From 1f2385a1323bfaf67788277063ed627c5d6fed12 Mon Sep 17 00:00:00 2001 From: Paolo Matarazzo <74918781+paolomatarazzo@users.noreply.github.com> Date: Tue, 2 Jan 2024 07:43:08 -0500 Subject: [PATCH] Update PowerShell script to use azurepowershell-interactive --- .../identity-protection/passwordless-strategy/journey-step-3.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/passwordless-strategy/journey-step-3.md b/windows/security/identity-protection/passwordless-strategy/journey-step-3.md index 7bffb12716..0f967086d2 100644 --- a/windows/security/identity-protection/passwordless-strategy/journey-step-3.md +++ b/windows/security/identity-protection/passwordless-strategy/journey-step-3.md @@ -111,7 +111,7 @@ If your users are defined in Microsoft Entra ID and not synchronized from Active The following sample PowerShell script generates a random password of 64 characters and sets it for the user specified in the variable name $userId. Modify the **userId** variable of the script to match your environment (first line), and then run it in a PowerShell session. When prompted to authenticate to Microsoft Entra ID, use the credentials of an account with a role capable of resetting passwords. -```powershell +```azurepowershell-interactive $userId = "" function Generate-RandomPassword{