Hi,
as a potential solution in the current environment. We configured a 'read only' cockpit such that we could give business users access to cockpit views without giving them access to the 'dangerous' functions.
If you wanted to give operations staff access to some of the cockpit functions, but you wanted a four eyes paradigm, then you could potentially implement your own management processes in the engine itself, include four eyes as part of the process - eg a user task to initiate, a user task to confirm, then a service task which calls the engine APIs to achieve what you want to achieve.
Personally, Id prefer to rely on an audit trail and limited privileged account access rather than go to the effort above. Perhaps you could have a single privileged user account which is disabled by default. Hence one party has access to unlock the account, but no access to cockpit. The second party has access to cockpit, but cant unlock the account. Not quite maker/checker, but at least there would need to be collusion for malicious activity to occur.
regards
Rob