| options/nixos/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/darwin/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/nixos/nix.sshServe.trusted | Whether to add nix-ssh to the nix.settings.trusted-users
|
| options/nixos/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/darwin/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/nixos/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/darwin/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/home-manager/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/darwin/users.users | Configuration for users.
|
| options/nixos/users.users | Additional user accounts to be created automatically by the system
|
| options/nixos/users.motd | Message of the day shown to users when they log in.
|
| options/darwin/users.users.<name>.uid | The user's UID.
|
| options/darwin/users.users.<name>.gid | The user's primary group.
|
| options/nixos/users.users.<name>.home | The user's home directory.
|
| options/nixos/users.users.<name>.uid | The account UID
|
| options/nixos/users.motdFile | A file containing the message of the day shown to users when they log in.
|
| options/nixos/users.users.<name>.group | The user's primary group.
|
| options/nixos/users.users.<name>.name | The name of the user account
|
| options/darwin/users.users.<name>.name | The name of the user account
|
| options/nixos/nix.settings.trusted-public-keys | List of public keys used to sign binary caches
|
| options/darwin/nix.settings.trusted-public-keys | List of public keys used to sign binary caches
|
| options/darwin/users.groups | Configuration for groups.
|
| options/darwin/users.knownUsers | List of users owned and managed by nix-darwin
|
| options/darwin/users.users.<name>.isHidden | Whether to make the user account hidden.
|
| options/nixos/users.groups | Additional groups to be created automatically by the system.
|
| options/darwin/users.users.<name>.home | The user's home directory
|
| options/nixos/power.ups.users | Users that can access upsd
|
| options/darwin/users.users.<name>.createHome | Create the home directory when creating the user.
|
| options/nixos/users.extraUsers | Alias of users.users.
|
| options/nixos/users.users.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/users.users.<name>.shell | The path to the user's shell
|
| options/nixos/users.users.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/users.users.<name>.homeMode | The user's home directory mode in numeric format
|
| options/nixos/users.users.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/users.mysql.pam | Settings for pam_mysql
|
| options/nixos/users.users.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/users.ldap.base | The distinguished name of the search base.
|
| options/nixos/users.users.<name>.packages | The set of packages that should be made available to the user
|
| options/darwin/users.users.<name>.packages | The set of packages that should be made availabe to the user
|
| options/nixos/users.extraGroups | Alias of users.groups.
|
| options/nixos/users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/users.users.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/nixos/users.users.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/nixos/users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.defaultUserHome | The default home directory for normal users.
|
| options/nixos/users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/darwin/users.users.<name>.shell | The user's shell
|
| options/nixos/users.mysql.user | The username to use when connecting to the database
|
| options/nixos/users.mysql.host | The hostname of the MySQL/MariaDB server
|
| options/nixos/users.users.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/nixos/users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/darwin/users.knownGroups | List of groups owned and managed by nix-darwin
|
| options/nixos/users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/nix.settings.require-sigs | If enabled (the default), Nix will only download binaries from binary caches if
they are cryptographically signed with any of the keys listed in
nix.settings.trusted-public-keys
|
| options/darwin/nix.settings.require-sigs | If enabled (the default), Nix will only download binaries from binary caches if
they are cryptographically signed with any of the keys listed in
nix.settings.trusted-public-keys
|
| options/nixos/users.ldap.server | The URL of the LDAP server.
|
| options/nixos/users.ldap.loginPam | Whether to include authentication against LDAP in login PAM.
|
| options/nixos/users.users.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/users.mysql.nss | Settings for libnss-mysql
|
| options/nixos/users.ldap.enable | Whether to enable authentication against an LDAP server.
|
| options/darwin/users.groups.<name>.gid | The group's GID.
|
| options/nixos/users.mysql.pam.where | Additional criteria for the query.
|
| options/nixos/users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/users.ldap.useTLS | If enabled, use TLS (encryption) over an LDAP (port 389)
connection
|
| options/nixos/users.mysql.pam.table | The name of table that maps unique login names to the passwords.
|
| options/nixos/users.mysql.database | The name of the database containing the users
|
| options/nixos/users.mysql.enable | Whether to enable authentication against a MySQL/MariaDB database.
|
| options/nixos/users.manageLingering | Whether to manage whether users linger or not.
|
| options/nixos/users.groups.<name>.gid | The group GID
|
| options/nixos/boot.initrd.systemd.users | Users to include in initrd.
|
| options/nixos/users.extraUsers.<name>.home | The user's home directory.
|
| options/nixos/users.groups.<name>.name | The name of the group
|
| options/darwin/users.groups.<name>.name | The group's name
|
| options/nixos/users.ldap.timeLimit | Specifies the time limit (in seconds) to use when performing
searches
|
| options/nixos/users.extraUsers.<name>.uid | The account UID
|
| options/nixos/users.extraUsers.<name>.group | The user's primary group.
|
| options/nixos/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/users.users.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/users.mysql.pam.userColumn | The name of the column that contains a unix login name.
|
| options/nixos/programs.weylus.users | To enable stylus and multi-touch support, the user you're going to use must be added to this list
|
| options/darwin/users.users.<name>.ignoreShellProgramCheck | By default, nix-darwin will check that programs
|
| options/nixos/users.extraUsers.<name>.name | The name of the user account
|
| options/nixos/users.ldap.nsswitch | Whether to include lookup against LDAP in NSS.
|
| options/nixos/users.extraGroups.<name>.gid | The group GID
|
| options/nixos/users.ldap.bind.timeLimit | Specifies the time limit (in seconds) to use when connecting
to the directory server
|
| options/nixos/power.ups.users.<name>.upsmon | Add the necessary actions for a upsmon process to work
|
| options/nixos/users.extraGroups.<name>.name | The name of the group
|
| options/nixos/users.defaultUserShell | This option defines the default shell assigned to user
accounts
|
| options/nixos/users.mysql.pam.verbose | If enabled, produces logs with detailed messages that describes what
pam_mysql is doing
|
| options/darwin/users.groups.<name>.members | The group's members.
|
| options/nixos/users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/nixos/programs.benchexec.users | Users that intend to use BenchExec
|
| options/nixos/users.enforceIdUniqueness | Whether to require that no two users/groups share the same uid/gid.
|
| options/nixos/users.mysql.nss.getpwnam | SQL query for the getpwnam
syscall.
|
| options/nixos/users.mysql.nss.getgrgid | SQL query for the getgrgid
syscall.
|
| options/nixos/users.mysql.nss.getgrnam | SQL query for the getgrnam
syscall.
|
| options/nixos/users.mysql.nss.getspnam | SQL query for the getspnam
syscall.
|
| options/nixos/users.mysql.nss.getspent | SQL query for the getspent
syscall.
|
| options/nixos/users.mysql.nss.getgrent | SQL query for the getgrent
syscall.
|
| options/nixos/users.mysql.nss.getpwuid | SQL query for the getpwuid
syscall.
|
| options/nixos/users.mysql.nss.getpwent | SQL query for the getpwent
syscall.
|
| options/darwin/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/services.nntp-proxy.users | NNTP-Proxy user configuration
|
| options/nixos/users.extraUsers.<name>.packages | The set of packages that should be made available to the user
|
| options/nixos/users.mysql.pam.updateTable | The name of the table used for password alteration
|
| options/nixos/users.mysql.pam.logging.table | The name of the table to which logs are written.
|
| options/nixos/services.murmur.users | Maximum number of concurrent clients allowed.
|
| options/nixos/users.mysql.passwordFile | The path to the file containing the password for the user
|
| options/nixos/power.ups.users.<name>.actions | Allow the user to do certain things with upsd
|
| options/nixos/users.mysql.pam.cryptDefault | The default encryption method to use for passwordCrypt = 1.
|
| options/nixos/boot.loader.grub.users | User accounts for GRUB
|
| options/nixos/users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| options/nixos/users.extraUsers.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/users.ldap.extraConfig | Extra configuration options that will be added verbatim at
the end of the ldap configuration file (ldap.conf(5))
|
| options/nixos/users.extraUsers.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/users.extraUsers.<name>.shell | The path to the user's shell
|
| options/nixos/users.mutableUsers | If set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands
|
| options/nixos/users.extraUsers.<name>.homeMode | The user's home directory mode in numeric format
|
| options/nixos/users.extraUsers.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/users.extraUsers.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| options/nixos/users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/users.mysql.pam.logging.enable | Enables logging of authentication attempts in the MySQL database.
