| options/nixos/security.acme.defaults | Default values inheritable by all configured certs
|
| options/nixos/security.acme.certs | Attribute set of certificates to get signed and renewed
|
| options/nixos/security.acme.certs.<name>.inheritDefaults | Whether to inherit values set in security.acme.defaults or not.
|
| options/nixos/services.reposilite.useACMEHost | Host of an existing Let's Encrypt certificate to use for SSL
|
| options/nixos/security.acme.certs.<name>.csr | Path to a certificate signing request to apply when fetching the certificate.
|
| options/nixos/security.acme.certs.<name>.csrKey | Path to the private key to the matching certificate signing request.
|
| options/nixos/security.acme.certs.<name>.group | Group running the ACME client.
|
| options/nixos/security.acme.certs.<name>.keyType | Key type to use for private keys
|
| options/nixos/security.acme.certs.<name>.postRun | Commands to run after new certificates go live
|
| options/nixos/security.acme.certs.<name>.email | Email address for account creation and correspondence from the CA
|
| options/nixos/security.acme.certs.<name>.domain | Domain to fetch certificate for (defaults to the entry name).
|
| options/nixos/security.acme.certs.<name>.validMinDays | Minimum remaining validity before renewal in days.
|
| options/nixos/security.acme.certs.<name>.s3Bucket | S3 bucket name to use for HTTP-01 based challenges
|
| options/nixos/security.acme.certs.<name>.server | ACME Directory Resource URI
|
| options/nixos/security.acme.certs.<name>.profile | The certificate profile to choose if the CA offers multiple profiles.
|
| options/nixos/security.acme.certs.<name>.listenHTTP | Interface and port to listen on to solve HTTP challenges
in the form [INTERFACE]:PORT
|
| options/nixos/security.acme.certs.<name>.extraLegoFlags | Additional global flags to pass to all lego commands.
|
| options/nixos/security.acme.certs.<name>.webroot | Where the webroot of the HTTP vhost is located.
.well-known/acme-challenge/ directory
will be created below the webroot if it doesn't exist.
http://example.org/.well-known/acme-challenge/ must also
be available (notice unencrypted HTTP).
|
| options/nixos/security.acme.certs.<name>.extraLegoRunFlags | Additional flags to pass to lego run.
|
| options/nixos/security.acme.certs.<name>.ocspMustStaple | Turns on the OCSP Must-Staple TLS extension
|
| options/nixos/security.acme.certs.<name>.enableDebugLogs | Whether to enable debug logging for this certificate.
|
| options/nixos/security.acme.certs.<name>.extraLegoRenewFlags | Additional flags to pass to lego renew.
|
| options/nixos/security.acme.certs.<name>.extraDomainNames | A list of extra domain names, which are included in the one certificate to be issued.
|
| options/nixos/security.acme.certs.<name>.dnsProvider | DNS Challenge provider
|
| options/nixos/security.acme.certs.<name>.dnsResolver | Set the resolver to use for performing recursive DNS queries
|
| options/nixos/security.acme.certs.<name>.directory | Directory where certificate and other state is stored.
|
| options/nixos/security.acme.certs.<name>.renewInterval | Systemd calendar expression when to check for renewal
|
| options/nixos/security.acme.certs.<name>.reloadServices | The list of systemd services to call systemctl try-reload-or-restart
on.
|
| options/nixos/security.acme.certs.<name>.credentialFiles | Environment variables suffixed by "_FILE" to set for the cert's service
for your selected dnsProvider
|
| options/nixos/security.acme.certs.<name>.environmentFile | Path to an EnvironmentFile for the cert's service containing any required and
optional environment variables for your selected dnsProvider
|
| options/nixos/security.acme.certs.<name>.dnsPropagationCheck | Toggles lego DNS propagation check, which is used alongside DNS-01
challenge to ensure the DNS entries required are available.
|
| options/nixos/services.etcd.certFile | Cert file to use for clients
|
| options/nixos/services.coturn.cert | Certificate file in PEM format.
|
| options/nixos/services.prosody.ssl.cert | Path to the certificate file.
|
| options/nixos/services.documize.cert | The cert.pem file used for https.
|
| options/nixos/services.pgmanage.tls.cert | TLS certificate
|
| options/nixos/services.flannel.etcd.certFile | Etcd cert file
|
| options/nixos/services.ttyd.certFile | SSL certificate file path.
|
| options/nixos/services.kubernetes.pki.certs | List of certificate specs to feed to cert generator.
|
| options/nixos/services.public-inbox.imap.cert | Path to TLS certificate to use for connections to public-inbox-imapd(1).
|
| options/nixos/services.public-inbox.nntp.cert | Path to TLS certificate to use for connections to public-inbox-nntpd(1).
|
| options/nixos/services.synergy.server.tls.cert | The TLS certificate to use for encryption.
