| packages/nixpkgs/apache-users | Username Enumeration through Apache UserDir |
| packages/nixpkgs/haskellPackages.users | A library simplifying user management for web applications |
| packages/nixpkgs/haskellPackages.users-test | Library to test backends for the users library |
| packages/nixpkgs/trousers | Trusted computing software stack |
| packages/nixpkgs/haskellPackages.users-mysql-haskell | A mysql-haskell backend for the users library |
| packages/nixpkgs/haskellPackages.users-persistent | A persistent backend for the users package |
| packages/nixpkgs/haskellPackages.users-postgresql-simple | A PostgreSQL backend for the users package |
| packages/nixpkgs/python314Packages.diffusers | State-of-the-art diffusion models for image and audio generation in PyTorch |
| packages/nixpkgs/python313Packages.diffusers | State-of-the-art diffusion models for image and audio generation in PyTorch |
| packages/nixpkgs/python312Packages.diffusers | State-of-the-art diffusion models for image and audio generation in PyTorch |
| options/darwin/users.users | Configuration for users.
|
| options/nixos/users.users | Additional user accounts to be created automatically by the system
|
| options/nixos/users.motd | Message of the day shown to users when they log in.
|
| options/darwin/users.users.<name>.uid | The user's UID.
|
| options/darwin/users.users.<name>.gid | The user's primary group.
|
| options/nixos/users.users.<name>.home | The user's home directory.
|
| options/nixos/users.users.<name>.uid | The account UID
|
| options/nixos/users.users.<name>.group | The user's primary group.
|
| options/nixos/users.users.<name>.name | The name of the user account
|
| options/darwin/users.users.<name>.name | The name of the user account
|
| options/nixos/users.motdFile | A file containing the message of the day shown to users when they log in.
|
| options/darwin/users.users.<name>.isHidden | Whether to make the user account hidden.
|
| options/darwin/users.groups | Configuration for groups.
|
| options/darwin/users.users.<name>.home | The user's home directory
|
| options/darwin/users.knownUsers | List of users owned and managed by nix-darwin
|
| options/nixos/users.users.<name>.homeMode | The user's home directory mode in numeric format
|
| options/nixos/users.users.<name>.shell | The path to the user's shell
|
| options/darwin/users.users.<name>.createHome | Create the home directory when creating the user.
|
| options/nixos/users.groups | Additional groups to be created automatically by the system.
|
| options/nixos/users.users.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/users.users.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/users.users.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/users.extraUsers | Alias of users.users.
|
| options/nixos/power.ups.users | Users that can access upsd
|
| options/nixos/users.users.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/users.mysql.pam | Settings for pam_mysql
|
| options/nixos/users.ldap.base | The distinguished name of the search base.
|
| options/nixos/users.users.<name>.packages | The set of packages that should be made available to the user
|
| options/darwin/users.users.<name>.packages | The set of packages that should be made availabe to the user
|
| options/darwin/users.users.<name>.shell | The user's shell
|
| options/nixos/users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/users.users.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/nixos/users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/users.users.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/nixos/users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.extraGroups | Alias of users.groups.
|
| options/nixos/users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/users.users.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/nixos/users.mysql.user | The username to use when connecting to the database
|
| options/nixos/users.mysql.host | The hostname of the MySQL/MariaDB server
|
| options/nixos/users.defaultUserHome | The default home directory for normal users.
|
| options/nixos/users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/users.users.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/darwin/users.knownGroups | List of groups owned and managed by nix-darwin
|
| options/nixos/users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/users.ldap.loginPam | Whether to include authentication against LDAP in login PAM.
|
| options/nixos/users.mysql.nss | Settings for libnss-mysql
|
| options/nixos/users.ldap.server | The URL of the LDAP server.
|
| options/nixos/users.ldap.useTLS | If enabled, use TLS (encryption) over an LDAP (port 389)
connection
|
| options/darwin/users.groups.<name>.gid | The group's GID.
|
| options/nixos/users.ldap.enable | Whether to enable authentication against an LDAP server.
|
| options/nixos/users.mysql.pam.where | Additional criteria for the query.
|
| options/nixos/users.groups.<name>.gid | The group GID
|
| options/nixos/users.mysql.enable | Whether to enable authentication against a MySQL/MariaDB database.
|
| options/nixos/users.mysql.pam.table | The name of table that maps unique login names to the passwords.
|
| options/nixos/users.mysql.database | The name of the database containing the users
|
| options/nixos/users.extraUsers.<name>.home | The user's home directory.
|
| options/nixos/users.groups.<name>.name | The name of the group
|
| options/darwin/users.groups.<name>.name | The group's name
|
| options/nixos/users.ldap.timeLimit | Specifies the time limit (in seconds) to use when performing
searches
|
| options/nixos/users.extraUsers.<name>.uid | The account UID
|
| options/nixos/users.manageLingering | Whether to manage whether users linger or not.
|
| options/nixos/users.extraUsers.<name>.group | The user's primary group.
|
| options/nixos/users.users.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/boot.initrd.systemd.users | Users to include in initrd.
|
| options/nixos/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/darwin/users.users.<name>.ignoreShellProgramCheck | By default, nix-darwin will check that programs
|
| options/nixos/users.extraUsers.<name>.name | The name of the user account
|
| options/nixos/users.extraGroups.<name>.gid | The group GID
|
| options/nixos/users.ldap.nsswitch | Whether to include lookup against LDAP in NSS.
|
| options/nixos/users.mysql.pam.userColumn | The name of the column that contains a unix login name.
|
| options/nixos/users.ldap.bind.timeLimit | Specifies the time limit (in seconds) to use when connecting
to the directory server
|
| options/nixos/users.extraGroups.<name>.name | The name of the group
|
| options/nixos/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/darwin/nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| options/nixos/programs.weylus.users | To enable stylus and multi-touch support, the user you're going to use must be added to this list
|
| options/darwin/users.groups.<name>.members | The group's members.
|
| options/nixos/users.defaultUserShell | This option defines the default shell assigned to user
accounts
|
| options/darwin/users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| options/nixos/users.mysql.pam.verbose | If enabled, produces logs with detailed messages that describes what
pam_mysql is doing
|
| options/nixos/power.ups.users.<name>.upsmon | Add the necessary actions for a upsmon process to work
|
| options/nixos/users.ldap.extraConfig | Extra configuration options that will be added verbatim at
the end of the ldap configuration file (ldap.conf(5))
|
| options/nixos/users.mutableUsers | If set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands
|
| options/nixos/users.extraUsers.<name>.homeMode | The user's home directory mode in numeric format
|
| options/nixos/users.extraUsers.<name>.packages | The set of packages that should be made available to the user
|
| options/nixos/users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/users.mysql.nss.getpwnam | SQL query for the getpwnam
syscall.
|
| options/nixos/users.mysql.nss.getgrgid | SQL query for the getgrgid
syscall.
|
| options/nixos/users.mysql.nss.getgrnam | SQL query for the getgrnam
syscall.
|
| options/nixos/users.mysql.nss.getspnam | SQL query for the getspnam
syscall.
|
| options/nixos/users.mysql.nss.getspent | SQL query for the getspent
syscall.
|
| options/nixos/users.mysql.nss.getgrent | SQL query for the getgrent
syscall.
|
| options/nixos/users.mysql.nss.getpwuid | SQL query for the getpwuid
syscall.
|
| options/nixos/users.mysql.nss.getpwent | SQL query for the getpwent
syscall.
|
| options/nixos/users.enforceIdUniqueness | Whether to require that no two users/groups share the same uid/gid.
|
| options/nixos/users.extraUsers.<name>.shell | The path to the user's shell
|
| options/nixos/users.mysql.passwordFile | The path to the file containing the password for the user
|
| options/nixos/users.mysql.pam.updateTable | The name of the table used for password alteration
|
| options/nixos/users.extraUsers.<name>.enable | If set to false, the user account will not be created
|
| options/nixos/programs.benchexec.users | Users that intend to use BenchExec
|
| options/nixos/users.extraUsers.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| options/nixos/services.nntp-proxy.users | NNTP-Proxy user configuration
|
| options/nixos/users.mysql.pam.cryptDefault | The default encryption method to use for passwordCrypt = 1.
|
| options/nixos/boot.loader.grub.users | User accounts for GRUB
|
| options/nixos/users.extraUsers.<name>.extraGroups | The user's auxiliary groups.
|
| options/nixos/users.mysql.pam.logging.table | The name of the table to which logs are written.
|
| options/nixos/power.ups.users.<name>.actions | Allow the user to do certain things with upsd
|
| options/nixos/services.murmur.users | Maximum number of concurrent clients allowed.
|
| options/nixos/users.extraUsers.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| options/nixos/users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| options/nixos/users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| options/nixos/users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/users.ldap.bind.passwordFile | The path to a file containing the credentials to use when binding
to the LDAP server (if not binding anonymously).
|
| options/nixos/users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| options/nixos/services._3proxy.usersFile | Load users and passwords from this file
|
| options/nixos/users.mysql.nss.memsbygid | SQL query for the memsbygid
syscall.
|
| options/nixos/users.mysql.nss.gidsbymem | SQL query for the gidsbymem
syscall.
|
| options/nixos/users.ldap.daemon.extraConfig | Extra configuration options that will be added verbatim at
the end of the nslcd configuration file (nslcd.conf(5)).
|
| options/nixos/users.mysql.pam.logging.enable | Enables logging of authentication attempts in the MySQL database.
