| packages/nixpkgs/gotrue-supabase | JWT based API for managing users and issuing JWT tokens |
| packages/nixpkgs/aws-c-auth | C99 library implementation of AWS client-side authentication |
| packages/nixpkgs/ente-auth | End-to-end encrypted, cross platform and free app for storing your 2FA codes with cloud backups |
| packages/nixpkgs/tlmi-auth | Utility for creating signature strings needed for thinklmi certificate based authentication |
| packages/nixpkgs/astal.auth | Astal module for authentication using pam |
| packages/nixpkgs/xauth | X authority file utility |
| packages/nixpkgs/auth0-cli | Supercharge your developer workflow |
| packages/nixpkgs/ssh-openpgp-auth | Command-line tool that provides client-side functionality to transparently verify the identity of remote SSH hosts |
| packages/nixpkgs/tt-rss-plugin-auth-ldap | Plugin for TT-RSS to authenticate users via ldap |
| packages/nixpkgs/authz0 | Automated authorization test tool |
| packages/nixpkgs/rauthy | Single Sign-On Identity & Access Management via OpenID Connect, OAuth 2.0 and PAM |
| packages/nixpkgs/gpauth | CLI for GlobalProtect VPN, based on OpenConnect, supports the SSO authentication method |
| packages/nixpkgs/glauth | Lightweight LDAP server for development, home use, or CI |
| packages/nixpkgs/xorg.xauth | |
| packages/nixpkgs/openvpn-auth-ldap | LDAP authentication plugin for OpenVPN |
| packages/nixpkgs/sshd-openpgp-auth | Command-line tool for creating and managing OpenPGP based trust anchors for SSH host keys |
| packages/nixpkgs/sbclPackages.mito-auth | |
| packages/nixpkgs/libsForQt5.kauth | |
| packages/nixpkgs/haskellPackages.yu-auth | Auth module for Yu |
| packages/nixpkgs/haskellPackages.ms-auth | Microsoft Authentication API |
| packages/nixpkgs/emacsPackages.totp-auth | |
| packages/nixpkgs/haskellPackages.yesod-auth-oauth | OAuth Authentication for Yesod |
| packages/nixpkgs/srht-gen-oauth-tok | Script to register a new Sourcehut OAuth token for a given user |
| packages/nixpkgs/oauth2c | User-friendly OAuth2 CLI |
| packages/nixpkgs/otpauth | Google Authenticator migration decoder |
| packages/nixpkgs/oauth2l | Simple CLI for interacting with Google API authentication |
| packages/nixpkgs/pizauth | Command-line OAuth2 authentication daemon |
| packages/nixpkgs/iceauth | libICE authority file utility |
| packages/nixpkgs/haskellPackages.yesod-auth-oauth2 | OAuth 2.0 authentication plugins |
| packages/nixpkgs/emacsPackages.auth-source-xoauth2 | |
| packages/nixpkgs/libsForQt5.qoauth | Qt library for OAuth authentication |
| packages/nixpkgs/google-alloydb-auth-proxy | Utility for connecting securely to your AlloyDB instances |
| packages/nixpkgs/oauth2-proxy | Reverse proxy that provides authentication with Google, Github, or other providers |
| packages/nixpkgs/python313Packages.swh-auth | Set of utility libraries related to user authentication in applications and services based on the use of Keycloak and OpenID Connect |
| packages/nixpkgs/python314Packages.swh-auth | Set of utility libraries related to user authentication in applications and services based on the use of Keycloak and OpenID Connect |
| packages/nixpkgs/haskellPackages.wai-hmac-auth | hmac authentication tools for WAI apps |
| packages/nixpkgs/haskellPackages.snap-auth-cli | Command-line tool to manage Snap AuthManager database |
| packages/nixpkgs/emacsPackages.tramp-auto-auth | |
| packages/nixpkgs/haskellPackages.yesod-auth | Authentication for Yesod |
| packages/nixpkgs/haskellPackages.Spock-auth | Provides authentification helpers for Spock |
| packages/nixpkgs/tailscale-nginx-auth | Tool that allows users to use Tailscale Whois authentication with NGINX as a reverse proxy |
| packages/nixpkgs/haskellPackages.yesod-auth-fb | Authentication backend for Yesod using Facebook |
| packages/nixpkgs/azure-cli-extensions.authV2 | Microsoft Azure Command-Line Tools Authv2 Extension |
| packages/nixpkgs/rPackages.auth0 | |
| packages/nixpkgs/haskellPackages.yesod-auth-pam | Provides PAM authentication module |
| packages/nixpkgs/xorg.iceauth | |
| packages/nixpkgs/python313Packages.dj-rest-auth | Authentication for Django Rest Framework |
| packages/nixpkgs/python314Packages.dj-rest-auth | Authentication for Django Rest Framework |
| packages/nixpkgs/haskellPackages.yesod-auth-oidc | A yesod-auth plugin for multi-tenant SSO via OpenID Connect |
| packages/nixpkgs/emacsPackages.auth-source-xoauth2-plugin | |
| packages/nixpkgs/haskellPackages.domain-auth | Domain authentication library |
| packages/nixpkgs/haskellPackages.yesod-auth-ldap | LDAP Authentication for Yesod |
| packages/nixpkgs/authelia | Single Sign-On Multi-Factor portal for web apps |
| packages/nixpkgs/haskellPackages.hwall-auth-iitk | Initial version of firewall Authentication for IITK network |
| packages/nixpkgs/sbclPackages.reblocks-auth | |
| packages/nixpkgs/python313Packages.sanic-auth | Simple Authentication for Sanic |
| packages/nixpkgs/python314Packages.sanic-auth | Simple Authentication for Sanic |
| packages/nixpkgs/python313Packages.httpx-auth | Authentication classes to be used with httpx |
| packages/nixpkgs/python314Packages.httpx-auth | Authentication classes to be used with httpx |
| packages/nixpkgs/sbclPackages.reblocks-auth-ci | |
| packages/nixpkgs/haskellPackages.yesod-auth-lti13 | A yesod-auth plugin for LTI 1.3 |
| packages/nixpkgs/oauth2ms | XOAUTH2 compatible Office365 token fetcher |
| packages/nixpkgs/liboauth | C library implementing the OAuth secure authentication protocol |
| packages/nixpkgs/haskellPackages.yesod-auth-basic | Yesod Middleware for HTTP Basic Authentication |
| packages/nixpkgs/haskellPackages.yesod-auth-simple | Traditional email/pass auth for Yesod |
| packages/nixpkgs/python312Packages.swh-auth | Set of utility libraries related to user authentication in applications and services based on the use of Keycloak and OpenID Connect |
| packages/nixpkgs/haskellPackages.http-client-auth | HTTP authorization (both basic and digest) done right |
| packages/nixpkgs/python314Packages.google-auth | Google Auth Python Library |
| packages/nixpkgs/python313Packages.google-auth | Google Auth Python Library |
| packages/nixpkgs/python313Packages.google-auth-oauthlib | Google Authentication Library: oauthlib integration |
| packages/nixpkgs/python314Packages.google-auth-oauthlib | Google Authentication Library: oauthlib integration |
| packages/nixpkgs/emacsPackages.auth-source-gopass | |
| packages/nixpkgs/emacsPackages.auth-source-keytar | |
| packages/nixpkgs/haskellPackages.servant-auth | Authentication combinators for servant |
| packages/nixpkgs/haskellPackages.yesod-auth-bcrypt | BCrypt salted and hashed passwords in a database as auth for yesod |
| packages/nixpkgs/kdePackages.kauth | KAuth |
| packages/nixpkgs/python312Packages.dj-rest-auth | Authentication for Django Rest Framework |
| packages/nixpkgs/sbclPackages.reblocks-auth-tests | |
| packages/nixpkgs/haskellPackages.yesod-auth-hashdb | Authentication plugin for Yesod |
| packages/nixpkgs/python312Packages.google-auth-oauthlib | Google Authentication Library: oauthlib integration |
| packages/nixpkgs/haskellPackages.reflex-monad-auth | Utilities to split reflex app to authorized and not authorized contexts |
| packages/nixpkgs/sbclPackages.cl-oauth | |
| packages/nixpkgs/haskellPackages.servant-auth-docs | servant-docs/servant-auth compatibility |
| packages/nixpkgs/python312Packages.sanic-auth | Simple Authentication for Sanic |
| packages/nixpkgs/haskellPackages.snaplet-auth-acid | Provides an Acid-State backend for the Auth Snaplet |
| packages/nixpkgs/python312Packages.httpx-auth | Authentication classes to be used with httpx |
| packages/nixpkgs/python313Packages.django-auth-ldap | Django authentication backend that authenticates against an LDAP service |
| packages/nixpkgs/python314Packages.django-auth-ldap | Django authentication backend that authenticates against an LDAP service |
| packages/nixpkgs/haskellPackages.servant-auth-hmac | Authentication via HMAC |
| packages/nixpkgs/haskellPackages.servant-hmac-auth | Servant authentication with HMAC |
| packages/nixpkgs/emacsPackages.auth-source-kwallet | |
| packages/nixpkgs/authentik | Authentication glue you need |
| packages/nixpkgs/python313Packages.django-rest-auth | Django app that makes registration and authentication easy |
| packages/nixpkgs/python313Packages.social-auth-core | Module for social authentication/registration mechanisms |
| packages/nixpkgs/python314Packages.django-rest-auth | Django app that makes registration and authentication easy |
| packages/nixpkgs/python314Packages.social-auth-core | Module for social authentication/registration mechanisms |
| packages/nixpkgs/python312Packages.google-auth | Google Auth Python Library |
| packages/nixpkgs/cyrus-sasl-xoauth2 | XOAUTH2 mechanism plugin for cyrus-sasl |
| packages/nixpkgs/haskellPackages.yesod-auth-ldap-native | Yesod LDAP authentication plugin |
| packages/nixpkgs/haskellPackages.yesod-auth-hmac-keccak | An account authentication plugin for yesod with encrypted token transfer |
| packages/nixpkgs/haskellPackages.yesod-auth-account | An account authentication plugin for Yesod |
| packages/nixpkgs/haskellPackages.yesod-auth-zendesk | Zendesk remote authentication support for Yesod apps |
| packages/nixpkgs/haskellPackages.yesod-auth-deskcom | Desk.com remote authentication support for Yesod apps. |
| packages/nixpkgs/haskellPackages.servant-auth-token | Servant based API and server for token based authorisation |
| packages/nixpkgs/proxyauth | Proxy Authentication Token - Fast authentication gateway for backend APIs |
| packages/nixpkgs/dvdauthor | Tools for generating DVD files to be played on standalone DVD players |
| packages/nixpkgs/python312Packages.django-auth-ldap | Django authentication backend that authenticates against an LDAP service |
| packages/nixpkgs/haskellPackages.servant-auth-token-api | Servant based API for token based authorisation |
| packages/nixpkgs/emacsPackages.oauth | |
| packages/nixpkgs/haskellPackages.servant-auth-client | servant-client/servant-auth compatibility |
| packages/nixpkgs/haskellPackages.servant-auth-server | servant-server/servant-auth compatibility |
| packages/nixpkgs/haskellPackages.servant-auth-token-acid | Acid-state backend for servant-auth-token server |
| packages/nixpkgs/sbclPackages.reblocks-auth-example | |
| packages/nixpkgs/python312Packages.django-rest-auth | Django app that makes registration and authentication easy |
| packages/nixpkgs/python312Packages.social-auth-core | Module for social authentication/registration mechanisms |
| packages/nixpkgs/haskellPackages.servant-auth-cookie | Authentication via encrypted cookies |
| packages/nixpkgs/haskellPackages.yesod-auth-account-fork | An account authentication plugin for Yesod |
| packages/nixpkgs/python313Packages.pydata-google-auth | Helpers for authenticating to Google APIs |
| packages/nixpkgs/python314Packages.pydata-google-auth | Helpers for authenticating to Google APIs |
| packages/nixpkgs/haskellPackages.happstack-auth | A Happstack Authentication Suite |
| packages/nixpkgs/haskellPackages.yesod-auth-bcryptdb | Authentication plugin for Yesod |
| packages/nixpkgs/haskellPackages.yesod-auth-kerberos | Kerberos Authentication for Yesod |
| packages/nixpkgs/haskellPackages.wordpress-auth | Validate Wordpress Cookies & Nonces; Build Wordpress Hashes & Salts |
| packages/nixpkgs/haskellPackages.sys-auth-smbclient | Auth with smbclient command |
| packages/nixpkgs/python314Packages.django-two-factor-auth | Complete Two-Factor Authentication for Django |
| packages/nixpkgs/python313Packages.django-two-factor-auth | Complete Two-Factor Authentication for Django |
| packages/nixpkgs/python313Packages.social-auth-app-django | Module for social authentication/registration mechanism |
| packages/nixpkgs/python314Packages.social-auth-app-django | Module for social authentication/registration mechanism |
| packages/nixpkgs/haskellPackages.servant-auth-swagger | servant-swagger/servant-auth compatibility |
| packages/nixpkgs/haskellPackages.yesod-auth-ldap-mediocre | Very simlple LDAP auth for yesod |
| packages/nixpkgs/emacsPackages.auth-source-1password | |
| packages/nixpkgs/python312Packages.pydata-google-auth | Helpers for authenticating to Google APIs |
| packages/nixpkgs/sbclPackages.hunchentoot-auth | |
| packages/nixpkgs/python312Packages.django-two-factor-auth | Complete Two-Factor Authentication for Django |
| packages/nixpkgs/python312Packages.social-auth-app-django | Module for social authentication/registration mechanism |
| packages/nixpkgs/emacsPackages.oauth2 | |
| packages/nixpkgs/plasma5Packages.kauth | |
| packages/nixpkgs/haskellPackages.yesod-auth-smbclient | Authentication plugin for Yesod using smbclient |
| packages/nixpkgs/haskellPackages.Xauth | A binding to the X11 authentication library |
| packages/nixpkgs/sbclPackages.lack-middleware-auth-basic | |
| packages/nixpkgs/authoscope | Scriptable network authentication cracker |
| packages/nixpkgs/haskellPackages.servant-auth-token-leveldb | Leveldb backend for servant-auth-token server |
| packages/nixpkgs/haskellPackages.servant-auth-token-rocksdb | RocksDB backend for servant-auth-token server |
| packages/nixpkgs/home-assistant-component-tests.auth | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/haskellPackages.wai-middleware-auth | Authentication middleware that secures WAI application |
| packages/nixpkgs/python313Packages.google-auth-httplib2 | Google Authentication Library: httplib2 transport |
| packages/nixpkgs/python314Packages.google-auth-httplib2 | Google Authentication Library: httplib2 transport |
| packages/nixpkgs/haskellPackages.snaplet-sqlite-simple-jwt-auth | Snaplet for JWT authentication with snaplet-sqlite-simple |
| packages/nixpkgs/emacsPackages.url-http-oauth | |
| packages/nixpkgs/graylogPlugins.auth_sso | SSO support for Graylog through trusted HTTP headers set by load balancers or authentication proxies |
| packages/nixpkgs/haskellPackages.yesod-auth-nopassword | A plugin for Yesod to provide email-only authentication |
| packages/nixpkgs/python312Packages.google-auth-httplib2 | Google Authentication Library: httplib2 transport |
| packages/nixpkgs/haskellPackages.servant-auth-wordpress | Authenticate Routes Using Wordpress Cookies |
| packages/nixpkgs/plasma5Packages.qoauth | Qt library for OAuth authentication |
| packages/nixpkgs/emacsPackages.oauth2-auto | |
| packages/nixpkgs/haskellPackages.hoauth | A Haskell implementation of OAuth 1.0a protocol. |
| packages/nixpkgs/home-assistant-custom-components.auth-header | Home Assistant custom component which allows you to delegate authentication to a reverse proxy |
| packages/nixpkgs/python313Packages.auth0-python | Auth0 Python SDK |
| packages/nixpkgs/python314Packages.auth0-python | Auth0 Python SDK |
| packages/nixpkgs/matrix-synapse-plugins.matrix-synapse-shared-secret-auth | Shared Secret Authenticator password provider module for Matrix Synapse |
| packages/nixpkgs/terraform-providers.auth0_auth0 | |
| packages/nixpkgs/haskellPackages.req-oauth2 | Provides OAuth2 authentication for use with Req |
| packages/nixpkgs/haskellPackages.authenticate-oauth | Library to authenticate with OAuth for Haskell web applications |
| packages/nixpkgs/haskellPackages.servant-auth-token-persistent | Persistent backend for servant-auth-token server |
| packages/nixpkgs/haskellPackages.bloodhound-amazonka-auth | Adds convenient Amazon ElasticSearch Service authentication to Bloodhound |
| packages/nixpkgs/git-credential-oauth | Git credential helper that securely authenticates to GitHub, GitLab and BitBucket using OAuth |
| packages/nixpkgs/python313Packages.miauth | Authenticate and interact with Xiaomi devices over BLE |
| packages/nixpkgs/python314Packages.miauth | Authenticate and interact with Xiaomi devices over BLE |
| packages/nixpkgs/haskellPackages.hoauth2 | Haskell OAuth2 authentication client |
| packages/nixpkgs/python312Packages.auth0-python | Auth0 Python SDK |
| packages/nixpkgs/haskellPackages.gogol-oauth2 | Google OAuth2 SDK |
| packages/nixpkgs/rdpgw | Remote Desktop Gateway |
| packages/nixpkgs/sbclPackages.cl-authorize-net | |
| packages/nixpkgs/python313Packages.httpx-oauth | Async OAuth client using HTTPX |
| packages/nixpkgs/python314Packages.httpx-oauth | Async OAuth client using HTTPX |
| packages/nixpkgs/python312Packages.oauth | Library for OAuth version 1.0a |
| packages/nixpkgs/python313Packages.oauth | Library for OAuth version 1.0a |
| packages/nixpkgs/authentik-outposts.ldap | Authentik ldap outpost |
| packages/nixpkgs/haskellPackages.hoauth2-demo | hoauth2 demo application |
| packages/nixpkgs/terraform-providers.auth0 | |
| packages/nixpkgs/haskellPackages.ucam-webauth | The Ucam-Webauth protocol, used by Raven |
| packages/nixpkgs/python313Packages.authres | Email Authentication-Results Headers generation and parsing for Python/Python3 |
| packages/nixpkgs/python314Packages.authres | Email Authentication-Results Headers generation and parsing for Python/Python3 |
| packages/nixpkgs/haskellPackages.authinfo-hs | Password querying for .authinfo |
| packages/nixpkgs/python313Packages.authlib | Library for building OAuth and OpenID Connect servers |
| packages/nixpkgs/python314Packages.authlib | Library for building OAuth and OpenID Connect servers |
| packages/nixpkgs/emacsPackages.oauth2-request | |
| packages/nixpkgs/python313Packages.asyauth | Unified authentication library |
| packages/nixpkgs/python313Packages.badauth | Unified authentication library |
| packages/nixpkgs/python314Packages.badauth | Unified authentication library |
| packages/nixpkgs/python314Packages.asyauth | Unified authentication library |
| packages/nixpkgs/python313Packages.otpauth | Implements one time password of HOTP/TOTP |
| packages/nixpkgs/python314Packages.otpauth | Implements one time password of HOTP/TOTP |
| packages/nixpkgs/haskellPackages.oauth10a | Fully Automatic Luxury OAuth 1.0a headers |
| packages/nixpkgs/python313Packages.mwoauth | Python library to perform OAuth handshakes with a MediaWiki installation |
| packages/nixpkgs/python314Packages.mwoauth | Python library to perform OAuth handshakes with a MediaWiki installation |
| packages/nixpkgs/haskellPackages.google-oauth2 | Google OAuth2 token negotiation |
| packages/nixpkgs/haskellPackages.webauthn | Relying party (server) implementation of the WebAuthn 2 specification |
| packages/nixpkgs/authentik-outposts.proxy | Authentik proxy outpost which is used for HTTP reverse proxy authentication |
| packages/nixpkgs/texlivePackages.nameauth | Name authority mechanism for consistency in body text and index |
| packages/nixpkgs/grooveauthor | GrooveAuthor is an editor for authoring StepMania charts |
| packages/nixpkgs/haskellPackages.snaplet-oauth | snaplet-oauth |
| packages/nixpkgs/python312Packages.miauth | Authenticate and interact with Xiaomi devices over BLE |
| packages/nixpkgs/python312Packages.oauth2 | Library for OAuth version 1.0 |
| packages/nixpkgs/python313Packages.oauth2 | Library for OAuth version 1.0 |
| packages/nixpkgs/haskellPackages.google-oauth2-jwt | Get a signed JWT for Google Service Accounts |
| packages/nixpkgs/haskellPackages.oauth2-jwt-bearer | OAuth2 jwt-bearer client flow as per rfc7523 |
| packages/nixpkgs/sbclPackages.cl-authorize-net-tests | |
| packages/nixpkgs/chickenPackages_5.chickenEggs.oauth | OAuth 1.0, 1.0a, RFC 5849 |
| packages/nixpkgs/authentik-outposts.radius | Authentik radius outpost which is used for the external radius API |
| packages/nixpkgs/haskellPackages.google-oauth2-easy | Opininated use of Google Authentication for ease |
| packages/nixpkgs/rPackages.shinyauthr | |
| packages/nixpkgs/haskellPackages.google-oauth2-for-cli | Get Google OAuth2 token for CLI tools |
| packages/nixpkgs/python312Packages.httpx-oauth | Async OAuth client using HTTPX |
| packages/nixpkgs/haskellPackages.servant-oauth2 | A library for OAuth2 authentication in servant |
| packages/nixpkgs/python312Packages.authres | Email Authentication-Results Headers generation and parsing for Python/Python3 |
| packages/nixpkgs/haskellPackages.authoring | A library for writing papers |
| packages/nixpkgs/haskellPackages.ucam-webauth-types | Types for the Ucam-Webauth protocol, as used by Raven |
| packages/nixpkgs/python312Packages.authlib | Library for building OAuth and OpenID Connect servers |
| packages/nixpkgs/python314Packages.oauthlib | Generic, spec-compliant, thorough implementation of the OAuth request-signing logic |
| packages/nixpkgs/python313Packages.oauthlib | Generic, spec-compliant, thorough implementation of the OAuth request-signing logic |
| packages/nixpkgs/python312Packages.badauth | Unified authentication library |
| packages/nixpkgs/python312Packages.asyauth | Unified authentication library |
| packages/nixpkgs/python313Packages.webauthn | Implementation of the WebAuthn API |
| packages/nixpkgs/python314Packages.webauthn | Implementation of the WebAuthn API |
| packages/nixpkgs/python312Packages.otpauth | Implements one time password of HOTP/TOTP |
| packages/nixpkgs/python313Packages.oauth2-client | Client library for OAuth2 |
| packages/nixpkgs/python314Packages.oauth2-client | Client library for OAuth2 |
| packages/nixpkgs/python313Packages.httpauth | WSGI HTTP Digest Authentication middleware |
| packages/nixpkgs/python314Packages.httpauth | WSGI HTTP Digest Authentication middleware |
| packages/nixpkgs/python313Packages.gpsoauth | Library for Google Play Services OAuth |
| packages/nixpkgs/python314Packages.gpsoauth | Library for Google Play Services OAuth |
| packages/nixpkgs/python312Packages.mwoauth | Python library to perform OAuth handshakes with a MediaWiki installation |
| packages/nixpkgs/python313Packages.plexauth | Handles the authorization flow to obtain tokens from Plex.tv via external redirection |
| packages/nixpkgs/python314Packages.plexauth | Handles the authorization flow to obtain tokens from Plex.tv via external redirection |
| packages/nixpkgs/python313Packages.python-oauth2 | Framework that aims at making it easy to provide authentication via OAuth 2.0 within an application stack |
