Least privilege is normally the priority in identity governance, but sometimes in an emergency you need all the access. Learn how Lumos can help you plan for the unexpected without excessive standing access.


In modern identity management, the guiding principle is clear: least privilege. Users should only have access to the systems and data they need—no more, no less. This reduces the attack surface, limits accidental damage, and ensures compliance with security frameworks.
But even in the most tightly controlled environments, reality has a way of throwing curveballs. Systems go down, key employees are unavailable, security incidents demand urgent response—and suddenly, your strict access controls are the very thing preventing recovery. That’s when you need “break glass” access—temporary, emergency access that gives trusted individuals extraordinary privileges when the situation demands it.
The challenge? Making that access instantly available—but only to the right person and for the right amount of time.
Break glass access refers to predefined methods that allow certain individuals or teams to override normal access restrictions during emergencies. Think of it like a fire extinguisher behind glass: you don’t want people using it casually, but you do need it to be immediately accessible when things are on fire.
Here are a few scenarios where emergency access is not just helpful but essential:
Without a break glass plan, teams risk losing hours—or even days—trying to regain control, losing revenue and reputation with each passing minute.

Historically, emergency access has been handled through shared credentials, out-of-band admin accounts, or manual escalation paths. While functional, these methods come with serious risks:
In other words: traditional break glass mechanisms often succeed at providing access, but fail at controlling, monitoring, and securing that access.

At Lumos, our goal is “Autonomous Identity”—to make access self-managing and self-optimizing as much as possible, so the right identity gets the right access for the right amount of time. This applies to break glass access too. With just-in-time (JIT) access, pre-approval workflows, and detailed auditing, you can have your fire extinguisher—and still keep it secure.
Here’s how break glass access works in Lumos:
Security teams can define break glass access in advance—specifying who can request what, under which circumstances, and for how long. These rules can include:
This ensures that when an emergency happens, you’re not scrambling for approvals—you’ve already planned for it.
Instead of granting standing admin privileges or static credentials, Lumos supports JIT access. An eligible user can trigger an emergency request, and access is provisioned dynamically—just for the duration needed. When the time expires, access is automatically revoked.
This drastically reduces the risk of long-lived privileges sitting unused, where they can be exploited by an attacker.
Every access request, including break glass scenarios, is logged in detail: who made the request, and how it was approved. In addition, since emergency access is temporarily granted to an employee's existing identities, all logs will show who has taken an emergency action, with no confusion around which person was actually behind a break glass identity. This creates a clean audit trail that simplifies compliance reviews and builds trust with security teams.
Security or compliance teams can be automatically notified when break glass access is used. This ensures oversight without delay and helps enforce accountability without needing to micromanage.
Break glass access is a necessity—not a failure of identity governance, but a safety net for the real world. The key is not just making it possible, but making it secure, traceable, and hard to misuse.
By combining pre-approved workflows, time-limited access, and detailed monitoring, Lumos makes it easy to support emergencies without sacrificing control. The power goes only to the right person, when you really need it, and only as long as you need it. Book a demo today to learn more!
Book a 1:1 demo with us and enable your IT and Security teams to achieve more.