|
| options/darwin/services.synergy.client.tls.cert | The TLS certificate to use for encryption.
|
| options/darwin/services.synergy.server.tls.cert | The TLS certificate to use for encryption.
|
| options/nixos/services.certspotter.startAtEnd | Whether to skip certificates issued before the first launch of Cert Spotter
|
| options/home-manager/services.syncthing.cert | Path to the cert.pem file, which will be copied into Syncthing's
config directory.
|
| options/home-manager/services.podman.images.<name>.certDir | Path of certificates (*.{crt,cert,key}) used to connect to registry.
|
| options/nixos/services.syncthing.cert | Path to the cert.pem file, which will be copied into Syncthing's
configDir.
|
| options/nixos/services.nebula.networks.<name>.cert | Path to the host certificate.
|
| options/nixos/services.movim.h2o.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/services.galene.certFile | Path to the server's certificate
|
| options/nixos/services.h2o.hosts.<name>.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/services.llama-swap.tls.certFile | Path to the TLS certificate file
|
| options/nixos/services.prosody.virtualHosts.<name>.ssl.cert | Path to the certificate file.
|
| options/nixos/security.tpm2.fapi.ekCertLess | A switch to disable Endorsement Key (EK) certificate verification
|
| options/nixos/services.certspotter.enable | Whether to enable Cert Spotter, a Certificate Transparency log monitor.
|
| options/nixos/services.gns3-server.ssl.certFile | Path to the SSL certificate file
|
| options/nixos/services.certspotter.extraFlags | Extra command-line arguments to pass to Cert Spotter
|
| options/nixos/services.syncplay.certDir | TLS certificates directory to use for encryption
|
| options/nixos/services.dolibarr.h2o.acme.useHost | An existing Let’s Encrypt certificate to use for this virtual
host
|
| options/nixos/services.journald.gateway.cert | The path to a file or AF_UNIX stream socket to read the server
certificate from
|
| options/nixos/services.molly-brown.certPath | Path to TLS certificate
|
| options/nixos/services.taskserver.pki.manual.ca.cert | Fully qualified path to the CA certificate.
Setting this option will prevent automatic CA creation and handling.
|
| options/nixos/services.stargazer.certOrg | The name of the organization responsible for the X.509
certificate's /O name.
|
| options/nixos/services.ghostunnel.servers.<name>.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/services.doh-server.useACMEHost | A host of an existing Let's Encrypt certificate to use.
Note that this option does not create any certificates, nor it does add subdomains to existing ones – you will need to create them manually using security.acme.certs.
|
| options/nixos/services.thanos.rule.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.maddy.tls.certificates.*.certPath | Path to the certificate used for TLS.
|
| options/nixos/services.thanos.query.grpc-client-tls-cert | TLS Certificates to use to identify this client to the server
|
| options/nixos/services.cockroachdb.certsDir | The path to the certificate directory.
|
| options/nixos/services.gitlab.registry.certFile | Path to GitLab container registry certificate.
|
| options/nixos/services.thanos.query.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.store.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.athens.storage.mongo.certPath | Path to the certificate file for the mongo database.
|
| options/nixos/services.taskserver.pki.manual.server.cert | Fully qualified path to the server certificate.
Setting this option will prevent automatic CA creation and handling.
|
| options/nixos/services.kubernetes.apiserver.etcd.certFile | Etcd cert file.
|
| options/nixos/services.privoxy.certsLifetime | If inspectHttps is enabled, the time generated HTTPS
certificates will be stored in a temporary directory for reuse
|
| options/nixos/services.komodo-periphery.ssl.certFile | Path to SSL certificate file.
|
| options/nixos/services.prometheus.exporters.node-cert.group | Group under which the node-cert exporter shall be run.
|
| options/nixos/services.thanos.sidecar.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.receive.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.prometheus.exporters.node-cert.enable | Whether to enable the prometheus node-cert exporter.
|
| options/nixos/services.davis.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.movim.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.slskd.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.snipe-it.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.node-cert.extraFlags | Extra commandline options to pass to the node-cert exporter.
|
| options/nixos/services.akkoma.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.gancio.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.fluidd.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.matomo.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.monica.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/darwin/programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/services.librespeed.useACMEHost | Use a certificate generated by the NixOS ACME module for the given host
|
| options/nixos/services.stargazer.certLifetime | How long certs generated by Stargazer should live for
|
| options/nixos/services.portunus.ldap.tls | Whether to enable LDAPS protocol
|
| options/nixos/services.certspotter.hooks | Scripts to run upon the detection of a new certificate
|
| options/nixos/security.ipa.certificate | IPA server CA certificate
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".gemini-certs | An absolute file path (which should be outside the Nix-store)
to Gemini certificates.
|
| options/nixos/services.certspotter.package | The certspotter package to use.
|
| options/nixos/virtualisation.podman.networkSocket.tls.cert | Path to certificate describing the server.