| packages/nixpkgs/python314Packages.python-oauth2 | Framework that aims at making it easy to provide authentication via OAuth 2.0 within an application stack |
| packages/nixpkgs/python314Packages.certauth | Simple CertificateAuthority and host certificate creation, useful for man-in-the-middle HTTPS proxy |
| packages/nixpkgs/python313Packages.certauth | Simple CertificateAuthority and host certificate creation, useful for man-in-the-middle HTTPS proxy |
| packages/nixpkgs/authenticator | Two-factor authentication code generator for GNOME |
| packages/nixpkgs/aws-iam-authenticator | AWS IAM credentials for Kubernetes authentication |
| packages/nixpkgs/texlivePackages.authordate | Author/date style citation styles |
| packages/nixpkgs/python312Packages.oauthlib | Generic, spec-compliant, thorough implementation of the OAuth request-signing logic |
| packages/nixpkgs/python312Packages.webauthn | Implementation of the WebAuthn API |
| packages/nixpkgs/python312Packages.oauth2-client | Client library for OAuth2 |
| packages/nixpkgs/python312Packages.httpauth | WSGI HTTP Digest Authentication middleware |
| packages/nixpkgs/python313Packages.django-allauth | Integrated set of Django applications addressing authentication, registration, account management as well as 3rd party (social) account authentication |
| packages/nixpkgs/python314Packages.django-allauth | Integrated set of Django applications addressing authentication, registration, account management as well as 3rd party (social) account authentication |
| packages/nixpkgs/python312Packages.gpsoauth | Library for Google Play Services OAuth |
| packages/nixpkgs/python312Packages.plexauth | Handles the authorization flow to obtain tokens from Plex.tv via external redirection |
| packages/nixpkgs/python312Packages.python-oauth2 | Framework that aims at making it easy to provide authentication via OAuth 2.0 within an application stack |
| packages/nixpkgs/python312Packages.certauth | Simple CertificateAuthority and host certificate creation, useful for man-in-the-middle HTTPS proxy |
| packages/nixpkgs/rPackages.shinydbauth | |
| packages/nixpkgs/python313Packages.flask-httpauth | Extension that provides HTTP authentication for Flask routes |
| packages/nixpkgs/python314Packages.flask-httpauth | Extension that provides HTTP authentication for Flask routes |
| packages/nixpkgs/python313Packages.requests-aws4auth | Amazon Web Services version 4 authentication for the Python Requests library |
| packages/nixpkgs/python314Packages.requests-aws4auth | Amazon Web Services version 4 authentication for the Python Requests library |
| packages/nixpkgs/qt6.qtnetworkauth | Cross-platform application framework for C++ |
| packages/nixpkgs/qt5.qtnetworkauth | Cross-platform application framework for C++ |
| packages/nixpkgs/proton-authenticator | Two-factor authentication manager with optional sync |
| packages/nixpkgs/sbclPackages.cl-oauth_dot_tests | |
| packages/nixpkgs/haskellPackages.hoauth2-tutorial | Tutorial for using hoauth2 |
| packages/nixpkgs/haskellPackages.prodapi-userauth | a base lib for performing user-authentication in prodapi services |
| packages/nixpkgs/python312Packages.django-allauth | Integrated set of Django applications addressing authentication, registration, account management as well as 3rd party (social) account authentication |
| packages/nixpkgs/python312Packages.requests-aws4auth | Amazon Web Services version 4 authentication for the Python Requests library |
| packages/nixpkgs/google-authenticator | Two-step verification, with pam module |
| packages/nixpkgs/texlivePackages.authorindex | Index citations by author names |
| packages/nixpkgs/python312Packages.flask-httpauth | Extension that provides HTTP authentication for Flask routes |
| packages/nixpkgs/python313Packages.django-oauth-toolkit | OAuth2 goodies for the Djangonauts |
| packages/nixpkgs/python314Packages.django-oauth-toolkit | OAuth2 goodies for the Djangonauts |
| packages/nixpkgs/vimPlugins.vim-fzf-coauthorship | |
| packages/nixpkgs/libsForQt5.qtnetworkauth | Cross-platform application framework for C++ |
| packages/nixpkgs/python313Packages.django-otp-webauthn | Passkey support for Django |
| packages/nixpkgs/python314Packages.django-otp-webauthn | Passkey support for Django |
| packages/nixpkgs/libsForQt5.qt5.qtnetworkauth | Cross-platform application framework for C++ |
| packages/nixpkgs/python313Packages.openaiauth | Library for authenticating with the OpenAI API |
| packages/nixpkgs/python314Packages.openaiauth | Library for authenticating with the OpenAI API |
| packages/nixpkgs/python313Packages.aiohttp-oauthlib | oauthlib integration for aiohttp clients |
| packages/nixpkgs/python314Packages.aiohttp-oauthlib | oauthlib integration for aiohttp clients |
| packages/nixpkgs/haskellPackages.hoauth2-providers | OAuth2 Identity Providers |
| packages/nixpkgs/haskellPackages.hoauth2_2_14_3 | Haskell OAuth2 authentication client |
| packages/nixpkgs/haskellPackages.hoauth2_2_15_0 | Haskell OAuth2 authentication client |
| packages/nixpkgs/python313Packages.authheaders | Python library for the generation of email authentication headers |
| packages/nixpkgs/python314Packages.authheaders | Python library for the generation of email authentication headers |
| packages/nixpkgs/python312Packages.django-oauth-toolkit | OAuth2 goodies for the Djangonauts |
| packages/nixpkgs/texlivePackages.affilauthor | Tag author and affiliation information in a key-value style |
| packages/nixpkgs/typstPackages.scholarly-tauthesis | A template for writing Tampere University theses |
| packages/nixpkgs/rPackages.authoritative | |
| packages/nixpkgs/python313Packages.mkdocs-git-authors-plugin | Lightweight MkDocs plugin to display git authors of a markdown page |
| packages/nixpkgs/python314Packages.mkdocs-git-authors-plugin | Lightweight MkDocs plugin to display git authors of a markdown page |
| packages/nixpkgs/python312Packages.django-otp-webauthn | Passkey support for Django |
| packages/nixpkgs/wordpressPackages.plugins.co-authors-plus | |
| packages/nixpkgs/python312Packages.openaiauth | Library for authenticating with the OpenAI API |
| packages/nixpkgs/python312Packages.aiohttp-oauthlib | oauthlib integration for aiohttp clients |
| packages/nixpkgs/haskellPackages.servant-oauth2-examples | Example applications using this library in three ways |
| packages/nixpkgs/python313Packages.requests-oauthlib | OAuthlib authentication support for Requests |
| packages/nixpkgs/python314Packages.requests-oauthlib | OAuthlib authentication support for Requests |
| packages/nixpkgs/python312Packages.authheaders | Python library for the generation of email authentication headers |
| packages/nixpkgs/haskellPackages.authenticate | Authentication methods for Haskell web applications |
| packages/nixpkgs/texlivePackages.oup-authoring-template | A general template for journals published by Oxford University Press (OUP) |
| packages/nixpkgs/python312Packages.mkdocs-git-authors-plugin | Lightweight MkDocs plugin to display git authors of a markdown page |
| packages/nixpkgs/haskellPackages.google-oauth2-jwt_0_3_3_2 | Get a signed JWT for Google Service Accounts |
| packages/nixpkgs/python313Packages.hawkauthlib | Hawk Access Authentication protocol |
| packages/nixpkgs/python314Packages.hawkauthlib | Hawk Access Authentication protocol |
| packages/nixpkgs/python314Packages.aiohttp-basicauth | HTTP basic authentication middleware for aiohttp 3.0 |
| packages/nixpkgs/python313Packages.aiohttp-basicauth | HTTP basic authentication middleware for aiohttp 3.0 |
| packages/nixpkgs/python313Packages.pyramid-multiauth | Authentication policy for Pyramid that proxies to a stack of other authentication policies |
| packages/nixpkgs/python314Packages.pyramid-multiauth | Authentication policy for Pyramid that proxies to a stack of other authentication policies |
| packages/nixpkgs/haskellPackages.authenticate-ldap | LDAP authentication for Haskell web applications |
| packages/nixpkgs/haskellPackages.snaplet-customauth | Alternate authentication snaplet |
| packages/nixpkgs/python312Packages.requests-oauthlib | OAuthlib authentication support for Requests |
| packages/nixpkgs/kdePackages.qtnetworkauth | Cross-platform application framework for C++ |
| packages/nixpkgs/qt6Packages.qtnetworkauth | Cross-platform application framework for C++ |
| packages/nixpkgs/texlivePackages.authorarchive | Adds self-archiving information to scientific papers |
| packages/nixpkgs/rPackages.snowflakeauth | |
| packages/nixpkgs/python312Packages.hawkauthlib | Hawk Access Authentication protocol |
| packages/nixpkgs/vimPlugins.nvim-treesitter-parsers.authzed | Tree-sitter grammar for authzed |
| packages/nixpkgs/python312Packages.aiohttp-basicauth | HTTP basic authentication middleware for aiohttp 3.0 |
| packages/nixpkgs/python312Packages.pyramid-multiauth | Authentication policy for Pyramid that proxies to a stack of other authentication policies |
| packages/nixpkgs/python313Packages.oauth2client | Client library for OAuth 2.0 |
| packages/nixpkgs/python314Packages.oauth2client | Client library for OAuth 2.0 |
| packages/nixpkgs/rPackages.firebase_auth_rest | |
| packages/nixpkgs/chickenPackages_5.chickenEggs.oauthtoothy | Oauth2 support for Schematra |
| packages/nixpkgs/python313Packages.keyrings-google-artifactregistry-auth | Python package which allows you to configure keyring to interact with Python repositories stored in Artifact Registry |
| packages/nixpkgs/python314Packages.keyrings-google-artifactregistry-auth | Python package which allows you to configure keyring to interact with Python repositories stored in Artifact Registry |
| packages/nixpkgs/texlivePackages.biblatex-realauthor | Indicate the real author of a work |
| packages/nixpkgs/python312Packages.keyrings-google-artifactregistry-auth | Python package which allows you to configure keyring to interact with Python repositories stored in Artifact Registry |
| packages/nixpkgs/home-assistant-custom-components.auth_oidc | OpenID Connect authentication provider for Home Assistant |
| packages/nixpkgs/python312Packages.oauth2client | Client library for OAuth 2.0 |
| packages/nixpkgs/haskellPackages.apiary-authenticate | authenticate support for apiary web framework |
| packages/nixpkgs/haskellPackages.lnurl-authenticator | A command line tool to manage LNURL auth identities |
| packages/nixpkgs/haskellPackages.otp-authenticator | OTP Authenticator (a la google) command line client |
| packages/nixpkgs/apacheHttpdPackages.mod_auth_mellon | Apache module with a simple SAML 2.0 service provider |
| packages/nixpkgs/matrix-authentication-service | OAuth2.0 + OpenID Provider for Matrix Homeservers |
| packages/nixpkgs/apacheHttpdPackages_2_4.mod_auth_mellon | Apache module with a simple SAML 2.0 service provider |
| packages/nixpkgs/plasma5Packages.qtnetworkauth | Cross-platform application framework for C++ |
| packages/nixpkgs/plasma5Packages.qt5.qtnetworkauth | Cross-platform application framework for C++ |
| packages/nixpkgs/haskellPackages.hoauth2-providers-tutorial | tutorial for hoauth2-providers module |
| packages/nixpkgs/haskellPackages.authenticate-kerberos | Authentication methods for Haskell web applications |
| packages/nixpkgs/haskellPackages.oauthenticated | Simple OAuth for http-client |
| packages/nixpkgs/python313Packages.keystoneauth1 | Authentication Library for OpenStack Identity |
| packages/nixpkgs/python314Packages.keystoneauth1 | Authentication Library for OpenStack Identity |
| packages/nixpkgs/python313Packages.authcaptureproxy | Proxy to capture authentication information from a webpage |
| packages/nixpkgs/python314Packages.authcaptureproxy | Proxy to capture authentication information from a webpage |
| packages/nixpkgs/python313Packages.azure-mgmt-authorization | This is the Microsoft Azure Authorization Management Client Library |
| packages/nixpkgs/python314Packages.azure-mgmt-authorization | This is the Microsoft Azure Authorization Management Client Library |
| packages/nixpkgs/python313Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/python314Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/haskellPackages.happstack-authenticate | Happstack Authentication Library |
| packages/nixpkgs/sbclPackages.authenticated-encryption | |
| packages/nixpkgs/python312Packages.keystoneauth1 | Authentication Library for OpenStack Identity |
| packages/nixpkgs/texlivePackages.authoraftertitle | Make author, etc., available after \maketitle |
| packages/nixpkgs/python312Packages.authcaptureproxy | Proxy to capture authentication information from a webpage |
| packages/nixpkgs/python312Packages.azure-mgmt-authorization | This is the Microsoft Azure Authorization Management Client Library |
| packages/nixpkgs/python312Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/pam_ssh_agent_auth | PAM module for authentication through the SSH agent |
| packages/nixpkgs/sbclPackages.authenticated-encryption-test | |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_7_0 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_6_2 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_9_0 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_5_0 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_8_0 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_4_0 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_4_1 | A template for writing Tampere University theses |
| packages/nixpkgs/python313Packages.pynintendoauth | Python module to provide APIs to authenticate with Nintendo services |
| packages/nixpkgs/python314Packages.pynintendoauth | Python module to provide APIs to authenticate with Nintendo services |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_16_3 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_12_0 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_13_2 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_10_2 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_11_0 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_15_2 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_10_0 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_11_2 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_15_0 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_14_1 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_17_4 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_14_0 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_17_1 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_14_3 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_14_2 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_17_6 | A template for writing Tampere University theses |
| packages/nixpkgs/typstPackages.scholarly-tauthesis_0_17_2 | A template for writing Tampere University theses |
| packages/nixpkgs/python313Packages.microsoft-kiota-authentication-azure | Kiota Azure authentication provider |
| packages/nixpkgs/python314Packages.microsoft-kiota-authentication-azure | Kiota Azure authentication provider |
| packages/nixpkgs/python312Packages.microsoft-kiota-authentication-azure | Kiota Azure authentication provider |
| packages/nixpkgs/python313Packages.jupyterhub-tmpauthenticator | Simple Jupyterhub authenticator that allows anyone to log in |
| packages/nixpkgs/python314Packages.jupyterhub-tmpauthenticator | Simple Jupyterhub authenticator that allows anyone to log in |
| packages/nixpkgs/python312Packages.jupyterhub-tmpauthenticator | Simple Jupyterhub authenticator that allows anyone to log in |
| packages/nixpkgs/haskellPackages.gogol-binaryauthorization | Google Binary Authorization SDK |
| packages/nixpkgs/python313Packages.jupyterhub-ldapauthenticator | Simple LDAP Authenticator Plugin for JupyterHub |
| packages/nixpkgs/python314Packages.jupyterhub-ldapauthenticator | Simple LDAP Authenticator Plugin for JupyterHub |
| packages/nixpkgs/python312Packages.jupyterhub-ldapauthenticator | Simple LDAP Authenticator Plugin for JupyterHub |
| options/home-manager/vdirsyncer.auth | Authentication settings
|
| options/nixos/services.code-server.auth | The type of authentication to use.
|
| options/nixos/programs.ente-auth.enable | Whether to enable Ente Auth.
|
| options/nixos/services.coturn.no-auth | This option is opposite to lt-cred-mech.
(TURN Server with no-auth option allows anonymous access)
|
| options/nixos/services.i2pd.proto.http.auth | Whether to enable webconsole authentication.
|
| options/nixos/programs.ente-auth.package | The ente-auth package to use.
|
| options/nixos/services.gns3-server.auth.user | Username used to access the GNS3 Server.
|
| options/nixos/services.tt-rss.auth.autoCreate | Allow authentication modules to auto-create users in tt-rss internal
database when authenticated successfully.
|
| options/nixos/services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| options/nixos/services.gns3-server.auth.enable | Whether to enable password based HTTP authentication to access the GNS3 Server.
|
| options/nixos/services.yarr.authFilePath | Path to a file containing username:password. null means no authentication required to use the service.
|
| options/nixos/services.tor.settings.HidServAuth.*.auth | Authentication cookie.
|
| options/home-manager/services.pizauth.accounts.<name>.authUri | The OAuth2 server's authentication URI.
|
| options/nixos/services.freeciv.settings.auth | Whether to enable server authentication.
|
| options/nixos/services.nipap.settings.auth.auth_cache_timeout | Seconds to store cached auth entries for.
|
| options/home-manager/vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/services.calibre-server.auth.mode | Choose the type of authentication used
|
| options/nixos/services.oauth2-proxy.setXauthrequest | Set X-Auth-Request-User and X-Auth-Request-Email response headers (useful in Nginx auth_request mode)
|
| options/nixos/services.calibre-server.auth.enable | Password based authentication to access the server
|
| options/nixos/services.calibre-server.auth.userDb | Choose users database file to use for authentication
|
| options/nixos/services.freshrss.authType | Authentication type for FreshRSS.
|
| options/nixos/services.tailscale.authKeyFile | A file containing the auth key
|
| options/nixos/services.deluge.authFile | The file managing the authentication for deluge, the format of this
file is straightforward, each line contains a
username:password:level tuple in plaintext
|
| options/nixos/services.microsocks.authOnce | If true, once a specific ip address authed successfully with user/pass,
it is added to a whitelist and may use the proxy without auth.
|
| options/nixos/services._3proxy.services.*.auth | Authentication type
|
| options/nixos/services.diod.authRequired | Allow clients to connect without authentication, i.e. without a valid MUNGE credential.
|
| options/nixos/services.gns3-server.auth.passwordFile | A file containing the password to access the GNS3 Server.
This should be a string, not a nix path, since nix paths
are copied into the world-readable nix store.
|
| options/home-manager/services.podman.builds.<name>.authFile | Path of the authentication file.
|
| options/nixos/services.xserver.displayManager.xpra.auth | Authentication to use when connecting to xpra
|
| options/home-manager/services.podman.images.<name>.authFile | Path of the authentication file used to connect to registry.
|
| options/nixos/services.bitlbee.authBackend | How users are authenticated
storage -- save passwords internally
pam -- Linux PAM authentication
|
| options/home-manager/programs.sftpman.mounts.<name>.authType | The authentication method to use.
|
| options/nixos/services.hqplayerd.auth.password | Password used for HQPlayer's WebUI
|
| options/nixos/services.hqplayerd.auth.username | Username used for HQPlayer's WebUI
|
| options/nixos/services.geth.<name>.authrpc.port | Port number of Go Ethereum Auth RPC API.
|
| options/nixos/services.bitlbee.authMode | The following authentication modes are available:
Open -- Accept connections from anyone, use NickServ for user authentication
|
| options/nixos/services.coturn.static-auth-secret-file | Path to the file containing the static authentication secret.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| options/nixos/services.tailscale.authKeyParameters | Extra parameters to pass after the auth key
|
| options/nixos/services.geth.<name>.authrpc.enable | Whether to enable Go Ethereum Auth RPC API.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.authType | Either "basic" for a general-purpose authorization protocol
or "stealth" for a less scalable protocol
that also hides service activity from unauthorized clients.
|
| options/nixos/services.coturn.use-auth-secret | TURN REST API flag
|
| options/nixos/services.nipap.authBackendSettings | auth.backends options to set in /etc/nipap/nipap.conf.
|
| options/nixos/services.oauth2-proxy.passBasicAuth | Pass HTTP Basic Auth, X-Forwarded-User and X-Forwarded-Email information to upstream.
|
| options/nixos/services.geth.<name>.authrpc.address | Listen address of Go Ethereum Auth RPC API.
|
| options/nixos/services.ceph.global.authClientRequired | Enables requiring the cluster to authenticate itself to the client.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/nixos/services.coturn.static-auth-secret | 'Static' authentication secret value (a string) for TURN REST API only
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter | The auth adapter type
|
| options/nixos/networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| options/nixos/services.simplesamlphp.<name>.authSources | Auth sources options used by SimpleSAMLphp.
|
| options/nixos/services.ceph.global.authClusterRequired | Enables requiring daemons to authenticate with eachother in the cluster.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/nixos/services.microsocks.authUsername | Optional username to use for authentication.
|
| options/nixos/services.nipap.settings.auth.default_backend | Name of auth backend to use by default.
|
| options/nixos/services.ceph.global.authServiceRequired | Enables requiring clients to authenticate with the cluster to access services in the cluster (e.g. radosgw, mds or osd).