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| options/nixos/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/darwin/users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| options/nixos/users.extraUsers.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| options/nixos/services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| options/nixos/security.doas.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/nixos/security.sudo.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/nixos/boot.loader.grub.users.<name>.password | Specifies the clear text password for the account
|
| options/nixos/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/darwin/nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| options/nixos/users.mysql.pam.logging.msgColumn | The name of the column in the log table to which the description
of the performed operation is stored.
|
| options/nixos/security.sudo-rs.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| options/nixos/users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/users.extraUsers.<name>.linger | Whether to enable or disable lingering for this user
|
| options/nixos/users.ldap.bind.policy | Specifies the policy to use for reconnecting to an unavailable
LDAP server
|
| options/nixos/users.users.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/users.mysql.pam.passwordColumn | The name of the column that contains a (encrypted) password string.
|
| options/nixos/services.anki-sync-server.users | List of user-password pairs to provide to the sync server.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| options/nixos/users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| options/nixos/users.mysql.pam.logging.timeColumn | The name of the column in the log table to which the timestamp of the
log entry is stored.
|
| options/nixos/users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| options/nixos/users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| options/nixos/boot.initrd.systemd.users.<name>.shell | The path to the user's shell in initrd.
|
| options/nixos/boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| options/nixos/services.crossmacro.users | List of users granted permission to use CrossMacro.
|
| options/nixos/users.extraUsers.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| options/nixos/power.ups.users.<name>.passwordFile | The full path to a file that contains the user's (clear text)
password
|
| options/nixos/power.ups.users.<name>.instcmds | Let the user initiate specific instant commands
|
| options/nixos/systemd.user.tmpfiles.users | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically.
|
| options/nixos/services._3proxy.services.*.acl.*.users | List of users, use empty list for any.
|
| options/nixos/users.ldap.daemon.enable | Whether to let the nslcd daemon (nss-pam-ldapd) handle the
LDAP lookups for NSS and PAM
|
| options/nixos/users.mysql.pam.logging.rHostColumn | The name of the column in the log table to which the name of the remote
host that initiates the session is stored
|
| options/nixos/programs.idescriptor.users | Users to be added to the idevice group.
|
| options/nixos/boot.loader.grub.users.<name>.hashedPassword | Specifies the password hash for the account,
generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.bitcoind.<name>.rpc.users | RPC user information for JSON-RPC connections.
|
| options/nixos/security.pam.oath.usersFile | Set the path to file where the user's credentials are
stored
|
| options/nixos/services.dokuwiki.sites.<name>.usersFile | Location of the dokuwiki users file
|
| options/nixos/hardware.openrazer.users | Usernames to be added to the "openrazer" group, so that they
can start and interact with the OpenRazer userspace daemon.
|
| options/nixos/users.users.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/users.users.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/darwin/users.groups.<name>.description | The group's description.
|
| options/nixos/users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| options/nixos/services.nntp-proxy.users.<name>.username | Username
|
| options/nixos/users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/services.anki-sync-server.users.*.password | Password accepted by anki-sync-server for the associated username.
WARNING: This option is not secure
|
| options/nixos/systemd.sysusers.enable | If enabled, users are created with systemd-sysusers instead of with
the custom update-users-groups.pl script
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.name | Username for JSON-RPC connections.
|
| options/nixos/services.influxdb2.provision.users | Users to provision.
|
| options/nixos/services.mosquitto.listeners.*.users | A set of users and their passwords and ACLs.
|
| options/nixos/services.mtprotoproxy.users | Allowed users and their secrets
|
| options/nixos/boot.loader.grub.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the account
|
| options/nixos/systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| options/nixos/users.ldap.daemon.rootpwmoddn | The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
|
| options/nixos/services.anki-sync-server.users.*.username | User name accepted by anki-sync-server.
|
| options/nixos/users.extraUsers.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| options/nixos/users.extraUsers.<name>.description | A short description of the user account, typically the
user's full name
|
| options/nixos/services.nntp-proxy.users.<name>.passwordHash | SHA-512 password hash (can be generated by
mkpasswd -m sha-512 <password>)
|
| options/nixos/users.ldap.daemon.rootpwmodpwFile | The path to a file containing the credentials with which to bind to
the LDAP server if the root user tries to change a user's password.
|
| options/nixos/services.grafana.settings.users.hidden_users | This is a comma-separated list of usernames
|
| options/nixos/users.users.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/services.anki-sync-server.users.*.passwordFile | File containing the password accepted by anki-sync-server for
the associated username
|
| options/nixos/boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| options/nixos/services.pgbouncer.settings.users | Optional
|
| options/nixos/services.grafana.settings.users.home_page | Path to a custom home page
|
| options/nixos/services.cloudlog.update-lotw-users.enable | Whether to periodically update the list of LoTW users
|
| options/nixos/users.ldap.bind.distinguishedName | The distinguished name to bind to the LDAP server with
|
| options/nixos/services.samba.settings.global."invalid users" | List of users who are denied to login via Samba.
|
| options/nixos/users.mysql.pam.passwordCrypt | The method to encrypt the user's password:
0 (or "plain"):
No encryption
|
| options/nixos/services.nntp-proxy.users.<name>.maxConnections | Maximum number of concurrent connections to the proxy for this user
|
| options/nixos/services.grafana.settings.users.allow_sign_up | Set to false to prohibit users from being able to sign up / create user accounts
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.acl | Control client access to topics on the broker.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.users | Sync users.
|
| options/nixos/users.mysql.pam.disconnectEveryOperation | By default, pam_mysql keeps the connection to the MySQL
database until the session is closed
|
| options/nixos/services.bitcoind.<name>.rpc.users.<name>.passwordHMAC | Password HMAC-SHA-256 for JSON-RPC connections
|
| options/nixos/services.clickhouse.usersConfig | Your users.yaml as a Nix attribute set
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| options/nixos/services.paretosecurity.users | Per-user Pareto Security configuration.
|
| options/nixos/services.influxdb2.provision.users.<name>.present | Whether to ensure that this user is present or absent.
|
| options/nixos/services.grafana.settings.users.login_hint | Text used as placeholder text on login page for login/username input.
|
| options/nixos/users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.password | Specifies the (clear text) password for the MQTT User.
|
| options/nixos/users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| options/nixos/services.grafana.settings.users.auto_assign_org | Set to true to automatically add new users to the main organization (id 1)
|
| options/nixos/services.vsftpd.virtualUseLocalPrivs | If enabled, virtual users will use the same privileges as local
users
|
| options/nixos/services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| options/nixos/services.cloudlog.update-lotw-users.interval | Specification (in the format described by systemd.time(7)) of the
time at which the LoTW user update will occur.
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| options/nixos/services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPassword | Specifies the hashed password for the MQTT User
|
| options/nixos/services.taskserver.organisations.<name>.users | A list of user names that belong to the organization.
|
| options/nixos/users.extraUsers.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| options/nixos/services.grafana.settings.users.password_hint | Text used as placeholder text on login page for password input.
|
| options/nixos/services.grafana.settings.users.default_theme | Sets the default UI theme. system matches the user's system theme.
|
| options/nixos/services.grafana.settings.users.allow_org_create | Set to false to prohibit users from creating new organizations.
|
| options/nixos/users.extraUsers.<name>.hashedPassword | Specifies the hashed password for the user
|
| options/nixos/services.freeciv.settings.Newusers | Whether to enable new users to login if auth is enabled.
|
| options/nixos/users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| options/nixos/services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| options/nixos/services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| options/nixos/services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| options/darwin/services.postgresql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| options/nixos/services.samba.usershares.enable | Whether to enable user-configurable Samba shares.
|
| options/nixos/users.extraUsers.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| options/nixos/services.grafana.settings.users.auto_assign_org_id | Set this value to automatically add new users to the provided org
|
| options/nixos/services.grafana.settings.users.default_language | This setting configures the default UI language, which must be a supported IETF language tag, such as en-US.