|
| options/nixos/users.ldap.bind.passwordFile | The path to a file containing the credentials to use when binding
to the LDAP server (if not binding anonymously).
|
| options/nixos/users.mysql.nss.memsbygid | SQL query for the memsbygid
syscall.
|
| options/nixos/users.mysql.nss.gidsbymem | SQL query for the gidsbymem
syscall.
|
| options/nixos/boot.loader.grub.users.<name>.password | Specifies the clear text password for the account
|
| options/nixos/users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/services._3proxy.usersFile | Load users and passwords from this file
|
| options/nixos/users.ldap.daemon.extraConfig | Extra configuration options that will be added verbatim at
the end of the nslcd configuration file (nslcd.conf(5)).
|
| options/nixos/services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| options/nixos/security.doas.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/nixos/security.sudo.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/nixos/users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/users.mysql.pam.logging.msgColumn | The name of the column in the log table to which the description
of the performed operation is stored.
|
| options/nixos/security.sudo-rs.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/nixos/users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/services.anki-sync-server.users | List of user-password pairs to provide to the sync server.
|
| options/nixos/boot.initrd.systemd.users.<name>.shell | The path to the user's shell in initrd.
|
| options/nixos/boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| options/nixos/users.mysql.pam.passwordColumn | The name of the column that contains a (encrypted) password string.
|
| options/nixos/services.crossmacro.users | List of users granted permission to use CrossMacro.
|
| options/nixos/users.mysql.pam.logging.timeColumn | The name of the column in the log table to which the timestamp of the
log entry is stored.
|
| options/nixos/users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| options/nixos/users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| options/nixos/users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| options/nixos/users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/users.extraUsers.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/nixos/systemd.user.tmpfiles.users | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically.
|
| options/nixos/power.ups.users.<name>.passwordFile | The full path to a file that contains the user's (clear text)
password
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/users.ldap.bind.policy | Specifies the policy to use for reconnecting to an unavailable
LDAP server
|
| options/nixos/power.ups.users.<name>.instcmds | Let the user initiate specific instant commands
|
| options/nixos/services._3proxy.services.*.acl.*.users | List of users, use empty list for any.
|
| options/nixos/users.extraUsers.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/programs.idescriptor.users | Users to be added to the idevice group.
|
| options/nixos/boot.loader.grub.users.<name>.hashedPassword | Specifies the password hash for the account,
generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.grafana.settings.users.hidden_users | This is a comma-separated list of usernames
|
| options/nixos/users.mysql.pam.logging.rHostColumn | The name of the column in the log table to which the name of the remote
host that initiates the session is stored
|
| options/nixos/users.extraUsers.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/services.pgbouncer.settings.users | Optional
|
| options/nixos/services.bitcoind.<name>.rpc.users | RPC user information for JSON-RPC connections.
|
| options/nixos/services.grafana.settings.users.home_page | Path to a custom home page
|
| options/nixos/users.ldap.daemon.enable | Whether to let the nslcd daemon (nss-pam-ldapd) handle the
LDAP lookups for NSS and PAM
|
| options/nixos/services.dokuwiki.sites.<name>.usersFile | Location of the dokuwiki users file
|
| options/nixos/systemd.sysusers.enable | If enabled, users are created with systemd-sysusers instead of with
the custom update-users-groups.pl script
|
| options/nixos/hardware.openrazer.users | Usernames to be added to the "openrazer" group, so that they
can start and interact with the OpenRazer userspace daemon.
|
| options/nixos/services.samba.settings.global."invalid users" | List of users who are denied to login via Samba.
|
| options/nixos/security.pam.oath.usersFile | Set the path to file where the user's credentials are
stored
|
| options/nixos/services.nntp-proxy.users.<name>.username | Username
|
| options/nixos/services.influxdb2.provision.users | Users to provision.
|
| options/nixos/services.anki-sync-server.users.*.password | Password accepted by anki-sync-server for the associated username.
WARNING: This option is not secure
|
| options/nixos/services.mosquitto.listeners.*.users | A set of users and their passwords and ACLs.
|
| options/darwin/users.groups.<name>.description | The group's description.
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.name | Username for JSON-RPC connections.
|
| options/nixos/services.mtprotoproxy.users | Allowed users and their secrets
|
| options/nixos/users.users.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/nix.settings.trusted-substituters | List of binary cache URLs that non-root users can use (in
addition to those specified using
nix.settings.substituters) by passing
--option binary-caches to Nix commands.
|
| options/darwin/nix.settings.trusted-substituters | List of binary cache URLs that non-root users can use (in
addition to those specified using
nix.settings.substituters) by passing
--option binary-caches to Nix commands.
|
| options/nixos/services.grafana.settings.users.allow_sign_up | Set to false to prohibit users from being able to sign up / create user accounts
|
| options/nixos/users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| options/nixos/boot.loader.grub.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the account
|
| options/nixos/systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/services.anki-sync-server.users.*.username | User name accepted by anki-sync-server.
|
| options/nixos/users.ldap.daemon.rootpwmoddn | The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
|
| options/nixos/services.nntp-proxy.users.<name>.passwordHash | SHA-512 password hash (can be generated by
mkpasswd -m sha-512 <password>)
|
| options/nixos/services.grafana.settings.users.login_hint | Text used as placeholder text on login page for login/username input.
|
| options/nixos/users.ldap.daemon.rootpwmodpwFile | The path to a file containing the credentials with which to bind to
the LDAP server if the root user tries to change a user's password.
|
| options/nixos/users.users.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/users.extraUsers.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/users.extraUsers.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/services.anki-sync-server.users.*.passwordFile | File containing the password accepted by anki-sync-server for
the associated username
|
| options/nixos/boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.cloudlog.update-lotw-users.enable | Whether to periodically update the list of LoTW users
|
| options/nixos/nix.nrBuildUsers | Number of nixbld user accounts created to
perform secure concurrent builds
|
| options/darwin/nix.nrBuildUsers | Number of nixbld user accounts created to
perform secure concurrent builds
|
| options/nixos/services.grafana.settings.users.auto_assign_org | Set to true to automatically add new users to the main organization (id 1)
|
| options/nixos/users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/users.users.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/nixos/services.vsftpd.virtualUseLocalPrivs | If enabled, virtual users will use the same privileges as local
users
|
| options/nixos/users.ldap.bind.distinguishedName | The distinguished name to bind to the LDAP server with
|
| options/nixos/services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.users | Sync users.
|
| options/nixos/services.nntp-proxy.users.<name>.maxConnections | Maximum number of concurrent connections to the proxy for this user
|
| options/nixos/services.freeciv.settings.Newusers | Whether to enable new users to login if auth is enabled.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.acl | Control client access to topics on the broker.
|
| options/nixos/users.mysql.pam.passwordCrypt | The method to encrypt the user's password:
0 (or "plain"):
No encryption
|
| options/nixos/services.grafana.settings.users.password_hint | Text used as placeholder text on login page for password input.
|
| options/nixos/services.grafana.settings.users.default_theme | Sets the default UI theme. system matches the user's system theme.
|
| options/nixos/services.grafana.settings.users.allow_org_create | Set to false to prohibit users from creating new organizations.
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.passwordHMAC | Password HMAC-SHA-256 for JSON-RPC connections
|
| options/nixos/users.mysql.pam.disconnectEveryOperation | By default, pam_mysql keeps the connection to the MySQL
database until the session is closed
|
| options/nixos/users.users.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/services.paretosecurity.users | Per-user Pareto Security configuration.
|
| options/nixos/services.influxdb2.provision.users.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| options/nixos/services.clickhouse.usersConfig | Your users.yaml as a Nix attribute set
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.password | Specifies the (clear text) password for the MQTT User.
