diff --git a/azps-14.4.0/Az.Resources/Update-AzRoleManagementPolicy.md b/azps-14.4.0/Az.Resources/Update-AzRoleManagementPolicy.md index 3e6b6190a1..8f4b345359 100644 --- a/azps-14.4.0/Az.Resources/Update-AzRoleManagementPolicy.md +++ b/azps-14.4.0/Az.Resources/Update-AzRoleManagementPolicy.md @@ -36,7 +36,7 @@ Update a role management policy ### Example 1: Update expiration rule of a policy ```powershell $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -$expirationRule = [RoleManagementPolicyExpirationRule]@{ +$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -63,7 +63,7 @@ Each individual `Rule` on a policy can be update independently. ### Example 2: Update expiration rule and a notification rule of a policy ```powershell $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -$expirationRule = [RoleManagementPolicyExpirationRule]@{ +$expirationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -75,7 +75,7 @@ $expirationRule = [RoleManagementPolicyExpirationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -$notificationRule = [RoleManagementPolicyNotificationRule]@{ +$notificationRule = [Microsoft.Azure.PowerShell.Cmdlets.Resources.Authorization.Models.Api20201001Preview.RoleManagementPolicyNotificationRule]@{ notificationType = "Email"; recipientType = "Approver"; isDefaultRecipientsEnabled = "false";