Skip to main content

Managing Permissions on Demand Request Approvers

One-Click Least Privilege. Zero Disruption.



© 2026 Sonrai Security. All rights reserved.

Overview

Permissions on Demand requires a defined listing of Approvers. This list provides a means to allow your organization to extend permission approval to those who have suitable authority and knowledge to authorize usage.

info

The list of Approvers defined within the Cloud Permissions Firewall are not required to have any associated privileges within your cloud estate to mutate the respective Cloud Controls or change any cloud access, this is simply about change management!


Prerequisites

The "Administrator" RBAC role is required for assigning/removing Approvers.


Adding Approvers

You can add Approvers at any scope within your cloud hierarchy — from the organization level down to individual accounts or projects. From the Approvers page, select the pencil icon on any scope row to open the Manage Approvers modal for that scope.

The main Approvers page showing the list of currently assigned PoD/JIT approvers for the selected scope. Select the pencil icon to edit approvers at that scope.The main Approvers page showing the list of currently assigned PoD/JIT approvers for the selected scope. Select the pencil icon to edit approvers at that scope.

From the Manage Approvers modal, you can add or remove users from the approver list for the selected scope.

The Manage Approvers modal, showing the approver list for the selected scope and the toggle to allow self-approval for PoD Requests.The Manage Approvers modal, showing the approver list for the selected scope and the toggle to allow self-approval for PoD Requests.

Click to open the Add Approver modal. Start typing to search for matching users in your CPF system — results appear automatically.

The Add Approver modal, showing a search field where users can type to find and add approvers from the CPF system.The Add Approver modal, showing a search field where users can type to find and add approvers from the CPF system.

Approvers added at a higher scope are inherited by all nested scopes below it. To remove an approver, click the delete icon beside their name in the Manage Approvers modal.

Overriding Inherited Approvers

Selecting the "Below this point, override previously assigned approvers" checkbox forces the currently specified approver settings to all underlying OUs (AWS) or folders (GCP), replacing any approvers previously assigned at those scopes.

The Manage Approvers modal with the 'Below this point, override previously assigned approvers' checkbox selected, which forces approver settings to all underlying OUs or folders.The Manage Approvers modal with the 'Below this point, override previously assigned approvers' checkbox selected, which forces approver settings to all underlying OUs or folders.

Allowing Self-Approval

By default, users cannot approve their own PoD or JIT access requests. Self-approval allows you to change this behaviour on a scope-by-scope basis, reducing friction for trusted users while preserving full audit visibility.

When self-approval is enabled at a scope, the self-approval icon (Self-approval icon) appears beside that scope in the Approvers list.

Self-approval is configured from the Manage Approvers modal using the Allow Self-approval for PoD Requests toggle. Settings are inherited down the scope hierarchy from the level at which they are applied.

info

The self-approval setting is checked at the moment a request is created, based on the originating scope. Self-approval status then applies to that request for its lifetime.

If a request escalates to a higher scope, the self-approval mode from the originating scope applies — escalation does not change the self-approval status for this request.

Self-Approval Modes

When the Allow Self-approval for PoD Requests toggle is enabled, a dropdown appears with two modes:

  • Only assigned approvers
  • Everyone at this scope
The self-approval dropdown in the Manage Approvers modal, showing 'Only Assigned Approvers' and 'Everyone at this Scope' as available modes.The self-approval dropdown in the Manage Approvers modal, showing 'Only Assigned Approvers' and 'Everyone at this Scope' as available modes.
Self-Approval ModeWho Can Self-Approve?
Self-approval OFFNo one. Approvers are excluded from approving their own requests. (Default)
Only assigned ApproversOnly users who are already named approvers at the originating scope can self-approve their own requests.
Everyone at this scopeAny user who submits a JIT or PoD request at this scope can self-approve — the approver role is not required.

Notifications

When a request is self-approved or self-denied, email and ChatOps notifications reflect the action accordingly:

EventRequester receivesApprovers receive
Approved by anotherYou were approved access…Approved by [approver]
Self-approvedYou self-approved access…Self-Approved by [requester]
Denied by anotherYou were denied access…Denied by [approver]
Self-deniedYou denied access…Self-Denied by [requester]

You can also check the Detailed Audit Log tab from the Reporting page to see when requests were self-approved:

The self-approval dropdown in the Manage Approvers modal, showing 'Only Assigned Approvers' and 'Everyone at this Scope' as available modes.The self-approval dropdown in the Manage Approvers modal, showing 'Only Assigned Approvers' and 'Everyone at this Scope' as available modes.