Built-in Functions and Procedures
The Security Policy Scripting Language provides built-in functions and procedures to help simplify security policy implementation. Built-in functions and procedures are stand-alone subroutines that perform specific tasks. The difference between a function and a procedure is that a function returns a value while a procedure does not.
Taking advantage of Endpoint Privilege Management for Unix and Linux built-in functions and procedures can dramatically speed the implementation time of a company’s security policy implementation.
Endpoint Privilege Management for Unix and Linux built-in functions are divided into the following groups:
- Date and time functions
- File and path functions
- Format and conversion functions
- Input and output functions and procedures
- LDAP functions
- List functions
- Miscellaneous functions
- NIS functions
- Policy environment functions and procedures
- String functions
- Task control procedures
- Task environment functions and procedures
- User and password functions
- PAM policy functions
- Advanced Control and Audit (ACA) procedure