|
| options/nixos/services.grafana.settings.users.viewers_can_edit | Viewers can access and use Explore and perform temporary edits on panels in dashboards they have access to
|
| options/nixos/services.incron.allow | Users allowed to use incrontab
|
| options/nixos/services.grafana.settings.users.auto_assign_org_role | The role new users will be assigned for the main organization (if the auto_assign_org setting is set to true).
|
| packages/nixpkgs/ombi | Self-hosted web application that automatically gives your shared Plex or Emby users the ability to request content by themselves |
| options/nixos/nix.sshServe.trusted | Whether to add nix-ssh to the nix.settings.trusted-users
|
| options/nixos/services.postgresql.ensureUsers | Ensures that the specified users exist
|
| options/nixos/nix.nrBuildUsers | Number of nixbld user accounts created to
perform secure concurrent builds
|
| options/darwin/nix.nrBuildUsers | Number of nixbld user accounts created to
perform secure concurrent builds
|
| options/nixos/services.tt-rss.plugins | List of plugins to load automatically for all users
|
| options/nixos/services.calibre-server.auth.userDb | Choose users database file to use for authentication
|
| options/nixos/services.fcron.deny | Users forbidden from using fcron.
|
| options/darwin/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/nixos/services.grafana.settings.users.verify_email_enabled | Require email validation before sign up completes.
|
| options/nixos/services.headscale.settings.oidc.allowed_users | Users allowed to authenticate even if not in allowedDomains.
|
| options/nixos/hardware.i2c.group | Grant access to i2c devices (/dev/i2c-*) to users in this group.
|
| options/home-manager/programs.zsh.dotDir | Directory where the zsh configuration and more should be located,
relative to the users home directory
|
| packages/nixpkgs/sonarr | Smart PVR for newsgroup and bittorrent users |
| options/nixos/programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| options/nixos/services.logrotate.checkConfig | Whether the config should be checked at build time
|
| options/nixos/services.incron.deny | Users forbidden from using incrontab.
|
| options/nixos/services.prosody.modules.blocklist | Allow users to block communications with other users
|
| options/nixos/services.umurmur.settings.max_users | Maximum number of concurrent clients allowed.
|
| options/nixos/programs.cdemu.group | Group that users must be in to use cdemu.
|
| options/nixos/security.polkit.adminIdentities | Specifies which users are considered “administrators”, for those
actions that require the user to authenticate as an
administrator (i.e. have an auth_admin
value)
|
| packages/nixpkgs/onboard | Onscreen keyboard useful for tablet PC users and for mobility impaired users |
| options/nixos/programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| options/nixos/programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| options/nixos/services.tor.relay.role | Your role in Tor network
|
| packages/nixpkgs/iw | Tool to use nl80211 |
| options/nixos/programs.fuse.mountMax | Set the maximum number of FUSE mounts allowed to non-root users.
|
| options/nixos/services.oauth2-proxy.google.adminEmail | The Google Admin to impersonate for API calls
|
| options/nixos/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/nixos/services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| options/nixos/services.guix.nrBuildUsers | Number of Guix build users to be used in the build pool.
|
| options/nixos/security.sudo.enable | Whether to enable the sudo command, which
allows non-root users to execute commands as root.
|
| options/nixos/security.doas.enable | Whether to enable the doas command, which allows
non-root users to execute commands as root.
|
| options/nixos/services.vsftpd.userDbPath | Only applies if enableVirtualUsers is true
|
| options/nixos/security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| options/nixos/programs.ydotool.group | Group which users must be in to use ydotool.
|
| options/nixos/services.syncplay.chat | Chat with users in the same room.
|
| packages/nixpkgs/ion3 | Tiling tabbed window manager designed with keyboard users in mind |
| packages/nixpkgs/jami | Free and universal communication platform that respects the privacy and freedoms of its users |
| packages/nixpkgs/kasmweb | Streaming containerized apps and desktops to end-users |
| options/nixos/programs.rush.shell | The resolved shell path that users can inherit to set rush as their login shell
|
| options/nixos/services.vsftpd.localUsers | Whether to enable FTP for local users.
|
| options/nixos/security.ipa.ifpAllowedUids | A list of users allowed to access the ifp dbus interface.
|
| options/nixos/security.sudo-rs.enable | Whether to enable a memory-safe implementation of the sudo command,
which allows non-root users to execute commands as root
.
|
| options/nixos/hardware.sane.enable | Enable support for SANE scanners.
Users in the "scanner" group will gain access to the scanner, or the "lp" group if it's also a printer.
|
| packages/nixpkgs/gummi | Simple LaTex editor for GTK users |
| options/nixos/services.syncplay.ready | Check readiness of users.
|
| options/nixos/services.weblate.smtp.port | SMTP port used when sending emails to users.
|
| options/nixos/services.weblate.smtp.host | SMTP host used when sending emails to users.
|
| options/darwin/system.checks.verifyBuildUsers | Whether to run the Nix build users validation checks.
|
| options/nixos/hardware.brillo.enable | Whether to enable brillo in userspace
|
| options/nixos/programs.fuse.userAllowOther | Allow non-root users to specify the allow_other or allow_root mount
options, see mount.fuse3(8).
|
| options/nixos/hardware.i2c.enable | Whether to enable i2c devices support
|
| options/nixos/security.pam.p11.enable | Enables P11 PAM (pam_p11) module
|
| options/nixos/services.exim.user | User to use when no root privileges are required
|
| options/nixos/services.vsftpd.writeEnable | Whether any write activity is permitted to users.
|
| options/nixos/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/darwin/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/nixos/hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| options/nixos/services.dovecot2.mailUser | Default user to store mail for virtual users.
|
| options/nixos/security.please.enable | Whether to enable please, a Sudo clone which allows a users to execute a command or edit a
file as another user
.
|
| options/nixos/services.ombi.enable | Whether to enable Ombi, a web application that automatically gives your shared Plex or
Emby users the ability to request content by themselves!
Optionally see https://docs.ombi.app/info/reverse-proxy
on how to set up a reverse proxy
.
|
| options/darwin/system.defaults.loginwindow.GuestEnabled | Apple menu > System Preferences > Users and Groups > Login Options
Allow users to login to the machine as guests using the Guest account
|
| options/nixos/programs.pmount.enable | Whether to enable pmount, a tool that allows normal users to mount removable devices
without requiring root privileges
.
|
| options/nixos/services.tt-rss.auth.autoCreate | Allow authentication modules to auto-create users in tt-rss internal
database when authenticated successfully.
|
| packages/nixpkgs/qmk | Program to help users work with QMK Firmware |
| options/nixos/services.sympa.listMasters | The list of the email addresses of the listmasters
(users authorized to perform global server commands).
|
| packages/nixpkgs/dcgm | Data Center GPU Manager (DCGM) is a daemon that allows users to monitor NVIDIA data-center GPUs |
| options/nixos/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/nixos/services.dovecot2.mailGroup | Default group to store mail for virtual users.
|
| options/nixos/services.dawarich.smtp.host | SMTP host used when sending emails to users.
|
| options/nixos/services.dawarich.smtp.port | SMTP port used when sending emails to users.
|
| options/nixos/services.mastodon.smtp.host | SMTP host used when sending emails to users.
|
| options/nixos/services.mastodon.smtp.port | SMTP port used when sending emails to users.
|
| options/darwin/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/home-manager/nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| options/nixos/services.matrix-synapse.settings.presence.enabled | Whether to enable presence tracking
|
| options/nixos/security.pam.dp9ik.enable | Whether to enable the dp9ik pam module provided by tlsclient
|
| options/nixos/services.jupyter.group | Name of the group used to run the jupyter service
|
| options/nixos/security.sudo.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/security.pam.howdy.enable | Whether to enable the Howdy PAM module
|
| options/nixos/services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| options/nixos/services.syncplay.motdFile | Path to text to display when users join
|
| options/nixos/security.sudo-rs.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/services.sftpgo.loadDataFile | Path to a json file containing users and folders to load (or update) on startup
|
| packages/nixpkgs/fbset | Framebuffer device maintenance program |
| options/nixos/programs.minipro.enable | Whether to enable minipro and its udev rules
|
| options/nixos/security.duosec.groups | If specified, Duo authentication is required only for users
whose primary group or supplementary group list matches one
of the space-separated pattern lists
|
| options/nixos/services.drupal.sites.<name>.themesDir | The location for users to install Drupal themes.
|
| options/nixos/services.diod.allsquash | Remap all users to "nobody"
|
| options/nixos/services.prosody.modules.mam | Store messages in an archive and allow users to access it
|
| options/nixos/services.prosody.modules.motd | Send a message to users when they log in
|
| options/nixos/services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| options/nixos/services.tt-rss.singleUserMode | Operate in single user mode, disables all functionality related to
multiple users and authentication
|
| options/nixos/networking.wireless.userControlled | Allow users of the wpa_supplicant group to control wpa_supplicant
through wpa_gui or wpa_cli
|
| options/nixos/virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| options/nixos/services.prosody.modules.pep | Enables users to publish their mood, activity, playing music and more
|
| options/nixos/services.timekpr.adminUsers | All listed users will become part of the timekpr group so they can manage timekpr settings without requiring sudo.
|
| options/nixos/services.syncplay.motd | Text to display when users join
|
| options/nixos/services.prosody.modules.vcard | Allow users to set vCards
|
| options/nixos/services.kea.dhcp6.configFile | Kea DHCP6 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp6-srv.html
|
| options/nixos/services.kea.dhcp4.configFile | Kea DHCP4 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp4-srv.html
|
| packages/nixpkgs/kapp | CLI tool that encourages Kubernetes users to manage bulk resources with an application abstraction for grouping |
| options/nixos/services.coturn.no-auth | This option is opposite to lt-cred-mech.
