{"version":1,"pages":[{"id":"2c5bL4gsc81fnImQpcAY","title":"What Is P0?","pathname":"/","siteSpaceId":"sitesp_4wGG6","description":"P0 Security is a cloud-native Privileged Access Management platform. Enforce just-in-time access and least-privilege governance across multi-cloud environments."},{"id":"fQpbbGMQOmIuAkMUWvaH","title":"P0 Dashboard","pathname":"/readme/p0-dashboard","siteSpaceId":"sitesp_4wGG6","emoji":"1f39b","description":"Track access security with automated reporting. View identities, posture findings, JIT access metrics, and request trends from the P0 dashboard.","breadcrumbs":[{"label":"What Is P0?"}]},{"id":"Gtv7FF0r3wGs1iPQlkiM","title":"Access Inventory","pathname":"/readme/access-inventory","siteSpaceId":"sitesp_4wGG6","emoji":"1f50e","description":"Discover production assets, identities, and access risks across AWS, Google Cloud, Kubernetes, Okta, and Google Workspace with P0's access inventory.","breadcrumbs":[{"label":"What Is P0?"}]},{"id":"e2hny5Ivp27MvmR6YIiR","title":"Posture","pathname":"/readme/posture","siteSpaceId":"sitesp_4wGG6","emoji":"1fa91","description":"Automatically scan your cloud environment for access risks. P0 Security detects overprivileged accounts, stale credentials, and security vulnerabilities.","breadcrumbs":[{"label":"What Is P0?"}]},{"id":"WsKD3kAwkLlLemZ66gzA","title":"Just-In-Time Access","pathname":"/readme/just-in-time-access","siteSpaceId":"sitesp_4wGG6","emoji":"23f1","description":"Grant tailored, short-lived privileges to specific cloud resources on demand. Reduce standing access and enforce least privilege with P0 Security's JIT access.","breadcrumbs":[{"label":"What Is P0?"}]},{"id":"KpIZuocJSZsC39c6tb36","title":"Service-Account Key Rotation","pathname":"/readme/service-account-key-rotation","siteSpaceId":"sitesp_4wGG6","emoji":"267b","description":"Manage rotation of static service account credentials for third-party systems. P0 discovers owners, creates fresh credentials, and coordinates updates.","breadcrumbs":[{"label":"What Is P0?"}]},{"id":"tJsL5jEkznAVvQmOUPOv","title":"P0 Onboarding","pathname":"/getting-started/p0-security-onboarding","siteSpaceId":"sitesp_4wGG6","description":"Deploy P0 Security, integrate your cloud environments, and establish just-in-time access for human and non-human identities. For security and DevOps teams.","breadcrumbs":[{"label":"Getting started"}]},{"id":"cWEkviSlSZEc0aoxwfEQ","title":"Supported Identity Providers","pathname":"/getting-started/p0-security-onboarding/supported-identity-providers","siteSpaceId":"sitesp_4wGG6","emoji":"1f441","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"P0 Onboarding"}]},{"id":"BiPMcxX33BXeahsmJQoC","title":"Okta Sign-In Setup","pathname":"/getting-started/p0-security-onboarding/supported-identity-providers/okta-sign-in-setup","siteSpaceId":"sitesp_4wGG6","emoji":"1f511","description":"","breadcrumbs":[{"label":"Getting started"},{"label":"P0 Onboarding"},{"label":"Supported Identity Providers","emoji":"1f441"}]},{"id":"kn3Mg03ByLowqw155BWv","title":"Getting Started with Just-in-Time Access","pathname":"/getting-started/getting-started-with-just-in-time-access","siteSpaceId":"sitesp_4wGG6","emoji":"2b07","description":"Install P0 Security, configure approval workflows, and make your first just-in-time access request. A step-by-step guide for security and DevOps teams.","breadcrumbs":[{"label":"Getting started"}]},{"id":"BXRsF0IWUboDhnG2thPj","title":"Getting Started with Inventory & Posture","pathname":"/getting-started/getting-started-with-inventory-and-posture","siteSpaceId":"sitesp_4wGG6","emoji":"2b07","description":"Connect your cloud environment, run your first access scan, and discover identity risks with P0 Security's inventory and posture management tools.","breadcrumbs":[{"label":"Getting started"}]},{"id":"HLUsBHeCbSXMP13fdc8K","title":"Share P0 With Your Team","pathname":"/getting-started/share-p0-with-your-team","siteSpaceId":"sitesp_4wGG6","emoji":"1f381","description":"Use the P0 slackbot to help your users learn how to create access requests through P0.","breadcrumbs":[{"label":"Getting started"}]},{"id":"7GB97pXtp8YPYxzO1iJh","title":"Access Inventory","pathname":"/inventory/access-inventory","siteSpaceId":"sitesp_4wGG6","emoji":"1f5fa","description":"Browse and query your entire IAM configuration. Combine data from identity providers, IAM policies, access logs, and P0's IAM Privilege Catalog.","breadcrumbs":[{"label":"Inventory"}]},{"id":"BdqgY99GYHRIZqHuCgVu","title":"Result Details","pathname":"/inventory/result-details","siteSpaceId":"sitesp_4wGG6","emoji":"1f52c","description":"","breadcrumbs":[{"label":"Inventory"}]},{"id":"L2wI3IpOjLw28xzCzBuJ","title":"Query Search","pathname":"/inventory/query-search","siteSpaceId":"sitesp_4wGG6","emoji":"2754","description":"","breadcrumbs":[{"label":"Inventory"}]},{"id":"FddBxtUzoCKPNP4SpT5v","title":"Search