PingAuthorize PingAuthorize Policy Administration Guide Policy solutions Expand/Collapse All Policy solutions This section recommends how to implement commonly needed business rules in policy. Use case: Using consent to determine access to a resource Use case: Using consent to change a response Use case: Using a SCIM resource type or a policy request action to control behavior Restricting the modification of attributes Repeating policies and attributes Use case: Using consent to determine access to a resource