diff --git a/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentSchedule.md b/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentSchedule.md index 9ab994eca505..6dad60cf6926 100644 --- a/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentSchedule.md +++ b/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentSchedule.md @@ -36,9 +36,11 @@ Get the specified role assignment schedule for a resource scope ### Example 1: List all role assignment schedules for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentSchedule -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -52,9 +54,11 @@ To call the API, you must have access to the `Microsoft.Authorization/roleAssign ### Example 2: List all My role assignment schedules for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope -Filter "asTarget()" +$scope = "/" # "/" stands for tenant level resource +Get-AzRoleAssignmentSchedule -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -67,10 +71,12 @@ Returns all `roleAssignmentSchedules` for the `scope` which are assigned to the ### Example 3: List all role assignment schedules for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope -Filter $filter +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" +Get-AzRoleAssignmentSchedule -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -98,9 +104,11 @@ Supported filters: ### Example 4: Get a role assignment schedule by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentSchedule -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentScheduleInstance.md b/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentScheduleInstance.md index 28d31546b008..86fbeb1e8898 100644 --- a/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentScheduleInstance.md +++ b/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentScheduleInstance.md @@ -37,9 +37,11 @@ Gets the specified role assignment schedule instance. ### Example 1: List all role assignment schedule instances for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleInstance -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -53,9 +55,11 @@ To call the API, you must have access to the `Microsoft.Authorization/roleAssign ### Example 2: List all My role assignment schedule instances for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter "asTarget()" +$scope = "/" # "/" stands for tenant level resource +Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -68,10 +72,12 @@ Returns all `roleAssignmentScheduleInstances` for the `scope` which are assigned ### Example 3: List all role assignment schedule instances for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter $filter +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" +Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -99,9 +105,11 @@ Supported filters: ### Example 4: Get a role assignment schedule instances by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleInstance -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentScheduleRequest.md b/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentScheduleRequest.md index d41eeb698d2c..923d4ed9f069 100644 --- a/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/docs/Get-AzRoleAssignmentScheduleRequest.md @@ -37,9 +37,11 @@ Get the specified role assignment schedule request. ### Example 1: List all role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 01b86d0b-2d7d-4ee2-bedb-68417ca9cc6a Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -52,9 +54,11 @@ Returns all `roleAssignmentScheduleRequests` for the `scope`. ### Example 2: List all My role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asTarget()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -67,9 +71,11 @@ Returns all `roleAssignmentScheduleRequests` for the `scope` which are assigned ### Example 3: List all role assignment schedule requests for a resource where calling user is an approver ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asApprover()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asApprover()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -82,9 +88,11 @@ Returns all `roleAssignmentScheduleRequests` for the `scope` on which the callin ### Example 4: Get a role assignment schedule request by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authoriz… diff --git a/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilitySchedule.md b/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilitySchedule.md index 41c010d8445c..cbe793408f9a 100644 --- a/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilitySchedule.md +++ b/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilitySchedule.md @@ -36,9 +36,11 @@ Get the specified role eligibility schedule for a resource scope ### Example 1: List all role eligible schedules for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilitySchedule -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -52,9 +54,11 @@ To call the API, you must have access to the `Microsoft.Authorization/roleAssign ### Example 2: List all My role eligible schedules for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource +$scope = "/" # "/" stands for tenant level resource Get-AzRoleEligibilitySchedule -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -67,10 +71,12 @@ Returns all `roleEligibilitySchedules` for the `scope` which are assigned to the ### Example 3: List all role eligible schedules for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" Get-AzRoleEligibilitySchedule -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -98,9 +104,11 @@ Supported filters: ### Example 4: Get a role eligible schedules by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilitySchedule -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilityScheduleInstance.md b/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilityScheduleInstance.md index 9a4cefcd5bcb..18637d6b9b2c 100644 --- a/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilityScheduleInstance.md +++ b/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilityScheduleInstance.md @@ -37,9 +37,11 @@ Gets the specified role eligibility