Reference","pathname":"/inventory/query-search/search-reference","siteSpaceId":"sitesp_4wGG6","emoji":"1f4d6","description":"","breadcrumbs":[{"label":"Inventory"},{"label":"Query Search","emoji":"2754"}]},{"id":"fY3XLGooxAve9jAw9zwJ","title":"Posture Overview","pathname":"/posture/posture-overview","siteSpaceId":"sitesp_4wGG6","emoji":"2696","description":"Detect access vulnerabilities with automated monitors. View scan results, define custom policies, and enforce organization-specific access controls with P0.","breadcrumbs":[{"label":"Posture"}]},{"id":"LmlcBvmyjVJ8tQdyp6DX","title":"Monitor Results","pathname":"/posture/monitor-results","siteSpaceId":"sitesp_4wGG6","icon":"list-radio","emoji":"1f4ca","description":"","breadcrumbs":[{"label":"Posture"}]},{"id":"VrsjpXr5XHXWg0moQ2Kn","title":"Finding Details","pathname":"/posture/finding-details","siteSpaceId":"sitesp_4wGG6","emoji":"1f914","description":"","breadcrumbs":[{"label":"Posture"}]},{"id":"AewPrlSwjZQPZjXip6rR","title":"Just-in-time access","pathname":"/orchestration/just-in-time-access","siteSpaceId":"sitesp_4wGG6","emoji":"23f0","description":"Set up ephemeral, on-demand access to production resources. Requests are approved, provisioned, and automatically revoked within minutes using P0 Security.","breadcrumbs":[{"label":"Orchestration"}]},{"id":"Pycv2zpswUhdyvHKxEiy","title":"Requesting Access","pathname":"/orchestration/just-in-time-access/requesting-access","siteSpaceId":"sitesp_4wGG6","emoji":"1f590","description":"This page describes how to make a just-in-time access request using P0","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"}]},{"id":"lvWsM8xV0c4OXMG8PIaC","title":"For Another Party","pathname":"/orchestration/just-in-time-access/requesting-access/for-another-party","siteSpaceId":"sitesp_4wGG6","emoji":"1f449","description":"","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Requesting Access","emoji":"1f590"}]},{"id":"LyruI2Mo17TcLe5VLanl","title":"Web Request Modal","pathname":"/orchestration/just-in-time-access/requesting-access/web-request-modal","siteSpaceId":"sitesp_4wGG6","emoji":"1f310","description":"","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Requesting Access","emoji":"1f590"}]},{"id":"LEpPCfZRZaUPjdmUjQZm","title":"Approving Access","pathname":"/orchestration/just-in-time-access/approving-access","siteSpaceId":"sitesp_4wGG6","emoji":"1f3c1","description":"This page describes how to review and approve just-in-time access requests","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"}]},{"id":"p58hWw8c5pKTucK8Tsyp","title":"Pre-approving Access","pathname":"/orchestration/just-in-time-access/approving-access/pre-approving-access","siteSpaceId":"sitesp_4wGG6","icon":"stamp","description":"","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Approving Access","emoji":"1f3c1"}]},{"id":"5ZpAdOENFxZCVrDldhsY","title":"P0 Allow Modal, CLI, and UI","pathname":"/orchestration/just-in-time-access/approving-access/p0-allow-workflows","siteSpaceId":"sitesp_4wGG6","icon":"stamp","description":"Configure P0 allow pre-approvals from Slack, the CLI, or the P0 web app.","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Approving Access","emoji":"1f3c1"}]},{"id":"y4l6dkEIYt8pNrgTXX70","title":"Request Routing","pathname":"/orchestration/just-in-time-access/request-routing","siteSpaceId":"sitesp_4wGG6","emoji":"1f500","description":"","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"}]},{"id":"sgi256wuLS6N4FubFhiO","title":"Google Cloud Filtering","pathname":"/orchestration/just-in-time-access/request-routing/google-cloud-filtering","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Request Routing","emoji":"1f500"}]},{"id":"HcSRaJN6UWmSGQVOENtQ","title":"AWS Filtering","pathname":"/orchestration/just-in-time-access/request-routing/aws-filtering","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Request Routing","emoji":"1f500"}]},{"id":"lNBQGsIsGWStAVGvMt7m","title":"Microsoft Azure Filtering","pathname":"/orchestration/just-in-time-access/request-routing/microsoft-azure-filtering","siteSpaceId":"sitesp_4wGG6","description":"This document covers the various ways fine-grained just-in-time access for Microsoft Azure can be configured by using P0's Routing Rules.","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Request Routing","emoji":"1f500"}]},{"id":"BN5ZHIMhdIi7o58HPk8E","title":"SSH Filtering","pathname":"/orchestration/just-in-time-access/request-routing/ssh-filtering","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Request Routing","emoji":"1f500"}]},{"id":"YU7Cy4yN6oXJESnAYFe7","title":"Session Recording","pathname":"/orchestration/just-in-time-access/session-recording","siteSpaceId":"sitesp_4wGG6","emoji":"1f5d2","description":"Session Recording in P0 allows you to view detailed activity that occurs within a privileged