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/darwin/services.postgresql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.grafana.settings.users.auto_assign_org_id | Set this value to automatically add new users to the provided org
|
| options/nixos/services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| options/nixos/services.grafana.settings.users.default_language | This setting configures the default UI language, which must be a supported IETF language tag, such as en-US.
|
| options/nixos/services.grafana.settings.users.viewers_can_edit | Viewers can access and use Explore and perform temporary edits on panels in dashboards they have access to
|
| options/nixos/services.cloudlog.update-lotw-users.interval | Specification (in the format described by systemd.time(7)) of the
time at which the LoTW user update will occur.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| options/nixos/services.incron.allow | Users allowed to use incrontab
|
| options/nixos/services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPassword | Specifies the hashed password for the MQTT User
|
| options/nixos/services.taskserver.organisations.<name>.users | A list of user names that belong to the organization.
|
| options/nixos/services.grafana.settings.users.auto_assign_org_role | The role new users will be assigned for the main organization (if the auto_assign_org setting is set to true).
|
| options/nixos/users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| options/nixos/services.postgresql.ensureUsers | Ensures that the specified users exist
|
| options/nixos/services.headscale.settings.oidc.allowed_users | Users allowed to authenticate even if not in allowedDomains.
|
| options/nixos/services.tt-rss.plugins | List of plugins to load automatically for all users
|
| options/nixos/services.calibre-server.auth.userDb | Choose users database file to use for authentication
|
| options/nixos/services.umurmur.settings.max_users | Maximum number of concurrent clients allowed.
|
| options/nixos/services.fcron.deny | Users forbidden from using fcron.
|
| options/home-manager/programs.zsh.dotDir | Directory where the zsh configuration and more should be located,
relative to the users home directory
|
| options/darwin/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/nixos/hardware.i2c.group | Grant access to i2c devices (/dev/i2c-*) to users in this group.
|
| options/nixos/services.grafana.settings.users.verify_email_enabled | Require email validation before sign up completes.
|
| options/nixos/users.extraUsers.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/services.incron.deny | Users forbidden from using incrontab.
|
| options/nixos/programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| options/nixos/programs.cdemu.group | Group that users must be in to use cdemu.
|
| options/nixos/services.tor.relay.role | Your role in Tor network
|
| options/nixos/services.prosody.modules.blocklist | Allow users to block communications with other users
|
| options/nixos/users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/services.logrotate.checkConfig | Whether the config should be checked at build time
|
| options/nixos/users.extraUsers.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/nixos/programs.fuse.mountMax | Set the maximum number of FUSE mounts allowed to non-root users.
|
| options/nixos/programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| options/nixos/security.polkit.adminIdentities | Specifies which users are considered “administrators”, for those
actions that require the user to authenticate as an
administrator (i.e. have an auth_admin
value)
|
| options/nixos/services.oauth2-proxy.google.adminEmail | The Google Admin to impersonate for API calls
|
| options/nixos/programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| options/nixos/services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| options/nixos/services.matrix-synapse.settings.presence.enabled | Whether to enable presence tracking
|
| options/nixos/security.pam.services.<name>.unixAuth | Whether users can log in with passwords defined in
/etc/shadow.
|
| options/nixos/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/nixos/services.guix.nrBuildUsers | Number of Guix build users to be used in the build pool.
|
| options/nixos/security.sudo.enable | Whether to enable the sudo command, which
allows non-root users to execute commands as root.
|
| options/nixos/security.doas.enable | Whether to enable the doas command, which allows
non-root users to execute commands as root.
|
| options/nixos/security.loginDefs.settings.UID_MAX | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| options/nixos/security.loginDefs.settings.UID_MIN | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| options/nixos/services.vsftpd.userDbPath | Only applies if enableVirtualUsers is true
|
| options/nixos/security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| options/nixos/services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| options/nixos/services.samba.usershares.enable | Whether to enable user-configurable Samba shares.
|
| options/nixos/security.loginDefs.settings.SYS_UID_MAX | Range of user IDs used for the creation of system users by useradd or newusers.
|
| options/nixos/security.loginDefs.settings.SYS_UID_MIN | Range of user IDs used for the creation of system users by useradd or newusers.
|
| options/nixos/programs.ydotool.group | Group which users must be in to use ydotool.
|
| options/nixos/services.syncplay.chat | Chat with users in the same room.
|
| options/nixos/users.extraUsers.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/programs.rush.shell | The resolved shell path that users can inherit to set rush as their login shell
|
| options/nixos/services.vsftpd.localUsers | Whether to enable FTP for local users.
|
| options/nixos/hardware.sane.enable | Enable support for SANE scanners.
Users in the "scanner" group will gain access to the scanner, or the "lp" group if it's also a printer.
|
| options/nixos/security.sudo-rs.enable | Whether to enable a memory-safe implementation of the sudo command,
which allows non-root users to execute commands as root
.
|
| options/nixos/services.weblate.smtp.port | SMTP port used when sending emails to users.
|
| options/nixos/services.weblate.smtp.host | SMTP host used when sending emails to users.
|
| options/nixos/security.ipa.ifpAllowedUids | A list of users allowed to access the ifp dbus interface.
|
| options/darwin/system.checks.verifyBuildUsers | Whether to run the Nix build users validation checks.
|
| options/nixos/services.exim.user | User to use when no root privileges are required
|
| options/nixos/services.syncplay.ready | Check readiness of users.
|
| options/nixos/hardware.brillo.enable | Whether to enable brillo in userspace
|
| options/nixos/hardware.i2c.enable | Whether to enable i2c devices support
|
| options/nixos/security.pam.p11.enable | Enables P11 PAM (pam_p11) module
|
| options/nixos/programs.fuse.userAllowOther | Allow non-root users to specify the allow_other or allow_root mount
options, see mount.fuse3(8).
|
| options/nixos/services.tt-rss.auth.autoCreate | Allow authentication modules to auto-create users in tt-rss internal
database when authenticated successfully.
|
| options/nixos/services.ombi.enable | Whether to enable Ombi, a web application that automatically gives your shared Plex or
Emby users the ability to request content by themselves!
Optionally see https://docs.ombi.app/info/reverse-proxy
on how to set up a reverse proxy
.
|
| options/nixos/services.vsftpd.writeEnable | Whether any write activity is permitted to users.
|
| options/nixos/hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| options/nixos/security.please.enable | Whether to enable please, a Sudo clone which allows a users to execute a command or edit a
file as another user
.
|
| options/nixos/programs.pmount.enable | Whether to enable pmount, a tool that allows normal users to mount removable devices
without requiring root privileges
.
|
| options/darwin/system.defaults.loginwindow.GuestEnabled | Apple menu > System Preferences > Users and Groups > Login Options
Allow users to login to the machine as guests using the Guest account
|
| options/nixos/security.pam.dp9ik.enable | Whether to enable the dp9ik pam module provided by tlsclient
|
| options/nixos/security.pam.howdy.enable | Whether to enable the Howdy PAM module
|
| options/nixos/services.dawarich.smtp.host | SMTP host used when sending emails to users.
|
| options/nixos/services.dawarich.smtp.port | SMTP port used when sending emails to users.
|
| options/nixos/services.mastodon.smtp.host | SMTP host used when sending emails to users.
|
| options/nixos/services.mastodon.smtp.port | SMTP port used when sending emails to users.
|
| options/nixos/services.biboumi.settings.admin | The bare JID of the gateway administrator
|
| options/nixos/services.sympa.listMasters | The list of the email addresses of the listmasters
(users authorized to perform global server commands).
|
| options/nixos/services.kubo.settings.Mounts.FuseAllowOther | Allow all users to access the FUSE mount points
|
| options/nixos/services.openssh.settings.LogLevel | Gives the verbosity level that is used when logging messages from sshd(8)
|
| options/nixos/services.dovecot2.mailUser | Default user to store mail for virtual users.
|
| options/nixos/services.angrr.settings.owned-only | Only monitors owned symbolic link target of GC roots.
- "auto": behaves like true for normal users, false for root.
- "true": only monitor GC roots owned by the current user.
