Skip to content

How jitsudo Compares

JIT (Just-In-Time) privileged access tools exist in three broad categories:

  1. Cloud-native JIT — built by cloud providers for their own IAM systems
  2. Commercial PAM — enterprise products with JIT as one feature among many
  3. Open source, self-hosted — jitsudo

Each has a different design center, and the right tool depends on your environment.


Cloud providers offer native JIT tools:

ToolProviderLicense
IAM Identity Center (temporary elevations)AWSProprietary
Privileged Identity Management (PIM)AzureRequires Entra ID P2
Privileged Access Manager (PAM)GCPProprietary

These tools are excellent if you live in a single cloud. They’re tightly integrated with that provider’s IAM model, audit trail, and console experience.

The problem: most infrastructure teams don’t live in one cloud.

If your team runs on AWS for production, GCP for ML workloads, and Kubernetes for internal tools, you have three separate access workflows, three audit trails, and three sets of approval processes. There is no unified view of who has elevated access to what, across all environments.

jitsudo is designed for this reality:

  • Single control plane across AWS, Azure, GCP, and Kubernetes
  • Unified audit log for every request, approval, and expiry — regardless of provider
  • One CLI, one policy language, one approval workflow

Enterprise PAM platforms (CyberArk, BeyondTrust, StrongDM) are powerful, comprehensive tools. They cover session recording, bastion host functionality, credential vaulting, compliance reporting, and JIT access — all in one product.

The trade-offs:

  • SaaS dependency: most commercial PAM tools are cloud-hosted. Your access control plane lives outside your infrastructure.
  • Proprietary configuration: policies and workflows are configured through GUI or proprietary DSLs, not code.
  • Cost: enterprise PAM is typically per-seat or per-resource licensed, with costs that scale significantly.
  • Complexity: full PAM suites are multi-week implementations. jitsudo can be operational in a day.
  • Not agent-native: none of these tools were designed with AI agents as first-class requestors or approvers.

jitsudo’s position: not a full PAM suite. jitsudo does JIT access management well. It does not do session recording, VPN, credential vaulting, or bastion host functionality — those are separate tools with separate jobs. See What jitsudo is NOT.


Teleport is open source (Apache 2.0), has a strong CLI (tsh), and is widely used in infrastructure teams. It deserves its own section because it is frequently evaluated alongside jitsudo — and the comparison is not straightforward.

What Teleport does: Teleport is a network access and session recording platform. It manages access to servers, databases, Kubernetes clusters, and internal web apps via its proxy model. It provides audited SSH, database, and kubectl sessions with session recording and replay.

What Teleport does not do: Teleport does not manage cloud IAM role assignments. It cannot grant a user a temporary roles/storage.objectViewer binding in GCP IAM, a temporary Reader role assignment in Azure RBAC, or a temporary sts:AssumeRole session in AWS IAM. These are fundamentally different things from network access.

DimensionTeleportjitsudo
Network access (SSH, DB, kubectl)
Session recording
Cloud IAM JIT (AWS, Azure, GCP)
Kubernetes RBAC JITPartial (via app access)✓ (RoleBinding management)
Policy-as-codePartial (YAML RBAC)✓ (OPA/Rego)
Open source✓ (Apache 2.0 core)✓ (ELv2 control plane)

If your threat model centers on audited network access and session recording, Teleport is a good choice. If it centers on temporary cloud IAM privilege elevation with policy-as-code approval workflows, that is jitsudo’s problem space. Many teams run both.


Vault’s dynamic secrets engine generates short-lived credentials on demand for databases, cloud providers, and other systems. It solves a related but different problem.

DimensionVault dynamic secretsjitsudo
What it managesCredentials / secretsIAM role assignments / permission grants
Approval workflowNone (policy-gated issuance)Optional human or AI approval step
Audit trailVault audit logjitsudo tamper-evident audit log
Multi-cloudYes (via plugins)Yes (native AWS/Azure/GCP/K8s)
Break-glassN/ABuilt-in with alerting

Vault and jitsudo are complementary. Vault manages the credentials jitsudod uses to call cloud provider APIs. jitsudo manages the human (and agent) approval workflow for elevated access grants.


jitsudo’s design decisions favor teams that:

Needjitsudo approach
Multi-cloud coverageNative AWS, Azure, GCP, Kubernetes providers; one control plane
Self-hosted, no SaaSDeploy on your own infrastructure; no external dependency
Policy-as-codeOPA/Rego policies in git; version-controlled, reviewable, testable
CLI-first workflowsjitsudo exec injects credentials into any subprocess
AI agent accessMCP interface for agents as first-class requestors and approvers
Audit integritySHA-256 hash chain; tamper-evident; exportable to SIEM
Open sourceApache 2.0 CLI/SDK; ELv2 control plane (free for self-hosted use)

In 2026, every infrastructure team is grappling with AI agents that need cloud access. The existing tool landscape was not designed for this.

The problem with persistent credentials for AI agents:

  • An agent with standing admin access has unlimited blast radius on any model error, prompt injection, or unexpected behavior
  • Audit trails for agent actions are inconsistent — who approved this? what reasoning was used?
  • Existing PAM tools have no concept of an AI agent as a principal or approver

jitsudo’s approach:

  • Agents as requestors: the MCP server interface lets any AI agent request JIT elevation on its own behalf, subject to the same OPA eligibility and approval workflow as humans. A misbehaving agent can only submit a request — the approval workflow still gates it.
  • Agents as approvers: the MCP approver interface lets an AI agent evaluate pending requests against contextual signals and approve, deny, or escalate. Every AI approval includes the model’s reasoning in the audit log. Uncertainty always routes to human escalation.

No existing open source JIT PAM tool was built with AI agents as first-class participants in the access workflow. This is jitsudo’s differentiated position.


DimensionjitsudoAWS IAM Identity CenterAzure PIMGCP PAMTeleportCyberArk / BeyondTrust
Multi-cloud IAM JITAWS onlyAzure onlyGCP only✗ (network access)
Self-hosted✗ (AWS-managed)✗ (Azure-managed)✗ (GCP-managed)✓ (on-prem)
Open source✓ (Apache 2.0)
Policy-as-code✓ (OPA/Rego)LimitedGUI onlyLimitedPartial (YAML RBAC)GUI/proprietary
AI agent native
CLI-firstPartialPartial✓ (tsh)
Session recording
Bastion host
LicenseELv2 (free self-hosted)Included with AWSRequires Entra P2Usage-basedApache 2.0 / EnterprisePer-seat enterprise