If your on-prem access model still relies on static SSH keys and jump boxes, this video is for you.
This episode of the Five minutes to zero standing access series demonstrates how to bring just-in-time SSH to bare-metal environments—using short-lived certificates, Slack approvals, and session-level revocation.
Most identity and access tools stop at the cloud boundary. But the reality for many organizations is hybrid: VMs, containers, and yes - still some bare-metal machines that run critical services.
In this short demo, you’ll see how P0 makes it easy to enable temporary, certificate-based SSH access to on-prem machines, without hardcoded keys, long-lived users, or manual ticketing.
The user authenticates via Okta and logs in through the P0 CLI. Using p0 ls, they view a list of available nodes, filtering down to on-prem machines with the --provider metal flag.
From there, they run p0 ssh. Behind the scenes:
<<INSERT SCREENSHOT TO VIDEO HERE: and link to XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX>>
On-prem systems are often governed by legacy controls — static keys, persistent local users, and outdated jump boxes.
P0 replaces that with:
If you’re still managing on-prem SSH access with static keys or shared users, this demo shows how to bring least privilege and automation to bare-metal systems.
Control and govern privileged access across all identities with P0 Security.