session.","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"}]},{"id":"VVT1O9x1aG5hisaTgRIz","title":"AWS","pathname":"/orchestration/just-in-time-access/session-recording/aws","siteSpaceId":"sitesp_4wGG6","emoji":"1f4e6","description":"View CloudTrail activity taken within a privileged session.","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Session Recording","emoji":"1f5d2"}]},{"id":"R9k5SxYuWHS1UIUOEyhl","title":"Just-in-time API","pathname":"/orchestration/just-in-time-access/just-in-time-api","siteSpaceId":"sitesp_4wGG6","emoji":"1f50c","description":"","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"}]},{"id":"wOGRo8SHGfbXYs68YoqZ","title":"Command API","pathname":"/orchestration/just-in-time-access/just-in-time-api/command-api","siteSpaceId":"sitesp_4wGG6","description":"Enable external systems to programmatically initiate access requests—enabling automation and integration with internal tools, bots, and security workflows.","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Just-in-time API","emoji":"1f50c"}]},{"id":"TAtzfcgQ9qhwTcL8B4lm","title":"Access Requests API","pathname":"/orchestration/just-in-time-access/just-in-time-api/access-requests-api","siteSpaceId":"sitesp_4wGG6","description":"Enable programmatic approval, denial, and revocation of access—enabling seamless integration with internal tools, bots, and security workflows for automated access escalation.","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Just-in-time API","emoji":"1f50c"}]},{"id":"wKSEIn0Mlff81HwlNQv7","title":"Routing Rules API","pathname":"/orchestration/just-in-time-access/just-in-time-api/routing-rules-api","siteSpaceId":"sitesp_4wGG6","description":"Enable fine-grained control over how just-in-time access requests are evaluated, approved, and enforced—ensuring secure, compliant, and context-aware access workflows.","breadcrumbs":[{"label":"Orchestration"},{"label":"Just-in-time access","emoji":"23f0"},{"label":"Just-in-time API","emoji":"1f50c"}]},{"id":"ilrkC8mJ50JRlggQNpFd","title":"Creating an Environment","pathname":"/environments/creating-an-environment","siteSpaceId":"sitesp_4wGG6","emoji":"2601","description":"","breadcrumbs":[{"label":"Environments"}]},{"id":"ZTLUTsoAv1icYxRgo2IX","title":"Environment Terminology","pathname":"/environments/environment-terminology","siteSpaceId":"sitesp_4wGG6","emoji":"1f4d3","description":"","breadcrumbs":[{"label":"Environments"}]},{"id":"wovfUtcAaK87ioXYdmnX","title":"Settings","pathname":"/environments/settings","siteSpaceId":"sitesp_4wGG6","emoji":"2699","description":"","breadcrumbs":[{"label":"Environments"}]},{"id":"iyWMKLo0XMGfKvIs6c5M","title":"Integrations","pathname":"/integrations/integrations","siteSpaceId":"sitesp_4wGG6","emoji":"1f517","description":"Connect P0 with AWS, Google Cloud, Azure, Kubernetes, Okta, Slack, and other systems. Configure cloud, directory, notifier, and SIEM integrations.","breadcrumbs":[{"label":"Integrations"}]},{"id":"FeDPCH8CJEuDHE4YQSB6","title":"Notifier integrations","pathname":"/integrations/notifier-integrations","siteSpaceId":"sitesp_4wGG6","emoji":"1f4de","description":"","breadcrumbs":[{"label":"Integrations"}]},{"id":"9Ytmb5OpYXghQQZ3M4nS","title":"Slack","pathname":"/integrations/notifier-integrations/slack","siteSpaceId":"sitesp_4wGG6","emoji":"1f4ac","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Notifier integrations","emoji":"1f4de"}]},{"id":"dpMTwpYrGRzXZQg41UbB","title":"Microsoft Teams","pathname":"/integrations/notifier-integrations/microsoft-teams","siteSpaceId":"sitesp_4wGG6","emoji":"1f46c","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Notifier integrations","emoji":"1f4de"}]},{"id":"RenxcbsWnNUFMI599YJr","title":"Email","pathname":"/integrations/notifier-integrations/email","siteSpaceId":"sitesp_4wGG6","emoji":"2709","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Notifier integrations","emoji":"1f4de"}]},{"id":"MVEKkomzJnye9c6QeOpw","title":"Custom Notifiers","pathname":"/integrations/notifier-integrations/custom-notifiers","siteSpaceId":"sitesp_4wGG6","emoji":"1f4e3","description":"Integrate P0 with any internal notification system you own, or with systems that do not have a built-in notification service yet.","breadcrumbs":[{"label":"Integrations"},{"label":"Notifier integrations","emoji":"1f4de"}]},{"id":"dvXavZMOzsRXVFYsnfl6","title":"AWS Lambda Notifier","pathname":"/integrations/notifier-integrations/custom-notifiers/aws-lambda-notifier","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Notifier integrations","emoji":"1f4de"},{"label":"Custom Notifiers","emoji":"1f4e3"}]},{"id":"hLTwVHzKnXdfUYlHooV6","title":"Resource integrations","pathname":"/integrations/resource-integrations","siteSpaceId":"sitesp_4wGG6","emoji":"1f511","description":"","breadcrumbs":[{"label":"Integrations"}]},{"id":"oOcOnLUMfBQoti6jD1po","title":"Google Cloud","pathname":"/integrations/resource-integrations/google-cloud","siteSpaceId":"sitesp_4wGG6","emoji":"2601","description":"Set up P0's integration for Google Cloud Platform. Configure IAM management, just-in-time access, and privilege governance for your GCP environment.