PingAuthorize PingAuthorize Policy Administration Guide Policy solutions Expand/Collapse All Policy solutions This section recommends how to implement commonly needed business rules in policy. Use case: Using a SCIM resource type or a policy request action to control behavior Restricting the modification of attributes Repeating policies and attributes Use case: Using a SCIM resource type or a policy request action to control behavior