Part of securing Active Directory is ensuring that the groups that have privileges have the correct members. Of course, obtaining the members of a group is not all that hard.
Allowing temporary access to sensitive IT resources
Assume the scenario below: You administer a sensitive IT resource – a database in production network containing important data. An emergency troubleshooting situation arises. A developer has to be provided time-limited, temporary access to the DBMS, say for a day