API to fetch assigned policy to a group?

hi
I have been searching OKTA API documentation and not able to find policy that a group is assigned.
Basically I have a group of users assigned to a group. And a policy is assigned to this group. Based on the policy I want to find prompt factor(Email/OKTA-Verify).

Can anyone help me ?

I think there is none available. You’d need to iterate through the list of policies to figure which one has your group

Thank @phi1ipp
But how can I figure out policy mapped to group ? I have list of policies but it doesn’t have any information related to group? As well as I am only able to get groups of user.

Is there any API which will give me both in common?

Do you not see an array of conditions.people.groups.include in the Policy when you make a GET request to /api/v1/policies/${policyId}, as in this example

  {
    "type": "OKTA_SIGN_ON",
    "id": "00pmez6igjv4TYOLl0g3",
    "status": "ACTIVE",
    "name": "Sales Policy",
    "description": "Policy for Sales Department",
    "priority": 1,
    "system": false,
    "conditions": {
      "people": {
        "groups": {
          "include": [
            "00gmexWGbl9VauvTP0g3"
          ]
        }
      }
    },
    "created": "2017-01-11T18:53:00.000Z",
    "lastUpdated": "2017-01-11T18:53:00.000Z",
    "_links": {
      "self": {
        "href": "http://ed.okta1.com:1802/api/v1/policies/00pmez6igjv4TYOLl0g3",
        "hints": {
          "allow": [
            "GET",
            "PUT",
            "DELETE"
          ]
        }
      },
      "deactivate": {
        "href": "http://ed.okta1.com:1802/api/v1/policies/00pmez6igjv4TYOLl0g3/lifecycle/deactivate",
        "hints": {
          "allow": [
            "POST"
          ]
        }
      },
      "rules": {
        "href": "http://ed.okta1.com:1802/api/v1/policies/00pmez6igjv4TYOLl0g3/rules",
        "hints": {
          "allow": [
            "GET",
            "POST"
          ]
        }
      }
    }
  }

Thanks a lot @andrea
Got it but in my case conditions field is blank for all policy as shown in screenshot :

Below is configuration of my policy