(TURN Server with no-auth option allows anonymous access)
|
| options/nixos/services.hologram-server.ldapBaseDN | The base DN for your Hologram users
|
| options/nixos/services.bitlbee.authBackend | How users are authenticated
storage -- save passwords internally
pam -- Linux PAM authentication
|
| options/nixos/services.alerta.signupEnabled | Whether to prevent sign-up of new users via the web UI
|
| options/nixos/programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| options/nixos/networking.wireless.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| options/darwin/system.defaults.loginwindow.ShutDownDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
Disables the "Shutdown" option when users are logged in
|
| options/nixos/services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| options/nixos/services.coturn.realm | The default realm to be used for the users when no explicit
origin/realm relationship was found in the database, or if the TURN
server is not using any database (just the commands-line settings
and the userdb file)
|
| options/nixos/security.pam.services.<name>.unixAuth | Whether users can log in with passwords defined in
/etc/shadow.
|
| options/nixos/services.aria2.enable | Whether or not to enable the headless Aria2 daemon service
|
| options/nixos/services.vsftpd.userlistEnable | Whether users are included.
|
| options/nixos/security.doas.extraRules.*.runAs | Which user or group the specified command is allowed to run as
|
| options/nixos/security.loginDefs.chfnRestrict | Use chfn SUID to allow non-root users to change their account GECOS information.
|
| options/nixos/services.prosody.modules.roster | Allow users to have a roster
|
| options/nixos/services.tt-rss.forceArticlePurge | When this option is not 0, users ability to control feed purging
intervals is disabled and all articles (which are not starred)
older than this amount of days are purged.
|
| options/nixos/services.zeitgeist.enable | Whether to enable zeitgeist, a service which logs the users' activities and events.
|
| options/nixos/services.kea.dhcp-ddns.configFile | Kea DHCP-DDNS configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/ddns.html
|
| packages/nixpkgs/cli-tips | CLI tool that provides useful tips and commands for Linux users |
| options/nixos/security.loginDefs.settings.UID_MAX | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| options/nixos/security.loginDefs.settings.UID_MIN | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| options/nixos/programs.mouse-actions.enable | Whether to install and set up mouse-actions and it's udev rules
|
| options/nixos/services.vsftpd.forceLocalDataSSL | Only applies if sslEnable is true
|
| options/nixos/security.pam.krb5.enable | Enables Kerberos PAM modules (pam-krb5,
pam-ccreds)
|
| options/darwin/system.defaults.loginwindow.RestartDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
Disables the “Restart” option when users are logged in
|
| options/nixos/hardware.acpilight.enable | Enable acpilight
|
| options/nixos/security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| options/nixos/services.kea.ctrl-agent.configFile | Kea Control Agent configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/agent.html
|
| packages/nixpkgs/coreutils | GNU Core Utilities |
| options/nixos/networking.supplicant.<name>.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| packages/nixpkgs/actkbd | Keyboard shortcut daemon |
| packages/nixpkgs/ghorg | Quickly clone an entire org/users repositories into one directory |
| options/nixos/security.pam.yubico.enable | Enables Yubico PAM (yubico-pam) module
|
| options/nixos/security.loginDefs.settings.SYS_UID_MAX | Range of user IDs used for the creation of system users by useradd or newusers.
|
| options/nixos/security.loginDefs.settings.SYS_UID_MIN | Range of user IDs used for the creation of system users by useradd or newusers.
|
| options/nixos/services.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate users via tailscale.
|
| options/darwin/system.defaults.loginwindow.SHOWFULLNAME | Apple menu > System Preferences > Users and Groups > Login Options
Displays login window as a name and password field instead of a list of users
|
| packages/nixpkgs/unix-privesc-check | Find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps |
| options/nixos/services.dawarich.smtp.fromAddress | "From" address used when sending emails to users.
|
| options/nixos/security.run0.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via run0.
|
| options/nixos/security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| options/nixos/services.mastodon.smtp.fromAddress | "From" address used when sending Emails to users.
|
| options/nixos/services.vsftpd.forceLocalLoginsSSL | Only applies if sslEnable is true
|
| packages/nixpkgs/coreutils-full | GNU Core Utilities |
| options/nixos/security.sudo.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| options/nixos/services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| options/nixos/security.doas.wheelNeedsPassword | Whether users of the wheel group must provide a password to
run commands as super user via doas.
|
| options/nixos/services.prosody.modules.welcome | Welcome users who register accounts
|
| packages/nixpkgs/afsctool | Utility that allows end-users to leverage HFS+/APFS compression |
| options/nixos/security.sudo-rs.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| options/nixos/services.displayManager.hiddenUsers | A list of users which will not be shown in the display manager.
|
| options/nixos/security.pam.dp9ik.authserver | This controls the hostname for the 9front authentication server
that users will be authenticated against.
|
| options/nixos/security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| options/nixos/services.portunus.seedSettings | Seed settings for users and groups
|
| options/nixos/services.pgmanage.loginGroup | This tells pgmanage to only allow users in a certain PostgreSQL group to
login to pgmanage
|
| options/nixos/services.terraria.enable | If enabled, starts a Terraria server
|
| options/nixos/services.upower.ignoreLid | Do we ignore the lid state
Some laptops are broken
|
| packages/nixpkgs/scmutils | Scheme library for mathematical physics |
| options/nixos/services.bitlbee.authMode | The following authentication modes are available:
Open -- Accept connections from anyone, use NickServ for user authentication
|
| options/nixos/security.pam.services.<name>.ttyAudit.enable | Enable or disable TTY auditing for specified users
|
| options/nixos/services.freshrss.api.enable | Whether to enable API access for mobile apps and third-party clients (Google Reader API and Fever API)
|
| options/nixos/programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| options/nixos/services.openafsClient.daemons | Number of daemons to serve user requests
|
| packages/nixpkgs/tntnet | Web server which allows users to develop web applications using C++ |
| packages/nixpkgs/whisparr | Adult movie collection manager for Usenet and BitTorrent users |
| options/nixos/virtualisation.spiceUSBRedirection.enable | Install the SPICE USB redirection helper with setuid
privileges
|
| options/nixos/security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| options/nixos/services.prosody.modules.announce | Send announcement to all online users
|
| options/nixos/services.glitchtip.settings.ENABLE_USER_REGISTRATION | When true, any user will be able to register
|
| options/nixos/programs.steam.fontPackages | Font packages to use in Steam
|
| options/nixos/services.kanidm.provision.enable | Whether to enable provisioning of groups, users and oauth2 resource servers.
|
| options/nixos/services.xserver.imwheel.rules | Window class translation rules.
