Creating a policy for permitted access token scopes - PingAuthorize - 9.3

PingAuthorize 9.3

bundle
pingauthorize-93
ft:publication_title
PingAuthorize 9.3
Product_Version_ce
PingAuthorize 9.3 (Latest)
category
ContentType
Product
Productdocumentation
paz-93
pingauthorize
ContentType_ce
Product documentation

The first policy defines the access token scopes that PingAuthorize Server accepts for SCIM requests.

The following table defines these scopes.

Scope Allowed actions Applies to
scimAdmin search, retrieve, create/modify, delete Any data
email retrieve Requester's email attributes
profile retrieve Requester's profile attributes

To create the policy and add rules to define the scopes, perform the following steps:

  1. Sign on to the PingAuthorize Policy Editor using the URL and credentials from Accessing the GUIs.
  2. Click Policies.
  3. Expand Global Decision Point, SCIM Policy Set, and Token Policies.
  4. Select Scope Policies.
  5. Next to Statements, click +.
  6. Click Components.
  7. From the Statements list, drag Insufficient Scope to the area immediately following the Statements section. A box appears for you to drop the item into.
  8. Click Save changes.
  9. Click Policies to the left of Components.
  10. Select Scope Policies.
  11. From the + menu, select Add Policy.
  12. For the name, replace Untitled with Permitted Scopes.
  13. Change the combining algorithm to A single deny will override any permit decisions.
  14. Click Save changes.