asset access management. By combining flexible approval workflows, and comprehensive audit capabilities, organizations can achieve the perfect balance between security and operational efficiency.
This ticket-based approach to permission management not only enhances security posture but also improves compliance and reduces administrative overhead, making it an essential component of modern enterprise security architecture.