Just in Time Admin Access Crate
What does the Just in Time Admin Access Crate do?
Our Just in Time Admin Access Crate provides Just-in-Time (JIT) administrative access, temporarily granting Global Admin rights in Microsoft 365, or domain admin rights in on-premises Active Directory though the use of a form.

The Just in Time Admin Access Crate automates the following processes.
Grant Temporary Administrative Access
For Microsoft 365, it assigns Global Admin privileges for a specified duration.
For on-premises, it assigns Domain Admin rights within Active Directory.
It creates or re-enables accounts as needed.
Automatic Documentation
The user must select the ticket they are working on and provide a reason for requesting temporary admin access. This ensures proper oversight and accountability for the use of privileged access.
Automated Expiration & Cleanup
After the set duration:
Microsoft 365 accounts have Global Admin revoked, and are deleted.
On-premises accounts have Domain Admin removed, are disabled, and have their passwords reset.
Status updates are added to the ticket when access is granted and revoked.
Why use the Just in Time Admin Access Crate?
This Crate is ideal for MSPs managing client environments securely and efficiently. It ensures that admin access is time-limited, reducing security risks while streamlining support operations. Common use cases include:
Emergency troubleshooting – Quickly assign temporary M365 or Domain Admin access to resolve critical issues.
Routine maintenance – Provide short-term admin rights for patching, updates, or Active Directory tasks.
System migrations – Grant Global or Domain Admin access for seamless infrastructure transitions.
Third-party vendor access – Offer controlled admin access without permanent account creation.
Security audits & compliance – Ensure admin access is documented, temporary, and automatically revoked.
By automating account provisioning and de-provisioning, this Crate enhances security, compliance, and efficiency, while reducing manual workload.
Crate prerequisites
For Microsoft 365 setup, our Microsoft Cloud integration bundle must be set up first.
For Active Directory setup, you’ll need to first set up your RMM integration, or Agent Smith.
Your PSA must be integrated with Rewst.
An open ticket must exist in your PSA.
Unpack the Just in Time Admin Access Crate
Navigate to Crates > Crate Marketplace in the left side menu of the Rewst platform.
Search for
Just in Time Admin Access Crate
.Click on the Crate tile to begin unpacking.
Change the name of the Workflow to suit your needs, if desired.
Leave all the form options as the default.
Click Unpack. The Crate will now unpack the workflow, trigger and form ready to be used.
Example: Unpack the Just in Time Admin Access Crate

Navigate to the Just in Time Admin Access form
To get to the form to create a Temporary Administrative Account:
Navigate to Automations > Forms.
Select the Search field and enter the form name
[Rewst] Just In Time Admin Access
.Click on the Options menu to the right of the form.
Click Usages.
Click on the Dynamic Form URL to open the form as the parent organization.
Fill out the form
Once you're in the form, you’ll need to enter information into the following fields:
Identity Provider
Choose the environment where administrative access is needed from the drop down list:
M365 (Microsoft 365): Grants Global Admin rights within the client’s Microsoft 365 tenant.
On Prem AD (Active Directory): Grants Domain Admin rights in the client’s on-premises Active Directory environment.
Choose the correct option based on whether the client’s infrastructure is cloud-based or on-premises.
Customer
Select the client for whom administrative privileges will be granted.
Example:
pedroaviary
This ensures the access request is linked to the correct client environment.
Ticket
Choose the ticket number related to the access request from the drop down list.
This links the admin access session to an active support ticket, for tracking and audit purposes.
Duration
Specify the duration in minutes for which administrative access should be granted.
Use only the time necessary to complete the task to minimize security risks.
Reason
Provide a detailed explanation of why administrative access is needed.
Example:
Admin access is required to apply security patches and restart domain controllers in the client's on-premises Active Directory.
This creates accountability, and helos with compliance by documenting the justification for elevated access.
Temporary Password
Click the Refresh button to generate a one-time-use temporary password for the session.
Important: Copy this password to your clipboard before submitting the request, as it won't be retrievable later by any forms users. This password will be used to log in to the temporary admin account for the duration of the session.
Note: A Rewst Admin account can retrieve the password, as explained in the troubleshooting section at the end of this guide.
Example: Use the [Rewst] Just In Time Admin Access form

Retrieve the username from the ticket
When the Just in Time Admin Access Crate completes, your ticket will be updated with the username of the temporary administrative account. This username can be found in the following formats, depending on whether it’s for Microsoft 365 or Active Directory (AD).
For Microsoft 365 Accounts
When the temporary account is enabled with Global Admin rights, the ticket will include:
The account [username] is now enabled and has been added to the Global Admin role.
To retrieve the username:
The user principal name (UPN) is typically the email address of the temporary account.
The username can be extracted by using the first part of the email address, before the @, and the domain, after the @. For example: Username:
[email protected]
For Active Directory accounts
When the temporary account is enabled with Domain Admin rights, the ticket will include:
The tech account [tech_account] is now enabled
.
If you need to retrieve the username, the tech account username is generated by combining the user's name with the client's domain prefix.
For example:
The email [email protected] would have a tech account of example.user-pedroaviary .
What happens once the time runs out?
On-premises Active Directory cleanup
Once the time limit expires:
Admin Privileges Removed – The account is removed from the Domain Admins group, revoking elevated permissions.
Account Disabled – The user account is disabled to prevent further access.
Password Reset – The password is automatically reset to prevent unauthorized reactivation.
Ticket Update – A status update is added to the ticket, confirming that access has been revoked. The user account is disabled, however still exists and is not deleted.
This ensures that no lingering admin access remains, maintaining security within the on-premises environment.
Microsoft 365 Cleanup
Once the time limit expires:
Global Admin Privileges Revoked – The account is removed from the Global Admin role, eliminating elevated permissions.
Account Deleted – The temporary admin account is permanently deleted from Microsoft 365, preventing further use.
Ticket Update – A status update is added to the ticket, confirming that access has been revoked and the account has been removed.
Since Microsoft 365 operates in a cloud environment, deleting the account ensures there is no lingering access or risk of reactivation.
Both processes are fully automated, reducing manual workload while enforcing security best practices and compliance.
Troubleshoot the Just in Time Admin Access Crate
If you need to retrieve the username and password for the temporary admin account from Rewst directly for any reason, follow these steps. The process differs slightly depending on whether the request was for On-Premises Active Directory or Microsoft 365.
Step-by-step guide
Navigate to Automations > Forms.
Search for the form [Rewst] Just In Time Admin Access.
Open the form’s options by clicking the ⋮ menu to the right.
Click Usages.

Click on the link [Rewst] Just-In-Time Admin Access v2, in the Workflow column.
Click the Chart button next to the pencil icon in the top toolbar to select View results for this workflow*,* as shown in the image below.
If multiple workflows exist, verify the approximate submission time of the [Rewst] Just In Time Admin Access form with the requester. Then, locate the workflow result under the Created At column, and open it by clicking the Status result or the > button.
To identify the user who submitted the request:
Click Load Context.
Expand the first dictionary object in the list.
Expand user to find the username of the requester. For example:
*[email protected]*
In the inputs list, locate the password that was generated.
Find the username of the temporary admin account based on the identity provider:
For On-Prem AD:
Expand the execution results of start_on_prem_jit.
Check the activate_admin_user result to find the username of the temporary Domain Admin account.
For Microsoft 365:
Expand the execution results of start_m365_jit.
In the create_m365_user action, locate the userPrincipalName—this is the login username.
Example: Retrieve username and password
Below is an example of retrieving both the username and password for a Microsoft 365 workflow by following the process outlined in the guide above.

Last updated
Was this helpful?