- "false": monitor all GC roots.
|
| options/nixos/services.openssh.settings.AllowUsers | If specified, login is allowed only for the listed users
|
| options/nixos/services.openssh.settings.DenyUsers | If specified, login is denied for all listed users
|
| options/nixos/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/darwin/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/nixos/services.maubot.settings.admins | List of administrator users
|
| options/nixos/security.sudo.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/services.jupyter.group | Name of the group used to run the jupyter service
|
| options/nixos/services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| options/nixos/services.syncplay.motdFile | Path to text to display when users join
|
| options/nixos/security.sudo-rs.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/services.sftpgo.loadDataFile | Path to a json file containing users and folders to load (or update) on startup
|
| options/nixos/services.cryptpad.settings.adminKeys | List of public signing keys of users that can access the admin panel
|
| options/nixos/services.prosody.modules.mam | Store messages in an archive and allow users to access it
|
| options/nixos/services.prosody.modules.motd | Send a message to users when they log in
|
| options/nixos/services.dovecot2.mailGroup | Default group to store mail for virtual users.
|
| options/nixos/programs.minipro.enable | Whether to enable minipro and its udev rules
|
| options/nixos/services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| options/nixos/security.duosec.groups | If specified, Duo authentication is required only for users
whose primary group or supplementary group list matches one
of the space-separated pattern lists
|
| options/nixos/services.tt-rss.singleUserMode | Operate in single user mode, disables all functionality related to
multiple users and authentication
|
| options/nixos/services.prosody.modules.pep | Enables users to publish their mood, activity, playing music and more
|
| options/nixos/services.openssh.settings.AllowGroups | If specified, login is allowed only for users part of the
listed groups
|
| options/nixos/services.openssh.settings.DenyGroups | If specified, login is denied for all users part of the listed
groups
|
| options/nixos/services.diod.allsquash | Remap all users to "nobody"
|
| options/nixos/services.drupal.sites.<name>.themesDir | The location for users to install Drupal themes.
|
| options/nixos/services.syncplay.motd | Text to display when users join
|
| options/nixos/services.prosody.modules.vcard | Allow users to set vCards
|
| options/nixos/services.glitchtip.settings.ENABLE_USER_REGISTRATION | When true, any user will be able to register
|
| options/nixos/services.timekpr.adminUsers | All listed users will become part of the timekpr group so they can manage timekpr settings without requiring sudo.
|
| options/nixos/services.kea.dhcp6.configFile | Kea DHCP6 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp6-srv.html
|
| options/nixos/services.kea.dhcp4.configFile | Kea DHCP4 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp4-srv.html
|
| options/nixos/virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| options/nixos/networking.wireless.userControlled | Allow users of the wpa_supplicant group to control wpa_supplicant
through wpa_gui or wpa_cli
|
| options/nixos/services.kea.dhcp-ddns.configFile | Kea DHCP-DDNS configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/ddns.html
|
| options/nixos/services.coturn.realm | The default realm to be used for the users when no explicit
origin/realm relationship was found in the database, or if the TURN
server is not using any database (just the commands-line settings
and the userdb file)
|
| options/nixos/programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| options/nixos/services.coturn.no-auth | This option is opposite to lt-cred-mech.
(TURN Server with no-auth option allows anonymous access)
|
| options/nixos/services.bitlbee.authBackend | How users are authenticated
storage -- save passwords internally
pam -- Linux PAM authentication
|
| options/nixos/services.alerta.signupEnabled | Whether to prevent sign-up of new users via the web UI
|
| options/nixos/services.hologram-server.ldapBaseDN | The base DN for your Hologram users
|
| options/nixos/services.prosody.modules.roster | Allow users to have a roster
|
| options/nixos/security.doas.extraRules.*.runAs | Which user or group the specified command is allowed to run as
|
| options/nixos/services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| options/nixos/networking.wireless.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| options/nixos/services.vsftpd.userlistEnable | Whether users are included.
|
| options/nixos/services.tt-rss.forceArticlePurge | When this option is not 0, users ability to control feed purging
intervals is disabled and all articles (which are not starred)
older than this amount of days are purged.
|
| options/nixos/services.kea.ctrl-agent.configFile | Kea Control Agent configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/agent.html
|
| options/nixos/security.pam.krb5.enable | Enables Kerberos PAM modules (pam-krb5,
pam-ccreds)
|
| options/nixos/security.loginDefs.chfnRestrict | Use chfn SUID to allow non-root users to change their account GECOS information.
|
| options/darwin/system.defaults.loginwindow.ShutDownDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
Disables the "Shutdown" option when users are logged in
|
| options/nixos/services.zeitgeist.enable | Whether to enable zeitgeist, a service which logs the users' activities and events.
|
| options/nixos/security.pam.yubico.enable | Enables Yubico PAM (yubico-pam) module
|
| options/nixos/services.aria2.enable | Whether or not to enable the headless Aria2 daemon service
|
| options/nixos/services.vsftpd.forceLocalDataSSL | Only applies if sslEnable is true
|
| options/nixos/programs.mouse-actions.enable | Whether to install and set up mouse-actions and it's udev rules
|
| options/nixos/services.cryptpad.settings.httpUnsafeOrigin | This is the URL that users will enter to load your instance
|
| options/nixos/services.sourcehut.settings."todo.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| options/nixos/security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| options/nixos/hardware.acpilight.enable | Enable acpilight
|
| options/nixos/services.sourcehut.settings."lists.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| options/nixos/services.dawarich.smtp.fromAddress | "From" address used when sending emails to users.
|
| options/nixos/services.mastodon.smtp.fromAddress | "From" address used when sending Emails to users.
|
| options/nixos/services.sourcehut.settings."builds.sr.ht".allow-free | Whether to enable nonpaying users to submit builds.
|
| options/darwin/system.defaults.loginwindow.RestartDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
Disables the “Restart” option when users are logged in
|
| options/nixos/services.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate users via tailscale.
|
| options/nixos/services.sourcehut.settings."todo.sr.ht::mail".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/nixos/services.prosody.modules.welcome | Welcome users who register accounts
|
| options/nixos/security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| options/nixos/services.vsftpd.forceLocalLoginsSSL | Only applies if sslEnable is true
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".user-domain | Configures the user domain, if enabled
|
| options/darwin/system.defaults.loginwindow.SHOWFULLNAME | Apple menu > System Preferences > Users and Groups > Login Options
Displays login window as a name and password field instead of a list of users
|
| options/nixos/security.sudo.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| options/nixos/security.doas.wheelNeedsPassword | Whether users of the wheel group must provide a password to
run commands as super user via doas.
|
| options/nixos/services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| options/nixos/security.pam.dp9ik.authserver | This controls the hostname for the 9front authentication server
that users will be authenticated against.
|
| options/nixos/networking.supplicant.<name>.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| options/nixos/security.sudo-rs.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| options/nixos/services.upower.ignoreLid | Do we ignore the lid state
Some laptops are broken
|
| options/nixos/services.pgmanage.loginGroup | This tells pgmanage to only allow users in a certain PostgreSQL group to
login to pgmanage
|
| options/nixos/services.freshrss.api.enable | Whether to enable API access for mobile apps and third-party clients (Google Reader API and Fever API)
|
| options/nixos/services.spacecookie.settings.log.hide-ips | If enabled, spacecookie will hide personal
information of users like IP addresses from
log output.
|
| options/nixos/security.run0.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via run0.
|
| options/nixos/security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| options/nixos/services.bitlbee.authMode | The following authentication modes are available:
Open -- Accept connections from anyone, use NickServ for user authentication
|
| options/nixos/security.pam.services.<name>.ttyAudit.enable | Enable or disable TTY auditing for specified users
|
| options/nixos/services.terraria.enable | If enabled, starts a Terraria server
|
| options/nixos/services.portunus.seedSettings | Seed settings for users and groups
|
| options/nixos/services.displayManager.hiddenUsers | A list of users which will not be shown in the display manager.
|
| options/nixos/services.dependency-track.settings."alpine.oidc.user.provisioning" | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| options/nixos/security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| options/nixos/services.xserver.imwheel.rules | Window class translation rules.
/etc/X11/imwheelrc is generated based on this config
which means this config is global for all users
|
| options/nixos/services.prosody.modules.announce | Send announcement to all online users
|
| options/nixos/services.openafsClient.daemons | Number of daemons to serve user requests
|
| options/nixos/services.kanidm.provision.enable | Whether to enable provisioning of groups, users and oauth2 resource servers.
|
| options/nixos/services.anuko-time-tracker.settings.multiorgMode | Defines whether users see the Register option in the menu of Time Tracker that allows them
to self-register and create new organizations (top groups).
|
| options/nixos/programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| options/nixos/hardware.keyboard.uhk.enable | Whether to enable non-root access to the firmware of UHK keyboards
|
| options/nixos/services.sourcehut.settings."lists.sr.ht::worker".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/nixos/programs.steam.fontPackages | Font packages to use in Steam
|
| options/nixos/services.nginx.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate nginx users via tailscale.
|
| options/nixos/security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| options/nixos/services.prosody.modules.register | Allow users to register on this server using a client and change passwords
|
| options/nixos/hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| options/nixos/services.szurubooru.server.settings.secretFile | File containing a secret used to salt the users' password hashes and generate filenames for static content.
|
| options/nixos/security.please.wheelNeedsPassword | Whether users of the wheel group must provide a password to run
commands or edit files with please and
pleaseedit respectively.
|
| options/nixos/virtualisation.spiceUSBRedirection.enable | Install the SPICE USB redirection helper with setuid
privileges
|
| options/nixos/services.vsftpd.anonymousMkdirEnable | Whether any uploads are permitted to anonymous users.
|
| options/nixos/security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| options/nixos/services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| options/nixos/security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| options/nixos/services.tuliprox.apiProxySettings | Users and proxy configuration
Refer to the Tuliprox documentation for available attributes
|
| options/nixos/programs.hyprland.withUWSM | Launch Hyprland with the UWSM (Universal Wayland Session Manager) session manager
|
| options/darwin/environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| options/nixos/programs.chromium.initialPrefs | Initial preferences are used to configure the browser for the first run
|
| options/nixos/services.dependency-track.oidc.userProvisioning | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| options/nixos/fonts.fontconfig.antialias | Enable font antialiasing
|
| options/nixos/services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| options/nixos/services.userdbd.enableSSHSupport | Whether to enable exposing OpenSSH public keys defined in userdb
|
| options/nixos/services.pipewire.systemWide | If true, a system-wide PipeWire service and socket is enabled
allowing all users in the "pipewire" group to use it simultaneously
|
| options/nixos/services.vsftpd.chrootlocalUser | Whether local users are confined to their home directory.
|
| options/nixos/services.vsftpd.anonymousUploadEnable | Whether any uploads are permitted to anonymous users.
