Skip to content

Commit c4ce3e7

Browse files
authored
Update Update-AzRoleManagementPolicy.md (#28502)
1 parent e807ac7 commit c4ce3e7

File tree

3 files changed

+9
-9
lines changed

3 files changed

+9
-9
lines changed

src/Resources/Authorization.Autorest/docs/Update-AzRoleManagementPolicy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Update a role management policy
3434
### Example 1: Update expiration rule of a policy
3535
```powershell
3636
$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/"
37-
$expirationRule = [RoleManagementPolicyExpirationRule]@{
37+
$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{
3838
isExpirationRequired = "false";
3939
maximumDuration = "P180D";
4040
id = "Expiration_Admin_Eligibility";
@@ -62,7 +62,7 @@ Each individual `Rule` on a policy can be update independently.
6262
### Example 2: Update expiration rule and a notification rule of a policy
6363
```powershell
6464
$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/"
65-
$expirationRule = [RoleManagementPolicyExpirationRule]@{
65+
$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{
6666
isExpirationRequired = "false";
6767
maximumDuration = "P180D";
6868
id = "Expiration_Admin_Eligibility";
@@ -74,7 +74,7 @@ $expirationRule = [RoleManagementPolicyExpirationRule]@{
7474
targetInheritableSetting = $null;
7575
targetEnforcedSetting = $null;
7676
}
77-
$notificationRule = [RoleManagementPolicyNotificationRule]@{
77+
$notificationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyNotificationRule]@{
7878
notificationType = "Email";
7979
recipientType = "Approver";
8080
isDefaultRecipientsEnabled = "false";

src/Resources/Authorization.Autorest/examples/Update-AzRoleManagementPolicy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
### Example 1: Update expiration rule of a policy
22
```powershell
33
$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/"
4-
$expirationRule = [RoleManagementPolicyExpirationRule]@{
4+
$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{
55
isExpirationRequired = "false";
66
maximumDuration = "P180D";
77
id = "Expiration_Admin_Eligibility";
@@ -29,7 +29,7 @@ Each individual `Rule` on a policy can be update independently.
2929
### Example 2: Update expiration rule and a notification rule of a policy
3030
```powershell
3131
$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/"
32-
$expirationRule = [RoleManagementPolicyExpirationRule]@{
32+
$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{
3333
isExpirationRequired = "false";
3434
maximumDuration = "P180D";
3535
id = "Expiration_Admin_Eligibility";
@@ -41,7 +41,7 @@ $expirationRule = [RoleManagementPolicyExpirationRule]@{
4141
targetInheritableSetting = $null;
4242
targetEnforcedSetting = $null;
4343
}
44-
$notificationRule = [RoleManagementPolicyNotificationRule]@{
44+
$notificationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyNotificationRule]@{
4545
notificationType = "Email";
4646
recipientType = "Approver";
4747
isDefaultRecipientsEnabled = "false";

src/Resources/Resources/help/Update-AzRoleManagementPolicy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Update a role management policy
3434
### Example 1: Update expiration rule of a policy
3535
```powershell
3636
$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/"
37-
$expirationRule = [RoleManagementPolicyExpirationRule]@{
37+
$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{
3838
isExpirationRequired = "false";
3939
maximumDuration = "P180D";
4040
id = "Expiration_Admin_Eligibility";
@@ -61,7 +61,7 @@ Each individual `Rule` on a policy can be update independently.
6161
### Example 2: Update expiration rule and a notification rule of a policy
6262
```powershell
6363
$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/"
64-
$expirationRule = [RoleManagementPolicyExpirationRule]@{
64+
$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{
6565
isExpirationRequired = "false";
6666
maximumDuration = "P180D";
6767
id = "Expiration_Admin_Eligibility";
@@ -73,7 +73,7 @@ $expirationRule = [RoleManagementPolicyExpirationRule]@{
7373
targetInheritableSetting = $null;
7474
targetEnforcedSetting = $null;
7575
}
76-
$notificationRule = [RoleManagementPolicyNotificationRule]@{
76+
$notificationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyNotificationRule]@{
7777
notificationType = "Email";
7878
recipientType = "Approver";
7979
isDefaultRecipientsEnabled = "false";

0 commit comments

Comments
 (0)