/etc/X11/imwheelrc is generated based on this config
which means this config is global for all users
|
| options/nixos/hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| options/nixos/services.nginx.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate nginx users via tailscale.
|
| options/nixos/security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| options/nixos/security.please.wheelNeedsPassword | Whether users of the wheel group must provide a password to run
commands or edit files with please and
pleaseedit respectively.
|
| options/nixos/hardware.keyboard.uhk.enable | Whether to enable non-root access to the firmware of UHK keyboards
|
| options/nixos/services.vsftpd.anonymousMkdirEnable | Whether any uploads are permitted to anonymous users.
|
| options/darwin/environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| packages/nixpkgs/uutils-coreutils-noprefix | Cross-platform Rust rewrite of the GNU coreutils |
| options/nixos/services.biboumi.settings.admin | The bare JID of the gateway administrator
|
| options/nixos/services.tuliprox.apiProxySettings | Users and proxy configuration
Refer to the Tuliprox documentation for available attributes
|
| options/nixos/services.openssh.settings.AllowUsers | If specified, login is allowed only for the listed users
|
| options/nixos/services.prosody.modules.register | Allow users to register on this server using a client and change passwords
|
| packages/nixpkgs/gotrue | SWT based API for managing users and issuing SWT tokens |
| options/nixos/security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| options/nixos/services.kubo.settings.Mounts.FuseAllowOther | Allow all users to access the FUSE mount points
|
| options/nixos/services.openssh.settings.LogLevel | Gives the verbosity level that is used when logging messages from sshd(8)
|
| options/nixos/services.openssh.settings.DenyUsers | If specified, login is denied for all listed users
|
| options/nixos/services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| options/nixos/services.cryptpad.settings.adminKeys | List of public signing keys of users that can access the admin panel
|
| options/nixos/services.dependency-track.oidc.userProvisioning | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| options/nixos/environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| options/nixos/fonts.fontconfig.antialias | Enable font antialiasing
|
| options/nixos/programs.chromium.initialPrefs | Initial preferences are used to configure the browser for the first run
|
| options/nixos/security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| options/nixos/services.maubot.settings.admins | List of administrator users
|
| options/nixos/services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| options/nixos/services.vsftpd.anonymousUploadEnable | Whether any uploads are permitted to anonymous users.
|
| options/nixos/services.vsftpd.chrootlocalUser | Whether local users are confined to their home directory.
|
| options/nixos/programs.hyprland.withUWSM | Launch Hyprland with the UWSM (Universal Wayland Session Manager) session manager
|
| options/nixos/services.iperf3.authorizedUsersFile | Path to the configuration file containing authorized users credentials to run iperf tests.
|
| options/nixos/services.angrr.settings.owned-only | Only monitors owned symbolic link target of GC roots.
- "auto": behaves like true for normal users, false for root.
- "true": only monitor GC roots owned by the current user.
- "false": monitor all GC roots.
|
| options/nixos/services.userdbd.enableSSHSupport | Whether to enable exposing OpenSSH public keys defined in userdb
|
| packages/nixpkgs/caribou | Input assistive technology intended for switch and pointer users |
| options/nixos/services.pipewire.systemWide | If true, a system-wide PipeWire service and socket is enabled
allowing all users in the "pipewire" group to use it simultaneously
|
| options/nixos/services.openssh.settings.AllowGroups | If specified, login is allowed only for users part of the
listed groups
|
| options/nixos/services.thelounge.public | Make your The Lounge instance public
|
| options/nixos/services.buildbot-master.reporters | List of reporter objects used to present build status to various users.
|
| options/nixos/services.openssh.settings.DenyGroups | If specified, login is denied for all users part of the listed
groups
|
| options/nixos/services.grafana.settings.users.user_invite_max_lifetime_duration | The duration in time a user invitation remains valid before expiring
|
| options/nixos/virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| options/nixos/services.systembus-notify.enable | Whether to enable System bus notification support
WARNING: enabling this option (while convenient) should not be done on a
machine where you do not trust the other users as it allows any other
local user to DoS your session by spamming notifications
.
|
| options/nixos/services.movim.minifyStaticFiles | Do minification on public static files which reduces the size of
assets — saving data for the server & users as well as offering a
performance improvement
|
| options/home-manager/accounts.email.accounts.<name>.getmail.readAll | Enable if you want to fetch all, even the read messages from the
server
|
| packages/nixpkgs/pam_krb5 | PAM module allowing PAM-aware applications to authenticate users by performing an AS exchange with a Kerberos KDC |
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.firezone.gui-client.allowedUsers | All listed users will become part of the firezone-client group so
they can control the tunnel service
|
| options/nixos/system.extraDependencies | A list of paths that should be included in the system
closure but generally not visible to users
|
| options/nixos/services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| options/home-manager/accounts.email.accounts.<name>.getmail.delete | Enable if you want to delete read messages from the server
|
| packages/nixpkgs/kompose | Tool to help users who are familiar with docker-compose move to Kubernetes |
| options/nixos/services.cryptpad.settings.httpUnsafeOrigin | This is the URL that users will enter to load your instance
|
| options/nixos/fonts.fontconfig.hinting.enable | Enable font hinting
|
| options/nixos/services.tt-rss.registration.maxUsers | Maximum amount of users which will be allowed to register on this
system. 0 - no limit.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/programs._1password-gui.polkitPolicyOwners | A list of users who should be able to integrate 1Password with polkit-based authentication mechanisms.
|
| options/nixos/services.mtprotoproxy.secureOnly | Don't allow users to connect in non-secure mode (without random padding).
|
| options/nixos/services.hylafax.userAccessFile | The hosts.hfaxd
file entry in the spooling area
will be symlinked to the location given here
|
| packages/nixpkgs/sourcegit | Free & OpenSource GUI client for GIT users |
| options/nixos/services.sourcehut.settings."todo.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| options/nixos/security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| packages/nixpkgs/mozwire | MozillaVPN configuration manager giving Linux, macOS users (among others), access to MozillaVPN |
| options/nixos/services.akkoma.config.":pleroma".":frontends" | Frontend configuration
|
| options/nixos/services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| options/nixos/services.userborn.static | Whether to generate the password files at build time and store them directly
in the system closure, without requiring any services at boot time
|
| options/nixos/services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| options/nixos/services.dependency-track.settings."alpine.oidc.user.provisioning" | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| options/nixos/services.sourcehut.settings."lists.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| options/nixos/services.sourcehut.settings."builds.sr.ht".allow-free | Whether to enable nonpaying users to submit builds.
|
| options/nixos/environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| options/darwin/environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| options/nixos/services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| packages/nixpkgs/deepin.deepin-draw | Lightweight drawing tool for users to freely draw and simply edit images |
| packages/nixpkgs/linuxPackages.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/kdePackages.elisa | Simple music player aiming to provide a nice experience for its users |
| options/nixos/services.sourcehut.settings."pages.sr.ht".user-domain | Configures the user domain, if enabled
|
| options/nixos/services.sourcehut.settings."todo.sr.ht::mail".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/darwin/system.defaults.loginwindow.autoLoginUser | Apple menu > System Preferences > Users and Groups > Login Options
Auto login the supplied user on boot
|
| options/nixos/services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| packages/nixpkgs/beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/gitlab-pages | Daemon used to serve static websites for GitLab users |
| packages/nixpkgs/gotrue-supabase | JWT based API for managing users and issuing JWT tokens |
| packages/nixpkgs/zeronsd | DNS server for ZeroTier users |
| options/nixos/services.aria2.downloadDirPermission | The permission for settings.dir
|
| options/nixos/security.unprivilegedUsernsClone | When disabled, unprivileged users will not be able to create new namespaces
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| options/nixos/services.syncthing.openDefaultPorts | Whether to open the default ports in the firewall: TCP/UDP 22000 for transfers
and UDP 21027 for discovery
|
| options/nixos/services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| options/nixos/services.meilisearch.noAnalytics | Deactivates analytics
|
| options/nixos/fonts.fontconfig.subpixel.lcdfilter | FreeType LCD filter
|
| options/nixos/services.spacecookie.settings.log.hide-ips | If enabled, spacecookie will hide personal
information of users like IP addresses from
log output.
|
| options/nixos/services.pulseaudio.systemWide | If false, a PulseAudio server is launched automatically for
each user that tries to use the sound system
|
| options/home-manager/wayland.windowManager.hyprland.enable | Whether to enable configuration for Hyprland, a tiling Wayland
compositor that doesn't sacrifice on its looks.
This module configures Hyprland and adds it to your user's PATH,
but does not make certain system-level changes
|
| packages/nixpkgs/filesender | Web application for sending large files to other users |
| packages/nixpkgs/linuxPackages_lqx.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxPackages_zen.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| options/nixos/services.anuko-time-tracker.settings.multiorgMode | Defines whether users see the Register option in the menu of Time Tracker that allows them
to self-register and create new organizations (top groups).
|
| options/nixos/nix.settings.trusted-substituters | List of binary cache URLs that non-root users can use (in
addition to those specified using
nix.settings.substituters) by passing
--option binary-caches to Nix commands.
|
| options/nixos/services.nginx.tailscaleAuth.expectedTailnet | If you want to prevent node sharing from allowing users to access services
across tailnets, declare your expected tailnets domain here.
|
| options/darwin/nix.settings.trusted-substituters | List of binary cache URLs that non-root users can use (in
addition to those specified using
nix.settings.substituters) by passing
--option binary-caches to Nix commands.
|
| options/nixos/services.paperless.consumptionDirIsPublic | Whether all users can write to the consumption dir.
|
| options/nixos/services.postfix.localRecipients | List of accepted local users
|
| options/nixos/services.tt-rss.registration.enable | Allow users to register themselves
|
| options/nixos/services.sourcehut.settings."lists.sr.ht::worker".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/nixos/services.hydra.useSubstitutes | Whether to use binary caches for downloading store paths
|
| options/nixos/services._3proxy.services.*.auth | Authentication type
|
| options/nixos/services.prosody.modules.vcard_legacy | Converts users profiles and Avatars between old and new formats
|
| packages/nixpkgs/b43Firmware_5_1_138 | Firmware for cards supported by the b43 kernel module |
| options/nixos/services.matrix-tuwunel.settings.global.allow_registration | Whether new users can register on this server
|
| options/nixos/services.xserver.displayManager.startx.enable | Whether to enable the dummy "startx" pseudo-display manager, which
allows users to start X manually via the startx command from a
virtual terminal.
