Skip to content

NKCODE TECH GEEK ZONE

  • RSS - Posts
Menu
  • Home
  • Cloud
    • Azure
    • Alibaba
    • AWS
  • Hardware
  • Linux
  • Network
  • Security
  • Windows Client / Servers
    • SQL
    • Windows Client OS
      • Windows 10
    • Windows Servers
      • Windows 2008R2
      • Windows Server 2012R2
      • Windows Server 2016
      • Windows Server 2019
  • VMWARE
  • Free Tools
  • About Me
    • Disclaimer
Menu

Just-In-Time Node Access Using AWS Systems Manager (Step-by-Step Guide)

Posted on August 20, 2025

Introduction

Managing secure access to servers is one of the biggest challenges in cloud environments. Traditionally, administrators use SSH keys, bastion hosts, or VPN access to connect to servers. These methods can introduce security risks, key management issues, and unnecessary permanent access.

Just-In-Time (JIT) Node Access solves this problem by providing temporary, controlled access to servers only when required.

Using AWS Systems Manager, administrators can securely connect to instances without opening SSH ports or managing SSH keys.

This guide explains how to implement Just-In-Time node access using AWS Systems Manager Session Manager.

What is Just-In-Time Node Access?

Just-In-Time access means:

  • Users request access only when needed

  • Access is granted temporarily

  • All activities are logged and audited

  • No permanent SSH access is required

Benefits:

✔ Improved security
✔ No open SSH ports (port 22 closed)
✔ Centralized access control
✔ Full session logging
✔ Temporary permissions

Key components used:

  • AWS Systems Manager

  • AWS Session Manager

  • Amazon EC2

  • AWS Identity and Access Management

Workflow:

  1. User requests temporary access.

  2. IAM grants limited access.

  3. User connects via Session Manager.

  4. Access automatically expires.

Prerequisites

Before implementing JIT access, ensure the following:

✔ An AWS account
✔ An EC2 instance running
✔ SSM Agent installed
✔ IAM role attached to EC2 instance

Step 1 — Launch an EC2 Instance

  • Log in to **Amazon EC2 console.

  • Click Launch Instance.

  • Choose an AMI (e.g., Amazon Linux 2).

  • Select instance type (e.g., t2.micro).

  • Configure security group:

    • Do NOT open SSH (port 22).

  • Launch the instance.

Step 2 — Attach IAM Role for Systems Manager

The instance must have permission to communicate with Systems Manager.

Steps:

  1. Go to AWS Identity and Access Management.

  2. Click Roles → Create Role.

  3. Select EC2 service.

  4. Attach the policy:

AmazonSSMManagedInstanceCore

  1. Create the role.

  2. Attach the role to the EC2 instance.

Now the instance can communicate with Systems Manager.

Step 3 — Verify Instance in Systems Manager

Steps:

  1. Open **AWS Systems Manager console.

  2. Navigate to:Node Management → Managed Instances

  1. Confirm your EC2 instance appears in the list.

If it appears, the SSM agent is working correctly.

Step 4 — Configure Just-In-Time Access Using IAM

Create a policy that allows temporary session access.

Example IAM policy:

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "ssm:StartSession",
        "ssm:TerminateSession",
        "ssm:DescribeSessions"
      ],
      "Resource": "*"
    }
  ]
}

Attach this policy to users who need temporary access.

For stronger security:

  • Use IAM Identity Center

  • Use temporary role assumption

  • Set session duration limits

Step 5 — Connect Using Session Manager

Steps:

  1. Open Systems Manager Console.

  2. Navigate to:Session Manager → Start Session

  1. Select the EC2 instance.

  2. Click Start Session.

A browser-based terminal will open.

No SSH keys required.

Step 6 — Enable Session Logging (Recommended)

For auditing purposes, enable session logging.

You can store logs in:

  • Amazon CloudWatch

  • Amazon S3

Steps:

  1. Open Session Manager Preferences.

  2. Enable Session Logging.

  3. Select S3 or CloudWatch.

Now all user sessions are recorded.

Security Best Practices

✔ Use IAM roles instead of SSH keys
✔ Enable session logging
✔ Use multi-factor authentication (MFA)
✔ Use temporary IAM roles for JIT access
✔ Restrict session duration

Advantages of JIT Access with Systems Manager

Feature Benefit
No SSH ports Reduced attack surface
Temporary access Improved security
Session logging Full auditing
No bastion hosts Simplified architecture
Browser access Easy management

Using AWS Systems Manager Session Manager, organizations can implement secure Just-In-Time access to EC2 instances without opening SSH ports or managing keys.

This approach:

  • Improves security

  • Simplifies access management

  • Provides full auditing

  • Eliminates bastion hosts

JIT access is now considered a best practice for cloud infrastructure security.

Share this:

  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Reddit (Opens in new window) Reddit
  • Email a link to a friend (Opens in new window) Email

Like this:

Like Loading...

Related

Welcome to Teck Geek Zone

Alibaba & Azure Cloud with a free trial worth $200-1200 USD Click below Cloud Providers

  • A Step-by-Step Guide Upgrading vSphere 8.x to VMware Cloud Foundation 9.0
  • Azure AI Services Cost Optimization: Strategies for Efficient and Scalable AI
  • 🚀 What’s New for Windows 365 & Azure Virtual Desktop: Top Announcements from Microsoft Ignite 2025
  • Securing Your Cloud Environment with Alibaba Cloud Firewall
  • 🚢 Sailing into the Data Age: How Cloud and IoT are Revolutionizing the Marine Industry

Categories

  • Cloud (190)
    • Alibaba (39)
    • AWS (40)
    • Azure (117)
  • Free Tools (5)
  • Hardware (17)
  • Linux (13)
  • Network (28)
  • Security (21)
  • VMWARE (58)
  • Windows OS (44)
    • Windows 10 (7)
  • Windows Servers (69)
    • SQL (3)
    • Windows 2008R2 (7)
    • Windows Server 2012R2 (15)
    • Windows Server 2016 (20)
    • Windows Server 2019 (10)

Subscribe to our newsletter

©2026 NKCODE TECH GEEK ZONE | Design: Newspaperly WordPress Theme
 

Loading Comments...
 

    %d