Skip to main content

Frequently Asked Questions

What is "break-glass" access?

"Break-glass" access is a controlled emergency procedure for accessing critical systems when normal access paths are unavailable or too slow.

Who can approve a request?

Approvers are designated roles within an organization. The exact roles and rules are configured by your organization.

How often should credentials be rotated?

Rotation schedules depend on your internal policy and risk level. AccessLedger tracks scheduled rotations and flags overdue items.

Where are audit logs stored?

Audit events are stored in the AccessLedger database and can be filtered and exported for compliance reporting.