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.options | Options for the auth plugin
|
| options/nixos/services.microsocks.authPasswordFile | Path to a file containing the password for authentication.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth | All authentication providers to provision
|
| options/nixos/services.oauth2-proxy.basicAuthPassword | The password to set when passing the HTTP Basic Auth header.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.name | The name of this authentication provider
|
| options/nixos/services.saslauthd.mechanism | Auth mechanism to use
|
| options/nixos/services.tailscale.authKeyParameters.preauthorized | Whether to skip manual device approval.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.username | The username to store inside the credentials file.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.password | The password to store inside the credentials file.
|
| options/nixos/services.oauth2-proxy.tls.key | Path to private key file.
|
| options/nixos/services.tailscale.authKeyParameters.baseURL | Base URL for the Tailscale API.
|
| options/nixos/services.oauth2-proxy.scope | OAuth scope specification.
|
| options/nixos/services.gitlab.pages.settings | Configuration options to set in the GitLab Pages config
file
|
| options/home-manager/programs.darcs.author | If this list has a single entry, it will be used as the author
when you record a patch
|
| options/nixos/services.mosquitto.listeners.*.authPlugins | Authentication plugin to attach to this listener
|
| options/nixos/security.pam.dp9ik.authserver | This controls the hostname for the 9front authentication server
that users will be authenticated against.
|
| options/nixos/services.oauth2-proxy.enable | Whether to enable oauth2-proxy.
|
| options/home-manager/services.pizauth.enable | Whether to enable Pizauth, a commandline OAuth2 authentication daemon
.
|
| options/nixos/services.oauth2-proxy.clientID | The OAuth Client ID.
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.plugin | Plugin path to load, should be a .so file.
|
| options/nixos/security.pam.u2f.settings.authfile | By default pam-u2f module reads the keys from
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set)
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/home-manager/services.pizauth.package | The pizauth package to use.
|
| options/nixos/services.chisel-server.authfile | Path to auth.json file
|
| options/nixos/services.oauth2-proxy.tls.enable | Whether to serve over TLS.
|
| options/home-manager/pam.yubico.authorizedYubiKeys.path | File path to write the authorized YubiKeys,
relative to HOME.
|
| options/nixos/services.oauth2-proxy.github.org | Restrict logins to members of this organisation.
|
| options/home-manager/programs.lapce.plugins.*.author | Author of the plugin.
|
| options/home-manager/pam.yubico.authorizedYubiKeys.ids | List of authorized YubiKey token IDs
|
| options/nixos/services.geth.<name>.authrpc.vhosts | List of virtual hostnames from which to accept requests.
|
| options/nixos/services.oauth2-proxy.keyFile | oauth2-proxy allows passing sensitive configuration via environment variables
|
| options/nixos/services.oauth2-proxy.package | The oauth2-proxy package to use.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/networking.wireless.networks.<name>.authProtocols | The list of authentication protocols accepted by this network
|
| options/nixos/services.oauth2-proxy.oidcIssuerUrl | The OAuth issuer URL.
|
| options/nixos/services.oauth2-proxy.cookie.name | The name of the cookie that the oauth_proxy creates.
|
| options/nixos/services.oauth2-proxy.github.team | Restrict logins to members of this team.
|
| options/nixos/services.oauth2-proxy.nginx.proxy | The address of the reverse proxy endpoint for oauth2-proxy
|
| options/nixos/services.oauth2-proxy.profileURL | Profile access endpoint.
|
| options/nixos/services.tailscale.authKeyParameters.ephemeral | Whether to register as an ephemeral node.
|
| options/nixos/services.oauth2-proxy.loginURL | Authentication endpoint
|
| options/nixos/services.oauth2-proxy.proxyPrefix | The url root path that this proxy should be nested under.
|
| options/nixos/services.oauth2-proxy.extraConfig | Extra config to pass to oauth2-proxy.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| options/nixos/services.outline.oidcAuthentication.authUrl | OIDC authentication URL endpoint.
|
| options/nixos/boot.initrd.network.ssh.authorizedKeys | Authorized keys for the root user on initrd
|
| options/home-manager/services.pizauth.extraConfig | Additional global configuration
|
| options/home-manager/services.pizauth.accounts | Pizauth accounts that should be configured
|
| options/nixos/services.oauth2-proxy.passHostHeader | Pass the request Host Header to upstream.
|
| options/nixos/services.oauth2-proxy.provider | OAuth provider.
|
| options/nixos/services.oauth2-proxy.cookie.httpOnly | Set HttpOnly cookie flag.
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.denySpecialChars | Automatically disallow all clients using #
or + in their name/id.
|
| options/nixos/services.oauth2-proxy.clientSecret | The OAuth Client Secret.
|
| options/nixos/services.oauth2-proxy.azure.tenant | Go to a tenant-specific or common (tenant-independent) endpoint.
|
| options/nixos/services.saslauthd.config | Configuration to use for Cyrus SASL authentication daemon.
|
| options/nixos/services.oauth2-proxy.cookie.expire | Expire timeframe for cookie.
|
| options/nixos/services.saslauthd.enable | Whether to enable saslauthd, the Cyrus SASL authentication daemon.
|
| options/nixos/boot.initrd.network.ssh.authorizedKeyFiles | Authorized keys taken from files for the root user on initrd
|
| options/nixos/services.oauth2-proxy.redirectURL | The OAuth2 redirect URL.
|
| options/nixos/services.oauth2-proxy.cookie.secret | The seed string for secure cookies.
|
| options/nixos/services.oauth2-proxy.redeemURL | Token redemption endpoint
|
| options/nixos/services.oauth2-proxy.google.groups | Restrict logins to members of these Google groups.
|
| options/nixos/services.oauth2-proxy.cookie.secure | Set secure (HTTPS) cookie flag.
|
| options/nixos/services.oauth2-proxy.skipAuthRegexes | Skip authentication for requests matching any of these regular
expressions.
|
| options/nixos/services.nipap.nipap-www.xmlrpcURIFile | Path to file containing XMLRPC URI for use by web UI - this is a secret, since it contains auth credentials
|
| options/nixos/services.saslauthd.package | The bin package to use.
|
| options/nixos/services.oauth2-proxy.email.domains | Authenticate emails with the specified domains
|
| options/nixos/services.oauth2-proxy.passAccessToken | Pass OAuth access_token to upstream via X-Forwarded-Access-Token header.
|
| options/nixos/services.oauth2-proxy.clientSecretFile | The path to a file containing the OAuth Client Secret.
|
| options/nixos/services.oauth2-proxy.upstream | The http url(s) of the upstream endpoint or file://
paths for static files
|
| options/nixos/services.oauth2-proxy.httpAddress | HTTPS listening address
|
| options/nixos/services.iperf3.authorizedUsersFile | Path to the configuration file containing authorized users credentials to run iperf tests.
|
| options/nixos/services.oauth2-proxy.azure.resource | The resource that is protected.
|
| options/nixos/services.oauth2-proxy.cookie.refresh | Refresh the cookie after this duration; 0 to disable.
|
| options/nixos/services.oauth2-proxy.cookie.secretFile | The path to a file containing the seed string for secure cookies.
|
| options/nixos/services.geth.<name>.authrpc.jwtsecret | Path to a JWT secret for authenticated RPC endpoint.
|
| options/nixos/services.oauth2-proxy.requestLogging | Log requests to stdout.
|
| options/nixos/services.oauth2-proxy.approvalPrompt | OAuth approval_prompt.
|
| options/nixos/services.oauth2-proxy.signatureKey | GAP-Signature request signature key.
|
| options/nixos/services.oauth2-proxy.htpasswd.file | Additionally authenticate against a htpasswd file
|
| options/nixos/services.oauth2-proxy.tls.httpsAddress | addr:port to listen on for HTTPS clients
|
| options/home-manager/services.pizauth.accounts.<name>.name | Unique identifier of the account
|
| options/nixos/services.oauth2-proxy.cookie.domain | Optional cookie domains to force cookies to (ie: .yourcompany.com)
|
| options/nixos/services.prometheus.exporters.collectd.collectdBinary.authFile | File mapping user names to pre-shared keys (passwords).
|
| options/home-manager/services.pizauth.accounts.<name>.tokenUri | The OAuth2 server's token URI.
|
| options/nixos/services.authelia.instances | Multi-domain protection currently requires multiple instances of Authelia
|
| options/nixos/services.oauth2-proxy.nginx.domain | The domain under which the oauth2-proxy will be accesible and the path of cookies are set to
|
| options/nixos/services.authelia.instances.<name>.user | The name of the user for this authelia instance.
|
| options/nixos/services.oauth2-proxy.validateURL | Access token validation endpoint
|
| options/nixos/services.opkssh.authorizations | User authorization mappings
|
| options/nixos/services.opkssh.authorizations.*.user | Linux user to authorize
|
| options/home-manager/services.pizauth.accounts.<name>.clientId | The OAuth2 client ID.
|
| options/home-manager/services.pizauth.accounts.<name>.loginHint | An optional login hint for the account provider.
|
| options/nixos/services.sftpgo.settings.smtp.auth_type |
0: Plain
1: Login
2: CRAM-MD5
|
| options/nixos/services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| options/nixos/services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| options/nixos/services.oauth2-proxy.email.addresses | Line-separated email addresses that are allowed to authenticate.
|
| options/nixos/services.oauth2-proxy.reverseProxy | In case when running behind a reverse proxy, controls whether headers
like X-Real-Ip are accepted
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts | Nginx virtual hosts to put behind the oauth2 proxy
|
| options/nixos/services.prosody.modules.saslauth | Authentication for clients and servers
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| options/nixos/services.grafana-to-ntfy.settings.bauthPass | The path to the password you will use in the Grafana webhook settings.
|
| options/home-manager/programs.git-credential-oauth.enable | Whether to enable Git authentication handler for OAuth.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter_config.clientSecretFile | A file containing a the client secret for an openid_connect adapter
|
| options/nixos/services.authelia.instances.<name>.enable | Whether to enable Authelia instance.
|
| options/nixos/services.oauth2-proxy.customTemplatesDir | Path to custom HTML templates.
|
| options/nixos/services.cjdns.authorizedPasswords | Any remote cjdns nodes that offer these passwords on
connection will be allowed to route through this node.
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| options/nixos/services.openssh.authorizedKeysCommandUser | Specifies the user under whose account the AuthorizedKeysCommand
is run
|
| options/nixos/services.prosody.authentication | Authentication mechanism used for logins.
|
| options/nixos/services.oauth2-proxy.google.adminEmail | The Google Admin to impersonate for API calls
|
| options/nixos/services.grafana-to-ntfy.settings.bauthUser | The user that you will authenticate with in the Grafana webhook settings
|
| options/nixos/services.wg-access-server.secretsFile | yaml file containing all secrets. this needs to be in the same structure as the configuration
|
| options/nixos/services.mastodon.smtp.authenticate | Authenticate with the SMTP server using username and password.
|
| options/nixos/services.gitlab.smtp.authentication | Authentication type to use, see http://api.rubyonrails.org/classes/ActionMailer/Base.html
|
| options/home-manager/programs.git-credential-oauth.package | The git-credential-oauth package to use.
|
| options/nixos/services.opkssh.authorizations.*.issuer | Issuer URI
|
| options/nixos/services.authelia.instances.<name>.package | The authelia package to use.
|
| options/nixos/services.openssh.authorizedKeysCommand | Specifies a program to be used to look up the user's public
keys
|
| options/nixos/services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| options/nixos/services.oauth2-proxy.htpasswd.displayForm | Display username / password login form if an htpasswd file is provided.
|
| options/home-manager/services.pizauth.accounts.<name>.clientSecret | The OAuth2 client secret.
|
| options/nixos/services.alerta.authenticationRequired | Whether users must authenticate when using the web UI or command-line tool
|
| options/home-manager/services.pizauth.accounts.<name>.scopes | The scopes which the OAuth2 token will give access to
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/home-manager/services.pizauth.accounts.<name>.extraConfig | Additional configuration that will be added to the account configuration
|
| options/nixos/services.oauth2-proxy.tls.certificate | Path to certificate file.
|
| options/nixos/services.oauth2-proxy.google.serviceAccountJSON | The path to the service account JSON credentials.
|
| options/home-manager/programs.git-credential-oauth.extraFlags | Extra command-line arguments passed to git-credential-oauth
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params | Sets the oauth2 params if authentication mechanism oauthbearer or
xoauth2 is used
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params | Sets the oauth2 params if authentication mechanism oauthbearer or
xoauth2 is used
|
| options/nixos/security.pam.sshAgentAuth.authorizedKeysFiles | A list of paths to files in OpenSSH's authorized_keys format, containing
the keys that will be trusted by the pam_ssh_agent_auth module
|
| options/nixos/services.kanidm.provision.systems.oauth2 | Provisioning of oauth2 resource servers
|
| options/nixos/users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/services.icingaweb2.authentications | authentication.ini contents
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient | See torrc manual.
|
| options/nixos/security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.scope | The OAuth2 requested scope.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.scope | The OAuth2 requested scope.
|
| options/nixos/services.prosody.modules.legacyauth | Legacy authentication
|
| options/nixos/security.pam.ussh.authorizedPrincipals | Comma-separated list of authorized principals to permit; if the user
presents a certificate with one of these principals, then they will be
authorized
|
| options/nixos/services.athens.basicAuthUser | Username for basic auth.
|
| options/nixos/services.jupyterhub.authentication | Jupyterhub authentication to use
There are many authenticators available including: oauth, pam,
ldap, kerberos, etc.
|
| options/nixos/security.pam.ussh.authorizedPrincipalsFile | Path to a list of principals; if the user presents a certificate with
one of these principals, then they will be authorized
|
| options/nixos/services.jitsi-meet.secureDomain.authentication | The authentication type to be used by jitsi
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/services.authelia.instances.<name>.settings.theme | The theme to display.
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".oauth-client-id | hg.sr.ht's OAuth client id for meta.sr.ht.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.authentication | The authentication mechanism.
|
| options/home-manager/accounts.email.accounts.<name>.imap.authentication | The authentication mechanism.
|
| options/nixos/services.opkssh.authorizations.*.principal | Principal identifier (email, repo, etc.)
|
| options/nixos/services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| options/nixos/services.sourcehut.settings."man.sr.ht".oauth-client-id | man.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."git.sr.ht".oauth-client-id | git.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."hub.sr.ht".oauth-client-id | hub.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| options/nixos/services.sourcehut.settings."todo.sr.ht".oauth-client-id | todo.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.authelia.instances.<name>.settings.log.level | Level of verbosity for logs.
|
| options/nixos/services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| options/nixos/services.athens.basicAuthPass | Password for basic auth
|
| options/nixos/services.sourcehut.settings."lists.sr.ht".oauth-client-id | lists.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".oauth-client-id | pages.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."paste.sr.ht".oauth-client-id | paste.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeys | Public SSH keys that are given full write access to this repository
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizedClients | Authorized clients for a v3 onion service,
as a list of public key, in the format:
descriptor:x25519:<base32-public-key>
See torrc manual.
|
| options/nixos/services.authelia.instances.<name>.settings.log.format | Format the logs are written as.
|
| options/nixos/services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| options/nixos/services.mailman.ldap.enable | Whether to enable LDAP auth.
|
| options/nixos/services.sourcehut.settings."builds.sr.ht".oauth-client-id | builds.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".oauth-client-secret | hg.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| options/nixos/services.sourcehut.settings."git.sr.ht".oauth-client-secret | git.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."hub.sr.ht".oauth-client-secret | hub.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."man.sr.ht".oauth-client-secret | man.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.guix.substituters.authorizedKeys | A list of signing keys for each substitute server to be authorized as
a source of substitutes
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.public | Whether this is a public client (enforces PKCE, doesn't use a basic secret)
|
| options/home-manager/programs.hexchat.channels.<name>.loginMethod | The login method
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| options/nixos/services.davis.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.movim.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.slskd.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.sourcehut.settings."todo.sr.ht".oauth-client-secret | todo.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.scopeMaps | Maps kanidm groups to returned oauth scopes
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originUrl | The redirect URL of the service
|
| options/nixos/services.snipe-it.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.keycloak.settings.http-relative-path | The path relative to / for serving
resources.
In versions of Keycloak using Wildfly (<17),
this defaulted to /auth
|
| options/nixos/services.pinchflat.secretsFile | Secrets like SECRET_KEY_BASE and BASIC_AUTH_PASSWORD
should be passed to the service without adding them to the world-readable Nix store
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities | Section defining complementary attributes of certification authorities, each
in its own subsection with an arbitrary yet unique name
|
| options/nixos/services.discourse.mail.outgoing.authentication | Authentication type to use, see https://api.rubyonrails.org/classes/ActionMailer/Base.html
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps | Adds additional claims (and values) based on which kanidm groups an authenticating party belongs to
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.clientNames | Only clients that are listed here are authorized to access the hidden service
|
| options/nixos/services.sourcehut.settings."lists.sr.ht".oauth-client-secret | lists.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."paste.sr.ht".oauth-client-secret | paste.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".oauth-client-secret | pages.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_id | The OAuth2 client identifier.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_id | The OAuth2 client identifier.
|
| options/nixos/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/darwin/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.present | Whether to ensure that this oauth2 resource server is present or absent.
|
| options/nixos/services.radicle.publicKey | An SSH public key (as an absolute file path or directly as a string),
usually generated by rad auth.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.displayName | Display name
|
| options/nixos/services.tt-rss.singleUserMode | Operate in single user mode, disables all functionality related to
multiple users and authentication
|
| options/nixos/services.tailscaleAuth.user | User which runs tailscale-nginx-auth
|
| options/nixos/services.kubernetes.apiserver.authorizationMode | Kubernetes apiserver authorization mode (AlwaysAllow/AlwaysDeny/ABAC/Webhook/RBAC/Node)
|
| options/nixos/services.authelia.instances.<name>.settings.server.address | The address to listen on.