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.thelounge.public | Make your The Lounge instance public
|
| options/home-manager/accounts.email.accounts.<name>.getmail.readAll | Enable if you want to fetch all, even the read messages from the
server
|
| options/nixos/services.pretix.settings.pretix.registration | Whether to allow registration of new admin users.
|
| options/nixos/environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| options/nixos/services.movim.minifyStaticFiles | Do minification on public static files which reduces the size of
assets — saving data for the server & users as well as offering a
performance improvement
|
| options/nixos/services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| options/nixos/services.transmission.settings.umask | Sets transmission's file mode creation mask
|
| options/nixos/security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| options/nixos/services.firezone.gui-client.allowedUsers | All listed users will become part of the firezone-client group so
they can control the tunnel service
|
| options/nixos/services.buildbot-master.reporters | List of reporter objects used to present build status to various users.
|
| options/nixos/services.systembus-notify.enable | Whether to enable System bus notification support
WARNING: enabling this option (while convenient) should not be done on a
machine where you do not trust the other users as it allows any other
local user to DoS your session by spamming notifications
.
|
| options/nixos/services.iperf3.authorizedUsersFile | Path to the configuration file containing authorized users credentials to run iperf tests.
|
| options/nixos/services.matrix-tuwunel.settings.global.allow_registration | Whether new users can register on this server
|
| options/nixos/services.grafana.settings.users.user_invite_max_lifetime_duration | The duration in time a user invitation remains valid before expiring
|
| options/nixos/virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| options/home-manager/accounts.email.accounts.<name>.getmail.delete | Enable if you want to delete read messages from the server
|
| options/nixos/fonts.fontconfig.hinting.enable | Enable font hinting
|
| options/nixos/services.grafana.settings.server.enable_gzip | Set this option to true to enable HTTP compression, this can improve transfer speed and bandwidth utilization
|
| options/nixos/services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/services.tt-rss.registration.maxUsers | Maximum amount of users which will be allowed to register on this
system. 0 - no limit.
|
| options/nixos/services.anubis.defaultOptions.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/nixos/system.extraDependencies | A list of paths that should be included in the system
closure but generally not visible to users
|
| options/nixos/services.hylafax.userAccessFile | The hosts.hfaxd
file entry in the spooling area
will be symlinked to the location given here
|
| options/nixos/services.pgbouncer.settings.pgbouncer.max_client_conn | Maximum number of client connections allowed
|
| options/nixos/services.userborn.static | Whether to generate the password files at build time and store them directly
in the system closure, without requiring any services at boot time
|
| options/nixos/services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| options/nixos/services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| options/nixos/services.mtprotoproxy.secureOnly | Don't allow users to connect in non-secure mode (without random padding).
|
| options/nixos/services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/nixos/services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.default" | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| options/nixos/services.akkoma.config.":pleroma".":frontends" | Frontend configuration
|
| options/nixos/services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/boot.initrd.network.ssh.hostKeys | Specify SSH host keys to import into the initrd
|
| options/nixos/programs._1password-gui.polkitPolicyOwners | A list of users who should be able to integrate 1Password with polkit-based authentication mechanisms.
|
| options/darwin/system.defaults.loginwindow.autoLoginUser | Apple menu > System Preferences > Users and Groups > Login Options
Auto login the supplied user on boot
|
| options/nixos/services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| options/nixos/services.sourcehut.settings."meta.sr.ht::settings".onboarding-redirect | Where to redirect new users upon registration.
|
| options/nixos/services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| options/home-manager/wayland.windowManager.hyprland.enable | Whether to enable configuration for Hyprland, a tiling Wayland
compositor that doesn't sacrifice on its looks.
This module configures Hyprland and adds it to your user's PATH,
but does not make certain system-level changes
|
| options/nixos/environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| options/darwin/environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| options/nixos/services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| options/nixos/fonts.fontconfig.subpixel.lcdfilter | FreeType LCD filter
|
| options/nixos/services.matrix-continuwuity.settings.global.allow_registration | Whether new users can register on this server
|
| options/nixos/services.syncthing.openDefaultPorts | Whether to open the default ports in the firewall: TCP/UDP 22000 for transfers
and UDP 21027 for discovery
|
| options/nixos/services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/services.pulseaudio.systemWide | If false, a PulseAudio server is launched automatically for
each user that tries to use the sound system
|
| options/nixos/services.nginx.tailscaleAuth.expectedTailnet | If you want to prevent node sharing from allowing users to access services
across tailnets, declare your expected tailnets domain here.
|
| options/nixos/services.tt-rss.registration.enable | Allow users to register themselves
|
| options/nixos/services.xserver.displayManager.startx.enable | Whether to enable the dummy "startx" pseudo-display manager, which
allows users to start X manually via the startx command from a
virtual terminal.
The X server will run under the current user, not as root.
|
| options/nixos/services.meilisearch.noAnalytics | Deactivates analytics
|
| options/nixos/services.aria2.downloadDirPermission | The permission for settings.dir
|
| options/nixos/services.umurmur.settings.default_channel | The channel in which users will appear in when connecting.
|
| options/nixos/security.unprivilegedUsernsClone | When disabled, unprivileged users will not be able to create new namespaces
|
| options/nixos/services.postfix.localRecipients | List of accepted local users
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/services.prosody.modules.vcard_legacy | Converts users profiles and Avatars between old and new formats
|
| options/nixos/services.dependency-track.oidc.teams.default | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| options/nixos/services.hydra.useSubstitutes | Whether to use binary caches for downloading store paths
|
| options/nixos/documentation.man.man-db.manualPages | The manual pages to generate caches for if documentation.man.generateCaches
is enabled
|
| options/nixos/services.paperless.consumptionDirIsPublic | Whether all users can write to the consumption dir.
|
| options/nixos/services.smartd.notifications.wall.enable | Whenever to send wall notifications to all users.
|
| options/nixos/services._3proxy.services.*.auth | Authentication type
|
| options/nixos/services.transmission.enable | Whether to enable the headless Transmission BitTorrent daemon
|
| options/nixos/services.prosody.modules.cloud_notify | Push notifications to inform users of new messages or other pertinent information even when they have no XMPP clients online
|
| options/nixos/services.warpgate.settings.config_provider | Source of truth of users
|
| options/nixos/services.dependency-track.frontend.baseUrl | The base URL of the API server
|
| options/darwin/system.defaults.loginwindow.SleepDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Sleep button on the login screen
|
| options/darwin/system.defaults.loginwindow.ShutDownDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Shut Down button on the login screen
|
| options/nixos/security.dhparams.params | Diffie-Hellman parameters to generate
|
| options/nixos/virtualisation.docker.enable | This option enables docker, a daemon that manages
linux containers
|
| options/darwin/environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| options/nixos/virtualisation.lxd.enable | This option enables lxd, a daemon that manages
containers
|
| options/nixos/hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| options/nixos/environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| options/nixos/services.xserver.displayManager.sx.enable | Whether to enable the "sx" pseudo-display manager, which allows users
to start manually via the "sx" command from a vt shell
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| options/darwin/system.defaults.loginwindow.RestartDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Restart button on the login screen
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors | All actors (users) to provision
|
| options/nixos/virtualisation.kvmgt.enable | Whether to enable KVMGT (iGVT-g) VGPU support
|
| options/nixos/services.linkwarden.enableRegistration | Whether to enable registration for new users.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.userFilter | LDAP filter for users.
