# Privilege Elevation Policy Type

<figure><img src="https://762006384-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MJXOXEifAmpyvNVL1to%2Fuploads%2FI595UdvjH4gykBsHXssQ%2Fimage.png?alt=media&#x26;token=2ec2c1bd-17d2-494d-a8e0-e31095f89233" alt=""><figcaption></figcaption></figure>

### Overview

The Privilege Elevation policy provides control over the ability of a user to elevate to an administrative role. It is recommended to first apply a [Least Privilege policy](https://docs.keeper.io/en/keeperpam/endpoint-privilege-manager/policies/policy-types/least-privilege-policy-type) to ensure that standard users do not have built-in administrative privilege.

On Windows, the privilege elevation policy will trigger the Keeper Client user interface to open when the user triggers an elevation event. On macOS and Linux (Ubuntu/Gnome), the Keeper Client user interface is available for the user to initiate the request.

#### How it Works

On the endpoint, the Keeper agent service runs with system privilege. All elevations are executed with an ephemeral account called `keeperusersession`.

### Approval Control

Approval-based elevation integrates with a centralized global approval framework. All elevation approval requests are managed through a unified administrative interface, ensuring consistent governance across request types and enforcement models.

### Elevation Controls (ALLOW / DENY / MFA / JUSTIFY / APPROVAL)

Elevation policies may enforce granular command-level restrictions, allowing administrators to approve specific command-line arguments or subcommands while denying others within the same executable. This supports highly precise enforcement of elevated operations. **Controls are additive (stacked)**—when multiple applicable policies apply to the same elevation scenario, **all enforced requirements must be satisfied**. For example, if one policy requires **MFA** and another requires **approval**, the user must complete **both MFA and approval** before elevation is granted.

### Policy Targeting

Elevation policies support advanced targeting across user, machine, application, and collection attributes, enabling refined enforcement strategies that align to operational context.

### Managing Privilege Elevation

From the **Admin Console** > **Endpoint Privilege Manager** > **Policies** create a new policy. Select "**Privilege Elevation**" from the policy type and then "**Enforce**".

<figure><img src="https://762006384-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MJXOXEifAmpyvNVL1to%2Fuploads%2FyF34Hhz5w91CCV0jfJ6q%2Fimage.png?alt=media&#x26;token=b0003621-92d9-45e6-b501-e9150ea5aa5a" alt="" width="375"><figcaption></figcaption></figure>

Select the **control** (Require approval, Require MFA or Require justification)

<figure><img src="https://762006384-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MJXOXEifAmpyvNVL1to%2Fuploads%2FMrZkJhQhdrvsHLo6kaql%2Fimage.png?alt=media&#x26;token=210aaa06-48aa-4fd2-9233-36b7b2bca8d6" alt="" width="375"><figcaption></figcaption></figure>

After applying the policy, the affected users on the endpoint will need to adhere to the policy in order to elevate their role on the device.

As an example, if the user attempts to run cmd.exe as administrator, Keeper will intercept the request and prompt for approval.

<figure><img src="https://762006384-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MJXOXEifAmpyvNVL1to%2Fuploads%2Fr1Kfyvse1FRfr4oCk6KU%2Fimage.png?alt=media&#x26;token=843c2c95-0e76-4b57-aaf7-7f5efc05eda5" alt=""><figcaption></figcaption></figure>

If MFA or justification is required, the user is prompted.

<figure><img src="https://762006384-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MJXOXEifAmpyvNVL1to%2Fuploads%2FBTfa1jp7qbOQ0WpR11OW%2Fimage.png?alt=media&#x26;token=5f18447f-8df7-4a9d-96f4-501f9abb2510" alt="" width="275"><figcaption></figcaption></figure>

The Admin receives a request to approve the elevation.

<figure><img src="https://762006384-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MJXOXEifAmpyvNVL1to%2Fuploads%2FTkscgO2Fc2aSBPWVX3GY%2Fimage.png?alt=media&#x26;token=8ee4fcf1-06be-490a-9221-259c6e391ab7" alt="" width="375"><figcaption></figcaption></figure>

After approval, the user is able to run the approved command directly from the Keeper user interface.

<figure><img src="https://762006384-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MJXOXEifAmpyvNVL1to%2Fuploads%2FrM7He4Yvqnn1o6zQLsu6%2Fimage.png?alt=media&#x26;token=d07028b9-0d08-43ba-93f1-acda1d51a5ae" alt="" width="270"><figcaption></figcaption></figure>

### Ephemeral Accounts

**Ephemeral accounts** in KEPM are **temporary, system-managed local accounts** (commonly the **KeeperUserSession** account) that KEPM uses to perform **privilege elevation without permanently granting admin rights** to the end user. When an elevation is approved (and any required controls are satisfied), KEPM ensures the ephemeral account exists, uses it to run the approved process with elevated rights, and then **revokes that privilege automatically** and records the event for auditing. This approach supports “just-in-time” privilege by granting elevation only for the approved operation and only for as long as needed.

In practice, KEPM’s agent/job flow launches the elevated process **as the ephemeral account** (for example on Linux using `sudo -u <ephemeralAccount> <command>` rather than elevating the user directly), and KEPM includes APIs and background cleanup to manage these accounts over time (create/launch, list/delete, cleanup). On Windows, because the OS may generate profile folders when the ephemeral account is created/recreated, KEPM includes scheduled cleanup to remove **orphaned KeeperUserSession profile folders** that can accumulate under `C:\Users` after the account is deleted and recreated.
