Built-in Functions and Procedures

The Security Policy Scripting Language provides built-in functions and procedures to help simplify security policy implementation. Built-in functions and procedures are stand-alone subroutines that perform specific tasks. The difference between a function and a procedure is that a function returns a value while a procedure does not.

Taking advantage of Endpoint Privilege Management for Unix and Linux built-in functions and procedures can dramatically speed the implementation time of a company’s security policy implementation.

Endpoint Privilege Management for Unix and Linux built-in functions are divided into the following groups:

  • Date and time functions
  • File and path functions
  • Format and conversion functions
  • Input and output functions and procedures
  • LDAP functions
  • List functions
  • Miscellaneous functions
  • NIS functions
  • Policy environment functions and procedures
  • String functions
  • Task control procedures
  • Task environment functions and procedures
  • User and password functions
  • PAM policy functions
  • Advanced Control and Audit (ACA) procedure