chsec Command

Purpose

Changes the attributes in the security stanza files.

Syntax

chsec [ -f File] [ -s Stanza] [ -a Attribute = Value ... ]

Description

The chsec command changes the attributes stored in the security configuration stanza files. These security configuration stanza files have attributes that you can specify with the Attribute = Value parameter:

When modifying attributes in the /etc/security/environ, /etc/security/lastlog, /etc/security/limits, /etc/security/passwd, and /etc/security/user files, the stanza name specified by the Stanza parameter must either be a valid user name or default. When modifying attributes in the /etc/security/group file, the stanza name specified by the Stanza parameter must either be a valid group name or default. When modifying attributes in the /usr/lib/security/mkuser.default file, the Stanza parameter must be either admin or user. When modifying attributes in the /etc/security/portlog file, the Stanza parameter must be a valid port name. When modifying attributes in the /etc/security/login.cfg file, the Stanza parameter must either be a valid port name, a method name, or the usw attribute.

When modifying attributes in the /etc/security/login.cfg or /etc/security/portlog file in a stanza that does not already exist, the stanza is automatically created by the chsec command.

You cannot modify the password attribute of the /etc/security/passwd file using the chsec command. Instead, use the passwd command.

Only the root user or a user with an appropriate authorization can change administrative attributes. For example, to modify administrative group data, the user must be root or have GroupAdmin authorization.

Flags

Item Description
-a Attribute = Value Specifies the attribute to modify and the new value for that attribute. If you do not specify the value, the attribute is removed from the given stanza.
-f File Specifies the name of the stanza file to modify.
-s Stanza Specifies the name of the stanza to modify.

Security

Access Control

This command grants execute access only to the root user and the security group. The command has the trusted computing base attribute and runs the setuid command to allow the root user to access the security databases.

On a Trusted AIX® system, only users with the aix.mls.clear.write authorization can modify clearance attributes. Only users with the aix.mls.tty.write authorization can modify the port attributes.

Auditing Events

Event Information
USER_Change user name, attribute
GROUP_Change group name, attribute
PORT_Change port, attribute

Files Accessed

Mode File
rw /etc/security/environ
rw /etc/security/group
rw /etc/security/audit/hosts
rw /etc/security/lastlog
rw /etc/security/limits
rw /etc/security/login.cfg
rw /usr/lib/security/mkuser.default
rw /etc/nscontrol.conf
rw /etc/security/passwd
rw /etc/security/portlog
rw /etc/security/pwdalg.cfg
rw /etc/security/roles
rw /etc/security/rtc/rtcd_policy.conf
rw /etc/security/smitacl.user
rw /etc/security/smitacl.group
rw /etc/security/user
rw /etc/security/user.roles
Attention RBAC users and Trusted AIX users: This command can perform privileged operations. Only privileged users can run privileged operations. For more information about authorizations and privileges, see Privileged Command Database in Security. For a list of privileges and the authorizations associated with this command, see the lssecattr command or the getcmdattr subcommand. To get the full functionality of the command, besides the accessauths, the role should also have the following authorizations:
  • aix.security.user.audit
  • aix.security.role.assign
  • aix.security
To perform the chsec command on the /etc/security/rtc/rtcd_policy.conf file, the role should also have the following authorization:
  • aix.security.config

Examples

  1. To change the /dev/tty0 port to automatically lock if 5 unsuccessful login attempts occur within 60 seconds, enter:
    chsec -f /etc/security/login.cfg -s /dev/tty0 -a logindisable=5 -a logininterval=60
  2. To unlock the /dev/tty0 port after it has been locked by the system, enter:
    chsec -f /etc/security/portlog -s /dev/tty0 -a locktime=0
  3. To allow logins from 8:00 a.m. until 5:00 p.m. for all users, enter:
    chsec -f /etc/security/user -s default -a logintimes=:0800-1700
  4. To change the CPU time limit of user joe to 1 hour (3600 seconds), enter:
    chsec -f /etc/security/limits -s joe -a cpu=3600

Files

Item Description
/usr/bin/chsec Specifies the path to the chsec command.
/etc/security/environ Contains the environment attributes of users.
/etc/security/group Contains extended attributes of groups.
/etc/security/audit/hosts Contains host and processor IDs.
/etc/security/group Defines the last login attributes for users.
/etc/security/limits Defines resource quotas and limits for each user.
/etc/security/login.cfg Contains port configuration information.
/usr/lib/security/mkuser.default Contains the default values for new users.
/etc/nscontrol.conf Contains the configuration information of some name services.
/etc/security/passwd Contains password information.
/etc/security/portlog Contains unsuccessful login attempt information for each port.
/etc/security/pwdalg.cfg Contains the configuration information for loadable password algorithms (LPA).
/etc/security/roles Contains a list of valid roles.
/etc/security/rtc/rtcd_policy.conf Contains the configuration information for the rtcd daemon.
/etc/security/smitacl.user Contains user ACL definitions.
/etc/security/smitacl.group Contains group ACL definitions.
/etc/security/user Contains the extended attributes of users.
/etc/security/user.roles Contains a list of roles for each user.
/etc/security/enc/LabelEncodings Contains label definitions for the Trusted AIX system.
/etc/security/domains Contains the valid domain definitions for the system.