diff --git a/doc/source/security/kubernetes/password-recovery-for-linux-user-accounts.rst b/doc/source/security/kubernetes/password-recovery-for-linux-user-accounts.rst index 26a40fc2c..798558b29 100644 --- a/doc/source/security/kubernetes/password-recovery-for-linux-user-accounts.rst +++ b/doc/source/security/kubernetes/password-recovery-for-linux-user-accounts.rst @@ -23,13 +23,13 @@ this type of account as follows: .. code-block:: none - $ sudo passwd + $ sudo passwd $ sudo chage -d 0 -where is the user name of the account to be reset \(for, example, -**sysadmin**\) and is a temporary password. The -:command:`chage` command forces immediate expiration, so that the user must -change the password at first login. +where `` is the user name of the account to be reset \(for, example, +**sysadmin**\) and :command:`sudo passwd ` will prompt for the new +password. The :command:`chage` command forces immediate expiration, so that +the user must change the password at first login. If no other Linux system user accounts have been created, you can recover using the default LDAP **operator** or **admin** accounts. For more