diff --git a/src/Resources/Resources/help/Get-AzADAppFederatedIdentityCredential.md b/src/Resources/Resources/help/Get-AzADAppFederatedIdentityCredential.md index cabb3eea8353..b1121c1b34db 100644 --- a/src/Resources/Resources/help/Get-AzADAppFederatedIdentityCredential.md +++ b/src/Resources/Resources/help/Get-AzADAppFederatedIdentityCredential.md @@ -45,14 +45,14 @@ Get federatedIdentityCredentials by Id from applications. ### Example 1: List federated identity credentials for application ```powershell -Get-AzADApplication -ObjectId $app | Get-AzADAppFederatedCredential +Get-AzADApplication -ObjectId $app | Get-AzADAppFederatedIdentityCredential ``` List federated identity credentials for application ### Example 2: Get federated identity credential by id ```powershell -Get-AzADAppFederatedCredential -ApplicationObjectId $appObjectId -Id $credentialId +Get-AzADAppFederatedIdentityCredential -ApplicationObjectId $appObjectId -Id $credentialId ``` Get federated identity credential by id diff --git a/src/Resources/Resources/help/Get-AzPrivateLinkAssociation.md b/src/Resources/Resources/help/Get-AzPrivateLinkAssociation.md index d8ee35124681..79906cbe592f 100644 --- a/src/Resources/Resources/help/Get-AzPrivateLinkAssociation.md +++ b/src/Resources/Resources/help/Get-AzPrivateLinkAssociation.md @@ -24,10 +24,10 @@ The Get-AzPrivateLinkAssociation cmdlet gets all of resource management private ### Example 1 ```powershell -PS C:\> Get-AzPrivateLinkAssociation -ManagementGroupId fc096d27-0434-4460-a3ea-110df0422a2d | fl - - +Get-AzPrivateLinkAssociation -ManagementGroupId fc096d27-0434-4460-a3ea-110df0422a2d | Format-List +``` +```output Id : /providers/Microsoft.Management/managementGroups/fc096d27-0434-4460-a3ea-110df0422a2d/providers/Microsoft. Authorization/privateLinkAssociations/7afcb623-ff23-591c-8cdd-57f5357711f4 Type : Microsoft.Authorization/privateLinkAssociations @@ -51,10 +51,10 @@ Get all the private link associations at the managment group scope. ### Example 2 ```powershell -PS C:\> Get-AzPrivateLinkAssociation -ManagementGroupId fc096d27-0434-4460-a3ea-110df0422a2d -Name 1d7942d1-288b-48de-8d0f-2d2aa8e03ad4 | fl - - +Get-AzPrivateLinkAssociation -ManagementGroupId fc096d27-0434-4460-a3ea-110df0422a2d -Name 1d7942d1-288b-48de-8d0f-2d2aa8e03ad4 | Format-List +``` +```output Id : /providers/Microsoft.Management/managementGroups/fc096d27-0434-4460-a3ea-110df0422a2d/providers/Microsoft. Authorization/privateLinkAssociations/1d7942d1-288b-48de-8d0f-2d2aa8e03ad4 Type : Microsoft.Authorization/privateLinkAssociations diff --git a/src/Resources/Resources/help/Get-AzResourceManagementPrivateLink.md b/src/Resources/Resources/help/Get-AzResourceManagementPrivateLink.md index 6754645794b7..c5c58ed1f75c 100644 --- a/src/Resources/Resources/help/Get-AzResourceManagementPrivateLink.md +++ b/src/Resources/Resources/help/Get-AzResourceManagementPrivateLink.md @@ -24,9 +24,10 @@ The Get-AzResourceManagementPrivateLink cmdlet gets a specific resource manageme ### Example 1 ```powershell -PS C:\> Get-AzResourceManagementPrivateLink -ResourceGroupName PrivateLinkTestRG -Name NewPL - +Get-AzResourceManagementPrivateLink -ResourceGroupName PrivateLinkTestRG -Name NewPL +``` +```output Id : /subscriptions/aeb49941-36c3-4e7c-9ffd-16ba89d33ec4/resourceGroups/PrivateLinkTestRG/provi ders/Microsoft.Authorization/resourceManagementPrivateLinks/NewPL Type : Microsoft.Authorization/resourceManagementPrivateLinks @@ -39,9 +40,10 @@ Get the resource management private link with the private endpoint connections a ### Example 2 ```powershell -PS C:\> Get-AzResourceManagementPrivateLink - +Get-AzResourceManagementPrivateLink +``` +```output Id : /subscriptions/aeb49941-36c3-4e7c-9ffd-16ba89d33ec4/resourceGroups/PrivateLinkTestRG/provi ders/Microsoft.Authorization/resourceManagementPrivateLinks/NewPL Type : Microsoft.Authorization/resourceManagementPrivateLinks @@ -61,9 +63,10 @@ Gets all of the resoure management private links at the subscription scope. ### Example 3 ```powershell -PS C:\> Get-AzResourceManagementPrivateLink -ResourceGroupName PrivateLinkTestRG - +Get-AzResourceManagementPrivateLink -ResourceGroupName PrivateLinkTestRG +``` +```output Id : /subscriptions/aeb49941-36c3-4e7c-9ffd-16ba89d33ec4/resourceGroups/PrivateLinkTestRG/provi ders/Microsoft.Authorization/resourceManagementPrivateLinks/NewPL Type : Microsoft.Authorization/resourceManagementPrivateLinks diff --git a/src/Resources/Resources/help/Get-AzRoleAssignmentSchedule.md b/src/Resources/Resources/help/Get-AzRoleAssignmentSchedule.md index 41e1cd35063b..c8509be2bc0a 