PingAuthorize PingAuthorize Policy Administration Guide Policy solutions Expand/Collapse All Policy solutions This section recommends how to implement commonly needed business rules in policy. Use case: Using a SCIM resource type or a policy request action to control behavior Restricting the modification of attributes Importing a self-governance policy snapshot Use case: Using a SCIM resource type or a policy request action to control behavior