schedule instance. ### Example 1: List all role eligible schedule instances for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilityScheduleInstance -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -53,9 +55,11 @@ To call the API, you must have access to the `Microsoft.Authorization/roleAssign ### Example 2: List all My role eligible schedule instances for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource +$scope = "/" # "/" stands for tenant level resource Get-AzRoleEligibilityScheduleInstance -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -68,10 +72,12 @@ Returns all `roleEligibilityScheduleInstances` for the `scope` which are assigne ### Example 3: List all role eligible schedule instances for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" Get-AzRoleEligibilityScheduleInstance -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -99,9 +105,11 @@ Supported filters: ### Example 4: Get a role eligible schedule instances by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilityScheduleInstance -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilityScheduleRequest.md b/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilityScheduleRequest.md index 88fdf3e3afa4..031fc97fdf92 100644 --- a/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilityScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibilityScheduleRequest.md @@ -37,9 +37,11 @@ Get the specified role eligibility schedule request. ### Example 1: List all role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 01b86d0b-2d7d-4ee2-bedb-68417ca9cc6a Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -52,9 +54,11 @@ Returns all `roleEligibilityScheduleRequests` for the `scope`. ### Example 2: List all My role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asTarget()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -67,9 +71,11 @@ Returns all `roleEligibilityScheduleRequests` for the `scope` which are assigned ### Example 3: List all role assignment schedule requests for a resource where calling user is an approver ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asApprover()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asApprover()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -82,9 +88,11 @@ Returns all `roleEligibilitySchedules` for the `scope` on which the calling user ### Example 4: Get a role assignment schedule request by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authoriz… diff --git a/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibleChildResource.md b/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibleChildResource.md index e98b0dc0eb98..12d64364a0aa 100644 --- a/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibleChildResource.md +++ b/src/Resources/Authorization.Autorest/docs/Get-AzRoleEligibleChildResource.md @@ -31,9 +31,11 @@ Get the child resources of a resource on which user has eligible access ### Example 1: List all child resources ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Get-AzRoleEligibleChildResource -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Get-AzRoleEligibleChildResource -Scope $scope +``` +```output Name Type ---- ---- AnujRG resourcegroup @@ -46,10 +48,12 @@ Get all child resources of a resource `scope` that the calling user has eligible ### Example 2: List all child resources filtered by resource type ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $filter = "resoureType eq 'resourcegroup'" -PS C:\> Get-AzRoleEligibleChildResource -Scope $scope -Filter $filter +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$filter = "resoureType eq 'resourcegroup'" +Get-AzRoleEligibleChildResource -Scope $scope -Filter $filter +``` +```output Name Type ---- ---- AnujRG resourcegroup diff --git a/src/Resources/Authorization.Autorest/docs/Get-AzRoleManagementPolicy.md b/src/Resources/Authorization.Autorest/docs/Get-AzRoleManagementPolicy.md index 630a1819670c..0f220ce82875 100644 --- a/src/Resources/Authorization.Autorest/docs/Get-AzRoleManagementPolicy.md +++ b/src/Resources/Authorization.Autorest/docs/Get-AzRoleManagementPolicy.md @@ -35,9 +35,11 @@ Get the specified role management policy for a resource scope ### Example 1: List all role management policies under a resource scope ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Get-AzRoleManagementPolicy -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Get-AzRoleManagementPolicy -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 588b80cc-f50c-4616-acc9-0003872624db Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -49,10 +51,12 @@ Returns all `roleManagementPolicies` for the `scope` ### Example 2: Get a role management policy by Scope and Name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "33b520ea-3544-4abc-8565-3588deb8e68e" -PS C:\> Get-AzRoleManagementPolicy -Scope $scope -Name $name +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "33b520ea-3544-4abc-8565-3588deb8e68e" +Get-AzRoleManagementPolicy -Scope $scope -Name $name +``` +```output Name Type Scope ---- ---- ----- 33b520ea-3544-4abc-8565-3588deb8e68e Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d diff --git a/src/Resources/Authorization.Autorest/docs/Get-AzRoleManagementPolicyAssignment.md b/src/Resources/Authorization.Autorest/docs/Get-AzRoleManagementPolicyAssignment.md index 1710749900d5..d1c6ae3f6d3b 100644 --- a/src/Resources/Authorization.Autorest/docs/Get-AzRoleManagementPolicyAssignment.md +++ b/src/Resources/Authorization.Autorest/docs/Get-AzRoleManagementPolicyAssignment.md @@ -36,9 +36,11 @@ Get the specified role management policy assignment for a resource scope ### Example 1: List all role management policy assignments under a resource scope ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Get-AzRoleManagementPolicyAssignment -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Get-AzRoleManagementPolicyAssignment -Scope $scope +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd Microsoft.Authorization/roleManagementPolicyAssignment /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f… @@ -51,10 +53,12 @@ Returns