diff --git a/src/Resources/Authorization.Autorest/docs/Update-AzRoleManagementPolicy.md b/src/Resources/Authorization.Autorest/docs/Update-AzRoleManagementPolicy.md index f4c0ee6ca82c..52106f47f5a9 100644 --- a/src/Resources/Authorization.Autorest/docs/Update-AzRoleManagementPolicy.md +++ b/src/Resources/Authorization.Autorest/docs/Update-AzRoleManagementPolicy.md @@ -34,7 +34,7 @@ Update a role management policy ### Example 1: Update expiration rule of a policy ```powershell $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -$expirationRule = [RoleManagementPolicyExpirationRule]@{ +$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -62,7 +62,7 @@ Each individual `Rule` on a policy can be update independently. ### Example 2: Update expiration rule and a notification rule of a policy ```powershell $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -$expirationRule = [RoleManagementPolicyExpirationRule]@{ +$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -74,7 +74,7 @@ $expirationRule = [RoleManagementPolicyExpirationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -$notificationRule = [RoleManagementPolicyNotificationRule]@{ +$notificationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyNotificationRule]@{ notificationType = "Email"; recipientType = "Approver"; isDefaultRecipientsEnabled = "false"; diff --git a/src/Resources/Authorization.Autorest/examples/Update-AzRoleManagementPolicy.md b/src/Resources/Authorization.Autorest/examples/Update-AzRoleManagementPolicy.md index e6aa3edbe9e3..662c3b7739ee 100644 --- a/src/Resources/Authorization.Autorest/examples/Update-AzRoleManagementPolicy.md +++ b/src/Resources/Authorization.Autorest/examples/Update-AzRoleManagementPolicy.md @@ -1,7 +1,7 @@ ### Example 1: Update expiration rule of a policy ```powershell $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -$expirationRule = [RoleManagementPolicyExpirationRule]@{ +$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -29,7 +29,7 @@ Each individual `Rule` on a policy can be update independently. ### Example 2: Update expiration rule and a notification rule of a policy ```powershell $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -$expirationRule = [RoleManagementPolicyExpirationRule]@{ +$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -41,7 +41,7 @@ $expirationRule = [RoleManagementPolicyExpirationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -$notificationRule = [RoleManagementPolicyNotificationRule]@{ +$notificationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyNotificationRule]@{ notificationType = "Email"; recipientType = "Approver"; isDefaultRecipientsEnabled = "false"; diff --git a/src/Resources/Resources/help/Update-AzRoleManagementPolicy.md b/src/Resources/Resources/help/Update-AzRoleManagementPolicy.md index d389400d7933..01e018c48a41 100644 --- a/src/Resources/Resources/help/Update-AzRoleManagementPolicy.md +++ b/src/Resources/Resources/help/Update-AzRoleManagementPolicy.md @@ -34,7 +34,7 @@ Update a role management policy ### Example 1: Update expiration rule of a policy ```powershell $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -$expirationRule = [RoleManagementPolicyExpirationRule]@{ +$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -61,7 +61,7 @@ Each individual `Rule` on a policy can be update independently. ### Example 2: Update expiration rule and a notification rule of a policy ```powershell $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -$expirationRule = [RoleManagementPolicyExpirationRule]@{ +$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -73,7 +73,7 @@ $expirationRule = [RoleManagementPolicyExpirationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -$notificationRule = [RoleManagementPolicyNotificationRule]@{ +$notificationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyNotificationRule]@{ notificationType = "Email"; recipientType = "Approver"; isDefaultRecipientsEnabled = "false";