The X server will run under the current user, not as root.
|
| options/nixos/boot.initrd.network.ssh.hostKeys | Specify SSH host keys to import into the initrd
|
| options/nixos/documentation.man.man-db.manualPages | The manual pages to generate caches for if documentation.man.generateCaches
is enabled
|
| options/nixos/services.transmission.enable | Whether to enable the headless Transmission BitTorrent daemon
|
| options/darwin/environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| packages/nixpkgs/cliquer | Routines for clique searching |
| packages/nixpkgs/elmPackages.elm-review | Analyzes Elm projects, to help find mistakes before your users find them |
| options/nixos/services.szurubooru.server.settings.secretFile | File containing a secret used to salt the users' password hashes and generate filenames for static content.
|
| options/nixos/services.dependency-track.oidc.teams.default | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| options/nixos/services.smartd.notifications.wall.enable | Whenever to send wall notifications to all users.
|
| options/nixos/services.prosody.modules.cloud_notify | Push notifications to inform users of new messages or other pertinent information even when they have no XMPP clients online
|
| options/nixos/virtualisation.docker.enable | This option enables docker, a daemon that manages
linux containers
|
| options/nixos/environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| options/darwin/system.defaults.loginwindow.SleepDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Sleep button on the login screen
|
| options/nixos/services.dependency-track.frontend.baseUrl | The base URL of the API server
|
| options/darwin/system.defaults.loginwindow.ShutDownDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Shut Down button on the login screen
|
| options/nixos/virtualisation.lxd.enable | This option enables lxd, a daemon that manages
containers
|
| options/nixos/services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/virtualisation.kvmgt.enable | Whether to enable KVMGT (iGVT-g) VGPU support
|
| options/nixos/security.dhparams.params | Diffie-Hellman parameters to generate
|
| packages/nixpkgs/userborn | Declaratively bear (manage) Linux users and groups |
| options/nixos/services.pgbouncer.settings.pgbouncer.max_client_conn | Maximum number of client connections allowed
|
| options/nixos/services.linkwarden.enableRegistration | Whether to enable registration for new users.
|
| packages/nixpkgs/capslock | Capability analysis CLI for Go packages that informs users of which privileged operations a given package can access |
| packages/nixpkgs/luarenamer | Plugin for Shoko that allows users to rename their collection using Lua |
| options/nixos/services.pretix.settings.pretix.registration | Whether to allow registration of new admin users.
|
| packages/nixpkgs/ibus-engines.cangjie | IBus engine for users of the Cangjie and Quick input methods |
| options/nixos/services.transmission.settings.umask | Sets transmission's file mode creation mask
|
| options/darwin/system.defaults.loginwindow.RestartDisabled | Apple menu > System Preferences > Users and Groups > Login Options
Hides the Restart button on the login screen
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.userFilter | LDAP filter for users.
|
| options/nixos/environment.corePackages | Set of core packages for a normal interactive system
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| packages/nixpkgs/linuxPackages_latest.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxPackages_xanmod.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| options/nixos/services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| options/nixos/virtualisation.libvirtd.enable | This option enables libvirtd, a daemon that manages
virtual machines
|
| options/nixos/services.firezone.server.provision.accounts.<name>.actors | All actors (users) to provision
|
| options/nixos/services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| packages/nixpkgs/acl2 | Interpreter and prover for a Lisp dialect |
| options/nixos/hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| options/nixos/services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| options/nixos/services.matrix-continuwuity.settings.global.allow_registration | Whether new users can register on this server
|
| packages/nixpkgs/b43FirmwareCutter | Firmware extractor for cards supported by the b43 kernel module |
| options/nixos/services.bitwarden-directory-connector-cli.sync.largeImport | Enable if you are syncing more than 2000 users/groups.
|
| options/nixos/services.prosody.xmppComplianceSuite | The XEP-0423 defines a set of recommended XEPs to implement
for a server
|
| options/nixos/services.xserver.displayManager.sx.enable | Whether to enable the "sx" pseudo-display manager, which allows users
to start manually via the "sx" command from a vt shell
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.userObjectClass | Class that users must have.
|
| options/nixos/services.grafana.settings.server.enable_gzip | Set this option to true to enable HTTP compression, this can improve transfer speed and bandwidth utilization
|
| options/nixos/services.i2pd.precomputation.elgamal | Whenever to use precomputated tables for ElGamal.
i2pd defaults to false
to save 64M of memory (and looses some performance)
|
| options/nixos/programs.opengamepadui.fontPackages | Font packages to use in OpenGamepadUI
|
| options/nixos/services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| options/nixos/services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| packages/nixpkgs/modprobed-db | Useful utility for users wishing to build a minimal kernel via a make localmodconfig |
| packages/nixpkgs/rfkill_udev | Rules+hook for udev to catch rfkill state changes |
| options/nixos/services.alerta.authenticationRequired | Whether users must authenticate when using the web UI or command-line tool
|
| options/nixos/services.anubis.defaultOptions.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/nixos/services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| options/nixos/services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| packages/nixpkgs/python313Packages.pyct | ClI for Python common tasks for users |
| packages/nixpkgs/python314Packages.pyct | ClI for Python common tasks for users |
| options/nixos/services.netbird.server.management.singleAccountModeDomain | Enables single account mode
|
| packages/nixpkgs/commonsBcel | Gives users a convenient way to analyze, create, and manipulate (binary) Java class files |
| packages/nixpkgs/commons-bcel | Gives users a convenient way to analyze, create, and manipulate (binary) Java class files |
| packages/nixpkgs/drawpile | Collaborative drawing program that allows multiple users to sketch on the same canvas simultaneously |
| packages/nixpkgs/flow-state | Terminal-based habit tracker designed for neurodivergent users |
| options/nixos/services.gitea.captcha.requireForExternalRegistration | Displays a CAPTCHA challenge for users that register externally.
|
| options/nixos/networking.networkmanager.enable | Whether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured
|
| options/darwin/system.defaults.loginwindow.PowerOffDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
If set to true, the Power Off menu item will be disabled when the user is logged in
|
| packages/nixpkgs/sudo-font | Font for programmers and command line users |
| packages/nixpkgs/python313Packages.pesq | PESQ (Perceptual Evaluation of Speech Quality) Wrapper for Python Users |
| packages/nixpkgs/python314Packages.pesq | PESQ (Perceptual Evaluation of Speech Quality) Wrapper for Python Users |
| options/nixos/services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| options/nixos/virtualisation.podman.dockerSocket.enable | Make the Podman socket available in place of the Docker socket, so
Docker tools can find the Podman socket
|
| options/nixos/services.dependency-track.settings."alpine.oidc.teams.default" | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.removeDisabled | Remove users from bitwarden groups if no longer in the ldap group.
|
| options/nixos/security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| options/nixos/virtualisation.docker.rootless.setSocketVariable | Point DOCKER_HOST to rootless Docker instance for
normal users by default.
|
| options/nixos/services.umurmur.settings.default_channel | The channel in which users will appear in when connecting.
