If you invoke the /identityiq/scim/v2/CheckedPolicyViolations SCIM API without a policies attribute then no policies are checked.
The API does not support checking all of the policies, if I supply the request with a policy then the check happens and I get a violation, removing the policies attribute to check all the policies, then none of the policies are checked.
For example this returns a policy violation on the Mainframe SOD policy:
{
"identity": "22699291",
"plan": {
"value": {
"accounts": [
{
"application": "AUR Active Directory",
"attributes": [
{
"name": "memberOf",
"op": "Add",
"value": "CN=my....."
}
],
"instance": "null",
"op": "Modify"
}
]
},
"type": "application/sailpoint.object.ProvisioningPlan+json"
},
"policies": [
"Mainframe SOD Policy"
]
}
Where as this returns not policy violations:
{
"identity": "22699291",
"plan": {
"value": {
"accounts": [
{
"application": "AUR Active Directory",
"attributes": [
{
"name": "memberOf",
"op": "Add",
"value": "CN=my....."
}
],
"instance": "null",
"op": "Modify"
}
]
},
"type": "application/sailpoint.object.ProvisioningPlan+json"
}
}
There is no way to check all the policies, unless you list every single policy in the policies attribute, we have too many policies to do this and it makes the json requests huge.