all `roleManagementPolicyAssignment` for the `scope` ### Example 2: Get a role management policy assignment by Scope and Name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" -PS C:\> Get-AzRoleManagementPolicyAssignment -Scope $scope -Name $name +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" +Get-AzRoleManagementPolicyAssignment -Scope $scope -Name $name +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd Microsoft.Authorization/roleManagementPolicyAssignment /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f… diff --git a/src/Resources/Authorization.Autorest/docs/New-AzRoleAssignmentScheduleRequest.md b/src/Resources/Authorization.Autorest/docs/New-AzRoleAssignmentScheduleRequest.md index 5ec3d6764dae..d8fa012dea0a 100644 --- a/src/Resources/Authorization.Autorest/docs/New-AzRoleAssignmentScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/docs/New-AzRoleAssignmentScheduleRequest.md @@ -29,11 +29,13 @@ Creates a role assignment schedule request. ### Example 1: Create a new role assignment schedule request as Admin ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -43,11 +45,13 @@ Creates a request to provision an active assignment of `roleDefinition` on the ` ### Example 2: Remove a role assignment schedule request as Admin ```powershell -PS C:\> $guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -57,11 +61,13 @@ Creates a request to remove an active assignment of `roleDefinition` on the `sco ### Example 3: Activate a new role assignment schedule request as user ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfActivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfActivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -71,11 +77,13 @@ Creates a request to activate an eligible assignment of `roleDefinition` on the ### Example 4: Deactivate a role assignment schedule request as user ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfDeactivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfDeactivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… diff --git a/src/Resources/Authorization.Autorest/docs/New-AzRoleEligibilityScheduleRequest.md b/src/Resources/Authorization.Autorest/docs/New-AzRoleEligibilityScheduleRequest.md index d9362baa48eb..5cdcf4ea6721 100644 --- a/src/Resources/Authorization.Autorest/docs/New-AzRoleEligibilityScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/docs/New-AzRoleEligibilityScheduleRequest.md @@ -29,11 +29,13 @@ Creates a role eligibility schedule request. ### Example 1: Create a new role eligibile schedule request as Admin ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -43,11 +45,13 @@ Creates a request to provision an eligible assignment of `roleDefinition` on the ### Example 2: Remove a role eligibile schedule request as Admin ```powershell -PS C:\> $guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… diff --git a/src/Resources/Authorization.Autorest/docs/New-AzRoleManagementPolicyAssignment.md b/src/Resources/Authorization.Autorest/docs/New-AzRoleManagementPolicyAssignment.md index 9369c06a116d..3bc2ff1f5f7f 100644 --- a/src/Resources/Authorization.Autorest/docs/New-AzRoleManagementPolicyAssignment.md +++ b/src/Resources/Authorization.Autorest/docs/New-AzRoleManagementPolicyAssignment.md @@ -22,11 +22,13 @@ Create a role management policy assignment ## EXAMPLES -### Example 1: {{ Add title here }} +### Example 1: Create a new role management policy assignment ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleManagementPolicyAssignment -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleManagementPolicyAssignment -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +``` +```output The requested resource does not support http method 'PUT'. ``` diff --git a/src/Resources/Authorization.Autorest/docs/Remove-AzRoleManagementPolicy.md b/src/Resources/Authorization.Autorest/docs/Remove-AzRoleManagementPolicy.md index 37efe88cf494..a12a712b68e0 100644 --- a/src/Resources/Authorization.Autorest/docs/Remove-AzRoleManagementPolicy.md +++ b/src/Resources/Authorization.Autorest/docs/Remove-AzRoleManagementPolicy.md @@ -31,9 +31,11 @@ Delete a role management policy ### Example 1: Delete a role management policy ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Remove-AzRoleManagementPolicy -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Remove-AzRoleManagementPolicy -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +``` +```output The requested resource does not support http method 'DELETE'. ``` diff --git a/src/Resources/Authorization.Autorest/docs/Remove-AzRoleManagementPolicyAssignment.md b/src/Resources/Authorization.Autorest/docs/Remove-AzRoleManagementPolicyAssignment.md index bcd7050af8db..d49623a3d614 100644 --- a/src/Resources/Authorization.Autorest/docs/Remove-AzRoleManagementPolicyAssignment.md +++ b/src/Resources/Authorization.Autorest/docs/Remove-AzRoleManagementPolicyAssignment.md @@ -31,9 +31,11 @@ Delete a role management policy assignment ### Example 1: Delete a role management policy assignment ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Remove-AzRoleManagementPolicyAssignment -Scope $scope -Name "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Remove-AzRoleManagementPolicyAssignment -Scope $scope -Name "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" +``` +```output Remove-AzRoleManagementPolicyAssignment_Delete: The requested resource does not support http method 'DELETE'. ``` diff --git a/src/Resources/Authorization.Autorest/docs/Stop-AzRoleAssignmentScheduleRequest.md b/src/Resources/Authorization.Autorest/docs/Stop-AzRoleAssignmentScheduleRequest.md index 1e76dc4d0450..ee8f004f612d 100644 --- a/src/Resources/Authorization.Autorest/docs/Stop-AzRoleAssignmentScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/docs/Stop-AzRoleAssignmentScheduleRequest.md @@ -31,10 +31,9 @@ Cancels a pending role assignment schedule request. ### Example 1: Cancel a pending role assignment schedule request ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" -PS C:\> Stop-AzRoleAssignmentScheduleRequest -Scope $scope -Name $name - +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" +Stop-AzRoleAssignmentScheduleRequest -Scope $scope -Name $name ``` You can use this operation to cancel a `roleAssignmentScheduleRequest` which has not been provisioned yet. diff --git a/src/Resources/Authorization.Autorest/docs/Stop-AzRoleEligibilityScheduleRequest.md b/src/Resources/Authorization.Autorest/docs/Stop-AzRoleEligibilityScheduleRequest.md index 0ac7c2e3ada0..aa8efb9420ad 100644 --- a/src/Resources/Authorization.Autorest/docs/Stop-AzRoleEligibilityScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/docs/Stop-AzRoleEligibilityScheduleRequest.md @@ -31,10 +31,9 @@ Cancels a pending role eligibility schedule request. ### Example 1: Cancel a pending role eligibility schedule request ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" -PS C:\> Stop-AzRoleEligibilitytScheduleRequest -Scope $scope -Name $name - +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" +Stop-AzRoleEligibilityScheduleRequest -Scope $scope -Name $name ``` You can use this operation to cancel a `roleEligibilityScheduleRequest` which has not been provisioned yet. diff --git a/src/Resources/Authorization.Autorest/docs/Update-AzRoleManagementPolicy.md b/src/Resources/Authorization.Autorest/docs/Update-AzRoleManagementPolicy.md index ec0311962f26..8d7293ed4318 100644 --- a/src/Resources/Authorization.Autorest/docs/Update-AzRoleManagementPolicy.md +++ b/src/Resources/Authorization.Autorest/docs/Update-AzRoleManagementPolicy.md @@ -33,8 +33,8 @@ Update a role management policy ### Example 1: Update expiration rule of a policy ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$expirationRule = [RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -46,9 +46,11 @@ PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -PS C:\> $rules = [IRoleManagementPolicyRule[]]@($expirationRule) -PS C:\> Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +$rules = [IRoleManagementPolicyRule[]]@($expirationRule) +Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +``` +```output Name Type Scope ---- ---- ----- 33b520ea-3544-4abc-8565-3588deb8e68e Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -59,8 +61,8 @@ Each individual `Rule` on a policy can be update independently. ### Example 2: Update expiration rule and a notification rule of a policy ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$expirationRule = [RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -72,7 +74,7 @@ PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -PS C:\> $notificationRule = [RoleManagementPolicyNotificationRule]@{ +$notificationRule = [RoleManagementPolicyNotificationRule]@{ notificationType = "Email"; recipientType = "Approver"; isDefaultRecipientsEnabled = "false"; @@ -87,9 +89,11 @@ PS C:\> $notificationRule = [RoleManagementPolicyNotificationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -PS C:\> $rules = [IRoleManagementPolicyRule[]]@($expirationRule, $notificationRule) -PS C:\> Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +$rules = [IRoleManagementPolicyRule[]]@($expirationRule, $notificationRule) +Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +``` +```output Name Type Scope ---- ---- ----- 33b520ea-3544-4abc-8565-3588deb8e68e Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d diff --git a/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentSchedule.md b/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentSchedule.md index 79b198c6b8d5..e3d1cca43d31 100644 --- a/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentSchedule.md +++ b/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentSchedule.md @@ -1,9 +1,11 @@ ### Example 1: List all role assignment schedules for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentSchedule -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -17,9 +19,11 @@ Returns all `roleAssignmentSchedules` for the `scope`. To call the API, you must ### Example 2: List all My role assignment schedules for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope -Filter "asTarget()" +$scope = "/" # "/" stands for tenant level resource +Get-AzRoleAssignmentSchedule -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -33,10 +37,12 @@ Returns all `roleAssignmentSchedules` for the `scope` which are assigned to the ### Example 3: List all role assignment schedules for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope -Filter $filter +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" +Get-AzRoleAssignmentSchedule -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -59,9 +65,11 @@ Supported filters: ### Example 4: Get a role assignment schedule by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentSchedule -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentScheduleInstance.md b/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentScheduleInstance.md index 82290764ee09..7ff06dfd33d9 100644 --- a/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentScheduleInstance.md +++ b/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentScheduleInstance.md @@ -1,9 +1,11 @@ ### Example 1: List all role assignment schedule instances for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleInstance -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -17,9 +19,11 @@ Returns all `roleAssignmentScheduleInstances` for the `scope`. To call the API, ### Example 2: List all My role assignment schedule instances for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter "asTarget()" +$scope = "/" # "/" stands for tenant level resource +Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -33,10 +37,12 @@ Returns all `roleAssignmentScheduleInstances` for the `scope` which are assigned ### Example 3: List all role assignment schedule instances for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter $filter +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" +Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -59,9 +65,11 @@ Supported filters: ### Example 4: Get a role assignment schedule instances by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleInstance -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentScheduleRequest.md b/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentScheduleRequest.md index 5438ffd16c2d..3d8cdef8e1cc 100644 --- a/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/examples/Get-AzRoleAssignmentScheduleRequest.md @@ -1,8 +1,10 @@ ### Example 1: List all role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 01b86d0b-2d7d-4ee2-bedb-68417ca9cc6a Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -15,9 +17,11 @@ Returns all `roleAssignmentScheduleRequests` for the `scope`. ### Example 2: List all My role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asTarget()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -30,9 +34,11 @@ Returns all `roleAssignmentScheduleRequests` for the `scope` which are assigned ### Example 3: List all role assignment schedule requests for a resource where calling user is an approver ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asApprover()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asApprover()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -46,9 +52,11 @@ Returns all `roleAssignmentScheduleRequests` for the `scope` on which the callin ### Example 4: Get a role assignment schedule request by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authoriz… diff --git a/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilitySchedule.md b/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilitySchedule.md index 6ec51c3d9354..bc6605b26291 100644 --- a/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilitySchedule.md +++ b/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilitySchedule.md @@ -1,8 +1,10 @@ ### Example 1: List all role eligible schedules for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilitySchedule -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -15,9 +17,11 @@ Returns all `roleEligibilitySchedules` for the `scope`. To call the API, you mus ### Example 2: List all My role eligible schedules for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource +$scope = "/" # "/" stands for tenant level resource Get-AzRoleEligibilitySchedule -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -30,10 +34,12 @@ Returns all `roleEligibilitySchedules` for the `scope` which are assigned to the ### Example 3: List all role eligible schedules for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" Get-AzRoleEligibilitySchedule -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -56,9 +62,11 @@ Supported filters: ### Example 4: Get a role eligible schedules by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilitySchedule -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilityScheduleInstance.md b/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilityScheduleInstance.md index 9986e1d76e7c..958f6445e8d2 100644 --- a/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilityScheduleInstance.md +++ b/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilityScheduleInstance.md @@ -1,8 +1,10 @@ ### Example 1: List all role eligible schedule instances for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilityScheduleInstance -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -15,9 +17,11 @@ Returns all `roleEligibilityScheduleInstances` for the `scope`. To call the API, ### Example 2: List all My role eligible schedule instances for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource +$scope = "/" # "/" stands for tenant level resource Get-AzRoleEligibilityScheduleInstance -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -30,10 +34,12 @@ Returns all `roleEligibilityScheduleInstances` for the `scope` which are assigne ### Example 3: List all role eligible schedule instances for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" Get-AzRoleEligibilityScheduleInstance -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -56,9 +62,11 @@ Supported filters: ### Example 4: Get a role eligible schedule instances by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilityScheduleInstance -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilityScheduleRequest.md b/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilityScheduleRequest.md index 87ff096fbe56..82c57d6b0801 100644 --- a/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilityScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibilityScheduleRequest.md @@ -1,8 +1,10 @@ ### Example 1: List all role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 01b86d0b-2d7d-4ee2-bedb-68417ca9cc6a Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -15,9 +17,11 @@ Returns all `roleEligibilityScheduleRequests` for the `scope`. ### Example 2: List all My role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asTarget()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -30,9 +34,11 @@ Returns all `roleEligibilityScheduleRequests` for the `scope` which are assigned ### Example 3: List all role assignment schedule requests for a resource where calling user is an approver ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asApprover()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asApprover()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -46,9 +52,11 @@ Returns all `roleEligibilitySchedules` for the `scope` on which the calling user ### Example 4: Get a role assignment schedule request by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authoriz… diff --git a/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibleChildResource.md b/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibleChildResource.md index a498023468cc..0189b79caad6 100644 --- a/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibleChildResource.md +++ b/src/Resources/Authorization.Autorest/examples/Get-AzRoleEligibleChildResource.md @@ -1,8 +1,10 @@ ### Example 1: List all child resources ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Get-AzRoleEligibleChildResource -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Get-AzRoleEligibleChildResource -Scope $scope +``` +```output Name Type ---- ---- AnujRG resourcegroup @@ -15,10 +17,12 @@ Get all child