|
| options/nixos/services.thanos.query-frontend.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.wstunnel.servers.<name>.useACMEHost | Use a certificate generated by the NixOS ACME module for the given host
|
| options/nixos/services.dnsdist.dnscrypt.certLifetime | The lifetime (in minutes) of the resolver certificate
|
| options/nixos/security.pki.certificates | A list of trusted root certificates in PEM format.
|
| options/darwin/security.pki.certificates | A list of trusted root certificates in PEM format.
|
| options/nixos/services.librenms.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.kanboard.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.agorakit.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.dolibarr.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.fediwall.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.pixelfed.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.mainsail.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.caddy.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.radicle.httpd.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.moodle.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.nagios.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cert | Path to certificate (PEM with certificate chain)
|
| options/nixos/services.blockbook-frontend.<name>.certFile | To enable SSL, specify path to the name of certificate files without extension
|
| options/nixos/services.anuko-time-tracker.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.httpd.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.nginx.virtualHosts.<name>.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.bookstack.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/security.pki.certificateFiles | A list of files containing trusted root certificates in PEM
format
|
| options/darwin/security.pki.certificateFiles | A list of files containing trusted root certificates in PEM
format
|
| options/nixos/services.prometheus.exporters.node-cert.port | Port to listen on.
|
| options/nixos/services.prometheus.exporters.node-cert.user | User owning the certs.
|
| options/nixos/services.certspotter.sendmailPath | Path to the sendmail binary
|
| options/nixos/services.jirafeau.nginxConfig.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.zabbixWeb.httpd.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.certspotter.watchlist | Domain names to watch
|
| options/nixos/services.certmgr.enable | Whether to enable certmgr.
|
| options/nixos/services.grafana.settings.smtp.cert_file | File path to a cert file.
|
| options/nixos/services.certmgr.validMin | The interval before a certificate expires to start attempting to renew it.
|
| options/nixos/services.prometheus.exporters.node-cert.paths | List of paths to search for SSL certificates.
|
| options/nixos/services.drupal.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.certmgr.specs | Certificate specs as described by:
https://github.com/cloudflare/certmgr#certificate-specs
These will be added to the Nix store, so they will be world readable.
|
| options/nixos/services.bcg.mqtt.certfile | Certificate file for MQTT server access.
|
| options/nixos/services.kubernetes.kubeconfig.certFile | Default kubeconfig client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.prometheus.exporters.pve.server.certFile | Path to a SSL certificate file for the server
|
| options/nixos/services.certmgr.package | The certmgr package to use.
|
| options/nixos/services.kubernetes.proxy.kubeconfig.certFile | Kubernetes proxy client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.fedimintd.<name>.nginx.config.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.certspotter.emailRecipients | A list of email addresses to send certificate updates to.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.mediawiki.httpd.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.limesurvey.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| options/nixos/services.prometheus.exporters.node-cert.excludePaths | List of paths to exclute from searching for SSL certificates.
|
| options/nixos/services.prometheus.exporters.node-cert.listenAddress | Address to listen on.
|
| options/nixos/services.certmgr.metricsPort | The port for the Prometheus HTTP endpoint.
|
| options/nixos/services.prometheus.exporters.node-cert.openFirewall | Open port in firewall for incoming connections.
|
| options/nixos/services.prometheus.exporters.node-cert.excludeGlobs | List files matching a pattern to include
|
| options/nixos/services.prometheus.exporters.node-cert.includeGlobs | List files matching a pattern to include
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.kubernetes.kubelet.kubeconfig.certFile | Kubelet client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.wordpress.sites.<name>.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.limesurvey.nginx.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.limesurvey.httpd.virtualHost.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.prometheus.exporters.node-cert.firewallRules | Specify rules for nftables to add to the input chain
when services.prometheus.exporters.node-cert.openFirewall is true.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.misskey.reverseProxy.webserver.caddy.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.etcd.peerCertFile | Cert file to use for peer to peer communication
|
| options/nixos/services.certmgr.svcManager | This specifies the service manager to use for restarting or reloading services
|
| options/nixos/services.certmgr.defaultRemote | The default CA host:port to use.
|
| options/nixos/services.kubernetes.scheduler.kubeconfig.certFile | Kubernetes scheduler client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.useACMEHost | A host of an existing Let's Encrypt certificate to use
|
| options/nixos/services.prometheus.exporters.node-cert.firewallFilter | Specify a filter for iptables to use when
services.prometheus.exporters.node-cert.openFirewall
is true
|
| options/nixos/security.agnos.settings.accounts.*.certificates | Certificates for agnos to issue or renew.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| options/nixos/services.certmgr.metricsAddress | The address for the Prometheus HTTP endpoint.
|
| options/nixos/services.certmgr.renewInterval | How often to check certificate expirations and how often to update the cert_next_expires metric.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.certs | List of certificate candidates to use for
authentication
|
| options/nixos/services.quassel.dataDir | The directory holding configuration files, the SQlite database and the SSL Cert.
