diff --git a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentSchedule.json b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentSchedule.json index 632f5facd9c4..ab1612d08c1c 100644 --- a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentSchedule.json +++ b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentSchedule.json @@ -39,7 +39,7 @@ "tags": [ "roleAssignmentSchedules" ], - "operationId": "roleAssignmentSchedules_Get", + "operationId": "RoleAssignmentSchedules_Get", "description": "Get the specified role assignment schedule for a resource scope", "parameters": [ { @@ -87,7 +87,7 @@ "tags": [ "roleAssignmentSchedules" ], - "operationId": "roleAssignmentSchedules_ListForScope", + "operationId": "RoleAssignmentSchedules_ListForScope", "description": "Gets role assignment schedules for a resource scope.", "parameters": [ { @@ -103,7 +103,7 @@ "in": "query", "required": false, "type": "string", - "description": "The filter to apply on the operation. Use $filter=atScope() to return all role assignment schedules at or above the scope. Use $filter=principalId eq {id} to return all role assignment schedules at, above or below the scope for the specified principal. Use $filter=asRequestor() to return all role assignment schedules requested by the current user. Use $filter=asTarget() to return all role assignment schedules created for the current user." + "description": "The filter to apply on the operation. Use $filter=atScope() to return all role assignment schedules at or above the scope. Use $filter=principalId eq {id} to return all role assignment schedules at, above or below the scope for the specified principal. Use $filter=assignedTo('{userId}') to return all role assignment schedules for the current user. Use $filter=asTarget() to return all role assignment schedules created for the current user." }, { "$ref": "#/parameters/ApiVersionParameter" diff --git a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentScheduleInstance.json b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentScheduleInstance.json index fab07e94b6f0..7e56155739ae 100644 --- a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentScheduleInstance.json +++ b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentScheduleInstance.json @@ -39,7 +39,7 @@ "tags": [ "roleAssignmentScheduleInstances" ], - "operationId": "roleAssignmentScheduleInstances_ListForScope", + "operationId": "RoleAssignmentScheduleInstances_ListForScope", "description": "Gets role assignment schedule instances of a role assignment schedule.", "parameters": [ { @@ -55,7 +55,7 @@ "in": "query", "required": false, "type": "string", - "description": "The filter to apply on the operation. Use $filter=atScope() to return all role assignment schedules at or above the scope. Use $filter=principalId eq {id} to return all role assignment schedules at, above or below the scope for the specified principal. Use $filter=asRequestor() to return all role assignment schedules requested by the current user. Use $filter=asTarget() to return all role assignment schedules created for the current user." + "description": "The filter to apply on the operation. Use $filter=atScope() to return all role assignment schedules at or above the scope. Use $filter=principalId eq {id} to return all role assignment schedules at, above or below the scope for the specified principal. Use $filter=assignedTo('{userId}') to return all role assignment schedule instances for the user. Use $filter=asTarget() to return all role assignment schedule instances created for the current user." }, { "$ref": "#/parameters/ApiVersionParameter" @@ -91,7 +91,7 @@ "tags": [ "roleAssignmentScheduleInstances" ], - "operationId": "roleAssignmentScheduleInstances_Get", + "operationId": "RoleAssignmentScheduleInstances_Get", "description": "Gets the specified role assignment schedule instance.", "parameters": [ { diff --git a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentScheduleRequest.json b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentScheduleRequest.json index fa2c3e99d0dd..16ef08399dd1 100644 --- a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentScheduleRequest.json +++ b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleAssignmentScheduleRequest.json @@ -404,7 +404,7 @@ }, "ticketSystem": { "type": "string", - "description": "Ticket number for the role assignment" + "description": "Ticket system name for the role assignment" } }, "description": "Ticket Info of the role assignment" diff --git a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilitySchedule.json b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilitySchedule.json index 01c7b43c3294..aae28e8195be 100644 --- a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilitySchedule.json +++ b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilitySchedule.json @@ -39,7 +39,7 @@ "tags": [ "roleEligibilitySchedules" ], - "operationId": "roleEligibilitySchedules_Get", + "operationId": "RoleEligibilitySchedules_Get", "description": "Get the specified role eligibility schedule for a resource scope", "parameters": [ { @@ -87,7 +87,7 @@ "tags": [ "roleEligibilitySchedules" ], - "operationId": "roleEligibilitySchedules_ListForScope", + "operationId": "RoleEligibilitySchedules_ListForScope", "description": "Gets role eligibility schedules for a resource scope.", "parameters": [ { @@ -103,7 +103,7 @@ "in": "query", "required": false, "type": "string", - "description": "The filter to apply on the operation. Use $filter=atScope() to return all role eligibility schedules at or above the scope. Use $filter=principalId eq {id} to return all role eligibility schedules at, above or below the scope for the specified principal. Use $filter=asRequestor() to return all role eligibility schedules requested by the current user. Use $filter=asTarget() to return all role eligibility schedules created for the current user." + "description": "The filter to apply on the operation. Use $filter=atScope() to return all role eligibility schedules at or above the scope. Use $filter=principalId eq {id} to return all role eligibility schedules at, above or below the scope for the specified principal. Use $filter=assignedTo('{userId}') to return all role eligibility schedules for the user. Use $filter=asTarget() to return all role eligibility schedules created for the current user." }, { "$ref": "#/parameters/ApiVersionParameter" diff --git a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilityScheduleInstance.json b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilityScheduleInstance.json index 0621ec64cd79..aca676b790af 100644 --- a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilityScheduleInstance.json +++ b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilityScheduleInstance.json @@ -39,7 +39,7 @@ "tags": [ "roleEligibilityScheduleInstances" ], - "operationId": "roleEligibilityScheduleInstances_ListForScope", + "operationId": "RoleEligibilityScheduleInstances_ListForScope", "description": "Gets role eligibility schedule instances of a role eligibility schedule.", "parameters": [ { @@ -55,7 +55,7 @@ "in": "query", "required": false, "type": "string", - "description": "The filter to apply on the operation. Use $filter=atScope() to return all role assignment schedules at or above the scope. Use $filter=principalId eq {id} to return all role assignment schedules at, above or below the scope for the specified principal. Use $filter=asRequestor() to return all role eligibility schedules requested by the current user. Use $filter=asTarget() to return all role eligibility schedules created for the current user." + "description": "The filter to apply on the operation. Use $filter=atScope() to return all role assignment schedules at or above the scope. Use $filter=principalId eq {id} to return all role assignment schedules at, above or below the scope for the specified principal. Use $filter=assignedTo('{userId}') to return all role eligibility schedules for the user. Use $filter=asTarget() to return all role eligibility schedules created for the current user." }, { "$ref": "#/parameters/ApiVersionParameter" @@ -91,7 +91,7 @@ "tags": [ "roleEligibilityScheduleInstances" ], - "operationId": "roleEligibilityScheduleInstances_Get", + "operationId": "RoleEligibilityScheduleInstances_Get", "description": "Gets the specified role eligibility schedule instance.", "parameters": [ { diff --git a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilityScheduleRequest.json b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilityScheduleRequest.json index b0d7561b6c12..9957d749ffd0 100644 --- a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilityScheduleRequest.json +++ b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleEligibilityScheduleRequest.json @@ -400,7 +400,7 @@ }, "ticketSystem": { "type": "string", - "description": "Ticket number for the role eligibility" + "description": "Ticket system name for the role eligibility" } }, "description": "Ticket Info of the role eligibility" diff --git a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleManagementPolicy.json b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleManagementPolicy.json index 57c1e3d8a94a..0ca289498323 100644 --- a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleManagementPolicy.json +++ b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleManagementPolicy.json @@ -39,7 +39,7 @@ "tags": [ "roleManagementPolicies" ], - "operationId": "roleManagementPolicies_Get", + "operationId": "RoleManagementPolicies_Get", "description": "Get