Why This Is Sometimes Required
Certain services — such as troubleshooting, migrations, updates, or configuration changes — require authenticated access to systems we are working on.
We request only the minimum access necessary
and only when it’s required
to complete approved work.