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.kubernetes.controllerManager.kubeconfig.certFile | Kubernetes controller manager client certificate file used to connect to kube-apiserver.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/security.agnos.settings.accounts.*.certificates.*.domains | Domains the certificate represents
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.ircdHybrid.certificate | IRCD server SSL certificate
|
| options/nixos/services.hitch.frontend | The port and interface of the listen endpoint in the
form [HOST]:PORT[+CERT].
|
| options/nixos/services.ghostunnel.servers.<name>.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/services.oauth2-proxy.tls.certificate | Path to certificate file.
|
| options/nixos/services.agate.certificatesDir | Root of the certificate directory.
|
| options/nixos/services.minio.certificatesDir | The directory where TLS certificates are stored.
|
| options/nixos/services.quassel.certificateFile | Path to the certificate used for SSL connections with clients.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| options/nixos/services.dendrite.tlsKey | The path to the TLS key.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.grafana.settings.server.cert_key | Path to the certificate key file (if protocol is set to https or h2).
|
| options/nixos/services.jibri.ignoreCert | Whether to enable the flag "--ignore-certificate-errors" for the Chromium browser opened by Jibri
|
| options/nixos/services.maddy.tls.certificates | A list of attribute sets containing paths to TLS certificates and
keys
|
| options/nixos/services.maddy.tls.certificates.*.keyPath | Path to the private key used for TLS.
|
| options/nixos/services.dendrite.tlsCert | The path to the TLS certificate.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| options/nixos/services.ghostunnel.servers.<name>.cacert | Path to CA bundle file (PEM/X509)
|
| options/home-manager/accounts.email.certificatesFile | Path to default file containing certificate authorities that
should be used to validate the connection authenticity
|
| options/home-manager/programs.ssh.matchBlocks.<name>.certificateFile | Specifies files from which the user certificate is read.
|
| options/nixos/services.namecoind.rpc.certificate | Certificate file for securing RPC connections.
|
| options/nixos/services.grafana.settings.server.cert_file | Path to the certificate file (if protocol is set to https or h2).
|
| options/nixos/services.bacula-sd.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.infinoted.certificateFile | Server certificate to use for TLS
|
| options/nixos/services.grafana.settings.database.client_cert_path | The path to the client cert
|
| options/nixos/services.bacula-dir.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.movim.h2o.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.sabnzbd.settings.misc.https_cert | Path to the TLS certificate for the web UI
|
| options/nixos/services.rkvm.server.settings.certificate | TLS certificate path.
This should be generated with rkvm-certificate-gen.
|
| options/nixos/services.rkvm.client.settings.certificate | TLS ceritficate path.
This should be generated with rkvm-certificate-gen.
|
| options/nixos/services.infinoted.certificateChain | Chain of CA-certificates to which our certificateFile is relative
|
| options/nixos/services.umurmur.settings.certificate | Path to your SSL certificate
|
| options/nixos/services.warpgate.settings.http.sni_certificates.*.certificate | Path to certificate.
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.mqtt2influxdb.mqtt.certfile | Certificate file for MQTT
|
| options/nixos/services.warpgate.settings.http.certificate | Path to HTTPS listener certificate.
|
| options/nixos/services.warpgate.settings.mysql.certificate | Path to MySQL listener certificate.
|
| options/nixos/services.dolibarr.h2o.tls.identity.*.certificate-file | Path to certificate file
|
| options/home-manager/programs.irssi.networks.<name>.server.ssl.certificateFile | Path to a file containing the certificate used for
client authentication to the server.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.keystore | Path to keystore (combined PEM with cert/key, or PKCS12 keystore)
|
| options/nixos/security.agnos.settings.accounts.*.certificates.*.key_output_file | Output path for the certificate private key
|
| options/nixos/services.trafficserver.sslMulticert | Configure SSL server certificates to terminate the SSL sessions
|
| options/nixos/virtualisation.podman.networkSocket.tls.cacert | Path to CA certificate to use for client authentication.
|
| options/nixos/services.kubernetes.pki.genCfsslAPICerts | Whether to automatically generate cfssl API webserver TLS cert and key,
if they don't exist.
|
| options/nixos/services.foundationdb.tls.certificate | Path to the TLS certificate file
|
| options/nixos/services.kubernetes.pki.cfsslAPIExtraSANs | Extra x509 Subject Alternative Names to be added to the cfssl API webserver TLS cert.
|
| options/nixos/services.warpgate.settings.postgres.certificate | Path to PostgreSQL listener certificate.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.certificatesFile | Path to file containing certificate authorities that should
be used to validate the connection authenticity
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.grafana.settings.database.ca_cert_path | The path to the CA certificate to use.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.headscale.settings.tls_cert_path | Path to already created certificate.
|
| options/nixos/services.ghostunnel.servers.<name>.allowAll | If true, allow all clients, do not check client cert subject.
|
| options/nixos/services.dnsdist.dnscrypt.providerName | The name that will be given to this DNSCrypt resolver.