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeysAppendOnly | Public SSH keys that can only be used to append new data (archives) to the repository
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth | Sets the Authorization header on every remote read request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/services.gancio.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.sourcehut.settings."builds.sr.ht".oauth-client-secret | builds.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.prometheus.scrapeConfigs.*.authorization | Sets the Authorization header on every scrape request with the configured credentials.
|
| options/nixos/services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.kubernetes.apiserver.authorizationPolicy | Kubernetes apiserver authorization policy file
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth | Sets the Authorization header on every remote write request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.imageFile | Application image to display in the WebUI
|
| options/nixos/services.oncall.settings.db.conn.require_auth | Whether authentication is required to access the web app.
|
| options/nixos/services.tailscaleAuth.group | Group which runs tailscale-nginx-auth
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth | EAP secret section for a specific secret
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.basicSecretFile | The basic secret to use for this service
|
| options/nixos/services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.joinType | Determines how multiple values are joined to create the claim value
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth | Sets the Authorization header on every scrape request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/services.davis.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.movim.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.slskd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originLanding | When redirecting from the Kanidm Apps Listing page, some linked applications may need to land on a specific page to trigger oauth2/oidc interactions.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.valuesByGroup | Maps kanidm groups to values for the claim.
|
| options/nixos/services.plausible.mail.smtp.user | The username/email in case SMTP auth is enabled.
|
| options/nixos/services.snipe-it.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cacert | The certificates may use a relative path from the swanctl
x509ca directory or an absolute path
|
| options/nixos/services.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate users via tailscale.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLegacyCrypto | Enable legacy crypto on this client
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.password | HTTP password
|
| packages/nixpkgs/python313Packages.gotrue | Python Client Library for Supabase Auth |
| packages/nixpkgs/python314Packages.gotrue | Python Client Library for Supabase Auth |
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.crl_uris | List of CRL distribution points (ldap, http, or file URI)
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saeAddToMacAllow | If set, all sae password entries that have a non-wildcard MAC associated to
them will additionally be used to populate the MAC allow list
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.username | HTTP username
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.preferShortUsername | Use 'name' instead of 'spn' in the preferred_username claim
|
| options/nixos/services.librenms.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.agorakit.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.cachix-watch-store.cachixTokenFile | Required file that needs to contain the cachix auth token.
|
| options/nixos/services.fluidd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.akkoma.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gancio.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.dolibarr.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.kanboard.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fediwall.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.tailscaleAuth.package | The tailscale-nginx-auth package to use.
|
| options/nixos/services.mainsail.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.pixelfed.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.authentication_method | The authentication method, either OAuth or ManagedIdentity
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.ocsp_uris | List of OCSP URIs
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| options/nixos/services.authelia.instances.<name>.settings.log.keep_stdout | Whether to also log to stdout when a file_path is defined.
|
| options/nixos/services.gitlab-runner.services.<name>.authenticationTokenConfigFile | Absolute path to a file containing environment variables used for
gitlab-runner registrations with runner authentication tokens
|
| options/nixos/services.draupnir.secrets.web.synapseHTTPAntispam.authorization | File containing the secret token when using the Synapse HTTP Antispam module
to be used in place of
services.draupnir.settings.web.synapseHTTPAntispam.authorization
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| options/nixos/services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| options/nixos/services.freeciv.settings.Guests | Whether to enable guests to login if auth is enabled.
|
| options/nixos/services.radicle.httpd.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.removeOrphanedClaimMaps | Whether claim maps not specified here but present in kanidm should be removed from kanidm.
|
| options/nixos/services.nextcloud.settings.mail_smtpauth | This depends on mail_smtpmode
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.secret | Value of the EAP/XAuth secret
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.id | If this attribute is given with non-zero length, it will set the password identifier
for this entry
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth.password | HTTP password
|
| options/nixos/services.anuko-time-tracker.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| options/nixos/services.radicle.privateKeyFile | Absolute file path to an SSH private key,
usually generated by rad auth
|
| options/nixos/services.bookstack.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.nginx.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate nginx users via tailscale.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.mac | If this attribute is not included, or if is set to the wildcard address (ff:ff:ff:ff:ff:ff),
the entry is available for any station (client) to use
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.pk | If this attribute is given, SAE-PK will be enabled for this connection
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.vlanid | If this attribute is given, all clients using this entry will get tagged with the given VLAN ID.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_secret | The OAuth2 client secret.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_secret | The OAuth2 client secret.
|
| options/nixos/services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_emails | List of emails to allow access to this vhost, or null to allow all.
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_groups | List of groups to allow access to this vhost, or null to allow all.
|
| options/nixos/services.kanboard.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.librenms.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.dolibarr.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fediwall.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mainsail.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.pixelfed.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.jirafeau.nginxConfig.basicAuth | Basic Auth protection for a vhost
|
| packages/nixpkgs/python312Packages.gotrue | Python Client Library for Supabase Auth |
| options/nixos/services.influxdb2.provision.organizations.<name>.auths | API tokens to provision for the user in this organization.
|
| options/nixos/services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords | Sets allowed passwords for WPA3-SAE
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token_file | Optional authentication information for token-based authentication:
https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token
It is mutually exclusive with auth_token and other authentication mechanisms.
|
| options/nixos/services.radicle.httpd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.freeciv.settings.Newusers | Whether to enable new users to login if auth is enabled.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.token_endpoint | The OAuth2 token endpoint.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.token_endpoint | The OAuth2 token endpoint.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| options/nixos/services.anuko-time-tracker.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mongodb.initialRootPasswordFile | Path to the file containing the password for the root user if auth is enabled.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.allowInsecureClientDisablePkce | Disable PKCE on this oauth2 resource server to work around insecure clients
that may not support it
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.xauth_id | Client XAuth username used in the XAuth exchange.
|
| options/nixos/services.sabnzbd.settings.misc.inet_exposure | Restrictions for access from non-local IP addresses
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.id | A unique identifier for this authentication token
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| options/nixos/services.bookstack.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.passwordFile | The password for this entry, read from the given file when starting hostapd
|
| options/nixos/services.nginx.tailscaleAuth.virtualHosts | A list of nginx virtual hosts to put behind tailscale.nginx-auth
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.pairwiseCiphers | Set of accepted cipher suites (encryption algorithms) for pairwise keys (unicast packets)
|
| options/nixos/services.davis.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.plausible.mail.smtp.passwordFile | The path to the file with the password in case SMTP auth is enabled.
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.allAccess | Grants all permissions in the associated organization.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.tokenFile | The token value
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.password | The password for this entry
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.mode | Selects the authentication mode for this AP.
- "none": Don't configure any authentication
|
| options/nixos/services.vmagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.vlagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| options/nixos/services.jirafeau.nginxConfig.basicAuthFile | Basic Auth password file for a vhost
|
| packages/nixpkgs/passh | Sshpass alternative for non-interactive ssh auth |
| options/nixos/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.supplementaryScopeMaps | Maps kanidm groups to additionally returned oauth scopes
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.zammad.secretKeyBaseFile | The path to a file containing the
secret_key_base secret
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readBuckets | The organization's buckets which should be allowed to be read
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.operator | Grants all permissions in all organizations.
|
| options/nixos/services.calibre-web.options.reverseProxyAuth.header | Auth proxy header name.
|
| options/nixos/services.calibre-web.options.reverseProxyAuth.enable | Enable authorization using auth proxy.
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writeBuckets | The organization's buckets which should be allowed to be written
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cert_uri_base | Defines the base URI for the Hash and URL feature supported by
IKEv2
|
| options/nixos/services.vmagent.remoteWrite.basicAuthPasswordFile | File that contains the Basic Auth password used to connect to remote_write endpoint
|
| options/nixos/services.vlagent.remoteWrite.basicAuthPasswordFile | File that contains the Basic Auth password used to connect to remote_write endpoint
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.mattermost.database.peerAuth | If set, will use peer auth instead of connecting to a Postgres server
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth.password_file | HTTP password file
|
| packages/nixpkgs/globus-cli | Command-line interface to Globus REST APIs, including the Transfer API and the Globus Auth API |
| options/nixos/services.davis.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.movim.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.slskd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.snipe-it.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.teleport.insecure.enable | Whether to enable starting teleport in insecure mode
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.reauth_time | Time to schedule IKE reauthentication
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fluidd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fedimintd.<name>.nginx.config.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gancio.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.matomo.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.kubernetes.apiserver.clientCaFile | Kubernetes apiserver CA file for client auth.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token | Optional authentication information for token-based authentication:
https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token
It is mutually exclusive with auth_token_file and other authentication mechanisms.
|
| options/nixos/services.keycloak.database.passwordFile | The path to a file containing the database password
|
| options/nixos/services.limesurvey.nginx.virtualHost.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.sabnzbd.settings.misc.html_login | Prompt for login with an html login mask if enabled,
otherwise prompt for basic auth (useful for SSO)
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.discourse.secretKeyBaseFile | The path to a file containing the
secret_key_base secret
|
| options/nixos/services.victorialogs.basicAuthUsername | Basic Auth username used to protect VictoriaLogs instance by authorization
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.authentication.enableRecommendedPairwiseCiphers | Additionally enable the recommended set of pairwise ciphers
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth | Authentication information used to authenticate to the API server.
password and password_file are mutually exclusive.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.dolibarr.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.kanboard.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.librenms.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.agorakit.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.fediwall.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.mainsail.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.pixelfed.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.maubot.settings.homeservers | Known homeservers
|
| options/nixos/services.limesurvey.nginx.virtualHost.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| options/nixos/services.victorialogs.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaLogs instance by authorization
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.description | Optional description for the API token
|
| options/nixos/services.radicle.httpd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.anuko-time-tracker.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| packages/nixpkgs/sshpass | Non-interactive ssh password auth |
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.outline.azureAuthentication | To configure Microsoft/Azure auth, you'll need to create an OAuth
Client
|
| options/nixos/services.outline.oidcAuthentication | To configure generic OIDC auth, you'll need some kind of identity
provider
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/networking.wireless.networks.<name>.pskRaw | Either the raw pre-shared key in hexadecimal format
or the name of the secret (as defined inside
networking.wireless.secretsFile and prefixed
with ext:) containing the network pre-shared key.
Be aware that this will be written to the Nix store
in plaintext! Always use an external reference.
The external secret can be either the plaintext
passphrase or the raw pre-shared key.
Mutually exclusive with psk and auth.
|
| options/nixos/services.outline.slackAuthentication | To configure Slack auth, you'll need to create an Application at
https://api.slack.com/apps
When configuring the Client ID, add a redirect URL under "OAuth & Permissions"
to https://[publicUrl]/auth/slack.callback.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.outline.googleAuthentication | To configure Google auth, you'll need to create an OAuth Client ID at
https://console.cloud.google.com/apis/credentials
When configuring the Client ID, add an Authorized redirect URI to
https://[publicUrl]/auth/google.callback.
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.outline.discordAuthentication | To configure Discord auth, you'll need to create an application at
https://discord.com/developers/applications/
See https://docs.getoutline.com/s/hosting/doc/discord-g4JdWFFub6
for details on setting up your Discord app.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.victoriatraces.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaTraces instance by authorization
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.victoriametrics.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaMetrics instance by authorization
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.type | Sets the authentication type
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization | Optional Authorization header configuration.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| packages/nixpkgs/python313Packages.garth | Garmin SSO auth and connect client |
| packages/nixpkgs/python314Packages.garth | Garmin SSO auth and connect client |
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| packages/nixpkgs/perlPackages.PlackMiddlewareAuthDigest | Digest authentication |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password_file | HTTP password file
|
| packages/nixpkgs/perl5Packages.PlackMiddlewareAuthDigest | Digest authentication |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials | Sets the credentials
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password_file | HTTP password file
|
| packages/nixpkgs/python312Packages.garth | Garmin SSO auth and connect client |
| packages/nixpkgs/python313Packages.httpie-ntlm | NTLM auth plugin for HTTPie |
| packages/nixpkgs/python314Packages.httpie-ntlm | NTLM auth plugin for HTTPie |
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| packages/nixpkgs/python313Packages.duo-client | Python library for interacting with the Duo Auth, Admin, and Accounts APIs |
| packages/nixpkgs/python314Packages.duo-client | Python library for interacting with the Duo Auth, Admin, and Accounts APIs |
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password | HTTP password
|
| packages/nixpkgs/python313Packages.globus-sdk | Interface to Globus REST APIs, including the Transfer API and the Globus Auth API |
| packages/nixpkgs/python314Packages.globus-sdk | Interface to Globus REST APIs, including the Transfer API and the Globus Auth API |
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| packages/nixpkgs/python313Packages.fastapi-mcp | Expose your FastAPI endpoints as Model Context Protocol (MCP) tools, with Auth |
| packages/nixpkgs/python314Packages.fastapi-mcp | Expose your FastAPI endpoints as Model Context Protocol (MCP) tools, with Auth |
| packages/nixpkgs/haskellPackages.hsoz | Iron, Hawk, Oz: Web auth protocols |
| packages/nixpkgs/perl540Packages.PlackMiddlewareAuthDigest | Digest authentication |
| packages/nixpkgs/perl538Packages.PlackMiddlewareAuthDigest | Digest authentication |
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password_file | HTTP password file
|
| packages/nixpkgs/python312Packages.httpie-ntlm | NTLM auth plugin for HTTPie |
| packages/nixpkgs/python312Packages.duo-client | Python library for interacting with the Duo Auth, Admin, and Accounts APIs |
| packages/nixpkgs/python313Packages.tokenlib | Generic support library for signed-token-based auth schemes |
| packages/nixpkgs/python314Packages.tokenlib | Generic support library for signed-token-based auth schemes |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| packages/nixpkgs/python312Packages.globus-sdk | Interface to Globus REST APIs, including the Transfer API and the Globus Auth API |
| packages/nixpkgs/perlPackages.NetSMTPTLS | SMTP client supporting TLS and AUTH |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| packages/nixpkgs/perl5Packages.NetSMTPTLS | SMTP client supporting TLS and AUTH |
| packages/nixpkgs/matrix-synapse-plugins.matrix-synapse-pam | PAM auth provider for the Synapse Matrix server |
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| packages/nixpkgs/python312Packages.fastapi-mcp | Expose your FastAPI endpoints as Model Context Protocol (MCP) tools, with Auth |
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| packages/nixpkgs/matrix-synapse-plugins.matrix-synapse-ldap3 | LDAP3 auth provider for Synapse |
| packages/nixpkgs/python312Packages.tokenlib | Generic support library for signed-token-based auth schemes |
| packages/nixpkgs/perl538Packages.NetSMTPTLS | SMTP client supporting TLS and AUTH |
| packages/nixpkgs/perl540Packages.NetSMTPTLS | SMTP client supporting TLS and AUTH |
| options/nixos/services.stash.settings.dangerous_allow_public_without_auth | Learn more at https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/
|
| packages/nixpkgs/perlPackages.NetSMTPTLSButMaintained | SMTP client supporting TLS and AUTH (DEPRECATED, use Net::SMTPS instead) |
| packages/nixpkgs/haskellPackages.amazonka-contrib-rds-utils | A Haskell equivalent of "aws rds generate-db-auth-token" |
| packages/nixpkgs/perl5Packages.NetSMTPTLSButMaintained | SMTP client supporting TLS and AUTH (DEPRECATED, use Net::SMTPS instead) |
| packages/nixpkgs/perl538Packages.NetSMTPTLSButMaintained | SMTP client supporting TLS and AUTH (DEPRECATED, use Net::SMTPS instead) |
| packages/nixpkgs/perl540Packages.NetSMTPTLSButMaintained | SMTP client supporting TLS and AUTH (DEPRECATED, use Net::SMTPS instead) |
| packages/nixpkgs/globalprotect-openconnect | GlobalProtect VPN client (GUI) for Linux based on OpenConnect that supports SAML auth mode |
| options/nixos/services.tt-rss.plugins | List of plugins to load automatically for all users
|
| options/nixos/security.googleOsLogin.enable | Whether to enable Google OS Login
|
| options/nixos/security.pam.services.<name>.p11Auth | If set, keys listed in
~/.ssh/authorized_keys and
~/.eid/authorized_certificates
can be used to log in with the associated PKCS#11 tokens.
|
| options/home-manager/accounts.email.certificatesFile | Path to default file containing certificate authorities that
should be used to validate the connection authenticity
|
| options/home-manager/programs.sftpman.mounts.<name>.sshKey | Path to the SSH key to use for authentication
|
| options/nixos/security.polkit.adminIdentities | Specifies which users are considered “administrators”, for those
actions that require the user to authenticate as an
administrator (i.e. have an auth_admin
value)
|
| options/nixos/services.hostapd.enable | Whether to enable hostapd, a user space daemon for access point and
authentication servers
|
| options/nixos/security.duosec.fallbackLocalIP | Duo Unix reports the IP address of the authorizing user, for
the purposes of authorization and whitelisting
|
| options/nixos/services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/nixos/security.pam.services.<name>.sshAgentAuth | If set, the calling user's SSH agent is used to authenticate
against the keys in the calling user's
~/.ssh/authorized_keys
|
| options/nixos/security.pam.dp9ik.enable | Whether to enable the dp9ik pam module provided by tlsclient
|
| options/nixos/security.pam.howdy.enable | Whether to enable the Howdy PAM module
|
| options/nixos/services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.prosody.s2sInsecureDomains | Some servers have invalid or self-signed certificates
|
| options/nixos/services.postgresql.ensureUsers | Ensures that the specified users exist
|
| options/darwin/services.postgresql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.cntlm.proxy | A list of NTLM/NTLMv2 authenticating HTTP proxies
|
| options/nixos/services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration with runner registration
tokens
|
| options/nixos/security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| options/nixos/services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| options/nixos/security.pam.krb5.enable | Enables Kerberos PAM modules (pam-krb5,
pam-ccreds)
|
| options/nixos/services.prosody.s2sRequireEncryption | Force servers to use encrypted connections? This option will
prevent servers from authenticating unless they are using encryption
|
| options/nixos/services.postgrest.pgpassFile | The password to authenticate to PostgreSQL with
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote | Section for a remote authentication round
|
| options/home-manager/services.pbgopy.httpAuth | Basic HTTP authentication's username and password
|
| options/nixos/services.postgres-websockets.pgpassFile | The password to authenticate to PostgreSQL with
|
| options/nixos/services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| options/nixos/services.dependency-track.oidc.userProvisioning | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| options/nixos/services.headscale.settings.oidc.allowed_domains | Allowed principal domains. if an authenticated user's domain
is not in this list authentication request will be rejected.
|
| options/darwin/security.pam.services.sudo_local.watchIdAuth | Use Apple Watch for sudo authentication, for devices without Touch ID or
laptops with lids closed, consider using this
|
| options/nixos/services.dependency-track.settings."alpine.oidc.user.provisioning" | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| options/nixos/security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| options/nixos/security.pam.yubico.enable | Enables Yubico PAM (yubico-pam) module
|
| options/nixos/services.nsd.enable | Whether to enable NSD authoritative DNS server.
|
| options/nixos/services.knot.enable | Whether to enable Knot authoritative-only DNS server.
|
| options/nixos/security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| options/nixos/security.pki.caBundle | (Read-only) the path to the final bundle of certificate authorities as a single file.
|
| options/nixos/security.doas.extraRules.*.persist | If true, do not ask for a password again for some
time after the user successfully authenticates.
|
| options/nixos/security.duosec.prompts | If a user fails to authenticate with a second factor, Duo
Unix will prompt the user to authenticate again
|
| options/nixos/services.bind.zones | List of zones we claim authority over.
|
| options/nixos/services.netbird.server.dashboard.settings | An attribute set that will be used to substitute variables when building the dashboard
|
| options/nixos/boot.initrd.luks.gpgSupport | Enables support for authenticating with a GPG encrypted password.
|
| options/nixos/security.pam.ussh.group | If set, then the authenticating user must be a member of this group
to use this module.
|
| options/nixos/services.pdns-recursor.forwardZones | DNS zones to be forwarded to other authoritative servers.
|
| options/nixos/services.step-ca.port | The port the certificate authority should listen on
|
| options/nixos/security.pam.rssh.enable | Whether to enable authenticating using a signature performed by the ssh-agent.
|
| options/nixos/boot.initrd.luks.fido2Support | Enables support for authenticating with FIDO2 devices.
|
| options/nixos/services.step-ca.enable | Whether to enable the smallstep certificate authority server.
|
| options/nixos/services.strongswan.ca | A set of CAs (certification authorities) and their options for
the ‘ca xxx’ sections of the ipsec.conf
file.
|
| options/nixos/services.rutorrent.nginx.exposeInsecureRPC2mount | If you do not enable one of the rpc or httprpc plugins you need to expose an RPC mount through scgi using this option
|
| options/nixos/services.bcg.mqtt.cafile | Certificate Authority file for MQTT server access.
|
| options/nixos/services.dnscache.domainServers | Table of {hostname: server} pairs to use as authoritative servers for hosts (and subhosts)
|
| options/nixos/services.skydns.nameservers | Skydns list of nameservers to forward DNS requests to when not authoritative for a domain.
|
| options/nixos/users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| options/nixos/users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| options/nixos/services.skydns.etcd.caCert | Skydns path of TLS certificate authority public key.
|
| options/nixos/services.etcd.trustedCaFile | Certificate authority file to use for clients
|
| options/nixos/services.flannel.etcd.caFile | Etcd certificate authority file
|
| options/nixos/services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| options/nixos/services.pomerium.enable | Whether to enable the Pomerium authenticating reverse proxy.
|
| options/nixos/services.openssh.settings.UseDns | Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for
the remote IP address maps back to the very same IP address
|
| options/nixos/services.sympa.listMasters | The list of the email addresses of the listmasters
(users authorized to perform global server commands).
|
| options/nixos/services.step-ca.address | The address (without port) the certificate authority should listen at
|
| options/nixos/services.etcd.peerTrustedCaFile | Certificate authority file to use for peer to peer communication
|
| options/nixos/services.jitsi-meet.secureDomain.enable | Whether to enable Authenticated room creation.
|
| options/nixos/services.step-ca.openFirewall | Whether to enable opening the certificate authority server port.
|
| options/nixos/security.pam.sshAgentAuth.enable | Whether to enable authenticating using a signature performed by the ssh-agent
|
| options/nixos/boot.initrd.luks.yubikeySupport | Enables support for authenticating with a YubiKey on LUKS devices
|
| options/nixos/services.nebula.networks.<name>.ca | Path to the certificate authority certificate.
|
| options/nixos/services.hologram-server.roleAttr | Which LDAP group attribute to search for authorized role ARNs
|
| options/nixos/services.kubernetes.caFile | Default kubernetes certificate authority
|
| options/home-manager/programs.sbt.credentials.*.host | The hostname of the repository you're authenticating to.
|
| options/nixos/security.pam.services.<name>.ttyAudit.openOnly | Set the TTY audit flag when opening the session,
but do not restore it when closing the session
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| options/home-manager/programs.sbt.credentials.*.realm | The realm of the repository you're authenticating to.
|
| options/nixos/boot.initrd.luks.devices.<name>.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| options/nixos/services.postfix.tlsTrustedAuthorities | File containing trusted certification authorities (CA) to verify certificates of mailservers contacted for mail delivery
|
| options/nixos/services.irkerd.listenAddress | Specifies the bind address on which the irker daemon listens
|
| options/nixos/boot.initrd.systemd.emergencyAccess | Set to true for unauthenticated emergency access, and false or
null for no emergency access
|
| options/nixos/services.nitter.config.tokenCount | Minimum amount of usable tokens
|
| options/nixos/security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| options/nixos/services.mysql.galeraCluster.sstMethod | Method for the initial state transfer (wsrep_sst_method) when a node joins the cluster
|
| options/nixos/services.cfdyndns.email | The email address to use to authenticate to CloudFlare.
