From bcc701b0e0833aff6fbfaadd19183daa97852ac5 Mon Sep 17 00:00:00 2001
From: Elaine Fonaro <elaine.fonaro@windriver.com>
Date: Thu, 2 Jun 2022 15:30:38 -0300
Subject: [PATCH] Password command usage is incorrect. (CP r6, dsr6)

Updated the original command: removed the <temp_password> from command.

Minor edits and also removed the <temp\_password> from the comment.

Signed-off-by: Elaine Fonaro <elaine.fonaro@windriver.com>
Change-Id: I876281ef2ddbea9b5df271cc1370b3580277d01e
---
 .../password-recovery-for-linux-user-accounts.rst      | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/doc/source/security/kubernetes/password-recovery-for-linux-user-accounts.rst b/doc/source/security/kubernetes/password-recovery-for-linux-user-accounts.rst
index 26a40fc2c..798558b29 100644
--- a/doc/source/security/kubernetes/password-recovery-for-linux-user-accounts.rst
+++ b/doc/source/security/kubernetes/password-recovery-for-linux-user-accounts.rst
@@ -23,13 +23,13 @@ this type of account as follows:
 
 .. code-block:: none
 
-    $ sudo passwd <user> <temp_password>
+    $ sudo passwd <user>
     $ sudo chage -d 0 <user>
 
-where <user> is the user name of the account to be reset \(for, example,
-**sysadmin**\) and <temp\_password> is a temporary password. The
-:command:`chage` command forces immediate expiration, so that the user must
-change the password at first login.
+where `<user>` is the user name of the account to be reset \(for, example,
+**sysadmin**\) and :command:`sudo passwd <user>` will prompt for the new
+password. The :command:`chage` command forces immediate expiration, so that
+the user must change the password at first login.
 
 If no other Linux system user accounts have been created, you can recover
 using the default LDAP **operator** or **admin** accounts. For more