The provider name must start with 2.dnscrypt-cert..
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.cacert | Path to CA bundle file (PEM/X509)
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.cloudflared.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| options/nixos/services.unbound.checkconf | Whether to check the resulting config file with unbound checkconf for syntax errors
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.kubernetes.apiserver.extraSANs | Extra x509 Subject Alternative Names to be added to the kubernetes apiserver tls cert.
|
| options/nixos/services.prometheus.exporters.unbound.unbound.certificate | Path to the Unbound control socket certificate
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cacert | The certificates may use a relative path from the swanctl
x509ca directory or an absolute path
|
| options/nixos/services.nextcloud-spreed-signaling.settings.https.certificate | Path to the certificate used for the HTTPS listener
|
| options/nixos/services.cloudflared.tunnels.<name>.certificateFile | Account certificate file, necessary to create, delete and manage tunnels
|
| options/nixos/services.privoxy.inspectHttps | Whether to configure Privoxy to inspect HTTPS requests, meaning all
encrypted traffic will be filtered as well
|
| options/nixos/services.warpgate.settings.http.sni_certificates | Certificates for additional domains.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.neo4j.directories.certificates | Directory for storing certificates to be used by Neo4j for
TLS connections
|
| options/nixos/networking.openconnect.interfaces.<name>.certificate | Certificate to authenticate with.
|
| options/nixos/services.warpgate.settings.http.sni_certificates.*.key | Path to private key.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| options/nixos/services.parsedmarc.settings.elasticsearch.cert_path | The path to a TLS certificate bundle used to verify
the server's certificate.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.kubernetes.apiserver.kubeletClientCaFile | Path to a cert file for connecting to kubelet.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/security.agnos.settings.accounts.*.certificates.*.fullchain_output_file | Output path for the full chain including the acquired certificate
|
| options/home-manager/programs.hexchat.channels.<name>.loginMethod | The login method
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.grafana.settings.database.server_cert_name | The common name field of the certificate used by the mysql or postgres server
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_cert | Send certificate payloads when using certificate authentication.
- With the default of
ifasked the daemon sends
certificate payloads only if certificate requests have been received.
never disables sending of certificate payloads
altogether,
always causes certificate payloads to be sent
unconditionally whenever certificate authentication is used
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowAll | If true, allow all clients, do not check client cert subject.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert_policy | List of certificate policy OIDs the peer's certificate
must have
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cert_uri_base | Defines the base URI for the Hash and URL feature supported by
IKEv2
|
| options/nixos/services.matrix-synapse.settings.tls_certificate_path | PEM encoded X509 certificate for TLS
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| packages/nixpkgs/cmctl | Command line utility to interact with a cert-manager instalation on Kubernetes |
| packages/nixpkgs/wad | Tool for detecting technologies used by web applications |
| packages/nixpkgs/hfinger | Fingerprinting tool for HTTP requests |
| packages/nixpkgs/ursadb | Trigram database written in C++, suited for malware indexing |
| packages/nixpkgs/regrippy | Modern Python-3-based alternative to RegRipper |
| packages/nixpkgs/coqPackages.wasmcert | Wasm mechanisation in Coq/Rocq |
| packages/nixpkgs/ghidra-extensions.kaiju | Java implementation of some features of the CERT Pharos Binary Analysis Framework for Ghidra |
| packages/nixpkgs/python314Packages.malduck | Helper for malware analysis |
| packages/nixpkgs/python313Packages.malduck | Helper for malware analysis |
| packages/nixpkgs/python313Packages.mwdblib | Python client library for the mwdb service |
| packages/nixpkgs/python314Packages.mwdblib | Python client library for the mwdb service |
| packages/nixpkgs/python312Packages.malduck | Helper for malware analysis |
| packages/nixpkgs/python312Packages.mwdblib | Python client library for the mwdb service |
| packages/nixpkgs/perlPackages.MozillaCA | Mozilla's CA cert bundle in PEM format |
| packages/nixpkgs/perl5Packages.MozillaCA | Mozilla's CA cert bundle in PEM format |
| packages/nixpkgs/python314Packages.karton-autoit-ripper | AutoIt script ripper for Karton framework |
| packages/nixpkgs/python313Packages.karton-autoit-ripper | AutoIt script ripper for Karton framework |