the specified role management policy for a resource scope", "parameters": [ { @@ -85,7 +85,7 @@ "tags": [ "roleManagementPolicies" ], - "operationId": "roleManagementPolicies_Create", + "operationId": "RoleManagementPolicies_Update", "description": "Update or create a role management policy", "parameters": [ { @@ -140,7 +140,7 @@ "tags": [ "roleManagementPolicies" ], - "operationId": "roleManagementPolicies_Delete", + "operationId": "RoleManagementPolicies_Delete", "description": "Delete a role management policy", "parameters": [ { @@ -188,7 +188,7 @@ "tags": [ "roleManagementPolicies" ], - "operationId": "roleManagementPolicies_ListForScope", + "operationId": "RoleManagementPolicies_ListForScope", "description": "Gets role management policies for a resource scope.", "parameters": [ { diff --git a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleManagementPolicyAssignment.json b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleManagementPolicyAssignment.json index d1eb52df6640..9a0fcb86a437 100644 --- a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleManagementPolicyAssignment.json +++ b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/RoleManagementPolicyAssignment.json @@ -39,7 +39,7 @@ "tags": [ "roleManagementPolicyAssignments" ], - "operationId": "roleManagementPolicyAssignments_Get", + "operationId": "RoleManagementPolicyAssignments_Get", "description": "Get the specified role management policy assignment for a resource scope", "parameters": [ { @@ -85,7 +85,7 @@ "tags": [ "roleManagementPolicyAssignments" ], - "operationId": "roleManagementPolicyAssignments_Create", + "operationId": "RoleManagementPolicyAssignments_Create", "description": "Create a role management policy assignment", "parameters": [ { @@ -140,7 +140,7 @@ "tags": [ "roleManagementPolicyAssignments" ], - "operationId": "roleManagementPolicyAssignments_Delete", + "operationId": "RoleManagementPolicyAssignments_Delete", "description": "Delete a role management policy assignment", "parameters": [ { @@ -188,7 +188,7 @@ "tags": [ "roleManagementPolicyAssignments" ], - "operationId": "roleManagementPolicyAssignments_ListForScope", + "operationId": "RoleManagementPolicyAssignments_ListForScope", "description": "Gets role management assignment policies for a resource scope.", "parameters": [ { diff --git a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/examples/GetRoleManagementPolicyByScope.json b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/examples/GetRoleManagementPolicyByScope.json index a67a7c87c400..0a329c482a08 100644 --- a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/examples/GetRoleManagementPolicyByScope.json +++ b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/examples/GetRoleManagementPolicyByScope.json @@ -1,6 +1,6 @@ { "parameters": { - "scope": "subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f", + "scope": "subscriptions/892f85f0-fd69-4fe8-8ee2-bda821252ac3", "api-version": "2020-10-01-preview" }, "responses": { diff --git a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/examples/PutRoleManagementPolicyAssignment.json b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/examples/PutRoleManagementPolicyAssignment.json index 0aa0afab81c8..f606dea2b49e 100644 --- a/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/examples/PutRoleManagementPolicyAssignment.json +++ b/specification/authorization/resource-manager/Microsoft.Authorization/preview/2020-10-01-preview/examples/PutRoleManagementPolicyAssignment.json @@ -6,7 +6,7 @@ "parameters": { "properties": { "scope": "/subscriptions/892f85f0-fd69-4fe8-8ee2-bda821252ac3", - "roleDefinitionId": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/roleDefinitions/a37489be-9462-48fb-a3b6-7b9bc2debbad", + "roleDefinitionId": "/subscriptions/892f85f0-fd69-4fe8-8ee2-bda821252ac3/providers/Microsoft.Authorization/roleDefinitions/a37489be-9462-48fb-a3b6-7b9bc2debbad", "policyId": "/subscriptions/892f85f0-fd69-4fe8-8ee2-bda821252ac3/providers/Microsoft.Authorization/RoleManagementPolicies/477f2d04-0fdc-417f-ab1b-d9fff8137134" } } @@ -16,7 +16,7 @@ "body": { "properties": { "scope": "/subscriptions/892f85f0-fd69-4fe8-8ee2-bda821252ac3", - "roleDefinitionId": "/subscriptions/dfa2a084-766f-4003-8ae1-c4aeb893a99f/providers/Microsoft.Authorization/roleDefinitions/a37489be-9462-48fb-a3b6-7b9bc2debbad", + "roleDefinitionId": "/subscriptions/892f85f0-fd69-4fe8-8ee2-bda821252ac3/providers/Microsoft.Authorization/roleDefinitions/a37489be-9462-48fb-a3b6-7b9bc2debbad", "policyId": "/subscriptions/892f85f0-fd69-4fe8-8ee2-bda821252ac3/providers/Microsoft.Authorization/RoleManagementPolicies/477f2d04-0fdc-417f-ab1b-d9fff8137134" }, "name": "477f2d04-0fdc-417f-ab1b-d9fff8137134_a37489be-9462-48fb-a3b6-7b9bc2debbad",