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.userEmailAttribute | Attribute for a users email.
|
| packages/nixpkgs/antora | Modular documentation site generator |
| packages/nixpkgs/python313Packages.i3-py | Tools for i3 users and developers |
| packages/nixpkgs/python314Packages.i3-py | Tools for i3 users and developers |
| options/nixos/system.stateVersion | This option defines the first version of NixOS you have installed on this particular machine,
and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions
|
| options/nixos/services.earlyoom.enableNotifications | Send notifications about killed processes via the system d-bus
|
| options/nixos/services.firezone.server.smtp.configureManually | Outbound email configuration is mandatory for Firezone and supports
many different delivery adapters
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.emailPrefixAttribute | The attribute that contains the users username.
|
| options/nixos/security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| options/nixos/security.pam.services.<name>.googleOsLoginAccountVerification | If set, will use the Google OS Login PAM modules
(pam_oslogin_login,
pam_oslogin_admin) to verify possible OS Login
users and set sudoers configuration accordingly
|
| options/nixos/services.warpgate.settings.config_provider | Source of truth of users
|
| packages/nixpkgs/acl2-minimal | Interpreter and prover for a Lisp dialect |
| options/nixos/services.sourcehut.settings."meta.sr.ht::settings".onboarding-redirect | Where to redirect new users upon registration.
|
| packages/nixpkgs/libdazzle | Library to delight your users with fancy features |
| packages/nixpkgs/python312Packages.pyct | ClI for Python common tasks for users |
| packages/nixpkgs/baikal | Lightweight CalDAV+CardDAV server that offers an extensive web interface with easy management of users, address books and calendars |
| packages/nixpkgs/conserver | Application that allows multiple users to watch a serial console at the same time |
| options/nixos/services.bitwarden-directory-connector-cli.sync.overwriteExisting | Remove and re-add users/groups, See https://bitwarden.com/help/user-group-filters/#overwriting-syncs for more details.
|
| options/nixos/services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| packages/nixpkgs/python312Packages.pesq | PESQ (Perceptual Evaluation of Speech Quality) Wrapper for Python Users |
| packages/nixpkgs/b43Firmware_6_30_163_46 | Firmware for cards supported by the b43 kernel module |
| packages/nixpkgs/gnome-user-docs | User and system administration help for the GNOME desktop |
| packages/nixpkgs/typstPackages.datify_0_1_3 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_4 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_1 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| packages/nixpkgs/typstPackages.datify_0_1_2 | Datify is a simple date package that allows users to format dates in new ways and addresses the issue of lacking date formats in different languages |
| options/nixos/virtualisation.lxc.unprivilegedContainers | Whether to enable support for unprivileged users to launch containers.
|
| options/nixos/services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| packages/nixpkgs/linuxKernel.packages.linux_5_4.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/gridcoin-research | POS-based cryptocurrency that rewards users for participating on the BOINC network |
| packages/nixpkgs/sillytavern | LLM Frontend for Power Users |
| packages/nixpkgs/typstPackages.postercise | Postercise allows users to easily create academic research posters with different themes using Typst |
| packages/nixpkgs/linuxKernel.packages.linux_zen.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_lqx.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python313Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/python314Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/python313Packages.bangla | Bangla is a package for Bangla language users with various functionalities including Bangla date and Bangla numeric conversation |
| packages/nixpkgs/python314Packages.bangla | Bangla is a package for Bangla language users with various functionalities including Bangla date and Bangla numeric conversation |
| packages/nixpkgs/bash-git-prompt | Informative, fancy bash prompt for Git users |
| packages/nixpkgs/tailscale-nginx-auth | Tool that allows users to use Tailscale Whois authentication with NGINX as a reverse proxy |
| options/nixos/services.smartd.notifications.systembus-notify.enable | Whenever to send systembus-notify notifications
|
| packages/nixpkgs/python312Packages.i3-py | Tools for i3 users and developers |
| packages/nixpkgs/linuxKernel.packages.linux_6_17.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_19.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_18.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_5_15.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| options/nixos/services.healthchecks.settings.REGISTRATION_OPEN | A boolean that controls whether site visitors can create new accounts
|
| options/nixos/services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| packages/nixpkgs/grafanaPlugins.grafana-discourse-datasource | Allows users to search and view topics, posts, users, tags, categories, and reports on a given Discourse forum through Grafana |
| packages/nixpkgs/bashSnippets | Collection of small bash scripts for heavy terminal users |
| packages/nixpkgs/python313Packages.beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/python314Packages.beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/drawpile-server-headless | Collaborative drawing program that allows multiple users to sketch on the same canvas simultaneously |
| packages/nixpkgs/tt-rss-plugin-auth-ldap | Plugin for TT-RSS to authenticate users via ldap |
| options/nixos/services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| packages/nixpkgs/haskellPackages.alto | Implement a menu experience fit for web users |
| options/nixos/services.nextcloud.settings.skeletondirectory | The directory where the skeleton files are located
|
| packages/nixpkgs/cudaPackages.cuda_nvprof | Collect and view profiling data from the command-line |
| packages/nixpkgs/python312Packages.msal | Library to access the Microsoft Cloud by supporting authentication of users with Microsoft Azure Active Directory accounts (AAD) and Microsoft Accounts (MSA) using industry standard OAuth2 and OpenID Connect |
| packages/nixpkgs/haskellPackages.path-io | Interface to ‘directory’ package for users of ‘path’ |
| options/nixos/services.grafana.provision.datasources.settings.datasources.*.editable | Allow users to edit datasources from the UI.
|
| packages/nixpkgs/linuxKernel.packages.linux_libre.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python312Packages.bangla | Bangla is a package for Bangla language users with various functionalities including Bangla date and Bangla numeric conversation |
| packages/nixpkgs/texlivePackages.biber | A BibTeX replacement for users of BibLaTeX |
| packages/nixpkgs/deepin.deepin-calculator | Easy to use calculator for ordinary users |
| packages/nixpkgs/python313Packages.django-filter | Reusable Django application for allowing users to filter querysets dynamically |
| packages/nixpkgs/python314Packages.django-filter | Reusable Django application for allowing users to filter querysets dynamically |
| packages/nixpkgs/docker-credential-gcr | Docker credential helper for GCR (https://gcr.io) users |
| packages/nixpkgs/tailscale-gitops-pusher | Allows users to use a GitOps flow for managing Tailscale ACLs |
| packages/nixpkgs/texlivePackages.biber-ms | A BibTeX replacement for users of BibLaTeX (multiscript version) |
| options/nixos/services.matrix-conduit.settings.global.allow_registration | Whether new users can register on this server.
|
| packages/nixpkgs/tmuxPlugins.tmux-which-key | Tmux plugin that allows users to select actions from a customizable popup menu |
| options/nixos/services.matrix-synapse.settings.enable_registration | Enable registration for new users.
|
| packages/nixpkgs/python312Packages.beanhub-cli | Command line tools for BeanHub or Beancount users |
| packages/nixpkgs/texlivePackages.engtlc | Support for users in Telecommunications Engineering |
| packages/nixpkgs/texlivePackages.luacas | A computer algebra system for users of LuaLaTeX |
| packages/nixpkgs/haskellPackages.betris | A horizontal version of tetris for braille users |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/haskellPackages.sproxy | HTTP proxy for authenticating users via OAuth2 |
| packages/nixpkgs/gnome-bluetooth_1_0 | Application that let you manage Bluetooth in the GNOME destkop |
| packages/nixpkgs/zsh-completions | Additional completion definitions for zsh |
| packages/nixpkgs/python313Packages.cmdstanpy | Lightweight interface to Stan for Python users |
| packages/nixpkgs/python314Packages.cmdstanpy | Lightweight interface to Stan for Python users |
| options/nixos/services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| packages/nixpkgs/haskellPackages.prompt-hs | A user-friendly, dependently-typed library for asking your users questions |
| packages/nixpkgs/python312Packages.django-filter | Reusable Django application for allowing users to filter querysets dynamically |
| packages/nixpkgs/texlivePackages.xltxtra | "Extras" for LaTeX users of XeTeX |
| packages/nixpkgs/python313Packages.pycognito | Python class to integrate Boto3's Cognito client so it is easy to login users |
| packages/nixpkgs/powerline-fonts | Patched fonts for Powerline users |
| packages/nixpkgs/python314Packages.pycognito | Python class to integrate Boto3's Cognito client so it is easy to login users |
| packages/nixpkgs/linuxPackages_xanmod_latest.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxPackages_xanmod_stable.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python313Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/python314Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/haskellPackages.sproxy2 | Secure HTTP proxy for authenticating users via OAuth2 |
| packages/nixpkgs/texlivePackages.pm-isomath | Poor man ISO math for pdfLaTeX users |
| packages/nixpkgs/gnomeExtensions.user-id-in-top-panel | Add ( user name :: user id @ host ) in top panel |
| packages/nixpkgs/texlivePackages.gustprog | utility programs for Polish users of TeX |
| packages/nixpkgs/haskellPackages.haskell-say | Let the Haskell logo talk to your users! |
| packages/nixpkgs/python313Packages.netbox-reorder-rack | NetBox plugin to allow users to reorder devices within a rack using a drag and drop UI |
| packages/nixpkgs/python314Packages.netbox-reorder-rack | NetBox plugin to allow users to reorder devices within a rack using a drag and drop UI |
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| options/nixos/services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| packages/nixpkgs/python312Packages.cmdstanpy | Lightweight interface to Stan for Python users |
| options/nixos/services.biboumi.settings.realname_customization | Whether the users will be able to use
the ad-hoc commands that lets them configure
their realname and username.