| packages/nixpkgs/perl538Packages.MozillaCA | Mozilla's CA cert bundle in PEM format |
| packages/nixpkgs/perl540Packages.MozillaCA | Mozilla's CA cert bundle in PEM format |
| packages/nixpkgs/python314Packages.karton-mwdb-reporter | Karton service that uploads analyzed artifacts and metadata to MWDB Core |
| packages/nixpkgs/python313Packages.karton-mwdb-reporter | Karton service that uploads analyzed artifacts and metadata to MWDB Core |
| packages/nixpkgs/python314Packages.karton-dashboard | Web application that allows for Karton task and queue introspection |
| packages/nixpkgs/python312Packages.karton-autoit-ripper | AutoIt script ripper for Karton framework |
| packages/nixpkgs/python313Packages.karton-dashboard | Web application that allows for Karton task and queue introspection |
| packages/nixpkgs/python312Packages.karton-mwdb-reporter | Karton service that uploads analyzed artifacts and metadata to MWDB Core |
| packages/nixpkgs/python313Packages.sleekxmppfs | Fork of SleekXMPP with TLS cert validation disabled, intended only to be used with the sucks project |
| packages/nixpkgs/python314Packages.sleekxmppfs | Fork of SleekXMPP with TLS cert validation disabled, intended only to be used with the sucks project |
| packages/nixpkgs/python314Packages.karton-classifier | File type classifier for the Karton framework |
| packages/nixpkgs/python313Packages.karton-classifier | File type classifier for the Karton framework |
| packages/nixpkgs/python314Packages.karton-asciimagic | Decoders for ascii-encoded executables for the Karton framework |
| packages/nixpkgs/python312Packages.karton-dashboard | Web application that allows for Karton task and queue introspection |
| packages/nixpkgs/python313Packages.karton-asciimagic | Decoders for ascii-encoded executables for the Karton framework |
| packages/nixpkgs/python314Packages.karton-config-extractor | Static configuration extractor for the Karton framework |
| packages/nixpkgs/python313Packages.karton-config-extractor | Static configuration extractor for the Karton framework |
| packages/nixpkgs/python312Packages.sleekxmppfs | Fork of SleekXMPP with TLS cert validation disabled, intended only to be used with the sucks project |
| packages/nixpkgs/python312Packages.karton-classifier | File type classifier for the Karton framework |
| packages/nixpkgs/python312Packages.karton-asciimagic | Decoders for ascii-encoded executables for the Karton framework |
| packages/nixpkgs/python314Packages.karton-yaramatcher | File and analysis artifacts yara matcher for the Karton framework |
| packages/nixpkgs/python313Packages.karton-yaramatcher | File and analysis artifacts yara matcher for the Karton framework |
| packages/nixpkgs/python312Packages.karton-config-extractor | Static configuration extractor for the Karton framework |
| packages/nixpkgs/python312Packages.karton-yaramatcher | File and analysis artifacts yara matcher for the Karton framework |
| packages/nixpkgs/vimPlugins.nvim-treesitter-parsers.powershell | Tree-sitter grammar for powershell |
| packages/nixpkgs/ocamlPackages.ca-certs | Detect root CA certificates from the operating system |
| packages/nixpkgs/ocamlPackages.ca-certs-nss | X.509 trust anchors extracted from Mozilla's NSS |
| packages/nixpkgs/ocamlPackages_latest.ca-certs | Detect root CA certificates from the operating system |
| packages/nixpkgs/ocamlPackages_latest.ca-certs-nss | X.509 trust anchors extracted from Mozilla's NSS |
| packages/nixpkgs/haskellPackages.test-certs | create temporary SSL certificates in tests |
| packages/nixpkgs/python313Packages.pip-system-certs | Live patches pip and requests to use system certs by default |
| packages/nixpkgs/python314Packages.pip-system-certs | Live patches pip and requests to use system certs by default |
| packages/nixpkgs/python312Packages.pip-system-certs | Live patches pip and requests to use system certs by default |
| packages/nixpkgs/python313Packages.mscerts | Makes the Microsoft Trusted Root Program's Certificate Trust Lists available in Python |
| packages/nixpkgs/python314Packages.mscerts | Makes the Microsoft Trusted Root Program's Certificate Trust Lists available in Python |
| packages/nixpkgs/certsync | Dump NTDS with golden certificates and UnPAC the hash |
| packages/nixpkgs/traefik-certs-dumper | Dump ACME data from traefik to certificates |
| packages/nixpkgs/python312Packages.mscerts | Makes the Microsoft Trusted Root Program's Certificate Trust Lists available in Python |
| packages/nixpkgs/certstrap | Tools to bootstrap CAs, certificate requests, and signed certificates |
| packages/nixpkgs/jre-generate-cacerts | |
| packages/nixpkgs/certspotter | Certificate Transparency Log Monitor |
| packages/nixpkgs/ssl-cert-check | Bourne shell script that can be used to report on expiring SSL certificates |
| packages/nixpkgs/certstream-server-go | Drop-in replacement in Golang for the certstream server by Calidog |
| packages/nixpkgs/cert-viewer | Admin tool to view and inspect multiple x509 Certificates |