|
| options/nixos/services.duckdns.tokenFile | The path to a file containing the token
used to authenticate with DuckDNS.
|
| options/nixos/services.tor.client.onionServices.<name>.clientAuthorizations | Clients' authorizations for a v3 onion service,
as a list of files containing each one private key, in the format:
descriptor:x25519:<base32-private-key>
See torrc manual.
|
| options/nixos/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/darwin/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.aesmd.settings.whitelistUrl | URL to retrieve authorized Intel SGX enclave signers.
|
| options/nixos/services.grafana-to-ntfy.settings.ntfyBAuthUser | The ntfy-sh user to use for authenticating with the ntfy-sh instance
|
| options/nixos/services.glusterfs.tlsSettings.caCert | Path certificate authority used to sign the cluster certificates.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_id | Optional client ID
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tenant_id | Optional tenant ID
|
| options/home-manager/programs.sftpman.mounts.<name>.user | The username to authenticate with.
|
| options/nixos/services.prosody.c2sRequireEncryption | Force clients to use encrypted connections? This option will
prevent clients from authenticating unless they are using encryption.
|
| options/nixos/security.pam.services.<name>.rootOK | If set, root doesn't need to authenticate (e.g. for the
useradd service).
|
| options/nixos/services.cfdyndns.apiTokenFile | The path to a file containing the API Token
used to authenticate with CloudFlare.
|
| options/home-manager/services.ssh-agent.pkcs11Whitelist | Specify a list of approved path patterns for PKCS#11 and FIDO authenticator middleware libraries
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.cfdyndns.apikeyFile | The path to a file containing the API Key
used to authenticate with CloudFlare.
|
| options/nixos/services.aria2.rpcSecretFile | A file containing the RPC secret authorization token
|
| options/nixos/services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| options/nixos/services.outline.smtp.username | Username to authenticate with.
|
| options/nixos/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/darwin/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/home-manager/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/nixos/services.headscale.settings.oidc.pkce.enabled | Enable or disable PKCE (Proof Key for Code Exchange) support
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_secret | Optional client secret
|
| options/nixos/services.cjdns.UDPInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| options/nixos/services.cjdns.ETHInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| options/home-manager/programs.git.signing.key | The default signing key fingerprint
|
| options/nixos/security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| options/nixos/services.mastodon.elasticsearch.user | Used for optionally authenticating with Elasticsearch.
|
| options/nixos/services.mqtt2influxdb.mqtt.cafile | Certification Authority file for MQTT
|
| options/nixos/services.outline.smtp.passwordFile | File path containing the password to authenticate with.
|
| options/nixos/services.kubernetes.kubeconfig.caFile | Default kubeconfig certificate authority file used to connect to kube-apiserver.
|
| options/nixos/services.murmur.clientCertRequired | Whether to enable requiring clients to authenticate via certificates.
|
| options/nixos/services.lldap.enable | Whether to enable lldap, a lightweight authentication server that provides an opinionated, simplified LDAP interface for authentication.
|
| options/nixos/programs.light.brightnessKeys.minBrightness | The minimum authorized brightness value, e.g. to avoid the
display going dark.
|
| options/nixos/services.suwayomi-server.settings.server.basicAuthUsername | The username value that you have to provide when authenticating.
|
| options/home-manager/programs.sbt.credentials.*.user | The user you're using to authenticate.
|
| options/nixos/services.isso.enable | Whether to enable isso, a commenting server similar to Disqus
|
| options/nixos/security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| options/nixos/services.kubernetes.proxy.kubeconfig.caFile | Kubernetes proxy certificate authority file used to connect to kube-apiserver.
|
| options/nixos/services.suwayomi-server.settings.server.basicAuthPasswordFile | The password file containing the value that you have to provide when authenticating.
|
| options/nixos/services.sssd.sshAuthorizedKeysIntegration | Whether to make sshd look up authorized keys from SSS
|
| options/nixos/services.oncall.secretFile | A YAML file containing secrets such as database or user passwords
|
| options/nixos/services.headscale.settings.oidc.extra_params | Custom query parameters to send with the Authorize Endpoint request.
|
| options/nixos/services.kubernetes.kubelet.kubeconfig.caFile | Kubelet certificate authority file used to connect to kube-apiserver.
|
| options/nixos/services.tailscaleAuth.socketPath | Path of the socket listening to authorization requests.
|
| options/nixos/users.ldap.loginPam | Whether to include authentication against LDAP in login PAM.
|
| options/nixos/services.mastodon.elasticsearch.passwordFile | Path to file containing password for optionally authenticating with Elasticsearch.
|
| options/nixos/services.hickory-dns.settings.zones.*.zone_type | One of:
- "Primary" (the master, authority for the zone).
- "Secondary" (the slave, replicated from the primary).
- "External" (a cached zone that queries other nameservers)
|
| options/nixos/services.prometheus.exporters.unbound.unbound.ca | Path to the Unbound server certificate authority
|
| options/nixos/services.meme-bingo-web.enable | Whether to enable a web app for the meme bingo, rendered entirely on the web server and made interactive with forms
|
| options/nixos/services.firezone.server.smtp.username | Username to authenticate against the SMTP relay
|
| options/nixos/services.matrix-appservice-irc.settings.ircService.mediaProxy.signingKeyPath | Path to the signing key file for authenticated media.
|
| options/nixos/services.kubernetes.controllerManager.rootCaFile | Kubernetes controller manager certificate authority file included in
service account's token secret.
|
| options/nixos/services.nextcloud.settings.mail_smtpname | This depends on mail_smtpauth
|
| options/nixos/services.cloudflared.tunnels.<name>.originRequest.caPool | Path to the certificate authority (CA) for the certificate of your origin
|
| options/nixos/services.murmur.registerPassword | Public server registry password, used authenticate your
server to the registry to prevent impersonation; required for
subsequent registry updates.
|
| options/nixos/users.ldap.enable | Whether to enable authentication against an LDAP server.
|
| options/nixos/services.dependency-track.settings."alpine.database.username" | Specifies the username to use when authenticating to the database.
|
| options/nixos/services.redis.servers.<name>.masterAuth | If the master is password protected (using the requirePass configuration)
it is possible to tell the slave to authenticate before starting the replication synchronization
process, otherwise the master will refuse the slave request.
(STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| options/nixos/services.crowdsec-firewall-bouncer.registerBouncer.enable | Whether to automatically register the bouncer to the locally running
crowdsec service
|
| options/nixos/services.rkvm.client.settings.password | Shared secret token to authenticate the client
|
| options/nixos/services.rkvm.server.settings.password | Shared secret token to authenticate the client
|
| options/nixos/services.bacula-sd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| options/nixos/services.bacula-fd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| options/nixos/services.kubernetes.scheduler.kubeconfig.caFile | Kubernetes scheduler certificate authority file used to connect to kube-apiserver.
|
| options/nixos/services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| options/nixos/users.mysql.enable | Whether to enable authentication against a MySQL/MariaDB database.
|
| options/nixos/security.soteria.enable | Whether to enable Soteria, a Polkit authentication agent
for any desktop environment.
You should only enable this if you are on a Desktop Environment that
does not provide a graphical polkit authentication agent, or you are on
a standalone window manager or Wayland compositor.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local | Section for a local authentication round
|
| options/nixos/services.blackfire-agent.settings.server-id | Sets the server id used to authenticate with Blackfire
You can find your personal server-id at https://blackfire.io/my/settings/credentials
|
| options/nixos/services.prometheus.remoteWrite.*.sigv4.profile | The named AWS profile used to authenticate.
|
| options/nixos/services.vsftpd.userDbPath | Only applies if enableVirtualUsers is true
|
| options/nixos/services.blackfire-agent.settings.server-token | Sets the server token used to authenticate with Blackfire
You can find your personal server-token at https://blackfire.io/my/settings/credentials
|
| options/nixos/services.biboumi.settings.password | The password used to authenticate the XMPP component to your XMPP server
|
| options/nixos/services.kubernetes.controllerManager.kubeconfig.caFile | Kubernetes controller manager certificate authority file used to connect to kube-apiserver.
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exactPermissions | When enabled,
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.exactPermissions | When enabled,
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/home-manager/programs.floorp.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.floorp.profiles.<profile>.extensions.packages
in
programs.floorp.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/home-manager/programs.firefox.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.firefox.profiles.<profile>.extensions.packages
in
programs.firefox.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/services.prometheus.exporters.mqtt.mqttUsername | Username which should be used to authenticate against the MQTT broker.
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exactPermissions | When enabled,
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
must specify the exact set of permissions that the
extension will request
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/networking.openconnect.interfaces.<name>.user | Username to authenticate with.
|
| options/nixos/services.howdy.enable | Whether to enable Howdy and its PAM module for face recognition
|
| options/nixos/users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| options/home-manager/programs.librewolf.profiles.<name>.extensions.exhaustivePermissions | When enabled, the user must authorize requested
permissions for all extensions from
programs.librewolf.profiles.<profile>.extensions.packages
in
programs.librewolf.profiles.<profile>.extensions.settings.<extensionID>.permissions
|
| options/nixos/programs.ssh.macs | Specifies the MAC (message authentication code) algorithms in order of preference
|
| options/nixos/services.postgrest.jwtSecretFile | The secret or JSON Web Key (JWK) (or set) used to decode JWT tokens clients provide for authentication
|
| options/nixos/services.bitwarden-directory-connector-cli.ldap.username | The user to authenticate as.
|
| options/nixos/networking.supplicant | Interfaces for which to start wpa_supplicant
|
| options/nixos/services.db-rest.redis.user | Optional username used for authentication with redis.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors.<name>.email | The email address used to authenticate as this account
|
| options/nixos/networking.openconnect.interfaces.<name>.privateKey | Private key to authenticate with.
|
| options/nixos/services.tt-rss.email.login | SMTP authentication login used when sending outgoing mail.
|
| options/nixos/services.ncps.netrcFile | The path to netrc file for upstream authentication
|
| options/nixos/services.headscale.settings.oidc.allowed_users | Users allowed to authenticate even if not in allowedDomains.
|
| options/nixos/services.prometheus.exporters.klipper.moonrakerApiKey | API Key to authenticate with the Moonraker APIs
|
| options/nixos/services.etcd.clientCertAuth | Whether to use certs for client authentication
|
| options/nixos/services.opkssh.enable | Whether to enable OpenID Connect SSH authentication.
|
| options/nixos/services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| options/nixos/services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| options/nixos/services.outline.logo | Custom logo displayed on the authentication screen
|
| options/nixos/services.plantuml-server.httpAuthorization | When calling the proxy endpoint, the value of HTTP_AUTHORIZATION will be used to set the HTTP Authorization header.
|
| options/nixos/networking.openconnect.interfaces.<name>.passwordFile | File containing the password to authenticate with
|
| options/nixos/services.ttyd.username | Username for basic http authentication.
|
| options/nixos/users.mysql.pam.logging.enable | Enables logging of authentication attempts in the MySQL database.
|
| options/nixos/services.usbguard.restoreControllerDeviceState | The USBGuard daemon modifies some attributes of controller
devices like the default authorization state of new child device
instances
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| options/nixos/services.prometheus.remoteRead.*.bearer_token | Sets the Authorization header on every remote read request with
the configured bearer token
|
| options/nixos/services.openssh.banner | Message to display to the remote user before authentication is allowed.
|
| options/nixos/services.outline.smtp | To support sending outgoing transactional emails such as
"document updated" or "you've been invited" you'll need to provide
authentication for an SMTP server.
|
| options/nixos/services.prometheus.remoteWrite.*.bearer_token | Sets the Authorization header on every remote write request with
the configured bearer token
|
| options/nixos/networking.openconnect.interfaces.<name>.certificate | Certificate to authenticate with.
|
| options/nixos/services.erigon.secretJwtPath | Path to the secret jwt used for the http api authentication.
|
| options/nixos/services.factorio.token | Authentication token
|
| options/nixos/services.netbox.enableLdap | Enable LDAP-Authentication for Netbox
|
| options/nixos/services.chrony.enableNTS | Whether to enable Network Time Security authentication
|
| options/nixos/services.prometheus.scrapeConfigs.*.bearer_token | Sets the Authorization header on every scrape request with
the configured bearer token
|
| options/nixos/users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| options/nixos/services.graylog.elasticsearchHosts | List of valid URIs of the http ports of your elastic nodes
|
| options/nixos/services.coturn.secure-stun | Require authentication of the STUN Binding request
|
| options/nixos/services.opendkim.enable | Whether to enable OpenDKIM sender authentication system.
|
| options/nixos/services.mongodb.enableAuth | Enable client authentication
|
| options/nixos/services.gitea.metricsTokenFile | Path to a file containing the metrics authentication token.
|
| options/nixos/services.iperf3.rsaPrivateKey | Path to the RSA private key (not password-protected) used to decrypt authentication credentials from the client.
|
| options/nixos/security.shadow.enable | Enable the shadow authentication suite, which provides critical programs such as su, login, passwd
|
| options/nixos/services.tt-rss.email.password | SMTP authentication password used when sending outgoing mail.
|
| options/nixos/security.duosec.groups | If specified, Duo authentication is required only for users
whose primary group or supplementary group list matches one
of the space-separated pattern lists
|
| options/nixos/services.netbox.ldapConfigPath | Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
|
| options/nixos/services.nsd.keys.<name>.algorithm | Authentication algorithm for this key.
|
| options/nixos/services.portunus.enable | Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP.
|
| options/nixos/services.ttyd.passwordFile | File containing the password to use for basic http authentication
|
| options/nixos/services.gitea.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/security.pam.u2f.control | This option sets pam "control"
|
| options/nixos/security.duosec.failmode | On service or configuration errors that prevent Duo
authentication, fail "safe" (allow access) or "secure" (deny
access)
|
| options/nixos/security.pam.p11.control | This option sets pam "control"
|
| options/nixos/services.openssh.settings.UsePAM | Whether to enable PAM authentication.
|
| options/nixos/services.lavalink.password | The password for Lavalink's authentication in plain text.
|
| options/nixos/services.ncps.cache.redis.username | Redis username for authentication (for Redis ACL).
|
| options/nixos/services.ncps.cache.redis.password | Redis password for authentication (for Redis ACL).
|
| options/nixos/security.pam.ussh.control | This option sets pam "control"
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.password_file | Path to a file which contains the password to authenticate with the target device
|
| options/nixos/services.misskey.settings.db.user | The user used for database authentication.
|
| options/nixos/services.misskey.settings.db.pass | The password used for database authentication.
|
| options/nixos/services.podgrab.passwordFile | The path to a file containing the PASSWORD environment variable
definition for Podgrab's authentication.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.password | Credentials are used to authenticate the requests to Uyuni API.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username | Credentials are used to authenticate the requests to Uyuni API.
|
| options/nixos/programs.ssh.pubkeyAcceptedKeyTypes | Specifies the key lib.types that will be used for public key authentication.
|
| options/nixos/services.moodle.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.dovecot2.showPAMFailure | Whether to enable showing the PAM failure message on authentication error (useful for OTPW).
|
| options/nixos/services.grafana.settings.smtp.user | User used for authentication.
|
| options/nixos/services.kapacitor.alerta.token | Default Alerta authentication token
|
| options/nixos/services.slurm.server.enable | Whether to enable the slurm control daemon
|
| options/nixos/services.prosody.s2sSecureAuth | Force certificate authentication for server-to-server connections?
This provides ideal security, but requires servers you communicate
with to support encryption AND present valid, trusted certificates
|
| options/nixos/services.zabbixWeb.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.boinc.allowRemoteGuiRpc | If set to true, any remote host can connect to and control this BOINC
client (subject to password authentication)
|
| options/nixos/services.ncps.cache.redis.passwordFile | File containing the redis password for authentication (for Redis ACL).
|
| options/nixos/services.magnetico.web.credentials | The credentials to access the web interface, in case authentication is
enabled, in the format username:hash
|
| options/nixos/security.pam.yubico.control | This option sets pam "control"
|
| options/nixos/services.peering-manager.enableOidc | Enable OIDC-Authentication for Peering Manager
|
| options/nixos/services.forgejo.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.redmine.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.peering-manager.enableLdap | Enable LDAP-Authentication for Peering Manager
|
| options/home-manager/programs.senpai.config.password | Your password, used for SASL authentication
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardAgent | Whether the connection to the authentication agent (if any)
will be forwarded to the remote machine.
|
| options/home-manager/programs.pianobar.settings.user | Username or emaill address for Pandora music service authentication
|
| options/nixos/programs.i3lock.u2fSupport | Whether to enable U2F support in the i3lock program
|
| options/nixos/services.neo4j.ssl.policies.<name>.clientAuth | The client authentication stance for this policy.
|
| options/nixos/services.librenms.settings | Attrset of the LibreNMS configuration
|
| options/nixos/services.zabbixProxy.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.prometheus.remoteRead.*.bearer_token_file | Sets the Authorization header on every remote read request with the bearer token
read from the configured file
|
| options/nixos/services.cassandra.remoteJmx | Cassandra ships with JMX accessible only from localhost
|
| options/nixos/services.rspamd-trainer.settings | IMAP authentication configuration for rspamd-trainer
|
| options/nixos/services.prometheus.remoteWrite.*.bearer_token_file | Sets the Authorization header on every remote write request with the bearer token
read from the configured file
|
| options/nixos/services.kimai.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.gotenberg.enableBasicAuth | HTTP Basic Authentication
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapAuth | Sets the authentication mechanism if imap is used as the incoming
method
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpAuth | Sets the authentication mechanism if smtp is used as the outgoing
method
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.id | IKE identity to use for authentication round
|
| options/nixos/security.pam.services.<name>.logFailures | Whether to log authentication failures in /var/log/faillog.
|
| options/nixos/security.pam.services.<name>.forwardXAuth | Whether X authentication keys should be passed from the
calling user to the target user (e.g. for
su)
|
| options/nixos/services.zabbixServer.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.peering-manager.oidcConfigPath | Path to the Configuration-File for OIDC-Authentication, will be loaded as oidc_config.py
|
| options/nixos/security.duosec.autopush | If true, Duo Unix will automatically send
a push login request to the user’s phone, falling back on a
phone call if push is unavailable
|
| options/nixos/services.movim.database.createLocally | local database using UNIX socket authentication
|
| options/nixos/services.peering-manager.ldapConfigPath | Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
|
| options/nixos/services.prometheus.scrapeConfigs.*.bearer_token_file | Sets the Authorization header on every scrape request with
the bearer token read from the configured file
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id | IKE identity to expect for authentication round
|
| options/nixos/services.drupal.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.fwupd.extraTrustedKeys | Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files
|
| options/nixos/services.linux-enable-ir-emitter.enable | Whether to enable IR emitter hardware
|
| options/home-manager/programs.hyprlock.enable | Whether to enable Hyprlock, Hyprland's GPU-accelerated lock screen
utility
|
| options/nixos/services.gitlab-runner.services.<name>.tagList | Tag list
|
| options/nixos/services.pixelfed.redis.createLocally | Whether to enable a local Redis database using UNIX socket authentication.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addKeysToAgent | When enabled, a private key that is used during authentication will be
added to ssh-agent if it is running (with confirmation enabled if
set to 'confirm')
|
| options/home-manager/accounts.contact.accounts.<name>.remote.userName | User name for authentication.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_id | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| options/nixos/services.mediawiki.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.anuko-time-tracker.settings.email.smtpAuth | MTA requires authentication.
|
| options/nixos/services.anuko-time-tracker.settings.email.smtpUser | MTA authentication username.
|
| options/nixos/services.onlyoffice.postgresUser | The username OnlyOffice should use to connect to Postgresql
|
| options/home-manager/programs.irssi.networks.<name>.saslExternal | Enable SASL external authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.certs | List of certificate candidates to use for
authentication
|
| options/nixos/services.openafsServer.enable | Whether to enable the OpenAFS server
|
| options/home-manager/accounts.calendar.accounts.<name>.remote.userName | User name for authentication.
|
| options/nixos/services.keycloak.database.host | Hostname of the database to connect to
|
| options/nixos/services.kubernetes.kubelet.clientCaFile | Kubernetes apiserver CA file for client authentication.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys | List of raw public key candidates to use for
authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_cert | Send certificate payloads when using certificate authentication.
- With the default of
ifasked the daemon sends
certificate payloads only if certificate requests have been received.
never disables sending of certificate payloads
altogether,
always causes certificate payloads to be sent
unconditionally whenever certificate authentication is used
|
| options/nixos/services.limesurvey.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.slurm.rest.environment.SLURM_JWT | This variable must be set to use JWT token authentication.
|
| options/home-manager/programs.nheko.settings | Attribute set of Nheko preferences (converted to an INI file)
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.aaa_id | Server side EAP-Identity to expect in the EAP method
|
| options/nixos/boot.initrd.luks.devices.<name>.yubikey.iterationStep | How much the iteration count for PBKDF2 is increased at each successful authentication.
|
| options/nixos/programs._1password-gui.polkitPolicyOwners | A list of users who should be able to integrate 1Password with polkit-based authentication mechanisms.
|
| options/nixos/security.pam.services.<name>.duoSecurity.enable | If set, use the Duo Security pam module
pam_duo for authentication
|
| options/nixos/services.pixelfed.database.createLocally | Whether to enable a local database using UNIX socket authentication.
|
| options/nixos/services.wordpress.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.graylog.rootPasswordSha2 | You MUST specify a hash password for the root user (which you only need to initially set up the
system and in case you lose connectivity to your authentication backend)
This password cannot be changed using the API or via the web interface
|
| options/nixos/services.scrutiny.settings.web.influxdb.token | Authentication token for connecting to InfluxDB.
|
| options/nixos/services.mysql.galeraCluster.clusterPassword | Optional password for securing cluster communications
|
| options/nixos/services.chatgpt-retrieval-plugin.bearerTokenPath | Path to the secret bearer token used for the http api authentication.
|
| options/nixos/services.guacamole-client.settings | Configuration written to guacamole.properties.
