{"files":{"SKILL.md":"---\nname: authorizationmanagementclient\ndescription: \"AuthorizationManagementClient API skill. Use when working with AuthorizationManagementClient for subscriptions, {scope}. Covers 6 endpoints.\"\nversion: 1.0.0\ngenerator: lapsh\n---\n\n# AuthorizationManagementClient\nAPI version: 2018-01-01-preview\n\n## Auth\nOAuth2\n\n## Base URL\nhttps://management.azure.com\n\n## Setup\n1. Configure auth: OAuth2\n2. GET /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.Authorization/permissions -- gets all permissions the caller has for a resource group.\n3. Explore available endpoints below\n\n## Endpoints\n6 endpoints across 2 groups. See references/api-spec.lap for full details.\n\n### Subscriptions\n| Method | Path | Description |\n|--------|------|-------------|\n| GET | /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.Authorization/permissions | Gets all permissions the caller has for a resource group. |\n| GET | /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/permissions | Gets all permissions the caller has for a resource. |\n\n### {scope}\n| Method | Path | Description |\n|--------|------|-------------|\n| DELETE | /{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionId} | Deletes a role definition. |\n| GET | /{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionId} | Get role definition by name (GUID). |\n| PUT | /{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionId} | Creates or updates a role definition. |\n| GET | /{scope}/providers/Microsoft.Authorization/roleDefinitions | Get all role definitions that are applicable at scope and above. |\n\n## Common Questions\nMatch user requests to endpoints in references/api-spec.lap. Key patterns:\n- \"List all permissions?\" -> GET /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.Authorization/permissions\n- \"Delete a roleDefinition?\" -> DELETE /{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionId}\n- \"Get roleDefinition details?\" -> GET /{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionId}\n- \"Update a roleDefinition?\" -> PUT /{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionId}\n- \"List all roleDefinitions?\" -> GET /{scope}/providers/Microsoft.Authorization/roleDefinitions\n- \"How to authenticate?\" -> See Auth section above\n\n## Response Tips\n- Check response schemas in references/api-spec.lap for field details\n- Create/update endpoints return the modified resource on success\n\n## References\n- Full spec: See references/api-spec.lap for complete endpoint details, parameter tables, and response schemas\n\n> Generated from the official API spec by [LAP](https://lap.sh)\n","references/api-spec.lap":"@lap v0.3\n# Machine-readable API spec. Each @endpoint block is one API call.\n@api AuthorizationManagementClient\n@base https://management.azure.com\n@version 2018-01-01-preview\n@auth OAuth2\n@endpoints 6\n@toc subscriptions(2), {scope}(4)\n\n@group subscriptions\n@endpoint GET /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.Authorization/permissions\n@desc Gets all permissions the caller has for a resource group.\n@returns(200) OK - Returns an array of permissions.\n\n@endpoint GET /subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/{resourceProviderNamespace}/{parentResourcePath}/{resourceType}/{resourceName}/providers/Microsoft.Authorization/permissions\n@desc Gets all permissions the caller has for a resource.\n@required {parentResourcePath: any # The parent resource identity., resourceType: any # The resource type of the resource., resourceName: any # The name of the resource to get the permissions for.}\n@returns(200) OK - Returns an array of permissions.\n\n@endgroup\n\n@group {scope}\n@endpoint DELETE /{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionId}\n@desc Deletes a role definition.\n@required {scope: any # The scope of the role definition., roleDefinitionId: any # The ID of the role definition to delete.}\n@returns(200) OK - Returns information about the role definition.\n@returns(204) Role definition already deleted or does not exist.\n\n@endpoint GET /{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionId}\n@desc Get role definition by name (GUID).\n@required {scope: any # The scope of the role definition., roleDefinitionId: any # The ID of the role definition.}\n@returns(200) OK - Returns information about the role definition.\n\n@endpoint PUT /{scope}/providers/Microsoft.Authorization/roleDefinitions/{roleDefinitionId}\n@desc Creates or updates a role definition.\n@required {scope: any # The scope of the role definition., roleDefinitionId: any # The ID of the role definition., roleDefinition: map # The values for the role definition.}\n@returns(201) OK - Returns information about the role definition.\n\n@endpoint GET /{scope}/providers/Microsoft.Authorization/roleDefinitions\n@desc Get all role definitions that are applicable at scope and above.\n@required {scope: any # The scope of the role definition.}\n@optional {$filter: any # The filter to apply on the operation. Use atScopeAndBelow filter to search below the given scope as well.}\n@returns(200) OK - Returns an array of role definitions.\n\n@endgroup\n\n@end\n"}}