|
| options/nixos/services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/virtualisation.libvirtd.enable | This option enables libvirtd, a daemon that manages
virtual machines
|
| options/nixos/services.prosody.xmppComplianceSuite | The XEP-0423 defines a set of recommended XEPs to implement
for a server
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.largeImport | Enable if you are syncing more than 2000 users/groups.
|
| options/nixos/environment.corePackages | Set of core packages for a normal interactive system
|
| options/nixos/services.i2pd.precomputation.elgamal | Whenever to use precomputated tables for ElGamal.
i2pd defaults to false
to save 64M of memory (and looses some performance)
|
| options/nixos/services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| options/nixos/services.healthchecks.settings.REGISTRATION_OPEN | A boolean that controls whether site visitors can create new accounts
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.userObjectClass | Class that users must have.
|
| options/nixos/services.netbird.server.management.singleAccountModeDomain | Enables single account mode
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/programs.opengamepadui.fontPackages | Font packages to use in OpenGamepadUI
|
| options/nixos/services.alerta.authenticationRequired | Whether users must authenticate when using the web UI or command-line tool
|
| options/darwin/system.defaults.loginwindow.PowerOffDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
If set to true, the Power Off menu item will be disabled when the user is logged in
|
| options/nixos/services.gitea.captcha.requireForExternalRegistration | Displays a CAPTCHA challenge for users that register externally.
|
| options/nixos/services.grafana.provision.datasources.settings.datasources.*.editable | Allow users to edit datasources from the UI.
|
| options/nixos/networking.networkmanager.enable | Whether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured
|
| options/nixos/virtualisation.podman.dockerSocket.enable | Make the Podman socket available in place of the Docker socket, so
Docker tools can find the Podman socket
|
| options/nixos/services.nextcloud.settings.skeletondirectory | The directory where the skeleton files are located
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.removeDisabled | Remove users from bitwarden groups if no longer in the ldap group.
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| options/nixos/virtualisation.docker.rootless.setSocketVariable | Point DOCKER_HOST to rootless Docker instance for
normal users by default.
|
| options/nixos/services.firezone.server.smtp.configureManually | Outbound email configuration is mandatory for Firezone and supports
many different delivery adapters
|
| options/nixos/system.stateVersion | This option defines the first version of NixOS you have installed on this particular machine,
and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.userEmailAttribute | Attribute for a users email.
|
| options/nixos/services.matrix-conduit.settings.global.allow_registration | Whether new users can register on this server.
|
| options/nixos/services.earlyoom.enableNotifications | Send notifications about killed processes via the system d-bus
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.emailPrefixAttribute | The attribute that contains the users username.
|
| options/nixos/security.pam.services.<name>.googleOsLoginAccountVerification | If set, will use the Google OS Login PAM modules
(pam_oslogin_login,
pam_oslogin_admin) to verify possible OS Login
users and set sudoers configuration accordingly
|
| options/nixos/security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| options/nixos/services.matrix-synapse.settings.enable_registration | Enable registration for new users.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.overwriteExisting | Remove and re-add users/groups, See https://bitwarden.com/help/user-group-filters/#overwriting-syncs for more details.
|
| options/nixos/services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| options/nixos/services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| options/nixos/services.smartd.notifications.systembus-notify.enable | Whenever to send systembus-notify notifications
|
| options/nixos/services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| options/nixos/virtualisation.lxc.unprivilegedContainers | Whether to enable support for unprivileged users to launch containers.
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| options/nixos/services.biboumi.settings.realname_customization | Whether the users will be able to use
the ad-hoc commands that lets them configure
their realname and username.
|
| options/nixos/services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| options/nixos/services.pgbouncer.settings.pgbouncer.max_user_connections | Do not allow more than this many server connections per user (regardless of database)
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| packages/nixpkgs/ombi | Self-hosted web application that automatically gives your shared Plex or Emby users the ability to request content by themselves |
| packages/nixpkgs/sonarr | Smart PVR for newsgroup and bittorrent users |
| packages/nixpkgs/onboard | Onscreen keyboard useful for tablet PC users and for mobility impaired users |
| packages/nixpkgs/iw | Tool to use nl80211 |
| packages/nixpkgs/ion3 | Tiling tabbed window manager designed with keyboard users in mind |
| packages/nixpkgs/jami | Free and universal communication platform that respects the privacy and freedoms of its users |
| packages/nixpkgs/kasmweb | Streaming containerized apps and desktops to end-users |
| packages/nixpkgs/gummi | Simple LaTex editor for GTK users |
| packages/nixpkgs/qmk | Program to help users work with QMK Firmware |
| packages/nixpkgs/dcgm | Data Center GPU Manager (DCGM) is a daemon that allows users to monitor NVIDIA data-center GPUs |
| packages/nixpkgs/fbset | Framebuffer device maintenance program |
| packages/nixpkgs/kapp | CLI tool that encourages Kubernetes users to manage bulk resources with an application abstraction for grouping |
| packages/nixpkgs/cli-tips | CLI tool that provides useful tips and commands for Linux users |
| packages/nixpkgs/actkbd | Keyboard shortcut daemon |
| packages/nixpkgs/ghorg | Quickly clone an entire org/users repositories into one directory |
| packages/nixpkgs/afsctool | Utility that allows end-users to leverage HFS+/APFS compression |
| packages/nixpkgs/scmutils | Scheme library for mathematical physics |
| packages/nixpkgs/tntnet | Web server which allows users to develop web applications using C++ |
| packages/nixpkgs/whisparr | Adult movie collection manager for Usenet and BitTorrent users |
| packages/nixpkgs/gotrue | SWT based API for managing users and issuing SWT tokens |
| packages/nixpkgs/caribou | Input assistive technology intended for switch and pointer users |
| packages/nixpkgs/pam_krb5 | PAM module allowing PAM-aware applications to authenticate users by performing an AS exchange with a Kerberos KDC |
| packages/nixpkgs/kompose | Tool to help users who are familiar with docker-compose move to Kubernetes |
| packages/nixpkgs/sourcegit | Free & OpenSource GUI client for GIT users |
| packages/nixpkgs/mozwire | MozillaVPN configuration manager giving Linux, macOS users (among others), access to MozillaVPN |
| packages/nixpkgs/beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/gitlab-pages | Daemon used to serve static websites for GitLab users |
| packages/nixpkgs/gotrue-supabase | JWT based API for managing users and issuing JWT tokens |
| packages/nixpkgs/zeronsd | DNS server for ZeroTier users |
| packages/nixpkgs/filesender | Web application for sending large files to other users |
| packages/nixpkgs/b43Firmware_5_1_138 | Firmware for cards supported by the b43 kernel module |
| packages/nixpkgs/cliquer | Routines for clique searching |
| packages/nixpkgs/userborn | Declaratively bear (manage) Linux users and groups |
| packages/nixpkgs/capslock | Capability analysis CLI for Go packages that informs users of which privileged operations a given package can access |
| packages/nixpkgs/luarenamer | Plugin for Shoko that allows users to rename their collection using Lua |
| packages/nixpkgs/acl2 | Interpreter and prover for a Lisp dialect |
| packages/nixpkgs/b43FirmwareCutter | Firmware extractor for cards supported by the b43 kernel module |
| packages/nixpkgs/modprobed-db | Useful utility for users wishing to build a minimal kernel via a make localmodconfig |
| packages/nixpkgs/rfkill_udev | Rules+hook for udev to catch rfkill state changes |
| packages/nixpkgs/commonsBcel | Gives users a convenient way to analyze, create, and manipulate (binary) Java class files |
| packages/nixpkgs/commons-bcel | Gives users a convenient way to analyze, create, and manipulate (binary) Java class files |
| packages/nixpkgs/drawpile | Collaborative drawing program that allows multiple users to sketch on the same canvas simultaneously |
| packages/nixpkgs/flow-state | Terminal-based habit tracker designed for neurodivergent users |
| packages/nixpkgs/sudo-font | Font for programmers and command line users |
| packages/nixpkgs/antora | Modular documentation site generator |
| packages/nixpkgs/acl2-minimal | Interpreter and prover for a Lisp dialect |
| packages/nixpkgs/libdazzle | Library to delight your users with fancy features |
