Ok
Sign up for freeSign in
Video

Enabling Just-in-Time (JIT) access with Okta and P0 - demonstrated using Grafana

This episode of the Five minutes to zero standing access series walks through a modern way to grant and revoke admin access to Grafana—using Okta groups and just-in-time controls.

See how P0 dynamically updates group membership at login, ensures access is short-lived, and eliminates manual cleanup. Perfect for teams managing sensitive dashboards.

Granting admin access to Grafana is easy. Revoking it on time? That’s where most teams fall short.

When access is tied to static group membership in Okta or another IdP, there’s no easy way to say “just give this person admin access for 30 minutes.” So access sticks around. Privileges linger. And there’s no system enforcing the boundary.

In this short demo, you’ll see how P0 makes that boundary enforceable — without changing your identity architecture.

How it works

We walk through how to use P0’s just-in-time access provisioning to grant temporary Grafana access by dynamically inserting a user into the correct Okta group - the one that controls their Grafana role.

Grafana maps user roles using Okta group claims during login. In this setup:

  • Each Okta group corresponds to a Grafana role (Admin, Editor, Viewer, etc.)
  • Grafana uses group claims sent via SSO to assign roles dynamically

The user initially tries to log in to Grafana via Okta but is denied - they aren’t in any Grafana group.

They then submit a JIT access request in Slack via the P0 bot. For demo purposes, self-approval is enabled. Once the request is approved, P0 temporarily adds them to the correct Okta group.

The user retries the login and is granted Admin access - all scoped, time-bound, and logged.

<<INSERT SCREENSHOT TO VIDEO HERE: and link to XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX>>

Once the access window ends, P0 (or an Okta workflow) removes the user from the group. That prevents re-authentication with elevated privileges.

If logout workflows are also configured, the active Grafana session ends immediately. Otherwise, users are removed at next login - enforcing least privilege even if someone forgets to sign out.

Why this matters

Critical apps like Grafana contain important or sensitive information. Granting or providing permanent admin access is low-friction - but it creates high-impact risks. 

P0 brings discipline to that access model:

  • Temporary, purpose-driven access
  • Role alignment through your existing IdP
  • Slack-based workflows for fast, auditable approvals
  • Clean revocation - no manual group cleanup

See for yourself 

If you’re still managing access to critical apps through static Okta groups or hoping people remember to remove roles later, this demo shows you the safer, faster way.

[replace video]

Explainer Video

Are you ready to gain control of your cloud access?

Control and govern privileged access across all identities with P0 Security.