100644 --- a/src/Resources/Resources/help/Get-AzRoleAssignmentSchedule.md +++ b/src/Resources/Resources/help/Get-AzRoleAssignmentSchedule.md @@ -36,9 +36,11 @@ Get the specified role assignment schedule for a resource scope ### Example 1: List all role assignment schedules for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentSchedule -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -52,9 +54,11 @@ To call the API, you must have access to the `Microsoft.Authorization/roleAssign ### Example 2: List all My role assignment schedules for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope -Filter "asTarget()" +$scope = "/" # "/" stands for tenant level resource +Get-AzRoleAssignmentSchedule -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -67,10 +71,12 @@ Returns all `roleAssignmentSchedules` for the `scope` which are assigned to the ### Example 3: List all role assignment schedules for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope -Filter $filter +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" +Get-AzRoleAssignmentSchedule -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -98,9 +104,11 @@ Supported filters: ### Example 4: Get a role assignment schedule by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentSchedule -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentSchedule -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentSchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleInstance.md b/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleInstance.md index 816ecc5fc892..9ccafab4bd56 100644 --- a/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleInstance.md +++ b/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleInstance.md @@ -37,9 +37,11 @@ Gets the specified role assignment schedule instance. ### Example 1: List all role assignment schedule instances for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleInstance -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -53,9 +55,11 @@ To call the API, you must have access to the `Microsoft.Authorization/roleAssign ### Example 2: List all My role assignment schedule instances for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter "asTarget()" +$scope = "/" # "/" stands for tenant level resource +Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -68,10 +72,12 @@ Returns all `roleAssignmentScheduleInstances` for the `scope` which are assigned ### Example 3: List all role assignment schedule instances for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter $filter +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" +Get-AzRoleAssignmentScheduleInstance -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -99,9 +105,11 @@ Supported filters: ### Example 4: Get a role assignment schedule instances by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleInstance -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleInstance -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleAssignmentScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleRequest.md b/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleRequest.md index 93cf034bbc89..89297e3db690 100644 --- a/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleRequest.md +++ b/src/Resources/Resources/help/Get-AzRoleAssignmentScheduleRequest.md @@ -37,9 +37,11 @@ Get the specified role assignment schedule request. ### Example 1: List all role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 01b86d0b-2d7d-4ee2-bedb-68417ca9cc6a Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -52,9 +54,11 @@ Returns all `roleAssignmentScheduleRequests` for the `scope`. ### Example 2: List all My role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asTarget()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -66,9 +70,11 @@ Returns all `roleAssignmentScheduleRequests` for the `scope` which are assigned ### Example 3: List all role assignment schedule requests for a resource where calling user is an approver ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asApprover()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope -Filter "asApprover()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -80,9 +86,11 @@ Returns all `roleAssignmentScheduleRequests` for the `scope` on which the callin ### Example 4: Get a role assignment schedule request by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleAssignmentScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleAssignmentScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authoriz… diff --git a/src/Resources/Resources/help/Get-AzRoleEligibilitySchedule.md