Resets the protected state environment of a user.
setsenv [ - ] NewEnvironment
The setsenv command resets your protected state environment while you are logged in. The protected state environment is defined as a set of variables. These variables are kept in the kernel and can be modified only by a SETUINFO system call. The setsenv command uses the variables specified by the NewEnvironment parameter. This parameter consists of EnvironmentVariable=Value definitions separated by a blank space. For information on environment variables, see environment File.
You cannot reset the following environment variables with the setsenv command:
If you enter the setsenv command without any defined variables, it displays the current protected state. The setsenv command does not change the security characteristics of the controlling terminal.
When you run the setsenv command, it replaces your current shell and gives you a new one. The command replaces your shell regardless of whether it completed successfully or not. For this reason, the command does not return error codes.
- | Reinitializes the environment as if the user had just logged in to the system. Otherwise, the environment is not changed. |
Access Control: This command should be a standard user program. This command should be installed as a program in the trusted computing base (TCB). The command should be owned by the root user with the setuid (SUID) bit set.
Mode | File |
---|---|
r | /etc/environment |
r | /etc/security/environ |
Event | Information |
---|---|
USER_SetEnv | new environment string |
setsenv
setsenv PSEUDO=tomThis example sets a user name for the PSEUDO protected environment variable.
/usr/bin/setsenv | Specifies the path to the setsenv command. |
/etc/environment | Contains environment information for each user. |
/etc/security/environ | Contains privileged environment information for each user. |
The login command, setgroups command, su command, andtsm command.
The getuinfo subroutine, setpenv subroutine, usrinfo subroutine.
For more information about the identification and authentication of users, discretionary access control, the trusted computing base, and auditing, refer to Security Administration in AIX Version 4.3 System Management Guide: Operating System and Devices.