{"files":{"SKILL.md":"---\nname: authorizationmanagementclient\ndescription: \"AuthorizationManagementClient API skill. Use when working with AuthorizationManagementClient for subscriptions, {scope}, {denyAssignmentId}. Covers 6 endpoints.\"\nversion: 1.0.0\ngenerator: lapsh\n---\n\n# AuthorizationManagementClient\nAPI version: 2018-07-01-preview\n\n## Auth\nOAuth2\n\n## Base URL\nhttps://management.azure.com\n\n## Setup\n1. Configure auth: OAuth2\n2. GET /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/denyAssignments -- gets deny assignments for a resource.\n3. Explore available endpoints below\n\n## Endpoints\n6 endpoints across 3 groups. See references/api-spec.lap for full details.\n\n### Subscriptions\n| Method | Path | Description |\n|--------|------|-------------|\n| GET | /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/denyAssignments | Gets deny assignments for a resource. |\n| GET | /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Authorization/denyAssignments | Gets deny assignments for a resource group. |\n| GET | /subscriptions/{subscriptionId}/providers/Microsoft.Authorization/denyAssignments | Gets all deny assignments for the subscription. |\n\n### {scope}\n| Method | Path | Description |\n|--------|------|-------------|\n| GET | /{scope}/providers/Microsoft.Authorization/denyAssignments/{denyAssignmentId} | Get the specified deny assignment. |\n| GET | /{scope}/providers/Microsoft.Authorization/denyAssignments | Gets deny assignments for a scope. |\n\n### {denyAssignmentId}\n| Method | Path | Description |\n|--------|------|-------------|\n| GET | /{denyAssignmentId} | Gets a deny assignment by ID. |\n\n## Common Questions\nMatch user requests to endpoints in references/api-spec.lap. Key patterns:\n- \"List all denyAssignments?\" -> GET /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/denyAssignments\n- \"Get denyAssignment details?\" -> GET /{scope}/providers/Microsoft.Authorization/denyAssignments/{denyAssignmentId}\n- \"Get {denyAssignmentId} details?\" -> GET /{denyAssignmentId}\n- \"How to authenticate?\" -> See Auth section above\n\n## Response Tips\n- Check response schemas in references/api-spec.lap for field details\n\n## References\n- Full spec: See references/api-spec.lap for complete endpoint details, parameter tables, and response schemas\n\n> Generated from the official API spec by [LAP](https://lap.sh)\n","references/api-spec.lap":"@lap v0.3\n# Machine-readable API spec. Each @endpoint block is one API call.\n@api AuthorizationManagementClient\n@base https://management.azure.com\n@version 2018-07-01-preview\n@auth OAuth2\n@endpoints 6\n@toc subscriptions(3), {scope}(2), {denyAssignmentId}(1)\n\n@group subscriptions\n@endpoint GET /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/denyAssignments\n@desc Gets deny assignments for a resource.\n@required {resourceProviderNamespace: any # The namespace of the resource provider., parentResourcePath: any # The parent resource identity., resourceType: any # The resource type of the resource., resourceName: any # The name of the resource to get deny assignments for.}\n@optional {$filter: any # The filter to apply on the operation. Use $filter=atScope() to return all deny assignments at or above the scope. Use $filter=denyAssignmentName eq '{name}' to search deny assignments by name at specified scope. Use $filter=principalId eq '{id}' to return all deny assignments at, above and below the scope for the specified principal. Use $filter=gdprExportPrincipalId eq '{id}' to return all deny assignments at, above and below the scope for the specified principal. This filter is different from the principalId filter as it returns not only those deny assignments that contain the specified principal is the Principals list but also those deny assignments that contain the specified principal is the ExcludePrincipals list. Additionally, when gdprExportPrincipalId filter is used, only the deny assignment name and description properties are returned.}\n@returns(200) OK - Returns an array of deny assignments.\n\n@endpoint GET /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Authorization/denyAssignments\n@desc Gets deny assignments for a resource group.\n@optional {$filter: any # The filter to apply on the operation. Use $filter=atScope() to return all deny assignments at or above the scope. Use $filter=denyAssignmentName eq '{name}' to search deny assignments by name at specified scope. Use $filter=principalId eq '{id}' to return all deny assignments at, above and below the scope for the specified principal. Use $filter=gdprExportPrincipalId eq '{id}' to return all deny assignments at, above and below the scope for the specified principal. This filter is different from the principalId filter as it returns not only those deny assignments that contain the specified principal is the Principals list but also those deny assignments that contain the specified principal is the ExcludePrincipals list. Additionally, when gdprExportPrincipalId filter is used, only the deny assignment name and description properties are returned.}\n@returns(200) OK - Returns an array of deny assignments.\n\n@endpoint GET /subscriptions/{subscriptionId}/providers/Microsoft.Authorization/denyAssignments\n@desc Gets all deny assignments for the subscription.\n@optional {$filter: any # The filter to apply on the operation. Use $filter=atScope() to return all deny assignments at or above the scope. Use $filter=denyAssignmentName eq '{name}' to search deny assignments by name at specified scope. Use $filter=principalId eq '{id}' to return all deny assignments at, above and below the scope for the specified principal. Use $filter=gdprExportPrincipalId eq '{id}' to return all deny assignments at, above and below the scope for the specified principal. This filter is different from the principalId filter as it returns not only those deny assignments that contain the specified principal is the Principals list but also those deny assignments that contain the specified principal is the ExcludePrincipals list. Additionally, when gdprExportPrincipalId filter is used, only the deny assignment name and description properties are returned.}\n@returns(200) OK - Returns an array of deny assignments.\n\n@endgroup\n\n@group {scope}\n@endpoint GET /{scope}/providers/Microsoft.Authorization/denyAssignments/{denyAssignmentId}\n@desc Get the specified deny assignment.\n@required {scope: any # The scope of the deny assignment., denyAssignmentId: any # The ID of the deny assignment to get.}\n@returns(200) OK - Returns information about the deny assignment.\n\n@endgroup\n\n@group {denyAssignmentId}\n@endpoint GET /{denyAssignmentId}\n@desc Gets a deny assignment by ID.\n@required {denyAssignmentId: any # The fully qualified deny assignment ID. For example, use the format, /subscriptions/{guid}/providers/Microsoft.Authorization/denyAssignments/{denyAssignmentId} for subscription level deny assignments, or /providers/Microsoft.Authorization/denyAssignments/{denyAssignmentId} for tenant level deny assignments.}\n@returns(200) OK - Returns the deny assignment.\n\n@endgroup\n\n@group {scope}\n@endpoint GET /{scope}/providers/Microsoft.Authorization/denyAssignments\n@desc Gets deny assignments for a scope.\n@required {scope: any # The scope of the deny assignments.}\n@optional {$filter: any # The filter to apply on the operation. Use $filter=atScope() to return all deny assignments at or above the scope. Use $filter=denyAssignmentName eq '{name}' to search deny assignments by name at specified scope. Use $filter=principalId eq '{id}' to return all deny assignments at, above and below the scope for the specified principal. Use $filter=gdprExportPrincipalId eq '{id}' to return all deny assignments at, above and below the scope for the specified principal. This filter is different from the principalId filter as it returns not only those deny assignments that contain the specified principal is the Principals list but also those deny assignments that contain the specified principal is the ExcludePrincipals list. Additionally, when gdprExportPrincipalId filter is used, only the deny assignment name and description properties are returned.}\n@returns(200) OK - Returns an array of deny assignments.\n\n@endgroup\n\n@end\n"}}