| packages/nixpkgs/baikal | Lightweight CalDAV+CardDAV server that offers an extensive web interface with easy management of users, address books and calendars |
| packages/nixpkgs/conserver | Application that allows multiple users to watch a serial console at the same time |
| packages/nixpkgs/b43Firmware_6_30_163_46 | Firmware for cards supported by the b43 kernel module |
| packages/nixpkgs/gnome-user-docs | User and system administration help for the GNOME desktop |
| packages/nixpkgs/gridcoin-research | POS-based cryptocurrency that rewards users for participating on the BOINC network |
| packages/nixpkgs/sillytavern | LLM Frontend for Power Users |
| packages/nixpkgs/bash-git-prompt | Informative, fancy bash prompt for Git users |
| packages/nixpkgs/tailscale-nginx-auth | Tool that allows users to use Tailscale Whois authentication with NGINX as a reverse proxy |
| packages/nixpkgs/bashSnippets | Collection of small bash scripts for heavy terminal users |
| packages/nixpkgs/drawpile-server-headless | Collaborative drawing program that allows multiple users to sketch on the same canvas simultaneously |
| packages/nixpkgs/tt-rss-plugin-auth-ldap | Plugin for TT-RSS to authenticate users via ldap |
| packages/nixpkgs/docker-credential-gcr | Docker credential helper for GCR (https://gcr.io) users |
| packages/nixpkgs/tailscale-gitops-pusher | Allows users to use a GitOps flow for managing Tailscale ACLs |
| packages/nixpkgs/gnome-bluetooth_1_0 | Application that let you manage Bluetooth in the GNOME destkop |
| packages/nixpkgs/zsh-completions | Additional completion definitions for zsh |
| packages/nixpkgs/powerline-fonts | Patched fonts for Powerline users |
| packages/nixpkgs/zsh-history-substring-search | Fish shell history-substring-search for Zsh |
| packages/nixpkgs/koodousfinder | Tool to allows users to search for and analyze Android apps |
| packages/nixpkgs/deadd-notification-center | Haskell-written notification center for users that like a desktop with style |
| packages/nixpkgs/zsh-syntax-highlighting | Fish shell like syntax highlighting for Zsh |
| packages/nixpkgs/lgogdownloader-gui | Unofficial downloader to GOG.com for Linux users |
| packages/nixpkgs/lgogdownloader | Unofficial downloader to GOG.com for Linux users |
| packages/nixpkgs/coreutils | GNU Core Utilities |
| packages/nixpkgs/coreutils-full | GNU Core Utilities |
| packages/nixpkgs/zsh-autosuggestions | Fish shell autosuggestions for Zsh |
| packages/nixpkgs/uutils-coreutils-noprefix | Cross-platform Rust rewrite of the GNU coreutils |
| packages/nixpkgs/busybox | Tiny versions of common UNIX utilities in a single small executable |
| packages/nixpkgs/deepin.deepin-draw | Lightweight drawing tool for users to freely draw and simply edit images |
| packages/nixpkgs/kdePackages.elisa | Simple music player aiming to provide a nice experience for its users |
| packages/nixpkgs/linuxPackages.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxPackages_lqx.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxPackages_zen.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/elmPackages.elm-review | Analyzes Elm projects, to help find mistakes before your users find them |
| packages/nixpkgs/ibus-engines.cangjie | IBus engine for users of the Cangjie and Quick input methods |
| packages/nixpkgs/linuxPackages_latest.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxPackages_xanmod.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python313Packages.pyct | ClI for Python common tasks for users |
| packages/nixpkgs/python314Packages.pyct | ClI for Python common tasks for users |
| packages/nixpkgs/python313Packages.pesq | PESQ (Perceptual Evaluation of Speech Quality) Wrapper for Python Users |
| packages/nixpkgs/python314Packages.pesq | PESQ (Perceptual Evaluation of Speech Quality) Wrapper for Python Users |
| packages/nixpkgs/python313Packages.i3-py | Tools for i3 users and developers |
| packages/nixpkgs/python314Packages.i3-py | Tools for i3 users and developers |
| packages/nixpkgs/python312Packages.pyct | ClI for Python common tasks for users |
| packages/nixpkgs/linuxKernel.packages.linux_zen.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_lqx.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python312Packages.pesq | PESQ (Perceptual Evaluation of Speech Quality) Wrapper for Python Users |
| packages/nixpkgs/linuxKernel.packages.linux_5_4.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/typstPackages.datify_0_1_3 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_4 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_1 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_2 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/python313Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/python314Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/typstPackages.postercise | Postercise allows users to easily create academic research posters with different themes using Typst |
| packages/nixpkgs/python313Packages.bangla | Bangla is a package for Bangla language users with various functionalities including Bangla date and Bangla numeric conversation |
| packages/nixpkgs/python314Packages.bangla | Bangla is a package for Bangla language users with various functionalities including Bangla date and Bangla numeric conversation |
| packages/nixpkgs/python312Packages.i3-py | Tools for i3 users and developers |
| packages/nixpkgs/linuxKernel.packages.linux_6_17.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_19.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_18.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_5_15.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python313Packages.beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/grafanaPlugins.grafana-discourse-datasource | Allows users to search and view topics, posts, users, tags, categories, and reports on a given Discourse forum through Grafana |
| packages/nixpkgs/python314Packages.beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/haskellPackages.alto | Implement a menu experience fit for web users |
| packages/nixpkgs/linuxKernel.packages.linux_libre.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/haskellPackages.path-io | Interface to ‘directory’ package for users of ‘path’ |
| packages/nixpkgs/cudaPackages.cuda_nvprof | Collect and view profiling data from the command-line |
| packages/nixpkgs/python312Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/texlivePackages.biber | A BibTeX replacement for users of BibLaTeX |
| packages/nixpkgs/python312Packages.bangla | Bangla is a package for Bangla language users with various functionalities including Bangla date and Bangla numeric conversation |
| packages/nixpkgs/deepin.deepin-calculator | Easy to use calculator for ordinary users |
| packages/nixpkgs/python313Packages.django-filter | Reusable Django application for allowing users to filter querysets dynamically |
| packages/nixpkgs/python314Packages.django-filter | Reusable Django application for allowing users to filter querysets dynamically |
| packages/nixpkgs/tmuxPlugins.tmux-which-key | Tmux plugin that allows users to select actions from a customizable popup menu |
| packages/nixpkgs/texlivePackages.biber-ms | A BibTeX replacement for users of BibLaTeX (multiscript version) |
| packages/nixpkgs/texlivePackages.engtlc | Support for users in Telecommunications Engineering |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/texlivePackages.luacas | A computer algebra system for users of LuaLaTeX |
| packages/nixpkgs/python312Packages.beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/haskellPackages.betris | A horizontal version of tetris for braille users |
| packages/nixpkgs/haskellPackages.sproxy | HTTP proxy for authenticating users via OAuth2 |
| packages/nixpkgs/haskellPackages.prompt-hs | A user-friendly, dependently-typed library for asking your users questions |
| packages/nixpkgs/python313Packages.cmdstanpy | Lightweight interface to Stan for Python users |
| packages/nixpkgs/python314Packages.cmdstanpy | Lightweight interface to Stan for Python users |
| packages/nixpkgs/texlivePackages.xltxtra | "Extras" for LaTeX users of XeTeX |
| packages/nixpkgs/python312Packages.django-filter | Reusable Django application for allowing users to filter querysets dynamically |
| packages/nixpkgs/python313Packages.pycognito | Python class to integrate Boto3's Cognito client so it is easy to login users |
| packages/nixpkgs/python314Packages.pycognito | Python class to integrate Boto3's Cognito client so it is easy to login users |
| packages/nixpkgs/python313Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/python314Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/haskellPackages.sproxy2 | Secure HTTP proxy for authenticating users via OAuth2 |
| packages/nixpkgs/texlivePackages.pm-isomath | Poor man ISO math for pdfLaTeX users |
| packages/nixpkgs/linuxPackages_xanmod_latest.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxPackages_xanmod_stable.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/haskellPackages.haskell-say | Let the Haskell logo talk to your users! |
| packages/nixpkgs/gnomeExtensions.user-id-in-top-panel | Add ( user name :: user id @ host ) in top panel |
| packages/nixpkgs/texlivePackages.gustprog | utility programs for Polish users of TeX |
| packages/nixpkgs/python313Packages.netbox-reorder-rack | NetBox plugin to allow users to reorder devices within a rack using a drag and drop UI |