| packages/nixpkgs/azure-sdk-for-cpp.security-keyvault-certificates | Azure Key Vault Certificates client library for C++ |
| packages/nixpkgs/certi | ADCS abuser |
| packages/nixpkgs/kodiPackages.certifi | Python package for providing Mozilla's CA Bundle |
| packages/nixpkgs/certbot-full | |
| packages/nixpkgs/python313Packages.cert-chain-resolver | Resolve / obtain the certificate intermediates of a x509 certificate |
| packages/nixpkgs/python314Packages.cert-chain-resolver | Resolve / obtain the certificate intermediates of a x509 certificate |
| packages/nixpkgs/coqPackages.compcert | Formally verified C compiler |
| packages/nixpkgs/python312Packages.cert-chain-resolver | Resolve / obtain the certificate intermediates of a x509 certificate |
| packages/nixpkgs/mkcert | Simple tool for making locally-trusted development certificates |
| packages/nixpkgs/ocamlPackages.dns-certify | MirageOS let's encrypt certificate retrieval |
| packages/nixpkgs/prometheus-node-cert-exporter | Prometheus exporter for SSL certificate |
| packages/nixpkgs/certmgr | Cloudflare's automated certificate management using a CFSSL CA |
| packages/nixpkgs/compcert | Formally verified C compiler |
| packages/nixpkgs/certdump | Dump certificates from PE files in different formats |
| packages/nixpkgs/ocamlPackages_latest.dns-certify | MirageOS let's encrypt certificate retrieval |
| packages/nixpkgs/certigo | Utility to examine and validate certificates in a variety of formats |
| packages/nixpkgs/rPackages.icertool | |
| packages/nixpkgs/python313Packages.certipy | Utility to create and sign CAs and certificates |
| packages/nixpkgs/python314Packages.certipy | Utility to create and sign CAs and certificates |
| packages/nixpkgs/python313Packages.certifi | Python package for providing Mozilla's CA Bundle |
| packages/nixpkgs/python314Packages.certifi | Python package for providing Mozilla's CA Bundle |
| packages/nixpkgs/certipy | Library and CLI tool to enumerate and abuse misconfigurations in Active Directory Certificate Services |
| packages/nixpkgs/python313Packages.certipy-ad | Library and CLI tool to enumerate and abuse misconfigurations in Active Directory Certificate Services |
| packages/nixpkgs/python314Packages.certipy-ad | Library and CLI tool to enumerate and abuse misconfigurations in Active Directory Certificate Services |
| packages/nixpkgs/python313Packages.certbot | ACME client that can obtain certs and extensibly update server configurations |
| packages/nixpkgs/python314Packages.certbot | ACME client that can obtain certs and extensibly update server configurations |
| packages/nixpkgs/cacert | Bundle of X.509 certificates of public Certificate Authorities (CA) |
| packages/nixpkgs/certbot | ACME client that can obtain certs and extensibly update server configurations |
| packages/nixpkgs/python313Packages.certbot-dns-inwx | INWX DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-inwx | INWX DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.certbot-dns-ovh | OVH DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-ovh | OVH DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.certauth | Simple CertificateAuthority and host certificate creation, useful for man-in-the-middle HTTPS proxy |
| packages/nixpkgs/python314Packages.certauth | Simple CertificateAuthority and host certificate creation, useful for man-in-the-middle HTTPS proxy |
| packages/nixpkgs/rPackages.occUncertain | |
| packages/nixpkgs/python312Packages.certipy | Utility to create and sign CAs and certificates |
| packages/nixpkgs/certinfo | Print x509 certificate info |
| packages/nixpkgs/python312Packages.certifi | Python package for providing Mozilla's CA Bundle |
| packages/nixpkgs/python313Packages.certbot-nginx | Nginx plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-nginx | Nginx plugin for Certbot |
| packages/nixpkgs/rubyPackages.certified | |
| packages/nixpkgs/rPackages.uncertainUCDP | |
| packages/nixpkgs/python312Packages.certipy-ad | Library and CLI tool to enumerate and abuse misconfigurations in Active Directory Certificate Services |
| packages/nixpkgs/dn42-cacert | DN42 Root CA certificate |
| packages/nixpkgs/python312Packages.certbot | ACME client that can obtain certs and extensibly update server configurations |
| packages/nixpkgs/certinfo-go | Tool to analyze and troubleshoot x.509 & ssh certificates, encoded keys |
| packages/nixpkgs/minio-certgen | Simple Minio tool to generate self-signed certificates, and provides SAN certificates with DNS and IP entries |
| packages/nixpkgs/rPackages.Xcertainty | |
| packages/nixpkgs/python312Packages.certbot-dns-inwx | INWX DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python312Packages.certbot-dns-ovh | OVH DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python312Packages.certauth | Simple CertificateAuthority and host certificate creation, useful for man-in-the-middle HTTPS proxy |
| packages/nixpkgs/haskellPackages.uncertain | Manipulating numbers with inherent experimental/measurement uncertainty |