The Guacamole web application uses one main configuration file called
guacamole.properties
|
| options/home-manager/programs.ssh.matchBlocks.<name>.identitiesOnly | Specifies that ssh should only use the authentication
identity explicitly configured in the
~/.ssh/config files or passed on the
ssh command-line, even if ssh-agent
offers more identities.
|
| options/home-manager/programs.swaylock.enable | Whether to enable swaylock
|
| options/nixos/services.kubernetes.apiserver.tokenAuthFile | Kubernetes apiserver token authentication file
|
| options/nixos/services.kubernetes.apiserver.basicAuthFile | Kubernetes apiserver basic authentication file
|
| options/nixos/services.canaille.settings.CANAILLE.SMTP | SMTP configuration
|
| options/nixos/networking.wireless.fallbackToWPA2 | Whether to fall back to WPA2 authentication protocols if WPA3 failed
|
| options/nixos/services.gitlab-runner.services.<name>.runUntagged | Register to run untagged builds; defaults to
true when tagList is empty
|
| options/home-manager/programs.senpai.config.password-cmd | Alternatively to providing your SASL authentication password
directly in plaintext, you can specify a command to be run to
fetch the password at runtime
|
| options/home-manager/programs.sbt.credentials.*.passwordCommand | The command that provides the password or authentication token for
the repository.
|
| options/nixos/networking.wireless.networks.<name>.psk | The network's pre-shared key in plaintext defaulting
to being a network without any authentication.
Be aware that this will be written to the Nix store
in plaintext! Use pskRaw with an external
reference to keep it safe.
Mutually exclusive with pskRaw.
|
| options/nixos/services.prometheus.exporters.nut.nutUser | The user to log in into NUT server
|
| options/nixos/services.grafana.settings.smtp.password | Password used for authentication
|
| options/nixos/services.anuko-time-tracker.settings.email.smtpPasswordFile | Path to file containing the MTA authentication password.
|
| options/nixos/services.umami.createPostgresqlDatabase | Whether to automatically create the database for Umami using PostgreSQL
|
| options/nixos/services.gitlab-runner.services.<name>.protected | When set to true Runner will only run on pipelines
triggered on protected branches
|
| options/nixos/services.onlyoffice.postgresPasswordFile | Path to a file that contains the password OnlyOffice should use to connect to Postgresql
|
| options/nixos/services.prometheus.exporters.ipmi.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.unique | Connection uniqueness policy to enforce
|
| options/nixos/services.listmonk.database.settings.smtp.*.tls_type | Type of TLS authentication with the SMTP server
|
| options/nixos/services.gitlab-runner.services.<name>.maximumTimeout | What is the maximum timeout (in seconds) that will be set for
job when using this Runner. 0 (default) simply means don't limit
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.username | Username for basic HTTP authentication
|
| options/nixos/services.roundcube.database.passwordFile | Password file for the postgresql connection
|
| options/nixos/services.sourcehut.settings."git.sr.ht::api".internal-ipnet | Set of IP subnets which are permitted to utilize internal API
authentication
|
| options/nixos/services.grafana.settings.server.root_url | This is the full URL used to access Grafana from a web browser
|
| options/nixos/services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::api".internal-ipnet | Set of IP subnets which are permitted to utilize internal API
authentication
|
| options/nixos/services.kerberos_server.enable | Whether to enable the kerberos authentication server.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap | EAP secret section for a specific secret
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.certificateFile | Path to a file containing the certificate used for
client authentication to the server.
|
| options/nixos/services.sourcehut.settings."pages.sr.ht::api".internal-ipnet | Set of IP subnets which are permitted to utilize internal API
authentication
|
| options/nixos/services.dependency-track.settings."alpine.ldap.enabled" | Defines if LDAP will be used for user authentication
|
| options/nixos/services.suwayomi-server.settings.server.basicAuthEnabled | Whether to enable basic access authentication for Suwayomi-Server
|
| options/nixos/services.dependency-track.settings."alpine.oidc.enabled" | Defines if OpenID Connect will be used for user authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm | NTLM secret section for a specific secret
|
| options/nixos/services.outline.oidcAuthentication.scopes | OpenID authentication scopes.
|
| options/nixos/services.outline.oidcAuthentication.clientId | Authentication client identifier.
|
| options/nixos/services.hercules-ci-agent.settings.clusterJoinTokenPath | Location of the cluster-join-token.key file
|
| options/darwin/services.hercules-ci-agent.settings.clusterJoinTokenPath | Location of the cluster-join-token.key file
|
| options/nixos/services.dysnomia.enableAuthentication | Whether to publish privacy-sensitive authentication credentials
|
| options/nixos/services.outline.slackAuthentication.clientId | Authentication key.
|
| options/nixos/virtualisation.podman.networkSocket.tls.cacert | Path to CA certificate to use for client authentication.
|
| options/nixos/services.firefox-syncserver.database.createLocally | Whether to create database and user on the local machine if they do not exist
|
| options/nixos/services.outline.azureAuthentication.clientId | Authentication client identifier.
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.cloudflare-ddns.credentialsFile | Path to a file containing the Cloudflare API authentication token
|
| options/nixos/services.hostapd.radios.<name>.networks.<name>.macAcl | Station MAC address -based authentication
|
| options/nixos/services.outline.googleAuthentication.clientId | Authentication client identifier.
|
| options/nixos/services.prometheus.exporters.pgbouncer.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.outline.slackAuthentication.secretFile | File path containing the authentication secret.
|
| options/nixos/services.outline.oidcAuthentication.displayName | Display name for OIDC authentication.
|
| options/nixos/services.outline.discordAuthentication.clientId | Authentication client identifier.
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.mattermost.database.fromEnvironment | Use services.mattermost.environmentFile to configure the database instead of writing the database URI
to the Nix store
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.outline.oidcAuthentication.clientSecretFile | File path containing the authentication secret.
|
| options/nixos/services.openssh.settings.AuthorizedPrincipalsFile | Specifies a file that lists principal names that are accepted for certificate authentication
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.outline.azureAuthentication.resourceAppId | Authentication application resource ID.
|
| options/nixos/services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_id | The project_id and project_name fields are optional for the Identity V2 API
|
| options/nixos/services.outline.azureAuthentication.clientSecretFile | File path containing the authentication secret.
|
| options/nixos/virtualisation.podman.networkSocket.enable | Make the Podman and Docker compatibility API available over the network
with TLS client certificate authentication
|
| options/nixos/services.outline.googleAuthentication.clientSecretFile | File path containing the authentication secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.forwardPass | The authentication provides a single field requiring
the user's password followed by the one-time password (OTP).
|
| options/nixos/services.magnetico.web.credentialsFile | The path to the file holding the credentials to access the web
interface
|
| options/nixos/services.outline.discordAuthentication.clientSecretFile | File path containing the authentication secret.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name | The project_id and project_name fields are optional for the Identity V2 API
|
| options/nixos/services.openssh.settings.PasswordAuthentication | Specifies whether password authentication is allowed.
|
| options/nixos/services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| options/nixos/services.prometheus.exporters.artifactory.artiAccessToken | Access token for authentication against JFrog Artifactory API
|
| options/nixos/services.prometheus.exporters.artifactory.artiPassword | Password for authentication against JFrog Artifactory API
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/services.ghostunnel.servers.<name>.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| options/home-manager/programs.pianobar.settings.password_command | Command pianobar will use to access password for Pandora music service authentication
|
| options/nixos/services.grafana.settings.database.client_key_path | The path to the client key
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id | Identity to use as peer identity during EAP authentication
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.login | Username to use for SMTP authentication.
|
| options/nixos/services.openssh.settings.KbdInteractiveAuthentication | Specifies whether keyboard-interactive authentication is allowed.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| options/nixos/services.grafana.settings.database.client_cert_path | The path to the client cert
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.ca_id | Identity in CA certificate to accept for authentication
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.password_command | Shell command which will print a password to stdout for basic HTTP
authentication
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_secret | The application_credential_secret field is required if using an application
credential to authenticate.
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.passphrase | Password to use for SMTP authentication.
|
| options/nixos/services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| options/nixos/services.matrix-synapse.settings.macaroon_secret_key | Secret key for authentication tokens
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediation_peer | Identity under which the peer is registered at the mediation server, that
is, the IKE identity the other end of this connection uses as its local
identity on its connection to the mediation server
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/services.grafana.settings.security.csrf_trusted_origins | List of additional allowed URLs to pass by the CSRF check
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.password | password for the Identity V2 and V3 APIs
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.grafana.settings.security.csrf_additional_headers | List of allowed headers to be set by the user
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| packages/nixpkgs/route-detect | Find authentication (authn) and authorization (authz) security bugs in web application routes |
| packages/nixpkgs/pesign | Signing tools for PE-COFF binaries |
| packages/nixpkgs/totp-cli | Authy/Google Authenticator like TOTP CLI tool written in Go |
| packages/nixpkgs/nginx-sso | SSO authentication provider for the auth_request nginx module |
| packages/nixpkgs/pam | Pluggable Authentication Modules, a flexible mechanism for authenticating user |
| packages/nixpkgs/linux-pam | Pluggable Authentication Modules, a flexible mechanism for authenticating user |
| packages/nixpkgs/ockam | Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale |
| packages/nixpkgs/dita-ot | Open-source publishing engine for content authored in the Darwin Information Typing Architecture |
| packages/nixpkgs/elasticsearchPlugins.search-guard | Elasticsearch plugin that offers encryption, authentication, and authorisation |
| packages/nixpkgs/tacacsplus | Protocol for authentication, authorization and accounting (AAA) services for routers and network devices |
| packages/nixpkgs/kile | User-friendly TeX/LaTeX authoring tool for the KDE desktop environment |
| packages/nixpkgs/eudic | Authoritative English Dictionary Software Essential Tools for English Learners |
| packages/nixpkgs/spicedb-zed | Command line for managing SpiceDB |
| packages/nixpkgs/spicedb | Open source permission database |
| packages/nixpkgs/haskellPackages.orizentic | Token-based authentication and authorization |
| packages/nixpkgs/vouch-proxy | SSO and OAuth / OIDC login solution for NGINX using the auth_request module |
| packages/nixpkgs/python313Packages.signify | Library that verifies PE Authenticode-signed binaries |
| packages/nixpkgs/python314Packages.signify | Library that verifies PE Authenticode-signed binaries |
| packages/nixpkgs/oathkeeper | Open-source identity and access proxy that authorizes HTTP requests based on sets of rules |
| packages/nixpkgs/nsd | Authoritative only, high performance, simple and open source name server |
| packages/nixpkgs/technitium-dns-server | Authorative and Recursive DNS server for Privacy and Security |
| packages/nixpkgs/bombono | DVD authoring program for personal computers |
| packages/nixpkgs/material-maker | Procedural materials authoring tool |
| packages/nixpkgs/cntlm | NTLM/NTLMv2 authenticating HTTP proxy |
| packages/nixpkgs/haskellPackages.gssapi-wai | WAI Middleware for SPNEGO authentiaction |
| packages/nixpkgs/knot-dns | Authoritative-only DNS server from .cz domain registry |
| packages/nixpkgs/aardvark-dns | Authoritative dns server for A/AAAA container records |
| packages/nixpkgs/pomerium | Authenticating reverse proxy |
| packages/nixpkgs/pdns | Authoritative DNS server |
| packages/nixpkgs/jsign | Authenticode signing for Windows executables, installers & scripts |
| packages/nixpkgs/texlivePackages.mohe-book | Typeset authored, translated, and research books according to mohe rules |
| packages/nixpkgs/texlivePackages.munich | An alternative authordate bibliography style |
| packages/nixpkgs/technitium-dns-server-library | Library for Authorative and Recursive DNS server for Privacy and Security |
| packages/nixpkgs/typstPackages.t4t | An utility package for typst package authors |
| packages/nixpkgs/dvdstyler | DVD authoring software |
| packages/nixpkgs/texlivePackages.fcltxdoc | Macros for use in the author's documentation |
| packages/nixpkgs/texlivePackages.rgltxdoc | Common code for documentation of the author's packages |
| packages/nixpkgs/compass | Stylesheet Authoring Environment that makes your website design simpler to implement and easier to maintain |
| packages/nixpkgs/git-team | Command line interface for managing and enhancing git commit messages with co-authors |
| packages/nixpkgs/cotp | Trustworthy, encrypted, command-line TOTP/HOTP authenticator app with import functionality |
| packages/nixpkgs/cloak | Command-line OTP authenticator application |
| packages/nixpkgs/step-ca | Private certificate authority (X.509 & SSH) & ACME server for secure automated certificate management, so you can use TLS everywhere & SSO for SSH |
| packages/nixpkgs/python312Packages.signify | Library that verifies PE Authenticode-signed binaries |
| packages/nixpkgs/python313Packages.python-kadmin-rs | Rust and Python interfaces to the Kerberos administration interface (kadm5) |
| packages/nixpkgs/python314Packages.python-kadmin-rs | Rust and Python interfaces to the Kerberos administration interface (kadm5) |
| packages/nixpkgs/krill | RPKI Certificate Authority and Publication Server written in Rust |
| packages/nixpkgs/uthenticode | Small cross-platform library for verifying Authenticode digital signatures |
| packages/nixpkgs/pam_rssh | PAM module for authenticating via ssh-agent, written in Rust |
| packages/nixpkgs/gptcommit | Git prepare-commit-msg hook for authoring commit messages with GPT-3 |
| packages/nixpkgs/okapi | Collection of tools that support workflows for working with authentic data and identity management |
| packages/nixpkgs/cacert | Bundle of X.509 certificates of public Certificate Authorities (CA) |
| packages/nixpkgs/python312Packages.python-kadmin-rs | Rust and Python interfaces to the Kerberos administration interface (kadm5) |
| packages/nixpkgs/typstPackages.t4t_0_3_1 | A utility package for typst package authors |
| packages/nixpkgs/typstPackages.t4t_0_4_0 | A utility package for typst package authors |
| packages/nixpkgs/typstPackages.t4t_0_3_2 | A utility package for typst package authors |
| packages/nixpkgs/typstPackages.t4t_0_4_3 | An utility package for typst package authors |
| packages/nixpkgs/typstPackages.t4t_0_1_0 | A utility package for typst package authors |
| packages/nixpkgs/typstPackages.t4t_0_3_0 | A utility package for typst package authors |
| packages/nixpkgs/typstPackages.t4t_0_2_0 | A utility package for typst package authors |
| packages/nixpkgs/typstPackages.t4t_0_4_1 | A utility package for typst package authors |
| packages/nixpkgs/typstPackages.t4t_0_4_2 | An utility package for typst package authors |
| packages/nixpkgs/pam-pgsql | Support to authenticate against PostgreSQL for PAM-enabled applications |
| packages/nixpkgs/pcsc-safenet | Safenet Authentication Client |
| packages/nixpkgs/panotools | Free software suite for authoring and displaying virtual reality panoramas |
| packages/nixpkgs/vcdimager | Full-featured mastering suite for authoring, disassembling and analyzing Video CDs and Super Video CDs |
| packages/nixpkgs/sequoia-wot | Rust CLI tool for authenticating bindings and exploring a web of trust |
| packages/nixpkgs/gp-saml-gui | Interactively authenticate to GlobalProtect VPNs that require SAML |
| packages/nixpkgs/yubioath-flutter | Yubico Authenticator for Desktop |
| packages/nixpkgs/texlivePackages.exam-n | Exam class, focused on collaborative authoring |
| packages/nixpkgs/perlPackages.HTMLMason | High-performance, dynamic web site authoring system |
| packages/nixpkgs/fido2luks | Decrypt your LUKS partition using a FIDO2 compatible authenticator |
| packages/nixpkgs/boulder | ACME-based certificate authority, written in Go |
| packages/nixpkgs/python313Packages.joserfc | Implementations of JOSE RFCs in Python |
| packages/nixpkgs/python314Packages.joserfc | Implementations of JOSE RFCs in Python |
| packages/nixpkgs/mailspring | Beautiful, fast and maintained fork of Nylas Mail by one of the original authors |
| packages/nixpkgs/pomerium-cli | Client-side helper for Pomerium authenticating reverse proxy |
| packages/nixpkgs/ztools | Essential set of Z-machine tools for interpreter authors, experienced Inform programmers, and Z-code hackers |
| packages/nixpkgs/perl5Packages.HTMLMason | High-performance, dynamic web site authoring system |
| packages/nixpkgs/python313Packages.spake2 | SPAKE2 password-authenticated key exchange library |
| packages/nixpkgs/python314Packages.spake2 | SPAKE2 password-authenticated key exchange library |
| packages/nixpkgs/adidnsdump | Active Directory Integrated DNS dumping by any authenticated user |
| packages/nixpkgs/haskellPackages.microdns | a minimalistic DNS-authoritative server |
| packages/nixpkgs/osslsigncode | OpenSSL based Authenticode signing for PE/MSI/Java CAB files |
| packages/nixpkgs/texlivePackages.oscola | BibLaTeX style for the Oxford Standard for the Citation of Legal Authorities |
| packages/nixpkgs/fwknop | Single Packet Authorization (and Port Knocking) server/client |
| packages/nixpkgs/perl538Packages.HTMLMason | High-performance, dynamic web site authoring system |
| packages/nixpkgs/perl540Packages.HTMLMason | High-performance, dynamic web site authoring system |
| packages/nixpkgs/pam_krb5 | PAM module allowing PAM-aware applications to authenticate users by performing an AS exchange with a Kerberos KDC |
| packages/nixpkgs/teleport | Certificate authority and access plane for SSH, Kubernetes, web applications, and databases |
| packages/nixpkgs/python312Packages.joserfc | Implementations of JOSE RFCs in Python |
| packages/nixpkgs/typstPackages.pubmatter | Parse, normalize and show publication frontmatter, including authors and affiliations |
| packages/nixpkgs/lldap | Lightweight authentication server that provides an opinionated, simplified LDAP interface for authentication |
| packages/nixpkgs/python312Packages.spake2 | SPAKE2 password-authenticated key exchange library |
| packages/nixpkgs/webwormhole | Send files using peer authenticated WebRTC |
| packages/nixpkgs/pam_ussh | PAM module to authenticate using SSH certificates |
| packages/nixpkgs/opcr-policy | CLI for managing authorization policies |
| packages/nixpkgs/python313Packages.dogtag-pki | Enterprise-class Certificate Authority |
| packages/nixpkgs/python314Packages.dogtag-pki | Enterprise-class Certificate Authority |
| packages/nixpkgs/python313Packages.dm-haiku | Haiku is a simple neural network library for JAX developed by some of the authors of Sonnet |
| packages/nixpkgs/python314Packages.dm-haiku | Haiku is a simple neural network library for JAX developed by some of the authors of Sonnet |
| packages/nixpkgs/dn42-cacert | DN42 Root CA certificate |
| packages/nixpkgs/python313Packages.lsassy | Python module to extract data from Local Security Authority Subsystem Service (LSASS) |
| packages/nixpkgs/python314Packages.lsassy | Python module to extract data from Local Security Authority Subsystem Service (LSASS) |
| packages/nixpkgs/teleport_18 | Certificate authority and access plane for SSH, Kubernetes, web applications, and databases |
| packages/nixpkgs/haskellPackages.spake2 | Implementation of the SPAKE2 Password-Authenticated Key Exchange algorithm |
| packages/nixpkgs/teleport_16 | Certificate authority and access plane for SSH, Kubernetes, web applications, and databases |
| packages/nixpkgs/ocamlPackages.ppx_tools | Tools for authors of ppx rewriters |
