How to Enable Just‑in‑Time (JIT) Access to Shared Accounts Using Rublon MFA

Modified on Mon, 23 Jun at 2:22 PM

The instructions below are intended for situations where several people have to share one set of primary credentials (username + password) and you want to let them in only when necessary.


Option #1: Individual Authenticators for Every Authorized Person

This approach ensures every person who shares the account has a distinct authenticator, which allows removing a single authenticator without affecting the rest.


1. Add the shared user account to Rublon MFA in one of the following ways:


Add the user account manually. Make sure the username is the same as the username in your external directory service.


Synchronize the account from an external directory like Active Directory or Entra ID.


• Ensure Enrollment Type is set to Automatic in the Rublon Admin Console and use the shared account’s primary credentials to sign in to the Rublon-integrated application. 


2. Enroll authenticators for this account:


Send an Enrollment Email to each person who will be using this shared account. Change the Email Address field before each Enrollment Email is sent to ensure everybody receives the email in their mailbox and enrolls their authenticator by opening the link inside the email message.


3. Change the shared account’s status to Denied so that any login attempt stops at the password stage with Access Denied!.


• To grant temporary access, set the status to Active just before the maintenance window, shift, or ad‑hoc session begins. Users log in with the shared username/password and complete MFA with their own registered authenticator.


• As soon as work is finished, switch the account back to Denied. With this approach, you only flip a status flag; no re‑enrollment is required, and logs clearly show who authenticated via which authenticator.


StatusEffect on loginTypical use
ActivePassword plus second MFA factor required.Normal, controlled access period.
DeniedAll logins are blocked (users see Access Denied!).The default state when nobody should be able to use the account.


Option #2: Supervised MFA (Approval‑Based JIT)

Sometimes you want the login to be performed by Operator A while the MFA confirmation must come from Supervisor B:


1. Add the shared user account to Rublon MFA in one of the following ways:


Add the user account manually. Make sure the username is the same as the username in your external directory service.


Synchronize the account from an external directory like Active Directory or Entra ID.


• Ensure Enrollment Type is set to Automatic in the Rublon Admin Console and use the shared account’s primary credentials to sign in to the Rublon-integrated application. 


2. Enroll authenticators for supervising admins:


Send an Enrollment Email to each person who will be using this shared account. Enter each person’s email address before sending the Enrollment Email to ensure everybody enrolls their authenticator by opening a link they receive in their mailbox.


3. Hide the Manage Authenticators button by unchecking Let Users Manage Authenticators. After doing that, users will not be able to add new authenticators in the Rublon Prompt


4. During login:


  1. The operator enters the shared username and password.
  2. The operator chooses the supervisor’s registered authenticator.
  3. The supervisor receives the authentication request and approves it.


Tip: If there is only one supervisor, enable the Default Authentication Method to prompt the supervisor for MFA automatically once the password is correct, reducing the time the Operator spends at the Rublon Prompt.


The following table describes how well each authentication method fits into Supervised MFA.


MethodHow approval happensRecommended?Notes
Mobile PushTap Approve in Rublon Authenticator.Fastest and most convenient method.
Phone CallPress any key during the call.Works even on landlines.
SMS LinkOpen the link in the text message.Convenient but not as fast or secure as Mobile Push.
Email LinkOpen the link in the email message.Convenient but not as fast or secure as Mobile Push.
QR CodeScan the QR code using Rublon Authenticator.Requires the supervisor to be physically present or the operator to share screen, which is inconvenient.
PasscodeEnter the passcode from an app.Requires the supervisor to be physically present or to tell/send the OTP value to the operator, which is inconvenient.
SMS PasscodeEnter the passcode from a text messageRequires the supervisor to be physically present or to tell/send the OTP value to the operator, which is inconvenient.
WebAuthn/U2F Security KeyPlug in and touch the key.Best phishing‑resistance, but not remote‑friendly, and inconvenient for the supervisor who has to be physically present with the key.
YubiKey OTPInsert and touch the key.Not remote‑friendly, and inconvenient for the supervisor who has to be physically present with the key.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article