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"eHC6Ma3nAVPl7j1WZohb","title":"Security perimeter","pathname":"/integrations/resource-integrations/google-cloud/security-perimeter","siteSpaceId":"sitesp_4wGG6","description":"This page describes how to set up a Cloud Run security perimeter for P0 to manage access in your Google Cloud environment.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Google Cloud","emoji":"2601"}]},{"id":"hr9KHGBsNf5LAJCfCwtw","title":"Requesting Google Cloud access","pathname":"/integrations/resource-integrations/google-cloud/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"How to request access to Google Cloud permissions, roles, and resources through the P0 bot","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Google Cloud","emoji":"2601"}]},{"id":"1g0zk5rStygDXeo1CwXu","title":"Permissions Reference","pathname":"/integrations/resource-integrations/google-cloud/permissions-reference","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Google Cloud","emoji":"2601"}]},{"id":"BQh7tMGZbWKS7x8kk0B7","title":"Cloud Storage","pathname":"/integrations/resource-integrations/google-cloud/permissions-reference/cloud-storage","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Google Cloud","emoji":"2601"},{"label":"Permissions Reference"}]},{"id":"QOhBcZhlnPTLze6lmkL7","title":"Compute Engine","pathname":"/integrations/resource-integrations/google-cloud/permissions-reference/compute-engine","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Google Cloud","emoji":"2601"},{"label":"Permissions Reference"}]},{"id":"Y61z4NZZ36WPeh6dup8B","title":"Cloud Run invocation","pathname":"/integrations/resource-integrations/google-cloud/cloud-run-invocation","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Google Cloud","emoji":"2601"}]},{"id":"baaaYyZ5nS00f0uGiG18","title":"AWS","pathname":"/integrations/resource-integrations/aws","siteSpaceId":"sitesp_4wGG6","emoji":"1f4e6","description":"Install P0 IAM management on AWS in about 10 minutes. Configure just-in-time access, identity governance, and privilege management for your AWS environment.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"qA1fOMD4BLkBjquPnr4O","title":"Requesting AWS access","pathname":"/integrations/resource-integrations/aws/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"How to request just-in-time access to AWS IAM policies, groups, and roles through P0 via Slack, Teams, Webex, the P0 CLI, or the P0 dashboard.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"AWS","emoji":"1f4e6"}]},{"id":"qDe4oJB2mvQVfSSW7jIX","title":"AWS Integration API","pathname":"/integrations/resource-integrations/aws/aws-integration-api","siteSpaceId":"sitesp_4wGG6","description":"Manage installable components of the P0 Amazon Web Services integration.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"AWS","emoji":"1f4e6"}]},{"id":"uOduYVKSO8MEX1zSaJqw","title":"Function invocation","pathname":"/integrations/resource-integrations/aws/function-invocation","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"AWS","emoji":"1f4e6"}]},{"id":"d4lhd3xyKjaJBSMSNCXq","title":"Managed services","pathname":"/integrations/resource-integrations/aws/managed-services","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"AWS","emoji":"1f4e6"}]},{"id":"WyDqdeCgULcFdDfZlGba","title":"AWS RDS","pathname":"/integrations/resource-integrations/aws/managed-services/aws-rds","siteSpaceId":"sitesp_4wGG6","icon":"database","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"AWS","emoji":"1f4e6"},{"label":"Managed services"}]},{"id":"GmspIXB04o1wtb9EOTSD","title":"Microsoft Azure","pathname":"/integrations/resource-integrations/microsoft-azure","siteSpaceId":"sitesp_4wGG6","emoji":"1f537","description":"Install P0 IAM management on Microsoft Azure in about 10 minutes. Configure just-in-time access and privilege governance for your Azure environment.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"Gas928MSxgADMMlSqe4O","title":"Azure App Registration","pathname":"/integrations/resource-integrations/microsoft-azure/azure-app-registration","siteSpaceId":"sitesp_4wGG6","description":"Create the Azure app registration that establishes P0's service identity in your tenant.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Microsoft Azure","emoji":"1f537"}]},{"id":"girUBZWTWJpLwtr4clvn","title":"IAM Management","pathname":"/integrations/resource-integrations/microsoft-azure/iam-management","siteSpaceId":"sitesp_4wGG6","description":"Enable Just‑in‑Time access to Azure resources by installing IAM management.