b/src/Resources/Resources/help/Get-AzRoleEligibilitySchedule.md index 373b4f658ceb..0f8e36352b60 100644 --- a/src/Resources/Resources/help/Get-AzRoleEligibilitySchedule.md +++ b/src/Resources/Resources/help/Get-AzRoleEligibilitySchedule.md @@ -36,9 +36,11 @@ Get the specified role eligibility schedule for a resource scope ### Example 1: List all role eligible schedules for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilitySchedule -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -52,9 +54,11 @@ To call the API, you must have access to the `Microsoft.Authorization/roleAssign ### Example 2: List all My role eligible schedules for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource +$scope = "/" # "/" stands for tenant level resource Get-AzRoleEligibilitySchedule -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -67,10 +71,12 @@ Returns all `roleEligibilitySchedules` for the `scope` which are assigned to the ### Example 3: List all role eligible schedules for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" Get-AzRoleEligibilitySchedule -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -98,9 +104,11 @@ Supported filters: ### Example 4: Get a role eligible schedules by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilitySchedule -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilitySchedules /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleInstance.md b/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleInstance.md index cfe59dbf393f..a721442b3cda 100644 --- a/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleInstance.md +++ b/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleInstance.md @@ -37,9 +37,11 @@ Gets the specified role eligibility schedule instance. ### Example 1: List all role eligible schedule instances for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilityScheduleInstance -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 986d4ad8-f513-4a21-92e5-7163486e9e7c Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -53,9 +55,11 @@ To call the API, you must have access to the `Microsoft.Authorization/roleAssign ### Example 2: List all My role eligible schedule instances for a resource ```powershell -PS C:\> $scope = "/" # "/" stands for tenant level resource +$scope = "/" # "/" stands for tenant level resource Get-AzRoleEligibilityScheduleInstance -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorizatio… @@ -68,10 +72,12 @@ Returns all `roleEligibilityScheduleInstances` for the `scope` which are assigne ### Example 3: List all role eligible schedule instances for a resource with filters ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" $filter = "roleDefinitionId eq '/providers/Microsoft.Authorization/roleDefinitions/8e3af657-a8ff-443c-a75c-2fe8c4bcb635'" Get-AzRoleEligibilityScheduleInstance -Scope $scope -Filter $filter +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 314aa57e-064d-46c3-964e-a0d20989c1a2 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/… @@ -99,9 +105,11 @@ Supported filters: ### Example 4: Get a role eligible schedule instances by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" Get-AzRoleEligibilityScheduleInstance -Scope $scope -Name "4cd7e26b-8eca-425c-969d-ec708c88bf18" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 4cd7e26b-8eca-425c-969d-ec708c88bf18 Microsoft.Authorization/roleEligibilityScheduleInstances /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/… diff --git a/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleRequest.md b/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleRequest.md index a6815fd3e5cd..3f38b721178b 100644 --- a/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleRequest.md +++ b/src/Resources/Resources/help/Get-AzRoleEligibilityScheduleRequest.md @@ -37,9 +37,11 @@ Get the specified role eligibility schedule request. ### Example 1: List all role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 01b86d0b-2d7d-4ee2-bedb-68417ca9cc6a Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -52,9 +54,11 @@ Returns all `roleEligibilityScheduleRequests` for the `scope`. ### Example 2: List all My role assignment schedule requests for a resource ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asTarget()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asTarget()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -66,9 +70,11 @@ Returns all `roleEligibilityScheduleRequests` for the `scope` which are assigned ### Example 3: List all role assignment schedule requests for a resource where calling user is an