Enhancement: Mandatory End Date and Max Duration on Access Requests

This feels like another half-baked feature that was not thought out as well as it should have been.

I don’t understand why the decision was made for the end or expiration time to be in force from the moment the request is submitted instead of from the moment final approval is granted and provisioning happens. This is not an intuitive design. I have IAM admins and management who have asked me why this works this way, as there is nothing we can do to change it.

Also, given the decision was made for the clock to start ticking at request time, I would think that you would let us submit temporary access in advance to get around this limitation, but nope, we can’t do that either and can only submit temporary access within the limits that we set on the role.

What this means from an IAM admin/engineering perspective, is we have users who are submitting requests and being approved and having access provisioned and then immediately deprovisioned who then reach out to us as to why they don’t have the access.

Again, not a well thought out implementation of this feature, which has the potential to be very useful, but not in its current state.

@jennifer_mitchell any idea when this will roll out to FedRAMP tenants?