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Microsoft Azure","emoji":"1f537"}]},{"id":"vffUB0QpJlD6NTzBGaLW","title":"Configure Bastion Host Integration","pathname":"/integrations/resource-integrations/microsoft-azure/configure-bastion-host-integration","siteSpaceId":"sitesp_4wGG6","description":"Set up the Azure Bastion host to enable secure SSH tunneling to your VMs.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Microsoft Azure","emoji":"1f537"}]},{"id":"2p5TTR4m4bEuV1216xc6","title":"Install SSH Access","pathname":"/integrations/resource-integrations/microsoft-azure/install-ssh-access","siteSpaceId":"sitesp_4wGG6","description":"Connect P0 to your Azure VMs by installing SSH access.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Microsoft Azure","emoji":"1f537"}]},{"id":"QoSjOzSlJ4FhFnBlNSak","title":"Requesting Microsoft Azure access","pathname":"/integrations/resource-integrations/microsoft-azure/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"How to request just-in-time access to Microsoft Azure subscriptions, resources, and roles through P0 via Slack, Teams, Webex, the P0 CLI, or the P0 dashboard.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Microsoft Azure","emoji":"1f537"}]},{"id":"PmNajuau9q2r5PTTC5b3","title":"Kubernetes","pathname":"/integrations/resource-integrations/kubernetes","siteSpaceId":"sitesp_4wGG6","emoji":"2638","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"4BKiewrZMbQA1rdh2OP8","title":"Terraform Installation","pathname":"/integrations/resource-integrations/kubernetes/terraform-installation","siteSpaceId":"sitesp_4wGG6","description":"How to install the P0 Kubernetes (EKS) integration using Terraform","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Kubernetes","emoji":"2638"}]},{"id":"0hsESSdGUbRp0r99fXzT","title":"Requesting Kubernetes access","pathname":"/integrations/resource-integrations/kubernetes/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"How to request access to Kubernetes permissions, roles, and resources through the P0 bot","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Kubernetes","emoji":"2638"}]},{"id":"JwlfUWxRrl7vyoskDvIs","title":"Advanced Requests","pathname":"/integrations/resource-integrations/kubernetes/advanced-requests","siteSpaceId":"sitesp_4wGG6","description":"How to request common Kubernetes access patterns with P0","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Kubernetes","emoji":"2638"}]},{"id":"opL9OInWPk4kKaG09OCJ","title":"PostgreSQL","pathname":"/integrations/resource-integrations/postgresql","siteSpaceId":"sitesp_4wGG6","emoji":"1f418","description":"Connecting P0 Security to Google Cloud SQL and Amazon RDS for PostgreSQL","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"ag6hg2pIvJdL5MhxCFkA","title":"Installing an CloudSQL Database","pathname":"/integrations/resource-integrations/postgresql/installing-an-cloudsql-database","siteSpaceId":"sitesp_4wGG6","description":"How to install an CloudSQL database to P0","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"PostgreSQL","emoji":"1f418"}]},{"id":"U99ZsaPCaH5xIvlsI0Fe","title":"Installing an RDS Database","pathname":"/integrations/resource-integrations/postgresql/installing-an-rds-database","siteSpaceId":"sitesp_4wGG6","description":"How to install an AWS RDS database to P0","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"PostgreSQL","emoji":"1f418"}]},{"id":"Ry2X4OonFhD9nQ10O15W","title":"Requesting PostgreSQL access","pathname":"/integrations/resource-integrations/postgresql/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"How to request access to PostgreSQL roles through the P0 bot.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"PostgreSQL","emoji":"1f418"}]},{"id":"GIwnl7BHyX5VjPJUzxCQ","title":"Cisco Secure Access","pathname":"/integrations/resource-integrations/cisco-secure-access","siteSpaceId":"sitesp_4wGG6","emoji":"1f510","description":"Installing P0 access management for Cisco Secure Access takes about 15 minutes.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"PTTE4c5Lgh3dluyhQ6IX","title":"Installation","pathname":"/integrations/resource-integrations/cisco-secure-access/installation","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Cisco Secure Access","emoji":"1f510"}]},{"id":"ynC7M5fIONWp870wzOUW","title":"Requesting Cisco Secure Access","pathname":"/integrations/resource-integrations/cisco-secure-access/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"How to request just-in-time access to private network resources protected by Cisco Secure Access through P0 via Slack, Teams, Webex, the P0 CLI, or the P0 dashboard.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Cisco Secure Access","emoji":"1f510"}]},{"id":"L3Cnca6oWCOCnTjRmkKb","title":"Snowflake","pathname":"/integrations/resource-integrations/snowflake","siteSpaceId":"sitesp_4wGG6","emoji":"2744","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"7wWeCKRzDyQxE3WuWATU","title":"Tailscale","pathname":"/integrations/resource-integrations/tailscale","siteSpaceId":"sitesp_4wGG6","emoji":"1f300","description":"Installing P0 access management for your Tailscale network takes about 5 minutes.