approver ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asApprover()" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope -Filter "asApprover()" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/prov… @@ -80,9 +86,11 @@ Returns all `roleEligibilitySchedules` for the `scope` on which the calling user ### Example 4: Get a role assignment schedule request by scope and name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" -PS C:\> Get-AzRoleEligibilityScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d" +Get-AzRoleEligibilityScheduleRequest -Scope $scope -Name "2cc018c2-27f8-4730-a0bc-b6a8fcee3e70" +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 2cc018c2-27f8-4730-a0bc-b6a8fcee3e70 Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authoriz… diff --git a/src/Resources/Resources/help/Get-AzRoleEligibleChildResource.md b/src/Resources/Resources/help/Get-AzRoleEligibleChildResource.md index 8e564330dff0..995d3a1abf95 100644 --- a/src/Resources/Resources/help/Get-AzRoleEligibleChildResource.md +++ b/src/Resources/Resources/help/Get-AzRoleEligibleChildResource.md @@ -31,9 +31,11 @@ Get the child resources of a resource on which user has eligible access ### Example 1: List all child resources ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Get-AzRoleEligibleChildResource -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Get-AzRoleEligibleChildResource -Scope $scope +``` +```output Name Type ---- ---- AnujRG resourcegroup @@ -46,10 +48,12 @@ Get all child resources of a resource `scope` that the calling user has eligible ### Example 2: List all child resources filtered by resource type ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $filter = "resoureType eq 'resourcegroup'" -PS C:\> Get-AzRoleEligibleChildResource -Scope $scope -Filter $filter +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$filter = "resoureType eq 'resourcegroup'" +Get-AzRoleEligibleChildResource -Scope $scope -Filter $filter +``` +```output Name Type ---- ---- AnujRG resourcegroup diff --git a/src/Resources/Resources/help/Get-AzRoleManagementPolicy.md b/src/Resources/Resources/help/Get-AzRoleManagementPolicy.md index 199f8018bd22..0172826c6bcb 100644 --- a/src/Resources/Resources/help/Get-AzRoleManagementPolicy.md +++ b/src/Resources/Resources/help/Get-AzRoleManagementPolicy.md @@ -35,9 +35,11 @@ Get the specified role management policy for a resource scope ### Example 1: List all role management policies under a resource scope ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Get-AzRoleManagementPolicy -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Get-AzRoleManagementPolicy -Scope $scope +``` +```output Name Type Scope ---- ---- ----- 588b80cc-f50c-4616-acc9-0003872624db Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -49,10 +51,12 @@ Returns all `roleManagementPolicies` for the `scope` ### Example 2: Get a role management policy by Scope and Name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "33b520ea-3544-4abc-8565-3588deb8e68e" -PS C:\> Get-AzRoleManagementPolicy -Scope $scope -Name $name +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "33b520ea-3544-4abc-8565-3588deb8e68e" +Get-AzRoleManagementPolicy -Scope $scope -Name $name +``` +```output Name Type Scope ---- ---- ----- 33b520ea-3544-4abc-8565-3588deb8e68e Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d diff --git a/src/Resources/Resources/help/Get-AzRoleManagementPolicyAssignment.md b/src/Resources/Resources/help/Get-AzRoleManagementPolicyAssignment.md index a5d92e0f45e9..cd2a0c6fc2d9 100644 --- a/src/Resources/Resources/help/Get-AzRoleManagementPolicyAssignment.md +++ b/src/Resources/Resources/help/Get-AzRoleManagementPolicyAssignment.md @@ -36,9 +36,11 @@ Get the specified role management policy assignment for a resource scope ### Example 1: List all role management policy assignments under a resource scope ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Get-AzRoleManagementPolicyAssignment -Scope $scope +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Get-AzRoleManagementPolicyAssignment -Scope $scope +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd Microsoft.Authorization/roleManagementPolicyAssignment /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f… @@ -51,10 +53,12 @@ Returns all `roleManagementPolicyAssignment` for the `scope` ### Example 2: Get a role management policy assignment by Scope and Name ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" -PS C:\> Get-AzRoleManagementPolicyAssignment -Scope $scope -Name $name +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" +Get-AzRoleManagementPolicyAssignment -Scope $scope -Name $name +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd Microsoft.Authorization/roleManagementPolicyAssignment /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f… diff --git a/src/Resources/Resources/help/New-AzADUser.md b/src/Resources/Resources/help/New-AzADUser.md index f2e79f7e560c..3c745f14874c 100644 --- a/src/Resources/Resources/help/New-AzADUser.md +++ b/src/Resources/Resources/help/New-AzADUser.md @@ -36,7 +36,7 @@ Adds new entity to users ### Example 1: Create user ```powershell $pp = New-Object -TypeName "Microsoft.Azure.PowerShell.Cmdlets.Resources.MSGraph.Models.ApiV10.IMicrosoftGraphPasswordProfile" -Property @{Password=$password} -New-AzADUser -DisplayName $uname -PasswordProfile $pp -AccountEnabled -MailNickname $nickname -UserPrincipalName $upn +New-AzADUser -DisplayName $uname -PasswordProfile $pp -AccountEnabled $true -MailNickname $nickname -UserPrincipalName $upn ``` Create user diff --git a/src/Resources/Resources/help/New-AzPrivateLinkAssociation.md b/src/Resources/Resources/help/New-AzPrivateLinkAssociation.md index 74f5a65c38eb..86840fab5785 100644 --- a/src/Resources/Resources/help/New-AzPrivateLinkAssociation.md +++ b/src/Resources/Resources/help/New-AzPrivateLinkAssociation.md @@ -25,9 +25,10 @@ The New-AzPrivateLinkAssociation cmdlet creates the private link assocaition at ### Example 1 ```powershell -PS C:\> New-AzPrivateLinkAssociation -ManagementGroupId fc096d27-0434-4460-a3ea-110df0422a2d -Name 1d7942d1-288b-48de-8d0f-2d2aa8e03ad4 | fl - +New-AzPrivateLinkAssociation -ManagementGroupId fc096d27-0434-4460-a3ea-110df0422a2d -Name 1d7942d1-288b-48de-8d0f-2d2aa8e03ad4 | Format-List +``` +```output Id : /providers/Microsoft.Management/managementGroups/fc096d27-0434-4460-a3ea-110df0422a2d/providers/Microsoft. Authorization/privateLinkAssociations/1d7942d1-288b-48de-8d0f-2d2aa8e03ad4 Type : Microsoft.Authorization/privateLinkAssociations diff --git a/src/Resources/Resources/help/New-AzResourceManagementPrivateLink.md b/src/Resources/Resources/help/New-AzResourceManagementPrivateLink.md index 360ba577e003..a205fcbeedde 100644 --- a/src/Resources/Resources/help/New-AzResourceManagementPrivateLink.md +++ b/src/Resources/Resources/help/New-AzResourceManagementPrivateLink.md @@ -24,9 +24,10 @@ The New-AzResourceManagementPrivateLink cmdlet create a specific resource manage ### Example 1 ```powershell -PS C:\> New-AzResourceManagementPrivateLink -ResourceGroupName PrivateLinkTestRG -Name NewPL - +New-AzResourceManagementPrivateLink -ResourceGroupName PrivateLinkTestRG -Name NewPL +``` +```output Id : /subscriptions/aeb49941-36c3-4e7c-9ffd-16ba89d33ec4/resourceGroups/PrivateLinkTestRG/provi ders/Microsoft.Authorization/resourceManagementPrivateLinks/NewPL Type : Microsoft.Authorization/resourceManagementPrivateLinks diff --git a/src/Resources/Resources/help/New-AzRoleAssignmentScheduleRequest.md b/src/Resources/Resources/help/New-AzRoleAssignmentScheduleRequest.md index 49c92aa9789c..9e14d5f4c30d 100644 --- a/src/Resources/Resources/help/New-AzRoleAssignmentScheduleRequest.md +++ b/src/Resources/Resources/help/New-AzRoleAssignmentScheduleRequest.md @@ -29,11 +29,13 @@ Creates a role assignment schedule request. ### Example 1: Create a new role assignment schedule request as Admin ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -43,11 +45,13 @@ Creates a request to provision an active assignment of `roleDefinition` on the ` ### Example 2: Remove a role assignment schedule request as Admin ```powershell -PS C:\> $guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -57,11 +61,13 @@ Creates a request to remove an active assignment of `roleDefinition` on the `sco ### Example 3: Activate a new role assignment schedule request as user ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfActivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfActivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -71,11 +77,13 @@ Creates a request to activate an eligible assignment of `roleDefinition` on the ### Example 4: Deactivate a role assignment schedule request as user ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfDeactivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleAssignmentScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType SelfDeactivate -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleAssignmentScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… diff --git a/src/Resources/Resources/help/New-AzRoleEligibilityScheduleRequest.md