| packages/nixpkgs/teleport_17 | Certificate authority and access plane for SSH, Kubernetes, web applications, and databases |
| packages/nixpkgs/typstPackages.biz-report | Multi-chapter business report with table styling and optional dropcaps, infoboxes & author cutout |
| packages/nixpkgs/openfga | High performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar |
| packages/nixpkgs/typstPackages.bamdone-rebuttal | Rebuttal/response letter template that allows authors to respond to feedback given by reviewers in a peer-review process on a point-by-point basis |
| packages/nixpkgs/canaille | Lightweight Identity and Authorization Management |
| packages/nixpkgs/python312Packages.dogtag-pki | Enterprise-class Certificate Authority |
| packages/nixpkgs/python312Packages.dm-haiku | Haiku is a simple neural network library for JAX developed by some of the authors of Sonnet |
| packages/nixpkgs/haskellPackages.sproxy | HTTP proxy for authenticating users via OAuth2 |
| packages/nixpkgs/python312Packages.lsassy | Python module to extract data from Local Security Authority Subsystem Service (LSASS) |
| packages/nixpkgs/python313Packages.certbot-dns-inwx | INWX DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-inwx | INWX DNS Authenticator plugin for Certbot |
| packages/nixpkgs/hypershell | Spawn shells anywhere |
| packages/nixpkgs/git-privacy | Tool to redact Git author and committer dates |
| packages/nixpkgs/python313Packages.certbot-dns-ovh | OVH DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-ovh | OVH DNS Authenticator plugin for Certbot |
| packages/nixpkgs/ocamlPackages_latest.ppx_tools | Tools for authors of ppx rewriters |
| packages/nixpkgs/haskellPackages.sproxy2 | Secure HTTP proxy for authenticating users via OAuth2 |
| packages/nixpkgs/python313Packages.os-service-types | Python library for consuming OpenStack service-types-authority data |
| packages/nixpkgs/python314Packages.os-service-types | Python library for consuming OpenStack service-types-authority data |
| packages/nixpkgs/perlPackages.POETestLoops | Reusable tests for POE::Loop authors |
| packages/nixpkgs/perl5Packages.POETestLoops | Reusable tests for POE::Loop authors |
| packages/nixpkgs/python312Packages.certbot-dns-inwx | INWX DNS Authenticator plugin for Certbot |
| packages/nixpkgs/typstPackages.sunny-orasis | A paper template made for the French national conference ORASIS following the author guidelines (also works for RFIAP and CAP |
| packages/nixpkgs/python313Packages.ctap-keyring-device | CTAP (client-to-authenticator-protocol) device backed by python's keyring library |
| packages/nixpkgs/python314Packages.ctap-keyring-device | CTAP (client-to-authenticator-protocol) device backed by python's keyring library |
| packages/nixpkgs/python312Packages.certbot-dns-ovh | OVH DNS Authenticator plugin for Certbot |
| packages/nixpkgs/texlivePackages.color-edits | Colorful edits for multiple authors of a shared document |
| packages/nixpkgs/python312Packages.os-service-types | Python library for consuming OpenStack service-types-authority data |
| packages/nixpkgs/python313Packages.certbot-dns-google | Google Cloud DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-google | Google Cloud DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.adal | Python module to authenticate to Azure Active Directory (AAD) in order to access AAD protected web resources |
| packages/nixpkgs/python314Packages.adal | Python module to authenticate to Azure Active Directory (AAD) in order to access AAD protected web resources |
| packages/nixpkgs/penpot-desktop | Unofficial desktop application for the open-source design tool, Penpot |
| packages/nixpkgs/perl540Packages.POETestLoops | Reusable tests for POE::Loop authors |
| packages/nixpkgs/perl538Packages.POETestLoops | Reusable tests for POE::Loop authors |
| packages/nixpkgs/apache-airflow | Platform to programmatically author, schedule and monitor workflows |
| packages/nixpkgs/pam_ccreds | PAM module to locally authenticate using an enterprise identity when the network is unavailable |
| packages/nixpkgs/perlPackages.CPANCommonIndex | Common library for searching CPAN modules, authors and distributions |
| packages/nixpkgs/pam_pgsql | Support to authenticate against PostgreSQL for PAM-enabled appliations |
| packages/nixpkgs/typstPackages.pubmatter_0_1_0 | Parse, normalize and show publication frontmatter, including authors and affiliations |
| packages/nixpkgs/typstPackages.pubmatter_0_2_0 | Parse, normalize and show publication frontmatter, including authors and affiliations |
| packages/nixpkgs/typstPackages.pubmatter_0_2_1 | Parse, normalize and show publication frontmatter, including authors and affiliations |
| packages/nixpkgs/typstPackages.pubmatter_0_2_2 | Parse, normalize and show publication frontmatter, including authors and affiliations |
| packages/nixpkgs/python313Packages.certbot-dns-route53 | Route53 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-route53 | Route53 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.certbot-dns-rfc2136 | RFC 2136 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-rfc2136 | RFC 2136 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/perl5Packages.CPANCommonIndex | Common library for searching CPAN modules, authors and distributions |
| packages/nixpkgs/syn2mas | Tool to help with the migration of a Matrix Synapse installation to the Matrix Authentication Service |
| packages/nixpkgs/python312Packages.ctap-keyring-device | CTAP (client-to-authenticator-protocol) device backed by python's keyring library |
| packages/nixpkgs/python312Packages.certbot-dns-google | Google Cloud DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.rules | Awesome Django authorization, without the database |
| packages/nixpkgs/python314Packages.rules | Awesome Django authorization, without the database |
| packages/nixpkgs/python313Packages.python-xbox | :ibrary to authenticate with Xbox Network and use their API |
| packages/nixpkgs/python314Packages.python-xbox | :ibrary to authenticate with Xbox Network and use their API |
| packages/nixpkgs/cargo-supply-chain | Gather author, contributor and publisher data on crates in your dependency graph |
| packages/nixpkgs/python312Packages.certbot-dns-route53 | Route53 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python312Packages.adal | Python module to authenticate to Azure Active Directory (AAD) in order to access AAD protected web resources |
| packages/nixpkgs/python312Packages.certbot-dns-rfc2136 | RFC 2136 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/perl540Packages.CPANCommonIndex | Common library for searching CPAN modules, authors and distributions |
| packages/nixpkgs/perl538Packages.CPANCommonIndex | Common library for searching CPAN modules, authors and distributions |
| packages/nixpkgs/luaPackages.lua-pam | Lua module for PAM authentication |
| packages/nixpkgs/typstPackages.bamdone-rebuttal_0_1_1 | Rebuttal/response letter template that allows authors to respond to feedback given by reviewers in a peer-review process on a point-by-point basis |
| packages/nixpkgs/typstPackages.bamdone-rebuttal_0_1_2 | Rebuttal/response letter template that allows authors to respond to feedback given by reviewers in a peer-review process on a point-by-point basis |
| packages/nixpkgs/typstPackages.bamdone-rebuttal_0_1_0 | Rebuttal/response letter template that allows authors to respond to feedback given by reviewers in a peer-review process on a point-by-point basis |
| packages/nixpkgs/python313Packages.pycookiecheat | Borrow cookies from your browser's authenticated session for use in Python scripts |
| packages/nixpkgs/python314Packages.pycookiecheat | Borrow cookies from your browser's authenticated session for use in Python scripts |
| packages/nixpkgs/go-2fa | Two-factor authentication on the command line |
| packages/nixpkgs/python313Packages.mohawk | Python library for Hawk HTTP authorization |
| packages/nixpkgs/python314Packages.mohawk | Python library for Hawk HTTP authorization |
| packages/nixpkgs/typstPackages.biz-report_0_1_0 | Multi-chapter business report with tables, infobox, author cutout |
| packages/nixpkgs/typstPackages.biz-report_0_2_0 | Multi-chapter business report with tables, infobox, author cutout |
| packages/nixpkgs/python312Packages.pycookiecheat | Borrow cookies from your browser's authenticated session for use in Python scripts |
| packages/nixpkgs/typstPackages.biz-report_0_3_0 | Multi-chapter business report with table styling and optional dropcaps, infoboxes & author cutout |
| packages/nixpkgs/typstPackages.biz-report_0_3_1 | Multi-chapter business report with table styling and optional dropcaps, infoboxes & author cutout |
| packages/nixpkgs/python312Packages.rules | Awesome Django authorization, without the database |
| packages/nixpkgs/texlivePackages.bestpapers | A BibTeX package to produce lists of authors' best papers |
| packages/nixpkgs/python312Packages.xbox-webapi | Library to authenticate with Windows Live/Xbox Live and use their API |
| packages/nixpkgs/python313Packages.xbox-webapi | Library to authenticate with Windows Live/Xbox Live and use their API |
| packages/nixpkgs/lua52Packages.lua-pam | Lua module for PAM authentication |
| packages/nixpkgs/lua53Packages.lua-pam | Lua module for PAM authentication |
| packages/nixpkgs/lua55Packages.lua-pam | Lua module for PAM authentication |
| packages/nixpkgs/lua54Packages.lua-pam | Lua module for PAM authentication |
| packages/nixpkgs/lua51Packages.lua-pam | Lua module for PAM authentication |
| packages/nixpkgs/python313Packages.certbot-dns-cloudflare | Cloudflare DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-cloudflare | Cloudflare DNS Authenticator plugin for Certbot |
| packages/nixpkgs/alp | Convenient authentication method that lets you use your android device as a key for your Linux machine |
| packages/nixpkgs/howdy | Windows Hello™ style facial authentication for Linux |
| packages/nixpkgs/libspf2 | Implementation of the Sender Policy Framework for SMTP authorization (Helsinki Systems fork) |
| packages/nixpkgs/python313Packages.openfga-sdk | Fine-Grained Authorization solution for Python |
| packages/nixpkgs/python314Packages.openfga-sdk | Fine-Grained Authorization solution for Python |
| packages/nixpkgs/python312Packages.mohawk | Python library for Hawk HTTP authorization |
| packages/nixpkgs/texlivePackages.hindawi-latex-template | A LaTeX template for authors of the Hindawi journals |
| packages/nixpkgs/miktex | Modern TeX distribution |
| packages/nixpkgs/web-eid-app | Signing and authentication operations with smart cards for the Web eID browser extension |
| packages/nixpkgs/luajitPackages.lua-pam | Lua module for PAM authentication |
| packages/nixpkgs/pam-watchid | PAM plugin module that allows the Apple Watch to be used for authentication |
| packages/nixpkgs/python312Packages.certbot-dns-cloudflare | Cloudflare DNS Authenticator plugin for Certbot |
| packages/nixpkgs/haskellPackages.wai-middleware-travisci | WAI middleware for authenticating webhook payloads from Travis CI |
| packages/nixpkgs/python312Packages.casbin | Authorization library that supports access control models like ACL, RBAC and ABAC |
| packages/nixpkgs/python313Packages.casbin | Authorization library that supports access control models like ACL, RBAC and ABAC |
| packages/nixpkgs/python313Packages.fastapi-github-oidc | FastAPI compatible middleware to authenticate Github OIDC Tokens |
| packages/nixpkgs/python314Packages.fastapi-github-oidc | FastAPI compatible middleware to authenticate Github OIDC Tokens |
| packages/nixpkgs/typstPackages.sunny-orasis_0_1_1 | A paper template made for the French national conference ORASIS following the author guidelines (also works for RFIAP and CAP |
| packages/nixpkgs/typstPackages.sunny-orasis_0_1_0 | A paper template made for the French national conference ORASIS following the author guidelines (also works for RFIAP and CAP |
| packages/nixpkgs/python313Packages.twscrape | Twitter API scrapper with authorization support |
| packages/nixpkgs/python314Packages.twscrape | Twitter API scrapper with authorization support |
| packages/nixpkgs/texliveFull | TeX Live environment |
| packages/nixpkgs/python313Packages.pycasbin | Authorization library that supports access control models like ACL, RBAC and ABAC |
| packages/nixpkgs/python314Packages.pycasbin | Authorization library that supports access control models like ACL, RBAC and ABAC |
| packages/nixpkgs/python312Packages.openfga-sdk | Fine-Grained Authorization solution for Python |
| packages/nixpkgs/aws-adfs | Command line tool to ease AWS CLI authentication against ADFS |
| packages/nixpkgs/shadow | Suite containing authentication-related tools such as passwd and su |
| packages/nixpkgs/python313Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/python314Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/python312Packages.fastapi-github-oidc | FastAPI compatible middleware to authenticate Github OIDC Tokens |
| packages/nixpkgs/python312Packages.twscrape | Twitter API scrapper with authorization support |
| packages/nixpkgs/python313Packages.scholarly | Retrieve author and publication information from Google Scholar |
| packages/nixpkgs/python314Packages.scholarly | Retrieve author and publication information from Google Scholar |
| packages/nixpkgs/msalsdk-dbusclient | Microsoft Authentication Library cross platform Dbus client for talking to microsoft-identity-broker |
| packages/nixpkgs/python312Packages.pycasbin | Authorization library that supports access control models like ACL, RBAC and ABAC |
| packages/nixpkgs/cmd-polkit | Easily create polkit authentication agents by using commands |
| packages/nixpkgs/ssh-tpm-agent | SSH agent with support for TPM sealed keys for public key authentication |
| packages/nixpkgs/soteria | Polkit authentication agent written in GTK designed to be used with any desktop environment |
| packages/nixpkgs/python312Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/hostapd | User space daemon for access point and authentication servers |
| packages/nixpkgs/python312Packages.scholarly | Retrieve author and publication information from Google Scholar |
| packages/nixpkgs/munge | An authentication service for creating and validating credentials
|
| packages/nixpkgs/python313Packages.onnxscript | Naturally author ONNX functions and models using a subset of Python |
| packages/nixpkgs/python314Packages.onnxscript | Naturally author ONNX functions and models using a subset of Python |
| packages/nixpkgs/tlock | Two-Factor Authentication Tokens Manager in Terminal |
| packages/nixpkgs/perlPackages.TestDistManifest | Author test that validates a package MANIFEST |
| packages/nixpkgs/perl5Packages.TestDistManifest | Author test that validates a package MANIFEST |
| packages/nixpkgs/alpaca-proxy | HTTP forward proxy with PAC and NTLM authentication support |
| packages/nixpkgs/ncrack | Network authentication tool |
| packages/nixpkgs/spiffe-vault | Integrates Spiffe and Vault to have secretless authentication |
| packages/nixpkgs/oath-toolkit | Components for building one-time password authentication systems |
| packages/nixpkgs/perl538Packages.TestDistManifest | Author test that validates a package MANIFEST |
| packages/nixpkgs/perl540Packages.TestDistManifest | Author test that validates a package MANIFEST |
| packages/nixpkgs/portunus | Self-contained user/group management and authentication service |
| packages/nixpkgs/git-extras | GIT utilities -- repo summary, repl, changelog population, author commit percentages and more |
| packages/nixpkgs/gpclient | CLI for GlobalProtect VPN, based on OpenConnect, supports the SSO authentication method |
| packages/nixpkgs/su | Suite containing authentication-related tools such as passwd and su |
| packages/nixpkgs/pam_p11 | Authentication with PKCS#11 modules |
| packages/nixpkgs/python313Packages.msal-extensions | Microsoft Authentication Library Extensions (MSAL-Extensions) for Python |
| packages/nixpkgs/python314Packages.msal-extensions | Microsoft Authentication Library Extensions (MSAL-Extensions) for Python |
| packages/nixpkgs/mate.mate-polkit | Integrates polkit authentication for MATE desktop |
| packages/nixpkgs/perlPackages.DistZillaPluginMojibakeTests | Author tests for source encoding |
| packages/nixpkgs/perlPackages.DistZillaPluginTestDistManifest | Author test that validates a package MANIFEST |
| packages/nixpkgs/perl5Packages.DistZillaPluginMojibakeTests | Author tests for source encoding |
| packages/nixpkgs/perl5Packages.DistZillaPluginTestDistManifest | Author test that validates a package MANIFEST |
| packages/nixpkgs/pam_u2f | PAM module for allowing authentication with a U2F device |
| packages/nixpkgs/pam_mysql | PAM authentication module against a MySQL database |
| packages/nixpkgs/ocamlPackages.ppx_tools_versioned | Tools for authors of syntactic tools (such as ppx rewriters) |
| packages/nixpkgs/python312Packages.msal-extensions | Microsoft Authentication Library Extensions (MSAL-Extensions) for Python |
| packages/nixpkgs/ocamlPackages_latest.ppx_tools_versioned | Tools for authors of syntactic tools (such as ppx rewriters) |
| packages/nixpkgs/perl540Packages.DistZillaPluginMojibakeTests | Author tests for source encoding |
| packages/nixpkgs/perl538Packages.DistZillaPluginMojibakeTests | Author tests for source encoding |
| packages/nixpkgs/perl538Packages.DistZillaPluginTestDistManifest | Author test that validates a package MANIFEST |
| packages/nixpkgs/perl540Packages.DistZillaPluginTestDistManifest | Author test that validates a package MANIFEST |
| packages/nixpkgs/kubelogin | Kubernetes credential plugin implementing Azure authentication |
| packages/nixpkgs/pam-reattach | Reattach to the user's GUI session on macOS during authentication (for Touch ID support in tmux) |
| packages/nixpkgs/python313Packages.imia | Authentication library for Starlette and FastAPI |
| packages/nixpkgs/python314Packages.imia | Authentication library for Starlette and FastAPI |
| packages/nixpkgs/ntlmrecon | Information enumerator for NTLM authentication enabled web endpoints |
| packages/nixpkgs/gsasl | GNU SASL, Simple Authentication and Security Layer library |
| packages/nixpkgs/silverfort-client | Silverfort multi-factor authentication client |
| packages/nixpkgs/kubelogin-oidc | Kubernetes credential plugin implementing OpenID Connect (OIDC) authentication |
| packages/nixpkgs/kdePackages.polkit-kde-agent-1 | Daemon providing a Polkit authentication UI for Plasma |
| packages/nixpkgs/perlPackages.DistZillaPluginTestPortability | Author tests for portability |
| packages/nixpkgs/python313Packages.drf-jwt | JSON Web Token based authentication for Django REST framework |
| packages/nixpkgs/python314Packages.drf-jwt | JSON Web Token based authentication for Django REST framework |
| packages/nixpkgs/haskellPackages.amazonka-certificatemanager-pca | Amazon Certificate Manager Private Certificate Authority SDK |
| packages/nixpkgs/python313Packages.aws-adfs | Command line tool to ease AWS CLI authentication against ADFS |
| packages/nixpkgs/responder | LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server |
| packages/nixpkgs/haskellPackages.windowslive | Implements Windows Live Web Authentication and Delegated Authentication |
| packages/nixpkgs/perl5Packages.DistZillaPluginTestPortability | Author tests for portability |
| packages/nixpkgs/cyrus_sasl | Library for adding authentication support to connection-based protocols |
| packages/nixpkgs/python314Packages.aws-adfs | Command line tool to ease AWS CLI authentication against ADFS |
| packages/nixpkgs/polkit_gnome | Dbus session bus service that is used to bring up authentication dialogs |
| packages/nixpkgs/ausweisapp | Official authentication app for German ID card and residence permit |
| packages/nixpkgs/python313Packages.scramp | Implementation of the SCRAM authentication protocol |
| packages/nixpkgs/python314Packages.scramp | Implementation of the SCRAM authentication protocol |
| packages/nixpkgs/nss_pam_ldapd | LDAP identity and authentication for NSS/PAM |
| packages/nixpkgs/python313Packages.djoser | REST implementation of Django authentication system |
| packages/nixpkgs/python313Packages.httpx-ntlm | NTLM authentication support for HTTPX |
| packages/nixpkgs/python314Packages.devpi-ldap | LDAP authentication for devpi-server |
| packages/nixpkgs/python314Packages.httpx-ntlm | NTLM authentication support for HTTPX |
| packages/nixpkgs/python314Packages.djoser | REST implementation of Django authentication system |
| packages/nixpkgs/perl540Packages.DistZillaPluginTestPortability | Author tests for portability |
| packages/nixpkgs/perl538Packages.DistZillaPluginTestPortability | Author tests for portability |
| packages/nixpkgs/python313Packages.devpi-ldap | LDAP authentication for devpi-server |
| packages/nixpkgs/python312Packages.imia | Authentication library for Starlette and FastAPI |
| packages/nixpkgs/python313Packages.repoze-who | WSGI Authentication Middleware / API |
| packages/nixpkgs/python314Packages.repoze-who | WSGI Authentication Middleware / API |
| packages/nixpkgs/perlPackages.NTLM | NTLM authentication module |
| packages/nixpkgs/ghostunnel | TLS proxy with mutual authentication support for securing non-TLS backend applications |
| packages/nixpkgs/python313Packages.python-pae | Pre-authentication encoding (PAE) implementation in Python |
| packages/nixpkgs/python314Packages.python-pae | Pre-authentication encoding (PAE) implementation in Python |
| packages/nixpkgs/perl5Packages.NTLM | NTLM authentication module |
| packages/nixpkgs/python313Packages.django-mfa3 | Multi factor authentication for Django |
| packages/nixpkgs/python314Packages.django-mfa3 | Multi factor authentication for Django |
| packages/nixpkgs/python312Packages.drf-jwt | JSON Web Token based authentication for Django REST framework |
| packages/nixpkgs/python312Packages.aws-adfs | Command line tool to ease AWS CLI authentication against ADFS |