resources of a resource `scope` that the calling user has eligible ### Example 2: List all child resources filtered by resource type ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $filter = "resoureType eq 'resourcegroup'" -PS C:\> Get-AzRoleEligibleChildResource -Scope $scope -Filter $filter +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$filter = "resoureType eq 'resourcegroup'" +Get-AzRoleEligibleChildResource -Scope $scope -Filter $filter +``` +```output Name Type ---- ---- AnujRG resourcegroup diff --git a/src/Resources/Authorization.Autorest/examples/Get-AzRoleManagementPolicy.md b/src/Resources/Authorization.Autorest/examples/Get-AzRoleManagementPolicy.md index c0abea16fb3b..9bcf4240dff6 100644 --- a/src/Resources/Authorization.Autorest/examples/Get-AzRoleManagementPolicy.md +++ b/src/Resources/Authorization.Autorest/examples/Get-AzRoleManagementPolicy.md @@ -1,8 +1,10 @@ ### Example 1: List all role management policies under a resource scope ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Get-AzRoleManagementPolicy -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Get-AzRoleManagementPolicy -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 588b80cc-f50c-4616-acc9-0003872624db Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -14,10 +16,12 @@ Returns all `roleManagementPolicies` for the `scope` ### Example 2: Get a role management policy by Scope and Name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "33b520ea-3544-4abc-8565-3588deb8e68e" -PS C:\> Get-AzRoleManagementPolicy -Scope $scope -Name $name +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "33b520ea-3544-4abc-8565-3588deb8e68e" +Get-AzRoleManagementPolicy -Scope $scope -Name $name +``` +```output Name Type Scope ---- ---- ----- 33b520ea-3544-4abc-8565-3588deb8e68e Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d diff --git a/src/Resources/Authorization.Autorest/examples/Get-AzRoleManagementPolicyAssignment.md b/src/Resources/Authorization.Autorest/examples/Get-AzRoleManagementPolicyAssignment.md index d8e59272ab2f..6611eed55111 100644 --- a/src/Resources/Authorization.Autorest/examples/Get-AzRoleManagementPolicyAssignment.md +++ b/src/Resources/Authorization.Autorest/examples/Get-AzRoleManagementPolicyAssignment.md @@ -1,8 +1,10 @@ ### Example 1: List all role management policy assignments under a resource scope ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Get-AzRoleManagementPolicyAssignment -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Get-AzRoleManagementPolicyAssignment -Scope $scope +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd Microsoft.Authorization/roleManagementPolicyAssignment /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f… @@ -15,10 +17,12 @@ Returns all `roleManagementPolicyAssignment` for the `scope` ### Example 2: Get a role management policy assignment by Scope and Name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" -PS C:\> Get-AzRoleManagementPolicyAssignment -Scope $scope -Name $name +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" +Get-AzRoleManagementPolicyAssignment -Scope $scope -Name $name +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd Microsoft.Authorization/roleManagementPolicyAssignment /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f… diff --git a/src/Resources/Authorization.Autorest/examples/New-AzRoleAssignmentScheduleRequest.md b/src/Resources/Authorization.Autorest/examples/New-AzRoleAssignmentScheduleRequest.md index d3e3bc31fc20..755207728f84 100644 --- a/src/Resources/Authorization.Autorest/examples/New-AzRoleAssignmentScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/examples/New-AzRoleAssignmentScheduleRequest.md @@ -1,10 +1,12 @@ ### Example 1: Create a new role assignment schedule request as Admin ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -14,11 +16,13 @@ Creates a request to provision an active assignment of `roleDefinition` on the ` ### Example 2: Remove a role assignment schedule request as Admin ```powershell -PS C:\> $guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -28,11 +32,13 @@ Creates a request to remove an active assignment of `roleDefinition` on the `sco ### Example 3: Activate a new role assignment schedule request as user ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfActivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfActivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -42,11 +48,13 @@ Creates a request to activate an eligible assignment of `roleDefinition` on the ### Example 4: Deactivate a role assignment schedule request as user ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfDeactivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfDeactivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… diff --git a/src/Resources/Authorization.Autorest/examples/New-AzRoleEligibilityScheduleRequest.md b/src/Resources/Authorization.Autorest/examples/New-AzRoleEligibilityScheduleRequest.md index 5138a4ef475b..fb78c916d928 100644 --- a/src/Resources/Authorization.Autorest/examples/New-AzRoleEligibilityScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/examples/New-AzRoleEligibilityScheduleRequest.md @@ -1,10 +1,12 @@ ### Example 1: Create a new role eligibile schedule request as Admin ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -14,11 +16,13 @@ Creates a request to provision an eligible assignment of `roleDefinition` on the ### Example 2: Remove a role eligibile schedule request as Admin ```powershell -PS C:\> $guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… diff --git a/src/Resources/Authorization.Autorest/examples/New-AzRoleManagementPolicyAssignment.md b/src/Resources/Authorization.Autorest/examples/New-AzRoleManagementPolicyAssignment.md index dc7bb4fcdc35..a0170d1f6c84 100644 --- a/src/Resources/Authorization.Autorest/examples/New-AzRoleManagementPolicyAssignment.md +++ b/src/Resources/Authorization.Autorest/examples/New-AzRoleManagementPolicyAssignment.md @@ -1,8 +1,10 @@ -### Example 1: {{ Add title here }} +### Example 1: Create a new role management policy assignment ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleManagementPolicyAssignment -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleManagementPolicyAssignment -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +``` +```output The requested resource does not support http method 'PUT'. ``` diff --git a/src/Resources/Authorization.Autorest/examples/Remove-AzRoleManagementPolicy.md b/src/Resources/Authorization.Autorest/examples/Remove-AzRoleManagementPolicy.md index 3055d7cd387d..309b67521faa 100644 --- a/src/Resources/Authorization.Autorest/examples/Remove-AzRoleManagementPolicy.md +++ b/src/Resources/Authorization.Autorest/examples/Remove-AzRoleManagementPolicy.md @@ -1,8 +1,10 @@ ### Example 1: Delete a role management policy ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Remove-AzRoleManagementPolicy -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Remove-AzRoleManagementPolicy -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +``` +```output The requested resource does not support http method 'DELETE'. ``` diff --git a/src/Resources/Authorization.Autorest/examples/Remove-AzRoleManagementPolicyAssignment.md b/src/Resources/Authorization.Autorest/examples/Remove-AzRoleManagementPolicyAssignment.md index 772bc6e2a29e..fc7a8698f151 100644 --- a/src/Resources/Authorization.Autorest/examples/Remove-AzRoleManagementPolicyAssignment.md +++ b/src/Resources/Authorization.Autorest/examples/Remove-AzRoleManagementPolicyAssignment.md @@ -1,8 +1,10 @@ ### Example 1: Delete a role management policy assignment ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Remove-AzRoleManagementPolicyAssignment -Scope $scope -Name "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Remove-AzRoleManagementPolicyAssignment -Scope $scope -Name "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" +``` +```output Remove-AzRoleManagementPolicyAssignment_Delete: The requested resource does not support http method 'DELETE'. ``` diff --git a/src/Resources/Authorization.Autorest/examples/Stop-AzRoleAssignmentScheduleRequest.md b/src/Resources/Authorization.Autorest/examples/Stop-AzRoleAssignmentScheduleRequest.md index 709a8adfa98f..089cb5f05f64 100644 --- a/src/Resources/Authorization.Autorest/examples/Stop-AzRoleAssignmentScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/examples/Stop-AzRoleAssignmentScheduleRequest.md @@ -1,9 +1,8 @@ ### Example 1: Cancel a pending role assignment schedule request ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" -PS C:\> Stop-AzRoleAssignmentScheduleRequest -Scope $scope -Name $name - +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" +Stop-AzRoleAssignmentScheduleRequest -Scope $scope -Name $name ``` You can use this operation to cancel a `roleAssignmentScheduleRequest` which has not been provisioned yet. diff --git a/src/Resources/Authorization.Autorest/examples/Stop-AzRoleEligibilityScheduleRequest.md b/src/Resources/Authorization.Autorest/examples/Stop-AzRoleEligibilityScheduleRequest.md index f9c894f6b0a8..4aaac0106508 100644 --- a/src/Resources/Authorization.Autorest/examples/Stop-AzRoleEligibilityScheduleRequest.md +++ b/src/Resources/Authorization.Autorest/examples/Stop-AzRoleEligibilityScheduleRequest.md @@ -1,9 +1,8 @@ ### Example 1: Cancel a pending role eligibility schedule request ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" -PS C:\> Stop-AzRoleEligibilitytScheduleRequest -Scope $scope -Name $name - +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" +Stop-AzRoleEligibilityScheduleRequest -Scope $scope -Name $name ``` You can use this operation to cancel a `roleEligibilityScheduleRequest` which has not been provisioned yet. diff --git a/src/Resources/Authorization.Autorest/examples/Update-AzRoleManagementPolicy.md b/src/Resources/Authorization.Autorest/examples/Update-AzRoleManagementPolicy.md index c2d708409cd1..e6aa3edbe9e3 100644 --- a/src/Resources/Authorization.Autorest/examples/Update-AzRoleManagementPolicy.md +++ b/src/Resources/Authorization.Autorest/examples/Update-AzRoleManagementPolicy.md @@ -1,7 +1,7 @@ ### Example 1: Update expiration rule of a policy ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$expirationRule = [RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -13,9 +13,11 @@ PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -PS C:\> $rules = [IRoleManagementPolicyRule[]]@($expirationRule) -PS C:\> Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +$rules = [IRoleManagementPolicyRule[]]@($expirationRule) +Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +``` +```output Name Type Scope ---- ---- ----- 33b520ea-3544-4abc-8565-3588deb8e68e Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -26,8 +28,8 @@ Each individual `Rule` on a policy can be update independently. ### Example 2: Update expiration rule and a notification rule of a policy ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$expirationRule = [RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -39,7 +41,7 @@ PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -PS C:\> $notificationRule = [RoleManagementPolicyNotificationRule]@{ +$notificationRule = [RoleManagementPolicyNotificationRule]@{ notificationType = "Email"; recipientType = "Approver"; isDefaultRecipientsEnabled = "false"; @@ -54,9 +56,11 @@ PS C:\> $notificationRule = [RoleManagementPolicyNotificationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -PS C:\> $rules = [IRoleManagementPolicyRule[]]@($expirationRule, $notificationRule) -PS C:\> Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +$rules = [IRoleManagementPolicyRule[]]@($expirationRule, $notificationRule) +Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +``` +```output Name Type Scope ---- ---- ----- 33b520ea-3544-4abc-8565-3588deb8e68e Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d diff --git a/src/Resources/MSGraph.Autorest/docs/Get-AzADAppFederatedIdentityCredential.md b/src/Resources/MSGraph.Autorest/docs/Get-AzADAppFederatedIdentityCredential.md index 9e6340c5cd28..fe2b8cb2d7c0 100644 --- a/src/Resources/MSGraph.Autorest/docs/Get-AzADAppFederatedIdentityCredential.md +++ b/src/Resources/MSGraph.Autorest/docs/Get-AzADAppFederatedIdentityCredential.md @@ -45,14 +45,14 @@ Get federatedIdentityCredentials by Id from applications. ### Example 1: List federated identity credentials for application ```powershell -Get-AzADApplication -ObjectId $app | Get-AzADAppFederatedCredential +Get-AzADApplication -ObjectId $app | Get-AzADAppFederatedIdentityCredential ``` List federated identity credentials for application ### Example 2: Get federated identity credential by id ```powershell -Get-AzADAppFederatedCredential -ApplicationObjectId $appObjectId -Id $credentialId +Get-AzADAppFederatedIdentityCredential -ApplicationObjectId $appObjectId -Id $credentialId ``` Get federated identity credential by id diff --git a/src/Resources/MSGraph.Autorest/docs/New-AzADAppCredential.md b/src/Resources/MSGraph.Autorest/docs/New-AzADAppCredential.md index 8ae8282559b6..e5536af22ac2 100644 --- a/src/Resources/MSGraph.Autorest/docs/New-AzADAppCredential.md +++ b/src/Resources/MSGraph.Autorest/docs/New-AzADAppCredential.md @@ -126,9 +126,9 @@ Creates key credentials or password credentials for an application. $Id = "00000000-0000-0000-0000-000000000000" # $cert is Base64 encoded content of certificate $credential = New-Object -TypeName "Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Models.ApiV10.MicrosoftGraphKeyCredential" ` - -Property @{'Key' = $cert; ` - 'Usage' = 'Verify'; ` - 'Type' = 'AsymmetricX509Cert' ` + -Property @{'Key' = $cert; + 'Usage' = 'Verify'; + 'Type' = 'AsymmetricX509Cert' } New-AzADAppCredential -ObjectId $Id -KeyCredentials $credential ``` diff --git a/src/Resources/MSGraph.Autorest/docs/New-AzADUser.md b/src/Resources/MSGraph.Autorest/docs/New-AzADUser.md index 8079366d405d..699926d44e3a 100644 --- a/src/Resources/MSGraph.Autorest/docs/New-AzADUser.md +++ b/src/Resources/MSGraph.Autorest/docs/New-AzADUser.md @@ -36,7 +36,7 @@ Adds new entity to users ### Example 1: Create user ```powershell $pp = New-Object -TypeName "Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Models.ApiV10.IMicrosoftGraphPasswordProfile" -Property @{Password=$password} -New-AzADUser -DisplayName $uname -PasswordProfile $pp -AccountEnabled -MailNickname $nickname -UserPrincipalName $upn +New-AzADUser -DisplayName $uname -PasswordProfile $pp -AccountEnabled $true -MailNickname $nickname -UserPrincipalName $upn ``` Create user diff --git a/src/Resources/MSGraph.Autorest/docs/Update-AzADGroup.md b/src/Resources/MSGraph.Autorest/docs/Update-AzADGroup.md index 0c2df51d1146..83ce99b0976b 100644 --- a/src/Resources/MSGraph.Autorest/docs/Update-AzADGroup.md +++ b/src/Resources/MSGraph.Autorest/docs/Update-AzADGroup.md @@ -31,8 +31,7 @@ Update entity in groups ### Example 1: Update description for group ```powershell -PS C:\> Update-AzADGroup -ObjectId $objectid -Description $description - +Update-AzADGroup -ObjectId $objectid -Description $description ``` Update description for group. diff --git a/src/Resources/MSGraph.Autorest/examples/Get-AzADAppFederatedIdentityCredential.md b/src/Resources/MSGraph.Autorest/examples/Get-AzADAppFederatedIdentityCredential.md index 2a276956b16a..c38babd520ac 100644 --- a/src/Resources/MSGraph.Autorest/examples/Get-AzADAppFederatedIdentityCredential.md +++ b/src/Resources/MSGraph.Autorest/examples/Get-AzADAppFederatedIdentityCredential.md @@ -1,13 +1,13 @@ ### Example 1: List federated identity credentials for application ```powershell -Get-AzADApplication -ObjectId $app | Get-AzADAppFederatedCredential +Get-AzADApplication -ObjectId $app | Get-AzADAppFederatedIdentityCredential ``` List federated identity credentials for application ### Example 2: Get federated identity credential by id ```powershell -Get-AzADAppFederatedCredential -ApplicationObjectId $appObjectId -Id $credentialId +Get-AzADAppFederatedIdentityCredential -ApplicationObjectId $appObjectId -Id $credentialId ``` Get federated identity credential by id diff --git a/src/Resources/MSGraph.Autorest/examples/New-AzADAppCredential.md b/src/Resources/MSGraph.Autorest/examples/New-AzADAppCredential.md index cf456f01daa4..8b7c0a99ae81 100644 --- a/src/Resources/MSGraph.Autorest/examples/New-AzADAppCredential.md +++ b/src/Resources/MSGraph.Autorest/examples/New-AzADAppCredential.md @@ -4,9 +4,9 @@ $Id = "00000000-0000-0000-0000-000000000000" # $cert is Base64 encoded content of certificate $credential = New-Object -TypeName "Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Models.ApiV10.MicrosoftGraphKeyCredential" ` - -Property @{'Key' = $cert; ` - 'Usage' = 'Verify'; ` - 'Type' = 'AsymmetricX509Cert' ` + -Property @{'Key' = $cert; + 'Usage' = 'Verify'; + 'Type' = 'AsymmetricX509Cert' } New-AzADAppCredential -ObjectId $Id -KeyCredentials $credential ``` diff --git a/src/Resources/MSGraph.Autorest/examples/New-AzADUser.md b/src/Resources/MSGraph.Autorest/examples/New-AzADUser.md index a336a9ae06a0..14506ffbb3ca 100644 --- a/src/Resources/MSGraph.Autorest/examples/New-AzADUser.md +++ b/src/Resources/MSGraph.Autorest/examples/New-AzADUser.md @@ -1,7 +1,7 @@ ### Example 1: Create user ```powershell $pp = New-Object -TypeName "Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Models.ApiV10.IMicrosoftGraphPasswordProfile" -Property @{Password=$password} -New-AzADUser -DisplayName $uname -PasswordProfile $pp -AccountEnabled -MailNickname $nickname -UserPrincipalName $upn +New-AzADUser -DisplayName $uname -PasswordProfile $pp -AccountEnabled $true -MailNickname $nickname -UserPrincipalName $upn ``` Create user \ No newline at end of file diff --git a/src/Resources/MSGraph.Autorest/examples/Update-AzADGroup.md b/src/Resources/MSGraph.Autorest/examples/Update-AzADGroup.md index fbf5add06dd0..3fbfa9513d79 100644 --- a/src/Resources/MSGraph.Autorest/examples/Update-AzADGroup.md +++ b/src/Resources/MSGraph.Autorest/examples/Update-AzADGroup.md @@ -1,7 +1,6 @@ ### Example 1: Update description for group ```powershell -PS C:\> Update-AzADGroup -ObjectId $objectid -Description $description - +Update-AzADGroup -ObjectId $objectid -Description $description ``` Update description for group.