b/src/Resources/Resources/help/New-AzRoleEligibilityScheduleRequest.md index 6cbbf0704384..d7f03a809caa 100644 --- a/src/Resources/Resources/help/New-AzRoleEligibilityScheduleRequest.md +++ b/src/Resources/Resources/help/New-AzRoleEligibilityScheduleRequest.md @@ -29,11 +29,13 @@ Creates a role eligibility schedule request. ### Example 1: Create a new role eligibile schedule request as Admin ```powershell -PS C:\> $guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminAssign -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 12f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… @@ -43,11 +45,13 @@ Creates a request to provision an eligible assignment of `roleDefinition` on the ### Example 2: Remove a role eligibile schedule request as Admin ```powershell -PS C:\> $guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" -PS C:\> $startTime = Get-Date -Format o -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +$guid = "13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca" +$startTime = Get-Date -Format o +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleEligibilityScheduleRequest -Name $guid -Scope $scope -ExpirationDuration PT1H -ExpirationType AfterDuration -PrincipalId 5a4bdd72-ab3e-4d8e-ab0f-8dd8917481a2 -RequestType AdminRemove -RoleDefinitionId subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authorization/roleDefinitions/acdd72a7-3385-48ef-bd42-f606fba81ae7 -ScheduleInfoStartDateTime $startTime +``` +```output Name Type Scope RoleDefinitionId ---- ---- ----- ---------------- 13f8978c-5d8d-4fbf-b4b6-2f43eeb43eca Microsoft.Authorization/roleEligibilityScheduleRequests /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/providers/Microsoft.Authori… diff --git a/src/Resources/Resources/help/New-AzRoleManagementPolicyAssignment.md b/src/Resources/Resources/help/New-AzRoleManagementPolicyAssignment.md index 0696622171b5..d4f97137bb8b 100644 --- a/src/Resources/Resources/help/New-AzRoleManagementPolicyAssignment.md +++ b/src/Resources/Resources/help/New-AzRoleManagementPolicyAssignment.md @@ -22,11 +22,13 @@ Create a role management policy assignment ## EXAMPLES -### Example 1: {{ Add title here }} +### Example 1: Create a role management policy assignment ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> New-AzRoleManagementPolicyAssignment -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +New-AzRoleManagementPolicyAssignment -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +``` +```output The requested resource does not support http method 'PUT'. ``` diff --git a/src/Resources/Resources/help/Publish-AzBicepModule.md b/src/Resources/Resources/help/Publish-AzBicepModule.md index f4da1dc78293..9703f4deb1e5 100644 --- a/src/Resources/Resources/help/Publish-AzBicepModule.md +++ b/src/Resources/Resources/help/Publish-AzBicepModule.md @@ -24,7 +24,7 @@ The **Publish-AzBicepModule** cmdlet publishes a Bicep file to a registry as a m ### Example 1 ```powershell -Publish-AzBicepModule -FilePath main.bicep -Target br:{registry}/{moduleName}:{tag} +Publish-AzBicepModule -FilePath 'main.bicep' -Target 'br:{registry}/{moduleName}:{tag}' ``` Publishes `main.bicep` to `br:{registry}/{moduleName}:{tag}`. diff --git a/src/Resources/Resources/help/Remove-AzPrivateLinkAssociation.md b/src/Resources/Resources/help/Remove-AzPrivateLinkAssociation.md index 363127e46374..92b344817493 100644 --- a/src/Resources/Resources/help/Remove-AzPrivateLinkAssociation.md +++ b/src/Resources/Resources/help/Remove-AzPrivateLinkAssociation.md @@ -31,9 +31,10 @@ The Remove-AzPrivateLinkAssociation cmdlet deletes a specific resource managemen ### Example 1 ```powershell -PS C:\> Remove-AzPrivateLinkAssociation -ManagementGroupId 24f15700-370c-45bc-86a7-aee1b0c4eb8a -Name 1d7942d1-288b-48de-8d0f-2d2aa8e03ad4 - +Remove-AzPrivateLinkAssociation -ManagementGroupId 24f15700-370c-45bc-86a7-aee1b0c4eb8a -Name 1d7942d1-288b-48de-8d0f-2d2aa8e03ad4 +``` +```output True ``` @@ -41,7 +42,7 @@ Delete a specific private link association. ### Example 2 ```powershell -PS C:\> Get-AzPrivateLinkAssociation -ManagementGroupId 24f15700-370c-45bc-86a7-aee1b0c4eb8a -Name 1d7942d1-288b-48de-8d0f-2d2aa8e03ad4 | Remove-AzPrivateLinkAssociation -Force +Get-AzPrivateLinkAssociation -ManagementGroupId 24f15700-370c-45bc-86a7-aee1b0c4eb8a -Name 1d7942d1-288b-48de-8d0f-2d2aa8e03ad4 | Remove-AzPrivateLinkAssociation -Force ``` Delete a specific private link association. diff --git a/src/Resources/Resources/help/Remove-AzResourceManagementPrivateLink.md b/src/Resources/Resources/help/Remove-AzResourceManagementPrivateLink.md index b93f173e6120..e5388a873713 