| packages/nixpkgs/htgettoken | Gets OIDC authentication tokens for High Throughput Computing via a Hashicorp vault server |
| packages/nixpkgs/python313Packages.django-otp | Pluggable framework for adding two-factor authentication to Django using one-time passwords |
| packages/nixpkgs/python314Packages.django-otp | Pluggable framework for adding two-factor authentication to Django using one-time passwords |
| packages/nixpkgs/python312Packages.scramp | Implementation of the SCRAM authentication protocol |
| packages/nixpkgs/haskellPackages.eap | Extensible Authentication Protocol (EAP) |
| packages/nixpkgs/python312Packages.devpi-ldap | LDAP authentication for devpi-server |
| packages/nixpkgs/python312Packages.djoser | REST implementation of Django authentication system |
| packages/nixpkgs/python312Packages.httpx-ntlm | NTLM authentication support for HTTPX |
| packages/nixpkgs/python312Packages.repoze-who | WSGI Authentication Middleware / API |
| packages/nixpkgs/haskellPackages.asap | Atlassian Service Authentication Protocol |
| packages/nixpkgs/microsoft-identity-broker | Microsoft Authentication Broker for Linux |
| packages/nixpkgs/python312Packages.python-pae | Pre-authentication encoding (PAE) implementation in Python |
| packages/nixpkgs/python313Packages.pyspnego | Python SPNEGO authentication library |
| packages/nixpkgs/python314Packages.pyspnego | Python SPNEGO authentication library |
| packages/nixpkgs/git-credential-manager | Secure, cross-platform Git credential storage with authentication to GitHub, Azure Repos, and other popular Git hosting services |
| packages/nixpkgs/python313Packages.django-sesame | URLs with authentication tokens for automatic login |
| packages/nixpkgs/python314Packages.django-sesame | URLs with authentication tokens for automatic login |
| packages/nixpkgs/perl540Packages.NTLM | NTLM authentication module |
| packages/nixpkgs/perl538Packages.NTLM | NTLM authentication module |
| packages/nixpkgs/python312Packages.django-mfa3 | Multi factor authentication for Django |
| packages/nixpkgs/taler-challenger | OAuth 2.0-based authentication service that validates user can receive messages at a certain address |
| packages/nixpkgs/python313Packages.srptools | Module to implement Secure Remote Password (SRP) authentication |
| packages/nixpkgs/python314Packages.srptools | Module to implement Secure Remote Password (SRP) authentication |
| packages/nixpkgs/terraform-backend | State backend server which implements the Terraform HTTP backend API with pluggable modules for authentication, storage, locking and state encryption |
| packages/nixpkgs/python312Packages.django-otp | Pluggable framework for adding two-factor authentication to Django using one-time passwords |
| packages/nixpkgs/perlPackages.DigestHMAC | Keyed-Hashing for Message Authentication |
| packages/nixpkgs/gnomeExtensions.totp | Generate Time-based One-Time Passwords (TOTP aka OTP) for websites that use Two-Factor Authentication (2FA) like Google, Facebook, Discord, Amazon, Steam, etc. |
| packages/nixpkgs/perl5Packages.DigestHMAC | Keyed-Hashing for Message Authentication |
| packages/nixpkgs/haskellPackages.WMSigner | WebMoney authentication module |
| packages/nixpkgs/python313Packages.requests-hawk | Hawk authentication strategy for the requests python library |
| packages/nixpkgs/python314Packages.requests-hawk | Hawk authentication strategy for the requests python library |
| packages/nixpkgs/haskellPackages.fernet | Generate and verify HMAC-based authentication tokens |
| packages/nixpkgs/haskellPackages.radius | Remote Authentication Dial In User Service (RADIUS) |
| packages/nixpkgs/python312Packages.pyspnego | Python SPNEGO authentication library |
| packages/nixpkgs/budgie-screensaver | Fork of old GNOME Screensaver for purposes of providing an authentication prompt on wake |
| packages/nixpkgs/python312Packages.django-sesame | URLs with authentication tokens for automatic login |
| packages/nixpkgs/monkeysphere | Leverage the OpenPGP web of trust for SSH and TLS authentication |
| packages/nixpkgs/python312Packages.srptools | Module to implement Secure Remote Password (SRP) authentication |
| packages/nixpkgs/python313Packages.requests-gssapi | GSSAPI authentication handler for python-requests |
| packages/nixpkgs/python314Packages.requests-gssapi | GSSAPI authentication handler for python-requests |
| packages/nixpkgs/perl540Packages.DigestHMAC | Keyed-Hashing for Message Authentication |
| packages/nixpkgs/perl538Packages.DigestHMAC | Keyed-Hashing for Message Authentication |
| packages/nixpkgs/python312Packages.requests-hawk | Hawk authentication strategy for the requests python library |
| packages/nixpkgs/python313Packages.requests-credssp | HTTPS CredSSP authentication with the requests library |
| packages/nixpkgs/python314Packages.requests-credssp | HTTPS CredSSP authentication with the requests library |
| packages/nixpkgs/numberstation | TOTP Authentication application for mobile |
| packages/nixpkgs/python312Packages.requests-gssapi | GSSAPI authentication handler for python-requests |
| packages/nixpkgs/python313Packages.flask-simpleldap | LDAP authentication extension for Flask |
| packages/nixpkgs/python314Packages.flask-simpleldap | LDAP authentication extension for Flask |
| packages/nixpkgs/python313Packages.requests-kerberos | Authentication handler for using Kerberos with Python Requests |
| packages/nixpkgs/python314Packages.requests-kerberos | Authentication handler for using Kerberos with Python Requests |
| packages/nixpkgs/python312Packages.requests-credssp | HTTPS CredSSP authentication with the requests library |
| packages/nixpkgs/python313Packages.requests-ntlm | HTTP NTLM authentication support for python-requests |
| packages/nixpkgs/python314Packages.requests-ntlm | HTTP NTLM authentication support for python-requests |
| packages/nixpkgs/python312Packages.flask-simpleldap | LDAP authentication extension for Flask |
| packages/nixpkgs/python312Packages.requests-kerberos | Authentication handler for using Kerberos with Python Requests |
| packages/nixpkgs/python313Packages.requests-http-signature | Requests authentication module for HTTP Signature |
| packages/nixpkgs/python314Packages.requests-http-signature | Requests authentication module for HTTP Signature |
| packages/nixpkgs/python312Packages.requests-ntlm | HTTP NTLM authentication support for python-requests |
| packages/nixpkgs/python313Packages.http-message-signatures | Requests authentication module for HTTP Signature |
| packages/nixpkgs/python314Packages.http-message-signatures | Requests authentication module for HTTP Signature |
| packages/nixpkgs/python313Packages.glocaltokens | Library to extract google home devices local authentication tokens from google servers |
| packages/nixpkgs/python314Packages.glocaltokens | Library to extract google home devices local authentication tokens from google servers |
| packages/nixpkgs/haskellPackages.wai-middleware-hmac | HMAC Authentication Middleware for WAI |
| packages/nixpkgs/hyprpolkitagent | Polkit authentication agent written in QT/QML |
| packages/nixpkgs/python312Packages.requests-http-signature | Requests authentication module for HTTP Signature |
| packages/nixpkgs/haskellPackages.wai-middleware-crowd | Middleware and utilities for using Atlassian Crowd authentication |
| packages/nixpkgs/python312Packages.http-message-signatures | Requests authentication module for HTTP Signature |
| packages/nixpkgs/simplesamlphp | SimpleSAMLphp is an application written in native PHP that deals with authentication (SQL, .htpasswd, YubiKey, LDAP, PAPI, Radius) |
| packages/nixpkgs/python312Packages.glocaltokens | Library to extract google home devices local authentication tokens from google servers |
| packages/nixpkgs/haskellPackages.wai-middleware-bearer | WAI Middleware for Bearer Token Authentication |
| packages/nixpkgs/haskellPackages.wai-middleware-hmac-client | WAI HMAC Authentication Middleware Client |
| packages/nixpkgs/python313Packages.requests-http-message-signatures | Request authentication plugin implementing IETF HTTP Message Signatures |
| packages/nixpkgs/python314Packages.requests-http-message-signatures | Request authentication plugin implementing IETF HTTP Message Signatures |
| packages/nixpkgs/python312Packages.requests-http-message-signatures | Request authentication plugin implementing IETF HTTP Message Signatures |
| packages/nixpkgs/python313Packages.djangorestframework-simplejwt | JSON Web Token authentication plugin for Django REST Framework |
| packages/nixpkgs/python314Packages.djangorestframework-simplejwt | JSON Web Token authentication plugin for Django REST Framework |
| packages/nixpkgs/python312Packages.djangorestframework-simplejwt | JSON Web Token authentication plugin for Django REST Framework |
| packages/nixpkgs/perlPackages.ApacheAuthCookie | Perl Authentication and Authorization via cookies |
| packages/nixpkgs/perl5Packages.ApacheAuthCookie | Perl Authentication and Authorization via cookies |
| packages/nixpkgs/perl538Packages.ApacheAuthCookie | Perl Authentication and Authorization via cookies |
| packages/nixpkgs/perl540Packages.ApacheAuthCookie | Perl Authentication and Authorization via cookies |
| packages/nixpkgs/perlPackages.ModuleInstallAuthorTests | Designate tests only run by module authors |
| packages/nixpkgs/perl5Packages.ModuleInstallAuthorTests | Designate tests only run by module authors |
| packages/nixpkgs/perl540Packages.ModuleInstallAuthorTests | Designate tests only run by module authors |
| packages/nixpkgs/perl538Packages.ModuleInstallAuthorTests | Designate tests only run by module authors |
| packages/nixpkgs/perlPackages.ModuleInstallAuthorRequires | Declare author-only dependencies |
| packages/nixpkgs/perl5Packages.ModuleInstallAuthorRequires | Declare author-only dependencies |
| packages/nixpkgs/perl538Packages.ModuleInstallAuthorRequires | Declare author-only dependencies |
| packages/nixpkgs/perl540Packages.ModuleInstallAuthorRequires | Declare author-only dependencies |
| packages/nixpkgs/perlPackages.MailAuthenticationResults | Object Oriented Authentication-Results Headers |
| packages/nixpkgs/perl5Packages.MailAuthenticationResults | Object Oriented Authentication-Results Headers |
| packages/nixpkgs/perl538Packages.MailAuthenticationResults | Object Oriented Authentication-Results Headers |
| packages/nixpkgs/perl540Packages.MailAuthenticationResults | Object Oriented Authentication-Results Headers |
| packages/nixpkgs/perlPackages.AuthenSASL | SASL Authentication framework |
| packages/nixpkgs/perl5Packages.AuthenSASL | SASL Authentication framework |
| packages/nixpkgs/perlPackages.AuthenSCRAM | Salted Challenge Response Authentication Mechanism (RFC 5802) |
| packages/nixpkgs/perl5Packages.AuthenSCRAM | Salted Challenge Response Authentication Mechanism (RFC 5802) |
| packages/nixpkgs/perlPackages.AuthenSimple | Simple Authentication |
| packages/nixpkgs/perl5Packages.AuthenSimple | Simple Authentication |
| packages/nixpkgs/perl540Packages.AuthenSASL | SASL Authentication framework |
| packages/nixpkgs/perl538Packages.AuthenSASL | SASL Authentication framework |
| packages/nixpkgs/perl538Packages.AuthenSCRAM | Salted Challenge Response Authentication Mechanism (RFC 5802) |
| packages/nixpkgs/perl540Packages.AuthenSCRAM | Salted Challenge Response Authentication Mechanism (RFC 5802) |
| packages/nixpkgs/perl538Packages.AuthenSimple | Simple Authentication |
| packages/nixpkgs/perl540Packages.AuthenSimple | Simple Authentication |
| packages/nixpkgs/perlPackages.AuthenSimplePasswd | Simple Passwd authentication |
| packages/nixpkgs/perl5Packages.AuthenSimplePasswd | Simple Passwd authentication |
| packages/nixpkgs/perlPackages.HTTPServerSimpleAuthen | Authentication plugin for HTTP::Server::Simple |
| packages/nixpkgs/perl5Packages.HTTPServerSimpleAuthen | Authentication plugin for HTTP::Server::Simple |
| packages/nixpkgs/perl540Packages.AuthenSimplePasswd | Simple Passwd authentication |
| packages/nixpkgs/perl538Packages.AuthenSimplePasswd | Simple Passwd authentication |
| packages/nixpkgs/perl538Packages.HTTPServerSimpleAuthen | Authentication plugin for HTTP::Server::Simple |
| packages/nixpkgs/perl540Packages.HTTPServerSimpleAuthen | Authentication plugin for HTTP::Server::Simple |
| packages/nixpkgs/perlPackages.CatalystPluginAuthorizationRoles | Role based authorization for Catalyst based on Catalyst::Plugin::Authentication |
| packages/nixpkgs/perl5Packages.CatalystPluginAuthorizationRoles | Role based authorization for Catalyst based on Catalyst::Plugin::Authentication |
| packages/nixpkgs/perl538Packages.CatalystPluginAuthorizationRoles | Role based authorization for Catalyst based on Catalyst::Plugin::Authentication |
| packages/nixpkgs/perl540Packages.CatalystPluginAuthorizationRoles | Role based authorization for Catalyst based on Catalyst::Plugin::Authentication |
| packages/nixpkgs/perlPackages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perlPackages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationStoreHtpasswd | Authen::Htpasswd based user storage/authentication |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perlPackages.AuthenKrb5 | XS bindings for Kerberos 5 |
| packages/nixpkgs/perl5Packages.AuthenKrb5 | XS bindings for Kerberos 5 |
| packages/nixpkgs/perlPackages.AuthenOATH | OATH One Time Passwords |
| packages/nixpkgs/perl5Packages.AuthenOATH | OATH One Time Passwords |
| packages/nixpkgs/perlPackages.AuthenDecHpwd | DEC VMS password hashing |
| packages/nixpkgs/perl5Packages.AuthenDecHpwd | DEC VMS password hashing |
| packages/nixpkgs/perlPackages.LWPAuthenOAuth | Generate signed OAuth requests |
| packages/nixpkgs/perl5Packages.LWPAuthenOAuth | Generate signed OAuth requests |
| packages/nixpkgs/perlPackages.AuthenModAuthPubTkt | Generate Tickets (Signed HTTP Cookies) for mod_auth_pubtkt protected websites |
| packages/nixpkgs/perl5Packages.AuthenModAuthPubTkt | Generate Tickets (Signed HTTP Cookies) for mod_auth_pubtkt protected websites |
| packages/nixpkgs/perlPackages.AuthenKrb5Admin | Perl extension for MIT Kerberos 5 admin interface |
| packages/nixpkgs/perl538Packages.AuthenKrb5 | XS bindings for Kerberos 5 |
| packages/nixpkgs/perl540Packages.AuthenKrb5 | XS bindings for Kerberos 5 |
| packages/nixpkgs/perl5Packages.AuthenKrb5Admin | Perl extension for MIT Kerberos 5 admin interface |
| packages/nixpkgs/perlPackages.AuthenRadius | Provide simple Radius client facilities |
| packages/nixpkgs/perl5Packages.AuthenRadius | Provide simple Radius client facilities |
| packages/nixpkgs/perl540Packages.AuthenOATH | OATH One Time Passwords |
| packages/nixpkgs/perl538Packages.AuthenOATH | OATH One Time Passwords |
| packages/nixpkgs/perl540Packages.AuthenDecHpwd | DEC VMS password hashing |
| packages/nixpkgs/perl538Packages.AuthenDecHpwd | DEC VMS password hashing |
| packages/nixpkgs/perl540Packages.LWPAuthenOAuth | Generate signed OAuth requests |
| packages/nixpkgs/perl538Packages.LWPAuthenOAuth | Generate signed OAuth requests |
| packages/nixpkgs/perlPackages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/perl5Packages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/perl540Packages.AuthenModAuthPubTkt | Generate Tickets (Signed HTTP Cookies) for mod_auth_pubtkt protected websites |
| packages/nixpkgs/perl538Packages.AuthenModAuthPubTkt | Generate Tickets (Signed HTTP Cookies) for mod_auth_pubtkt protected websites |
| packages/nixpkgs/perl538Packages.AuthenKrb5Admin | Perl extension for MIT Kerberos 5 admin interface |
| packages/nixpkgs/perl540Packages.AuthenKrb5Admin | Perl extension for MIT Kerberos 5 admin interface |
| packages/nixpkgs/perl540Packages.AuthenRadius | Provide simple Radius client facilities |
| packages/nixpkgs/perl538Packages.AuthenRadius | Provide simple Radius client facilities |
| packages/nixpkgs/perl538Packages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/perl540Packages.AuthenSASLSASLprep | Stringprep Profile for User Names and Passwords (RFC 4013) |
| packages/nixpkgs/perlPackages.AuthenHtpasswd | Interface to read and modify Apache .htpasswd files |
| packages/nixpkgs/perl5Packages.AuthenHtpasswd | Interface to read and modify Apache .htpasswd files |
| packages/nixpkgs/perl538Packages.AuthenHtpasswd | Interface to read and modify Apache .htpasswd files |
| packages/nixpkgs/perl540Packages.AuthenHtpasswd | Interface to read and modify Apache .htpasswd files |
| packages/nixpkgs/perlPackages.AuthenPassphrase | Hashed passwords/passphrases as objects |
| packages/nixpkgs/perl5Packages.AuthenPassphrase | Hashed passwords/passphrases as objects |
| packages/nixpkgs/perl540Packages.AuthenPassphrase | Hashed passwords/passphrases as objects |
| packages/nixpkgs/perl538Packages.AuthenPassphrase | Hashed passwords/passphrases as objects |
| packages/nixpkgs/perlPackages.CatalystPluginAuthorizationACL | ACL support for Catalyst applications |
| packages/nixpkgs/perl5Packages.CatalystPluginAuthorizationACL | ACL support for Catalyst applications |
| packages/nixpkgs/perl540Packages.CatalystPluginAuthorizationACL | ACL support for Catalyst applications |
| packages/nixpkgs/perl538Packages.CatalystPluginAuthorizationACL | ACL support for Catalyst applications |
| packages/nixpkgs/perlPackages.CatalystPluginAuthentication | Infrastructure plugin for the Catalyst authentication framework |
| packages/nixpkgs/perl5Packages.CatalystPluginAuthentication | Infrastructure plugin for the Catalyst authentication framework |
| packages/nixpkgs/perl538Packages.CatalystPluginAuthentication | Infrastructure plugin for the Catalyst authentication framework |
| packages/nixpkgs/perl540Packages.CatalystPluginAuthentication | Infrastructure plugin for the Catalyst authentication framework |
| packages/nixpkgs/perlPackages.CatalystAuthenticationCredentialHTTP | HTTP Basic and Digest authentication for Catalyst |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationCredentialHTTP | HTTP Basic and Digest authentication for Catalyst |
| packages/nixpkgs/perlPackages.CatalystAuthenticationStoreDBIxClass | Extensible and flexible object <-> relational mapper |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationCredentialHTTP | HTTP Basic and Digest authentication for Catalyst |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationCredentialHTTP | HTTP Basic and Digest authentication for Catalyst |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationStoreDBIxClass | Extensible and flexible object <-> relational mapper |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationStoreDBIxClass | Extensible and flexible object <-> relational mapper |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationStoreDBIxClass | Extensible and flexible object <-> relational mapper |
| packages/nur/nodezeroat.hammer | Tool for CTF challenge authors |
| packages/nur/rycee.firefox-addons.whowrotethat | Explore authorship and revision information visually and directly in Wikipedia articles |
| packages/nur/mikaelfangel-nur.gitpolite | A tool to create github co-author messages. |
| packages/nur/rycee.firefox-addons.ycs-continued | Search comments, replies, chat replay, video transcript for the current video on YouTube by contents, authors, time. |
| packages/nur/rycee.firefox-addons.kagi-privacy-pass | Enables use of Privacy Pass to authenticate with Kagi Search. |
| packages/nur/rycee.firefox-addons.privacy-pass | Client support for Privacy Pass anonymous authorization protocol. |
| packages/nur/xddxdd.comp128 | Python implementation of the Comp128 v1-3 GSM authentication algorithms |
| packages/nur/rycee.firefox-addons.web-eid | Use your electronic identification card for secure authentication and digital signing. |
| packages/nur/xddxdd.python3Packages.comp128 | Python implementation of the Comp128 v1-3 GSM authentication algorithms |
| packages/nur/moraxyc.boringssl-oqs | Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs |
| packages/nur/xddxdd.boringssl-oqs | Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs |
| packages/nur/xddxdd.uncategorized.boringssl-oqs | Fork of BoringSSL that includes prototype quantum-resistant key exchange and authentication in the TLS handshake based on liboqs |
| packages/nur/xddxdd.ldap-auth-proxy | Simple drop-in HTTP proxy for transparent LDAP authentication which is also a HTTP auth backend |
| packages/nur/heph2.google-cloud-sdk-auth-plugin | Google Cloud SDK Auth Plugin |
| packages/nur/xddxdd.glauth | Lightweight LDAP server for development, home use, or CI |
| packages/nur/rycee.firefox-addons.auth-helper | Authenticator generates 2-Step Verification codes in your browser. |
| packages/nur/k0ral.oauth2l | Simple CLI for interacting with Google API authentication |
| packages/nur/shelvacu.haproxy-auth-request | Lua script for HAProxy to add access control to your HTTP services based on a subrequest |
| packages/nur/lennis-dev.xauth-server | The server handling single sign-on and authentication for Lennis.dev services. |
| packages/nur/xddxdd.uncategorized.ldap-auth-proxy | Simple drop-in HTTP proxy for transparent LDAP authentication which is also a HTTP auth backend |
| packages/nur/xddxdd.email-oauth2-proxy | IMAP/POP/SMTP proxy that transparently adds OAuth 2.0 authentication for email clients |
| packages/nur/wrvsrx.goauthing | Authentication utility for srun4000 (auth.tsinghua.edu.cn / net.tsinghua.edu.cn / Tsinghua-IPv4) |
| packages/nur/codgician.sasl-xoauth2 | SASL plugin for XOAUTH2 |
| packages/nur/xddxdd.uncategorized.glauth | Lightweight LDAP server for development, home use, or CI |
| packages/nur/xddxdd.python3Packages.email-oauth2-proxy | IMAP/POP/SMTP proxy that transparently adds OAuth 2.0 authentication for email clients |
| packages/nur/nagy.python3Packages.oauth2token | Simple cli tools to create and use oauth2token |
| packages/nur/wrvsrx.pam_ssh_agent_auth | PAM module for authentication through the SSH agent |