{"files":{"SKILL.md":"---\nname: authorizationmanagementclient\ndescription: \"AuthorizationManagementClient API skill. Use when working with AuthorizationManagementClient for subscriptions, {scope}, {roleId}. Covers 10 endpoints.\"\nversion: 1.0.0\ngenerator: lapsh\n---\n\n# AuthorizationManagementClient\nAPI version: 2018-09-01-preview\n\n## Auth\nOAuth2\n\n## Base URL\nhttps://management.azure.com\n\n## Setup\n1. Configure auth: OAuth2\n2. GET /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/roleAssignments -- gets role assignments for a resource.\n3. Explore available endpoints below\n\n## Endpoints\n10 endpoints across 3 groups. See references/api-spec.lap for full details.\n\n### Subscriptions\n| Method | Path | Description |\n|--------|------|-------------|\n| GET | /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/roleAssignments | Gets role assignments for a resource. |\n| GET | /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Authorization/roleAssignments | Gets role assignments for a resource group. |\n| GET | /subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleAssignments | Gets all role assignments for the subscription. |\n\n### {scope}\n| Method | Path | Description |\n|--------|------|-------------|\n| DELETE | /{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName} | Deletes a role assignment. |\n| PUT | /{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName} | Creates a role assignment. |\n| GET | /{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName} | Get the specified role assignment. |\n| GET | /{scope}/providers/Microsoft.Authorization/roleAssignments | Gets role assignments for a scope. |\n\n### {roleId}\n| Method | Path | Description |\n|--------|------|-------------|\n| DELETE | /{roleId} | Deletes a role assignment. |\n| PUT | /{roleId} | Creates a role assignment by ID. |\n| GET | /{roleId} | Gets a role assignment by ID. |\n\n## Common Questions\nMatch user requests to endpoints in references/api-spec.lap. Key patterns:\n- \"List all roleAssignments?\" -> GET /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/roleAssignments\n- \"Delete a roleAssignment?\" -> DELETE /{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}\n- \"Update a roleAssignment?\" -> PUT /{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}\n- \"Get roleAssignment details?\" -> GET /{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}\n- \"Delete a {roleId}?\" -> DELETE /{roleId}\n- \"Update a {roleId}?\" -> PUT /{roleId}\n- \"Get {roleId} details?\" -> GET /{roleId}\n- \"How to authenticate?\" -> See Auth section above\n\n## Response Tips\n- Check response schemas in references/api-spec.lap for field details\n- Create/update endpoints return the modified resource on success\n\n## References\n- Full spec: See references/api-spec.lap for complete endpoint details, parameter tables, and response schemas\n\n> Generated from the official API spec by [LAP](https://lap.sh)\n","references/api-spec.lap":"@lap v0.3\n# Machine-readable API spec. Each @endpoint block is one API call.\n@api AuthorizationManagementClient\n@base https://management.azure.com\n@version 2018-09-01-preview\n@auth OAuth2\n@endpoints 10\n@toc subscriptions(3), {scope}(4), {roleId}(3)\n\n@group subscriptions\n@endpoint GET /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/roleAssignments\n@desc Gets role assignments for a resource.\n@required {resourceProviderNamespace: any # The namespace of the resource provider., parentResourcePath: any # The parent resource identity., resourceType: any # The resource type of the resource., resourceName: any # The name of the resource to get role assignments for.}\n@optional {$filter: any # The filter to apply on the operation. Use $filter=atScope() to return all role assignments at or above the scope. Use $filter=principalId eq {id} to return all role assignments at, above or below the scope for the specified principal.}\n@returns(200) OK - Returns an array of role assignments.\n\n@endpoint GET /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Authorization/roleAssignments\n@desc Gets role assignments for a resource group.\n@optional {$filter: any # The filter to apply on the operation. Use $filter=atScope() to return all role assignments at or above the scope. Use $filter=principalId eq {id} to return all role assignments at, above or below the scope for the specified principal.}\n@returns(200) OK - Returns an array of role assignments.\n\n@endgroup\n\n@group {scope}\n@endpoint DELETE /{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}\n@desc Deletes a role assignment.\n@required {scope: any # The scope of the role assignment to delete., roleAssignmentName: any # The name of the role assignment to delete.}\n@returns(200) OK - Returns information about the role assignment.\n@returns(204) Role assignment already deleted or does not exist.\n\n@endpoint PUT /{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}\n@desc Creates a role assignment.\n@required {scope: any # The scope of the role assignment to create. The scope can be any REST resource instance. For example, use '/subscriptions/{subscription-id}/' for a subscription, '/subscriptions/{subscription-id}/resourceGroups/{resource-group-name}' for a resource group, and '/subscriptions/{subscription-id}/resourceGroups/{resource-group-name}/providers/{resource-provider}/{resource-type}/{resource-name}' for a resource., roleAssignmentName: any # A GUID for the role assignment to create. The name must be unique and different for each role assignment., parameters: any # Parameters for the role assignment.}\n@returns(201) Created - Returns information about the role assignment.\n\n@endpoint GET /{scope}/providers/Microsoft.Authorization/roleAssignments/{roleAssignmentName}\n@desc Get the specified role assignment.\n@required {scope: any # The scope of the role assignment., roleAssignmentName: any # The name of the role assignment to get.}\n@returns(200) OK - Returns information about the role assignment.\n\n@endgroup\n\n@group {roleId}\n@endpoint DELETE /{roleId}\n@desc Deletes a role assignment.\n@required {roleId: any # The ID of the role assignment to delete.}\n@returns(200) OK - Returns information about the role assignment.\n@returns(204) Role assignment already deleted or does not exist.\n\n@endpoint PUT /{roleId}\n@desc Creates a role assignment by ID.\n@required {roleId: any # The ID of the role assignment to create., parameters: any # Parameters for the role assignment.}\n@returns(201) Created - Returns the role assignment.\n\n@endpoint GET /{roleId}\n@desc Gets a role assignment by ID.\n@required {roleId: any # The ID of the role assignment to get.}\n@returns(200) OK - Returns the role assignment.\n\n@endgroup\n\n@group subscriptions\n@endpoint GET /subscriptions/{subscriptionId}/providers/Microsoft.Authorization/roleAssignments\n@desc Gets all role assignments for the subscription.\n@optional {$filter: any # The filter to apply on the operation. Use $filter=atScope() to return all role assignments at or above the scope. Use $filter=principalId eq {id} to return all role assignments at, above or below the scope for the specified principal.}\n@returns(200) OK - Returns an array of role assignments.\n\n@endgroup\n\n@group {scope}\n@endpoint GET /{scope}/providers/Microsoft.Authorization/roleAssignments\n@desc Gets role assignments for a scope.\n@required {scope: any # The scope of the role assignments.}\n@optional {$filter: any # The filter to apply on the operation. Use $filter=atScope() to return all role assignments at or above the scope. Use $filter=principalId eq {id} to return all role assignments at, above or below the scope for the specified principal.}\n@returns(200) OK - Returns an array of role assignments.\n\n@endgroup\n\n@end\n"}}