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"vqbN0MrTTPHX5JAqQcSl","title":"Requesting Tailscale access","pathname":"/integrations/resource-integrations/tailscale/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"How to request just-in-time access to Tailscale devices and network resources through P0 via Slack, Teams, Webex, the P0 CLI, or the P0 dashboard.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Tailscale","emoji":"1f300"}]},{"id":"a3MVhtBXzRYiJLK6S0Hf","title":"SSH","pathname":"/integrations/resource-integrations/ssh","siteSpaceId":"sitesp_4wGG6","emoji":"1f5a5","description":"How to request SSH permissions for AWS, Microsoft Azure and GCP instances.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"XZvaRvHQs0c1Azr5sNxN","title":"Self-hosted","pathname":"/integrations/resource-integrations/ssh/self-hosted","siteSpaceId":"sitesp_4wGG6","icon":"desktop","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"SSH","emoji":"1f5a5"}]},{"id":"BtoUQpiKMdEQMCpYUvwU","title":"Oracle Cloud","pathname":"/integrations/resource-integrations/oracle-cloud","siteSpaceId":"sitesp_4wGG6","emoji":"1f52e","description":"Installing P0 IAM management on Oracle Cloud Infrastructure (OCI).","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"TjcgBBo9y6EeI78rhnUH","title":"Requesting Oracle Cloud access","pathname":"/integrations/resource-integrations/oracle-cloud/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"Requesting access to Oracle Cloud Infrastructure (OCI) groups through P0.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Oracle Cloud","emoji":"1f52e"}]},{"id":"k4ZSvz98HZi7HNreZQwI","title":"GitHub","pathname":"/integrations/resource-integrations/github","siteSpaceId":"sitesp_4wGG6","icon":"github","description":"Managed just-in-time access for GitHub organization teams","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"APeF5iiF7X79NUi69pVj","title":"Requesting GitHub access","pathname":"/integrations/resource-integrations/github/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"How to request access to a GitHub team via P0","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"GitHub","icon":"github"}]},{"id":"J2wN1CkWulpyIqTIQHMj","title":"Custom Resource","pathname":"/integrations/resource-integrations/custom-resource","siteSpaceId":"sitesp_4wGG6","emoji":"1f6e0","description":"Integrate P0 with any internal system you own, or with systems that do not have a built-in integration yet.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"FVfLKH81j72iK0OczkHj","title":"Installing a Custom Resource Integration","pathname":"/integrations/resource-integrations/custom-resource/installing-a-custom-resource-integration","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"Custom Resource","emoji":"1f6e0"}]},{"id":"FOQeT1nYuX2aA247jI04","title":"MySQL","pathname":"/integrations/resource-integrations/mysql","siteSpaceId":"sitesp_4wGG6","emoji":"1f42c","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"}]},{"id":"7iK2A67k1Fj0SANzyqxB","title":"Installation","pathname":"/integrations/resource-integrations/mysql/installation","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"MySQL","emoji":"1f42c"}]},{"id":"FigRWaXghfo8RY41YZbx","title":"Requesting MySQL access","pathname":"/integrations/resource-integrations/mysql/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"How to request just-in-time access to MySQL databases through P0 using the CLI.","breadcrumbs":[{"label":"Integrations"},{"label":"Resource integrations","emoji":"1f511"},{"label":"MySQL","emoji":"1f42c"}]},{"id":"ZcsKfC9GWHPrf0JumIzi","title":"Directory integrations","pathname":"/integrations/directory-integrations","siteSpaceId":"sitesp_4wGG6","emoji":"1f465","description":"","breadcrumbs":[{"label":"Integrations"}]},{"id":"IcvYWfeZNF0cujiJ9q0p","title":"Microsoft Entra ID","pathname":"/integrations/directory-integrations/microsoft-entra-id","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Directory integrations","emoji":"1f465"}]},{"id":"sUVlJJOsqn0tvVwS25N7","title":"Requesting Microsoft Entra ID access","pathname":"/integrations/directory-integrations/microsoft-entra-id/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"Requesting access to Microsoft Entra ID Roles/Groups","breadcrumbs":[{"label":"Integrations"},{"label":"Directory integrations","emoji":"1f465"},{"label":"Microsoft Entra ID"}]},{"id":"vVKXZxFXZJ6mVhrRx1Ps","title":"Microsoft Entra ID (Legacy)","pathname":"/integrations/directory-integrations/microsoft-entra-id-legacy","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Directory integrations","emoji":"1f465"}]},{"id":"qINajMEBNFR1Wdylz1ys","title":"Requesting Microsoft Entra ID access (legacy)","pathname":"/integrations/directory-integrations/microsoft-entra-id-legacy/requesting-access","siteSpaceId":"sitesp_4wGG6","description":"Requesting access to Microsoft Entra ID groups","breadcrumbs":[{"label":"Integrations"},{"label":"Directory integrations","emoji":"1f465"},{"label":"Microsoft Entra ID (Legacy)"}]},{"id":"GlASQ4uKmfqZvsAF16g0","title":"Google Workspace","pathname":"/integrations/directory-integrations/google-workspace","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Directory integrations","emoji":"1f465"}]},{"id":"VHEv66GfE8oHC0BzsbKk","title":"Okta","pathname":"/integrations/directory-integrations/okta","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Directory integrations","emoji":"1f465"}]},{"id":"xMXtixNwJsDmp4Vc8PKM","title":"Approval integrations","pathname":"/integrations/approval-integrations","siteSpaceId":"sitesp_4wGG6","emoji":"2714","description":"","breadcrumbs":[{"label":"Integrations"}]},{"id":"9mmwSGzt5dScbf2bstRR","title":"PagerDuty","pathname":"/integrations/approval-integrations/pagerduty","siteSpaceId":"sitesp_4wGG6","emoji":"1f514","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Approval integrations","emoji":"2714"}]},{"id":"LXaRQxg6eT6c3wXayh1m","title":"Incident.io","pathname":"/integrations/approval-integrations/incidentio","siteSpaceId":"sitesp_4wGG6","emoji":"1f6a8","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Approval integrations","emoji":"2714"}]},{"id":"aY0FikmngYa5zxerOND5","title":"SIEM Integrations","pathname":"/integrations/siem-integrations","siteSpaceId":"sitesp_4wGG6","emoji":"26a1","description":"SIEM integrations allow you to stream P0 audit logs to target SIEM tools (Datadog, Splunk).","breadcrumbs":[{"label":"Integrations"}]},{"id":"WUlz6cFtRcIQSy7U8ut4","title":"Audit Log Format","pathname":"/integrations/siem-integrations/audit-log-format","siteSpaceId":"sitesp_4wGG6","description":"Reference for P0 audit log fields, actions, and payload formats streamed to SIEM integrations.","breadcrumbs":[{"label":"Integrations"},{"label":"SIEM Integrations","emoji":"26a1"}]},{"id":"F1UWbVQxtQ0t606LLGaS","title":"Datadog Setup","pathname":"/integrations/siem-integrations/datadog-setup","siteSpaceId":"sitesp_4wGG6","description":"Integration to send P0 audit logs to Datadog.","breadcrumbs":[{"label":"Integrations"},{"label":"SIEM Integrations","emoji":"26a1"}]},{"id":"1m9xSNmkFFHVSDAeJZUB","title":"Splunk HEC Setup","pathname":"/integrations/siem-integrations/splunk-hec-setup","siteSpaceId":"sitesp_4wGG6","description":"Integration to send p0 audit logs to splunk instance.","breadcrumbs":[{"label":"Integrations"},{"label":"SIEM Integrations","emoji":"26a1"}]},{"id":"lWwxovJexdPpPo6i6Ebs","title":"Tracker integrations","pathname":"/integrations/tracker-integrations","siteSpaceId":"sitesp_4wGG6","emoji":"1f4dd","description":"","breadcrumbs":[{"label":"Integrations"}]},{"id":"aleUh22431lxnIKTauJf","title":"Jira","pathname":"/integrations/tracker-integrations/jira","siteSpaceId":"sitesp_4wGG6","emoji":"1f3ab","description":"","breadcrumbs":[{"label":"Integrations"},{"label":"Tracker integrations","emoji":"1f4dd"}]},{"id":"yJ3g4wGoUG85kYknyX2e","title":"Role-Based Access Control","pathname":"/p0-management/role-based-access-control","siteSpaceId":"sitesp_4wGG6","emoji":"1f3a9","description":"Configure role-based access control to enforce least-privileged access for your P0 Security users. Assign roles and manage permissions across your organization.","breadcrumbs":[{"label":"P0 Management"}]},{"id":"d1PEf9FcmVhBFbbMUDAa","title":"Generating an API key","pathname":"/p0-management/generating-an-api-key","siteSpaceId":"sitesp_4wGG6","emoji":"1f511","description":"Generate an API key to use the P0 Management API or install P0 via Terraform.","breadcrumbs":[{"label":"P0 Management"}]},{"id":"khF0PBmoSllxgE0taG4n","title":"Management API","pathname":"/p0-management/management-api","siteSpaceId":"sitesp_4wGG6","emoji":"1f50c","description":"","breadcrumbs":[{"label":"P0 Management"}]},{"id":"LqkcvIA1tVAYSd77d3F5","title":"Role Management API","pathname":"/p0-management/management-api/role-management-api","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 Management"},{"label":"Management API","emoji":"1f50c"}]},{"id":"V8sw0WlvMjJ4b0pGKW2G","title":"Just-in-time settings API","pathname":"/p0-management/management-api/just-in-time-settings-api","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 Management"},{"label":"Management API","emoji":"1f50c"}]},{"id":"V0cJ5ECpdbvaW7o5wdPQ","title":"Installing p0 CLI","pathname":"/p0-cli/installing-p0-cli","siteSpaceId":"sitesp_4wGG6","icon":"hammer","description":"Download and install the P0 CLI on macOS or Windows. Authenticate with your P0 account and start requesting cloud access from the command line.","breadcrumbs":[{"label":"P0 