| packages/nixpkgs/python314Packages.netbox-reorder-rack | NetBox plugin to allow users to reorder devices within a rack using a drag and drop UI |
| packages/nixpkgs/python312Packages.cmdstanpy | Lightweight interface to Stan for Python users |
| packages/nixpkgs/linuxKernel.packages.linux_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/texlivePackages.penlight | Penlight Lua libraries made available to LuaLaTeX users |
| packages/nixpkgs/texlivePackages.latex4wp | A LaTeX guide specifically designed for word processor users |
| packages/nixpkgs/python312Packages.pycognito | Python class to integrate Boto3's Cognito client so it is easy to login users |
| packages/nixpkgs/texlivePackages.latex4wp-it | LaTeX guide for word processor users, in Italian |
| packages/nixpkgs/texlivePackages.graphics-pln | LaTeX-style graphics for Plain TeX users |
| packages/nixpkgs/python312Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/python313Packages.defusedcsv | Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module |
| packages/nixpkgs/python314Packages.defusedcsv | Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module |
| packages/nixpkgs/python312Packages.netbox-reorder-rack | NetBox plugin to allow users to reorder devices within a rack using a drag and drop UI |
| packages/nixpkgs/texlivePackages.etextools | e-TeX tools for LaTeX users and package writers |
| packages/nixpkgs/graylogPlugins.aggregates | Plugin that enables users to execute term searches and get notified when the given criteria are met |
| packages/nixpkgs/python313Packages.orbax-checkpoint | Orbax provides common utility libraries for JAX users |
| packages/nixpkgs/python314Packages.orbax-checkpoint | Orbax provides common utility libraries for JAX users |
| packages/nixpkgs/haskellPackages.prompt-hs_1_1_0_1 | A user-friendly, dependently-typed library for asking your users questions |
| packages/nixpkgs/haskellPackages.prompt-hs_1_1_0_2 | A user-friendly, dependently-typed library for asking your users questions |
| packages/nixpkgs/typstPackages.postercise_0_1_0 | Postercise allows users to easily create academic research posters with different themes using Typst |
| packages/nixpkgs/typstPackages.postercise_0_2_0 | Postercise allows users to easily create academic research posters with different themes using Typst |
| packages/nixpkgs/python312Packages.defusedcsv | Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module |
| packages/nixpkgs/gnomeExtensions.mumbleping | Displays how many users are currently online on a mumble server |
| packages/nixpkgs/texlivePackages.ctanupload | Support for users uploading to CTAN |
| packages/nixpkgs/texlivePackages.expex-glossonly | Help gb4e, linguex, and covington users use the ExPex glossing macros |
| packages/nixpkgs/texlivePackages.biblatex-gb7714-2015 | A BibLaTeX implementation of the GBT7714-2015 bibliography style for Chinese users |
| packages/nixpkgs/python312Packages.orbax-checkpoint | Orbax provides common utility libraries for JAX users |
| packages/nixpkgs/gnomeExtensions.browser-switcher | Quick default browser switching from the system panel |
| packages/nixpkgs/pantheon.elementary-onboarding | Onboarding app for new users designed for elementary OS |
| packages/nixpkgs/gnomeExtensions.classic-app-switcher | Classic App Switcher is a Mac OS 9-style application switcher extension for GNOME Shell |
| packages/nixpkgs/linuxKernel.packages.linux_5_4_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_6_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_latest_libre.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_1_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/gnomeExtensions.yaru-automatic-dark-mode | Automatically switches between light and dark versions of the Yaru shell, icon, and GTK themes based on your system's dark mode setting |
| packages/nixpkgs/gnomeExtensions.sevosio-session-switcher | Allows session switching between users |
| packages/nixpkgs/haskellPackages.juandelacosa | Manage users in MariaDB >= 10.1.1 |
| packages/nixpkgs/linuxKernel.packages.linux_5_10_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_5_15_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_stable.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_latest.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/vscode-extensions.RoweWilsonFrederiskHolme.wikitext | Extension that helps users view and write MediaWiki's Wikitext files |
| packages/nixpkgs/gnomeExtensions.pipewire-airplay-toggle | Quick Setting menu toggle to enable/disable the RAOP Discover Module in PipeWire, allowing users to quickly and easily show or hide their AirPlay enabled speakers |
| packages/nixpkgs/python313Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/python314Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/gnomeExtensions.colorblind-filters | Color filters are designed to assist both color-blind users and developers |
| packages/nixpkgs/python312Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/texlivePackages.biblatex-caspervector | A simple citation style for Chinese users |
| packages/nixpkgs/perlPackages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/gnomeExtensions.set-monitor-ddc-brightnesscontrast-extra-dimming | Control brightness and contrast with ddc and extra screen dimming with black overlay, It requires ddcutil to be installed, i2c permissions for non-root users configured. |
| packages/nixpkgs/haskellPackages.users | A library simplifying user management for web applications |
| packages/nixpkgs/haskellPackages.users-test | Library to test backends for the users library |
| packages/nixpkgs/apache-users | Username Enumeration through Apache UserDir |
| packages/nixpkgs/haskellPackages.users-mysql-haskell | A mysql-haskell backend for the users library |
| packages/nixpkgs/haskellPackages.users-persistent | A persistent backend for the users package |
| packages/nixpkgs/haskellPackages.users-postgresql-simple | A PostgreSQL backend for the users package |
| packages/nixpkgs/python313Packages.diffusers | State-of-the-art diffusion models for image and audio generation in PyTorch |
| packages/nixpkgs/python314Packages.diffusers | State-of-the-art diffusion models for image and audio generation in PyTorch |
| packages/nixpkgs/trousers | Trusted computing software stack |
| packages/nixpkgs/python312Packages.diffusers | State-of-the-art diffusion models for image and audio generation in PyTorch |
| packages/nixpkgs/unix-privesc-check | Find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps |
| packages/nur/xddxdd._meta.howto | This NUR has a binary cache |
| packages/nur/vladexa.SteamTokenDumper | 🔢 Submit users' PICS access tokens to SteamDB |
| packages/nur/renesat.tukai | The app provides an interactive typing experience with switchable templates, designed to help users improve their typing speed and accuracy |
| packages/nur/lennis-dev.hackit | This is a simple web application that allows users to try and solve a series of challenges |
| packages/nur/linyinfeng.zeronsd | A DNS server for ZeroTier users |
| packages/nur/codgician.samsung-dc-toolkit-3 | Samsung DC Toolkit is designed to help users with easy-to-use disk management and diagnostic features for server
and data center usage. |
| packages/nur/codgician.samsung-dc-toolkit-2 | Samsung DC Toolkit is designed to help users with easy-to-use disk management and diagnostic features for server
and data center usage. |
| packages/nur/c2vi.mac-telnet | Open source MAC Telnet client and server for connecting to Mikrotik RouterOS routers and Posix devices using MAC addresses |
| packages/nur/ohheyrj.openaudible | OpenAudible is a cross-platform desktop app that lets Audible users download, convert, and manage their audiobooks in MP3 or M4B formats for offline listening. |
| packages/nur/rycee.firefox-addons.maya-light | Soft pastel pink light theme with a few darker Evil maya accents |
| packages/nur/rycee.firefox-addons.passff | Add-on that allows users of the unix password manager 'pass' to access their password store from Firefox |
| packages/nur/rycee.firefox-addons.jabref | Browser extension for users of the bibliographic reference manager JabRef |
| packages/nur/rycee.firefox-addons.about-sync | Show information about Firefox Sync |
| packages/nur/rycee.firefox-addons.binnen-i-be-gone | This add-on likely is only useful for users who speak German or visit German language websites - it will remove so called "Binnen-Is" on webpages. |
| packages/nur/rycee.firefox-addons.metamask | The most secure wallet for crypto, NFTs, and DeFi, trusted by millions of users |
| packages/nur/sikmir.capture2text | Capture2Text enables users to quickly OCR a portion of the screen using a keyboard shortcut |
| packages/nur/kira-bruneau.powertools | Steam Deck power tweaks for power users |
| packages/nur/xeals.koillection | Self-hosted service allowing users to manage any kind of collections |
| packages/nur/rycee.firefox-addons.clearcache | Advanced cache clearing with time periods, current tab filter, and smart notifications |
| packages/nur/meain.firefox-addons.mastodon4-redirect | Redirects users from Mastodon4 supported instances to their home instance |
| packages/nur/rycee.firefox-addons.startpage-private-search | This extension protects users from being tracked while allowing them to search the web in complete private mode. |
| packages/nur/rycee.firefox-addons.flexheaders-alter-http-headers | A lightweight yet powerful extension to modify HTTP headers on the fly |