When you create a rule it will be in a staged state. This allows you to configure conditions and evaluate conditional users before activating the rule when users will be added to the ruleset manifest.
After a rule has been activated, you cannot make changes to the rule conditions. You can duplicate an existing rule or create a new one to create a new version of a rule with different conditions.
Documentation Index
Fetch the complete documentation index at: https://docs.provisionr.io/llms.txt
Use this file to discover all available pages before exploring further.
Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
Policy Rule ID
ActivatePolicyRuleRequestData
The body is of type ActivatePolicyRuleRequestData · object.
PolicyRuleDetailedResponseData
"porul_01hq8xyzabc123def456ghi789"
staged The rule is a draft and you can add or remove conditions. Users are not provisioned yet. This is only visible to administrators or in the API. Use the activate method during your change window to provision access to users. |
active The rule is active and conditions are locked. You can create a new rule or duplicate an existing rule to customize conditions, and deactivate the old rule after the new rule is activated. Matching users are now Ruleset (Manifest) Users and are provisioned and deprovisioned using the vendor APIs. |
expiring The rule is active, however expires_at value is set and is scheduled to expire. If the expires_after_days value is 0, users will lose access immediately when this rule expires.You can run the activate action to remove the scheduled expiration. |
expired The expires_at value is in the past and the rule was deactivated. If the user matched a different rule, then they did not lose access. |
deactivated The rule was deactivated manually by a ruleset or global admin. |
staged, active, expiring, expired, deactivated "active"
The name of the vendor role that users matching this rule are assigned to
"Group Member"
The shorthand handle of the vendor role that users matching this rule are assigned to
"member"
Whether this rule was automatically created when importing a Directory Attribute from a Workspace Integration.
You can filter by false values to see rules that were created by an administrator
The description of the rule to provide business justification context. If not set by the user, the condition descriptions are aggregated into the description (if conditions are not a draft)
The rule's custom key/value metadata added by someone or automation in your organization. This is used for business justification, reference IDs, or links to internal issue/tickets for access reviews
Users will be automatically deprecated if they no longer qualify for at least one rule in the ruleset.
The expires_after_days value determines how many days after they no longer qualify that they still
have access for a graceful transition period when users change job roles.
The value is inherited from the Workspace > Dimension (for Directory Attributes) > Ruleset and can be
overridden at any level to provide shorter revoke time controls when needed.
If the value is 0, this skips the grace period and revokes access immediately after expires_at.
By default, users have perpetual access (as Policy Users) as long as their attributes continue to match
the conditions for this rule. If this rule is designed for just-in-time or short term access, you can
set the expires_at date for all conditional users to be deprecated at that time.
You can use expires_at and expires_after_days=0 together to revoke access immediately
Whether this rule expiration was inherited from the ruleset resource or overridden for this rule
Priority order between 1 and 99 for evaluating this rule among other rules in the same ruleset.
Lower numbers are evaluated first. Rules with the same priority are evaluated based on the greatest number of users matched (highest to lowest).
Rules for a specific user are always evaluated first (regardless of priority) before other rules to ensure that user-specific elevated roles take precedence.
If not set, the default priority is 42 (obviously...)
42
The timestamps for the policy rule record
Count of related resources
Included related resources
API hyperlinks related to the policy rule record