100644 --- a/src/Resources/Resources/help/Remove-AzResourceManagementPrivateLink.md +++ b/src/Resources/Resources/help/Remove-AzResourceManagementPrivateLink.md @@ -31,7 +31,10 @@ The Remove-AzResourceManagementPrivateLink cmdlet deletes a specific resource ma ### Example 1 ```powershell -PS C:\> Remove-AzResourceManagementPrivateLink -ResourceGroupName PrivateLinkTestRG -Name NewPL +Remove-AzResourceManagementPrivateLink -ResourceGroupName PrivateLinkTestRG -Name NewPL +``` + +```output True ``` @@ -39,7 +42,7 @@ Delete the specific Resource Management Private Link. ### Example 2 ```powershell -PS C:\> Get-AzResourceManagementPrivateLink -ResourceGroupName PrivateLinkTestRG -Name NewPL | Remove-AzResourceManagementPrivateLink -Force +Get-AzResourceManagementPrivateLink -ResourceGroupName PrivateLinkTestRG -Name NewPL | Remove-AzResourceManagementPrivateLink -Force ``` Delete the specific Resource Management Private Link. diff --git a/src/Resources/Resources/help/Remove-AzRoleManagementPolicy.md b/src/Resources/Resources/help/Remove-AzRoleManagementPolicy.md index fbca1dc4024d..112f6157cf96 100644 --- a/src/Resources/Resources/help/Remove-AzRoleManagementPolicy.md +++ b/src/Resources/Resources/help/Remove-AzRoleManagementPolicy.md @@ -31,9 +31,11 @@ Delete a role management policy ### Example 1: Delete a role management policy ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Remove-AzRoleManagementPolicy -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Remove-AzRoleManagementPolicy -Scope $scope -Name "0a4d3ef7-147b-4777-a958-ae9dfab3c331" +``` +```output The requested resource does not support http method 'DELETE'. ``` diff --git a/src/Resources/Resources/help/Remove-AzRoleManagementPolicyAssignment.md b/src/Resources/Resources/help/Remove-AzRoleManagementPolicyAssignment.md index b15f0aedf6b9..73c5592a4f0e 100644 --- a/src/Resources/Resources/help/Remove-AzRoleManagementPolicyAssignment.md +++ b/src/Resources/Resources/help/Remove-AzRoleManagementPolicyAssignment.md @@ -31,9 +31,11 @@ Delete a role management policy assignment ### Example 1: Delete a role management policy assignment ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> Remove-AzRoleManagementPolicyAssignment -Scope $scope -Name "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +Remove-AzRoleManagementPolicyAssignment -Scope $scope -Name "588b80cc-f50c-4616-acc9-0003872624db_00493d72-78f6-4148-b6c5-d3ce8e4799dd" +``` +```output Remove-AzRoleManagementPolicyAssignment_Delete: The requested resource does not support http method 'DELETE'. ``` diff --git a/src/Resources/Resources/help/Remove-AzTemplateSpec.md b/src/Resources/Resources/help/Remove-AzTemplateSpec.md index 3f115e3e68e0..6947ccce9ee4 100644 --- a/src/Resources/Resources/help/Remove-AzTemplateSpec.md +++ b/src/Resources/Resources/help/Remove-AzTemplateSpec.md @@ -54,7 +54,7 @@ Removes the Template Spec named 'MyTemplateSpec' and all of its versions within ### Example 4: Removing a Template Spec and all versions by resource id ```powershell -Remove-AzTemplateSpec -ResourceId '/subscriptions/{subId}/resourceGroups/myRG/providers/Microsoft.Resources/templateSpecs/MyTemplateSpec' -ResourceGroupName 'myRG' +Remove-AzTemplateSpec -ResourceId '/subscriptions/{subId}/resourceGroups/myRG/providers/Microsoft.Resources/templateSpecs/MyTemplateSpec' ``` Removes the Template Spec named 'MyTemplateSpec' and all of its versions within the resource group 'myRG' of subscription \{subId\}. diff --git a/src/Resources/Resources/help/Set-AzManagedApplication.md b/src/Resources/Resources/help/Set-AzManagedApplication.md index a976547efe93..f9ab28f1d51e 100644 --- a/src/Resources/Resources/help/Set-AzManagedApplication.md +++ b/src/Resources/Resources/help/Set-AzManagedApplication.md @@ -35,10 +35,10 @@ The **Set-AzManagedApplication** cmdlet updates managed applications ### Example 1: Update managed application definition description ```powershell -Set-AzManagedApplication -ResourceId "/subscriptions/mySubId/resourcegroups/myRG/Microsoft.Solutions/applications/myApp" -Description "Updated description here" +Set-AzManagedApplication -ResourceId "/subscriptions/mySubId/resourcegroups/myRG/Microsoft.Solutions/applications/myApp" -Tag @{"key" = "value"} ``` -This command updates the managed application description +This command updates the managed application tag ## PARAMETERS diff --git a/src/Resources/Resources/help/Stop-AzRoleAssignmentScheduleRequest.md b/src/Resources/Resources/help/Stop-AzRoleAssignmentScheduleRequest.md index 837aabfc10e0..c22394e6d4c0 100644 --- a/src/Resources/Resources/help/Stop-AzRoleAssignmentScheduleRequest.md +++ b/src/Resources/Resources/help/Stop-AzRoleAssignmentScheduleRequest.md @@ -31,9 +31,9 @@ Cancels a pending role assignment schedule request. ### Example 1: Cancel a pending role assignment schedule request ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" -PS C:\> Stop-AzRoleAssignmentScheduleRequest -Scope $scope -Name $name +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" +Stop-AzRoleAssignmentScheduleRequest -Scope $scope -Name $name ``` You can use this operation to cancel a `roleAssignmentScheduleRequest` which has not been provisioned yet. diff --git a/src/Resources/Resources/help/Stop-AzRoleEligibilityScheduleRequest.md b/src/Resources/Resources/help/Stop-AzRoleEligibilityScheduleRequest.md index 466e4b9f8939..290862f21d10 100644 --- a/src/Resources/Resources/help/Stop-AzRoleEligibilityScheduleRequest.md +++ b/src/Resources/Resources/help/Stop-AzRoleEligibilityScheduleRequest.md @@ -31,9 +31,9 @@ Cancels a pending role eligibility schedule request. ### Example 1: Cancel a pending role eligibility schedule request ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" -PS C:\> Stop-AzRoleEligibilitytScheduleRequest -Scope $scope -Name $name +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$name = "47f8978c-5d8d-4fbf-b4b6-2f43eeb43ec6" +Stop-AzRoleEligibilityScheduleRequest -Scope $scope -Name $name ``` You can use this operation to cancel a `roleEligibilityScheduleRequest` which has not been provisioned yet. diff --git a/src/Resources/Resources/help/Update-AzADGroup.md b/src/Resources/Resources/help/Update-AzADGroup.md index 7775f304231e..0a3627a98bc6 100644 --- a/src/Resources/Resources/help/Update-AzADGroup.md +++ b/src/Resources/Resources/help/Update-AzADGroup.md @@ -31,7 +31,7 @@ Update entity in groups ### Example 1: Update description for group ```powershell -PS C:\> Update-AzADGroup -ObjectId $objectid -Description $description +Update-AzADGroup -ObjectId $objectid -Description $description ``` Update description for group. diff --git a/src/Resources/Resources/help/Update-AzRoleManagementPolicy.md b/src/Resources/Resources/help/Update-AzRoleManagementPolicy.md index 29d085c95302..9c1d2d5ea5d8 100644 --- a/src/Resources/Resources/help/Update-AzRoleManagementPolicy.md +++ b/src/Resources/Resources/help/Update-AzRoleManagementPolicy.md @@ -33,8 +33,8 @@ Update a role management policy ### Example 1: Update expiration rule of a policy ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$expirationRule = [RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -46,9 +46,11 @@ PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -PS C:\> $rules = [IRoleManagementPolicyRule[]]@($expirationRule) -PS C:\> Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +$rules = [IRoleManagementPolicyRule[]]@($expirationRule) +Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +``` +```output Name Type Scope ---- ---- ----- 33b520ea-3544-4abc-8565-3588deb8e68e Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d @@ -58,8 +60,8 @@ Each individual `Rule` on a policy can be update independently. ### Example 2: Update expiration rule and a notification rule of a policy ```powershell -PS C:\> $scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" -PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ +$scope = "/subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d/" +$expirationRule = [RoleManagementPolicyExpirationRule]@{ isExpirationRequired = "false"; maximumDuration = "P180D"; id = "Expiration_Admin_Eligibility"; @@ -71,7 +73,7 @@ PS C:\> $expirationRule = [RoleManagementPolicyExpirationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -PS C:\> $notificationRule = [RoleManagementPolicyNotificationRule]@{ +$notificationRule = [RoleManagementPolicyNotificationRule]@{ notificationType = "Email"; recipientType = "Approver"; isDefaultRecipientsEnabled = "false"; @@ -86,9 +88,11 @@ PS C:\> $notificationRule = [RoleManagementPolicyNotificationRule]@{ targetInheritableSetting = $null; targetEnforcedSetting = $null; } -PS C:\> $rules = [IRoleManagementPolicyRule[]]@($expirationRule, $notificationRule) -PS C:\> Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +$rules = [IRoleManagementPolicyRule[]]@($expirationRule, $notificationRule) +Update-AzRoleManagementPolicy -Scope $scope -Name "33b520ea-3544-4abc-8565-3588deb8e68e" -Rule $rules +``` +```output Name Type Scope ---- ---- ----- 33b520ea-3544-4abc-8565-3588deb8e68e Microsoft.Authorization/roleManagementPolicies /subscriptions/38ab2ccc-3747-4567-b36b-9478f5602f0d