CLI"}]},{"id":"3jLNxJtiLuFBqOFE2sBe","title":"Windows","pathname":"/p0-cli/installing-p0-cli/windows","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Installing p0 CLI","icon":"hammer"}]},{"id":"7r50sITUWOpFiUFJ3qdB","title":"macOS","pathname":"/p0-cli/installing-p0-cli/macos","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Installing p0 CLI","icon":"hammer"}]},{"id":"v5hCNmAZM6OaI5UIpII4","title":"p0 Commands and Usage","pathname":"/p0-cli/p0-commands-and-usage","siteSpaceId":"sitesp_4wGG6","icon":"square-terminal","description":"Complete reference for P0 CLI commands including login, SSH, access requests, AWS role assumption, and Kubernetes configuration.","breadcrumbs":[{"label":"P0 CLI"}]},{"id":"qJNKpnX0b8nnhxGX2dB1","title":"p0 login","pathname":"/p0-cli/p0-commands-and-usage/p0-login","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"quh6PAnjTyXza9Hzik8K","title":"p0 logout","pathname":"/p0-cli/p0-commands-and-usage/p0-logout","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"SMGUDyjBsKplZPMHetiK","title":"p0 ssh","pathname":"/p0-cli/p0-commands-and-usage/p0-ssh","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"MZzfjawm9AIuiD8bAzQ9","title":"p0 request","pathname":"/p0-cli/p0-commands-and-usage/p0-request","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"ep5DfBBGLeHUW729AguQ","title":"p0 aws role assume","pathname":"/p0-cli/p0-commands-and-usage/p0-aws-role-assume","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"lUEWfbpZK8RGV0VAEhRq","title":"p0 aws permission-set assume","pathname":"/p0-cli/p0-commands-and-usage/p0-aws-permission-set-assume","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"LGI6Z25oSgQy7QXRUIMo","title":"p0 ls","pathname":"/p0-cli/p0-commands-and-usage/p0-ls","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"VYj7gR1H3kQE6XFUzUiG","title":"p0 allow","pathname":"/p0-cli/p0-commands-and-usage/p0-allow","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"9EuQnJvjP8VfcwJMWbNY","title":"p0 grant","pathname":"/p0-cli/p0-commands-and-usage/p0-grant","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"C3d4kjVVgfFXv8h1687J","title":"p0 kubeconfig","pathname":"/p0-cli/p0-commands-and-usage/p0-kubeconfig","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"86nNjpWpVySUCIAk49OE","title":"p0 scp","pathname":"/p0-cli/p0-commands-and-usage/p0-scp","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"1lNYC4flQ8IobMsURYuK","title":"p0 rdp","pathname":"/p0-cli/p0-commands-and-usage/p0-rdp","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"BclWY0o0kCLxb7aksktR","title":"p0 ssh-resolve","pathname":"/p0-cli/p0-commands-and-usage/p0-ssh-resolve","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"p0 Commands and Usage","icon":"square-terminal"}]},{"id":"2zndppUAlnGxScARIvQ4","title":"Troubleshooting","pathname":"/p0-cli/troubleshooting","siteSpaceId":"sitesp_4wGG6","icon":"screwdriver-wrench","description":"","breadcrumbs":[{"label":"P0 CLI"}]},{"id":"6Gx8OBtv9QSVer201k1u","title":"p0 login","pathname":"/p0-cli/troubleshooting/p0-login","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"DPVKzWbh4GE1aCmCVcyE","title":"p0 ssh","pathname":"/p0-cli/troubleshooting/p0-ssh","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"EYVg9jyKPxbsddz1NnYR","title":"p0 request","pathname":"/p0-cli/troubleshooting/p0-request","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"IWxquvPeSEErHoGka8vV","title":"p0 aws role assume","pathname":"/p0-cli/troubleshooting/p0-aws-role-assume","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"UbdEw2YNKQX4wnBeTMgQ","title":"p0 aws permission-set assume","pathname":"/p0-cli/troubleshooting/p0-aws-permission-set-assume","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"ORqtbXNpzJhFBt84o1Aw","title":"p0 ls","pathname":"/p0-cli/troubleshooting/p0-ls","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"XsVtuOcPsl3GsMf2WDlD","title":"p0 allow","pathname":"/p0-cli/troubleshooting/p0-allow","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"C3CTRumiEFNuUEyHZwpD","title":"p0 grant","pathname":"/p0-cli/troubleshooting/p0-grant","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"zTVub9ACKhPIo7O7YmN6","title":"p0 kubeconfig","pathname":"/p0-cli/troubleshooting/p0-kubeconfig","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"3Oh0kHDivgNSjYeztd81","title":"p0 scp","pathname":"/p0-cli/troubleshooting/p0-scp","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"x2cvPzxamVADSXdxIUIc","title":"p0 ssh-resolve","pathname":"/p0-cli/troubleshooting/p0-ssh-resolve","siteSpaceId":"sitesp_4wGG6","description":"","breadcrumbs":[{"label":"P0 CLI"},{"label":"Troubleshooting","icon":"screwdriver-wrench"}]},{"id":"DCbcOVKHIqArHqlnKAjl","title":"2025","pathname":"/change-log/2025","siteSpaceId":"sitesp_4wGG6","emoji":"1f4d6","description":"This page has all the current & past feature, updates and changes to the p0 app for 2025.","breadcrumbs":[{"label":"Change Log"}]}]}