| packages/nixpkgs/python313Packages.certbot-dns-google | Google Cloud DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-google | Google Cloud DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python312Packages.certbot-nginx | Nginx plugin for Certbot |
| packages/nixpkgs/nagiosPlugins.check_ssl_cert | Nagios plugin to check the CA and validity of an X.509 certificate |
| packages/nixpkgs/python313Packages.certbot-dns-route53 | Route53 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-route53 | Route53 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.certbot-dns-rfc2136 | RFC 2136 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-rfc2136 | RFC 2136 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/certgraph | Intelligence tool to crawl the graph of certificate alternate names |
| packages/nixpkgs/rPackages.uncertainty | |
| packages/nixpkgs/python312Packages.certbot-dns-google | Google Cloud DNS Authenticator plugin for Certbot |
| packages/nixpkgs/rPackages.rankUncertainty | |
| packages/nixpkgs/certmitm | Tool for testing for certificate validation vulnerabilities of TLS connections |
| packages/nixpkgs/rPackages.UncertainInterval | |
| packages/nixpkgs/python312Packages.certbot-dns-route53 | Route53 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python312Packages.certbot-dns-rfc2136 | RFC 2136 DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.certomancer | Quickly construct, mock & deploy PKI test configurations using simple declarative configuration |
| packages/nixpkgs/python314Packages.certomancer | Quickly construct, mock & deploy PKI test configurations using simple declarative configuration |
| packages/nixpkgs/haskellPackages.certificate | Certificates and Key Reader/Writer |
| packages/nixpkgs/zscaler-cacert | ZScaler Root CA certificate |
| packages/nixpkgs/home-assistant-component-tests.cert_expiry | Open source home automation that puts local control and privacy first |
| packages/nixpkgs/python312Packages.certomancer | Quickly construct, mock & deploy PKI test configurations using simple declarative configuration |
| packages/nixpkgs/python313Packages.certbot-dns-cloudflare | Cloudflare DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python314Packages.certbot-dns-cloudflare | Cloudflare DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python312Packages.certbot-dns-cloudflare | Cloudflare DNS Authenticator plugin for Certbot |
| packages/nixpkgs/python313Packages.certvalidator | Validates X.509 certificates and paths |
| packages/nixpkgs/python314Packages.certvalidator | Validates X.509 certificates and paths |
| packages/nixpkgs/python313Packages.uncertainties | Transparent calculations with uncertainties on the quantities involved (aka error propagation) |
| packages/nixpkgs/python314Packages.uncertainties | Transparent calculations with uncertainties on the quantities involved (aka error propagation) |
| packages/nixpkgs/python312Packages.certvalidator | Validates X.509 certificates and paths |
| packages/nixpkgs/python312Packages.uncertainties | Transparent calculations with uncertainties on the quantities involved (aka error propagation) |
| packages/nixpkgs/certificate-ripper | CLI tool to extract server certificates |
| packages/nixpkgs/python313Packages.pyhanko-certvalidator | Python library for validating X.509 certificates and paths |
| packages/nixpkgs/python314Packages.pyhanko-certvalidator | Python library for validating X.509 certificates and paths |
| packages/nixpkgs/python313Packages.azure-keyvault-certificates | Microsoft Azure Key Vault Certificates Client Library for Python |
| packages/nixpkgs/python314Packages.azure-keyvault-certificates | Microsoft Azure Key Vault Certificates Client Library for Python |
| packages/nixpkgs/rubyPackages_3_1.certified | |
| packages/nixpkgs/rubyPackages_3_2.certified | |
| packages/nixpkgs/rubyPackages_3_3.certified | |
| packages/nixpkgs/rubyPackages_3_5.certified | |
| packages/nixpkgs/rubyPackages_4_0.certified | |
| packages/nixpkgs/rubyPackages_3_4.certified | |
| packages/nixpkgs/python312Packages.pyhanko-certvalidator | Python library for validating X.509 certificates and paths |
| packages/nixpkgs/python312Packages.azure-keyvault-certificates | Microsoft Azure Key Vault Certificates Client Library for Python |
| packages/nixpkgs/kdePackages.khealthcertificate | Handling of digital vaccination, test and recovery certificates. |
| packages/nixpkgs/haskellPackages.amazonka-certificatemanager | Amazon Certificate Manager SDK |
| packages/nixpkgs/haskellPackages.amazonka-certificatemanager-pca | Amazon Certificate Manager Private Certificate Authority SDK |
| packages/nixpkgs/haskellPackages.stratosphere-certificatemanager | Stratosphere integration for AWS CertificateManager |
| packages/nur/Red-Flake.evil-winrm-py | Interactive WinRM shell (Python) with NTLM/hash/cert/Kerberos and in-memory ops |
| packages/nur/sikmir.gemcert | A simple tool for creating self-signed certs for use in Geminispace |