This article highlights the limitations of traditional Privileged Access Management (PAM) tools in handling SSH keys, which are critical access credentials in IT environments. Unlike passwords, SSH keys often outnumber passwords and provide access to multiple servers, but they are not centrally managed, making them prone to security risks. Traditional PAMs struggle with discovering and managing SSH keys, leaving gaps in security. The solution proposed is to adopt a passwordless and keyless approach using ephemeral access, where secrets are granted just-in-time for sessions and automatically expire, reducing the attack surface and complexity.