A ruleset is automatically synced when a Attribute or Resource is synced. There is no need to sync a ruleset manually unless you need a real-time update and want to dispatch a sync job immediately using this endpoint.
Documentation Index
Fetch the complete documentation index at: https://docs.provisionr.io/llms.txt
Use this file to discover all available pages before exploring further.
Bearer authentication header of the form Bearer <token>, where <token> is your auth token.
Policy Ruleset ID
PolicyRulesetDetailedResponseData
"poset_01hq8xyzabc123def456ghi789"
The state of the policy ruleset and whether the group or resource is being managed
unmanaged The Workspace Integration sync detected this existing group or resource. Until you change the ruleset to monitored or managed, Provisionr simply sees that it exists but will not perform API calls to detect users. No rules or conditions can be created until a ruleset is changed to managed. Any unmanaged groups and resources are hidden from most user interfaces to reduce clutter. An unmanaged ruleset is not counted as an active policy for billing purposes. |
monitored The Workspace Integration sync is performing read-only monitoring for this group or resource to detect changes, however no API calls are made to add or remove users. This allows you to see an audit trail of changes in user membership over time without managing rules and conditions. Recommendations for rules and conditions will still be generated based on user membership changes for insights. You can change the ruleset to managed to start creating rules and conditions. A monitored ruleset does count as an active policy for billing purposes. |
managed The Workspace Integration sync is actively managing this group or resource and provisioning and deprovisioning users based on the rules and conditions defined. By default, is_authoritative is set to false. Administrators can create rules and conditions to manage users, however any unmanaged group or resource users detected during syncs are ignored (not removed). If is_authoritative is set to true, any unmanaged users detected during syncs are removed from the group or resource. The Provisionr database maintains a record of them for auditing purposes and ability to restore them later if needed. A managed ruleset does count as an active policy for billing purposes. |
unmanaged, monitored, managed The type of resource that this policy ruleset applies to
directory_attribute Provisionr Dimension Attribute. This acts as a reusable ruleset for other Attributes, Groups or Resources |
gitlab_group GitLab Group. This is used for granting access to child groups and projects, or inviting membership groups to other groups or projects. |
gitlab_project GitLab Project. This is used for managing members of a specific project. |
google_drive_doc Google Drive Document. This is used for managing members of a Google Docs file. |
google_drive_file Google Drive File. This is used for managing members of a Google Drive uploaded file (ex. PDF). |
google_drive_folder Google Drive Folder. This is used for managing members of a Google Drive folder. |
google_drive_deck Google Drive Slidedeck. This is used for managing members of a Google Slides file. |
google_drive_sheet Google Drive Spreadsheet. This is used for managing members of a Google Sheets file. |
google_identity_group Google Cloud Identity Group. This is used for Cloud Identity Groups that can be used for access management. |
google_workspace_drive Google Workspace Shared Drive. This is used for managing members of a Google Shared Drive in Google Workspace. |
google_workspace_group Google Workspace Group. This is used for Workspace Groups that can be used for email distribution lists and access management. |
okta_group Okta Group. This is used for managing members of a group that is assigned to one or more to Okta Apps. |
slack_connect_channel Slack Connect Channel. |
slack_public_channel Slack Public Channel. This is used for inviting users to Slack public channels. |
slack_private_channel Slack Private Channel. This is used for inviting users to Slack private channels. |
slack_group Slack User Group. This can be used for taggable user groups or adding user groups to channels. |
directory_attribute, gitlab_group, gitlab_project, google_drive_doc, google_drive_file, google_drive_folder, google_drive_deck, google_drive_sheet, google_identity_group, google_workspace_drive, google_workspace_group, okta_group, slack_connect_channel, slack_public_channel, slack_private_channel, slack_group "directory_attribute"
The ID of the resource that this policy ruleset applies to
"dratr_01hq8xyzabc123def456ghi789"
"glgrp_01hq8xyzabc123def456ghi789"
"glprj_01hq8xyzabc123def456ghi789"
"gddoc_01hq8xyzabc123def456ghi789"
"gdfil_01hq8xyzabc123def456ghi789"
"gdfol_01hq8xyzabc123def456ghi789"
"gddck_01hq8xyzabc123def456ghi789"
"gdsht_01hq8xyzabc123def456ghi789"
"gigrp_01hq8xyzabc123def456ghi789"
"gwdrv_01hq8xyzabc123def456ghi789"
"gwgrp_01hq8xyzabc123def456ghi789"
"okgrp_01hq8xyzabc123def456ghi789"
"slgrp_01hq8xyzabc123def456ghi789"
"slprv_01hq8xyzabc123def456ghi789"
"slpub_01hq8xyzabc123def456ghi789"
The parent name of the resource that this policy ruleset applies to
"Department"
The name of the resource that this policy ruleset applies to
"Engineering"
The handle of the resource that this policy ruleset applies to
"eng"
Whether this ruleset is authoritative for managing users on the resource. If true, only users that match
a Provisionr policy rule will remain a member of the group or resource, and unmanaged users will be removed
during each sync. If false, users added outside of Provisionr will not be removed
false
This shows the value for the parent attribute or resource.
Users will be automatically deprecated if they no longer qualify for at least one rule in the ruleset.
The expires_after_days value determines how many days after they no longer qualify that they still
have access for a graceful transition period when users change job roles.
The value is inherited from the Workspace > Dimension > Ruleset > Rule and can be overridden
at any level to provide shorter revoke time controls when needed.
If the value is 0, this skips the grace period and revokes access immediately after expires_at
30
Counts of related resources
Included related resources
API hyperlinks related to the policy ruleset record