|
| packages/nixpkgs/texlivePackages.penlight | Penlight Lua libraries made available to LuaLaTeX users |
| packages/nixpkgs/linuxKernel.packages.linux_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/python312Packages.pycognito | Python class to integrate Boto3's Cognito client so it is easy to login users |
| packages/nixpkgs/texlivePackages.latex4wp | A LaTeX guide specifically designed for word processor users |
| packages/nixpkgs/python312Packages.monkeyhex | Small library to assist users of the python shell who work in contexts where printed numbers are more usefully viewed in hexadecimal |
| packages/nixpkgs/texlivePackages.latex4wp-it | LaTeX guide for word processor users, in Italian |
| packages/nixpkgs/texlivePackages.graphics-pln | LaTeX-style graphics for Plain TeX users |
| packages/nixpkgs/zsh-history-substring-search | Fish shell history-substring-search for Zsh |
| packages/nixpkgs/python313Packages.defusedcsv | Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module |
| packages/nixpkgs/python314Packages.defusedcsv | Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module |
| packages/nixpkgs/koodousfinder | Tool to allows users to search for and analyze Android apps |
| packages/nixpkgs/python312Packages.netbox-reorder-rack | NetBox plugin to allow users to reorder devices within a rack using a drag and drop UI |
| packages/nixpkgs/deadd-notification-center | Haskell-written notification center for users that like a desktop with style |
| packages/nixpkgs/graylogPlugins.aggregates | Plugin that enables users to execute term searches and get notified when the given criteria are met |
| packages/nixpkgs/texlivePackages.etextools | e-TeX tools for LaTeX users and package writers |
| packages/nixpkgs/python313Packages.orbax-checkpoint | Orbax provides common utility libraries for JAX users |
| packages/nixpkgs/python314Packages.orbax-checkpoint | Orbax provides common utility libraries for JAX users |
| packages/nixpkgs/haskellPackages.prompt-hs_1_1_0_1 | A user-friendly, dependently-typed library for asking your users questions |
| packages/nixpkgs/typstPackages.postercise_0_1_0 | Postercise allows users to easily create academic research posters with different themes using Typst |
| packages/nixpkgs/typstPackages.postercise_0_2_0 | Postercise allows users to easily create academic research posters with different themes using Typst |
| packages/nixpkgs/haskellPackages.prompt-hs_1_1_0_2 | A user-friendly, dependently-typed library for asking your users questions |
| packages/nixpkgs/python312Packages.defusedcsv | Python library to protect your users from Excel injections in CSV-format exports, drop-in replacement for standard library's csv module |
| packages/nixpkgs/zsh-syntax-highlighting | Fish shell like syntax highlighting for Zsh |
| packages/nixpkgs/lgogdownloader-gui | Unofficial downloader to GOG.com for Linux users |
| packages/nixpkgs/gnomeExtensions.mumbleping | Displays how many users are currently online on a mumble server |
| packages/nixpkgs/lgogdownloader | Unofficial downloader to GOG.com for Linux users |
| options/nixos/services.pgbouncer.settings.pgbouncer.max_user_connections | Do not allow more than this many server connections per user (regardless of database)
|
| packages/nixpkgs/texlivePackages.ctanupload | Support for users uploading to CTAN |
| packages/nixpkgs/python312Packages.orbax-checkpoint | Orbax provides common utility libraries for JAX users |
| packages/nixpkgs/texlivePackages.expex-glossonly | Help gb4e, linguex, and covington users use the ExPex glossing macros |
| packages/nixpkgs/texlivePackages.biblatex-gb7714-2015 | A BibLaTeX implementation of the GBT7714-2015 bibliography style for Chinese users |
| packages/nixpkgs/gnomeExtensions.browser-switcher | Quick default browser switching from the system panel |
| packages/nixpkgs/pantheon.elementary-onboarding | Onboarding app for new users designed for elementary OS |
| packages/nixpkgs/gnomeExtensions.classic-app-switcher | Classic App Switcher is a Mac OS 9-style application switcher extension for GNOME Shell |
| packages/nixpkgs/gnomeExtensions.yaru-automatic-dark-mode | Automatically switches between light and dark versions of the Yaru shell, icon, and GTK themes based on your system's dark mode setting |
| packages/nixpkgs/linuxKernel.packages.linux_5_4_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_6_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_latest_libre.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_1_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/gnomeExtensions.sevosio-session-switcher | Allows session switching between users |
| packages/nixpkgs/haskellPackages.juandelacosa | Manage users in MariaDB >= 10.1.1 |
| packages/nixpkgs/zsh-autosuggestions | Fish shell autosuggestions for Zsh |
| packages/nixpkgs/linuxKernel.packages.linux_5_10_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_5_15_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_stable.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_latest.zenergy | Based on AMD_ENERGY driver, but with some jiffies added so non-root users can read it safely |
| packages/nixpkgs/vscode-extensions.RoweWilsonFrederiskHolme.wikitext | Extension that helps users view and write MediaWiki's Wikitext files |
| packages/nixpkgs/python313Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/python314Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/gnomeExtensions.pipewire-airplay-toggle | Quick Setting menu toggle to enable/disable the RAOP Discover Module in PipeWire, allowing users to quickly and easily show or hide their AirPlay enabled speakers |
| packages/nixpkgs/gnomeExtensions.colorblind-filters | Color filters are designed to assist both color-blind users and developers |
| packages/nixpkgs/python312Packages.oauthenticator | Authenticate JupyterHub users with common OAuth providers |
| packages/nixpkgs/busybox | Tiny versions of common UNIX utilities in a single small executable |
| packages/nixpkgs/texlivePackages.biblatex-caspervector | A simple citation style for Chinese users |
| packages/nixpkgs/perlPackages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl5Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl540Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/perl538Packages.CatalystAuthenticationStoreLDAP | Authenticate Users against LDAP Directories |
| packages/nixpkgs/gnomeExtensions.set-monitor-ddc-brightnesscontrast-extra-dimming | Control brightness and contrast with ddc and extra screen dimming with black overlay, It requires ddcutil to be installed, i2c permissions for non-root users configured. |
| options/nixos/programs.zsh.enable | Whether to configure zsh as an interactive shell
|
| options/nixos/services.memos.group | The group to run Memos as.
If changing the default value, you are responsible of creating the corresponding group with users.groups.
|
| options/nixos/services.memos.user | The user to run Memos as.
If changing the default value, you are responsible of creating the corresponding user with users.users.
|
| options/nixos/programs.gphoto2.enable | Whether to configure system to use gphoto2
|
| options/nixos/programs.bash.enable | Whenever to configure Bash as an interactive shell
|
| options/nixos/programs.rust-motd.enableMotdInSSHD | Whether to let openssh print the
result when entering a new ssh-session
|
| options/nixos/services.reaction.runAsRoot | Whether to run reaction as root
|
| options/nixos/services.vault.extraSettingsPaths | Configuration files to load besides the immutable one defined by the NixOS module
|
| options/nixos/services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| options/nixos/services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| options/nixos/services.pdfding.enable | Whether to enable PdfDing service
|
| options/home-manager/programs.qutebrowser.greasemonkey | Greasemonkey userscripts to add to qutebrowser's greasemonkey
directory.
|
| options/nixos/services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| options/nixos/services.gvfs.enable | Whether to enable GVfs, a userspace virtual filesystem.
|
| options/nixos/services.iptsd.enable | Whether to enable the userspace daemon for Intel Precise Touch & Stylus.
|
| options/nixos/services.ulogd.enable | Whether to enable ulogd, a userspace logging daemon for netfilter/iptables related logging.
|
| options/nixos/services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| options/nixos/security.tpm2.abrmd.enable | Whether to enable Trusted Platform 2 userspace resource manager daemon
.
|
| options/nixos/services.scx.enable | Whether to enable SCX service, a daemon to run schedulers from userspace.
This service requires a kernel with the Sched-ext feature
|
| options/nixos/networking.ucarp.enable | Whether to enable ucarp, userspace implementation of CARP.
|
| options/nixos/hardware.openrazer.enable | Whether to enable OpenRazer drivers and userspace daemon
.
|
| options/nixos/services.kmscon.enable | Whether to enable kmscon as the virtual console instead of gettys.
kmscon is a kms/dri-based userspace virtual terminal implementation
|
| options/nixos/services.tee-supplicant.enable | Whether to enable OP-TEE userspace supplicant.
|
| options/nixos/services.hardware.bolt.enable | Whether to enable Bolt, a userspace daemon to enable
security levels for Thunderbolt 3 on GNU/Linux
|
| options/nixos/services.esdm.enableLinuxCompatServices | Enable /dev/random, /dev/urandom and /proc/sys/kernel/random/* userspace wrapper.
|
| options/nixos/services.tailscale.interfaceName | The interface name for tunnel traffic
|
| options/nixos/programs.ryzen-monitor-ng.enable | Whether to enable ryzen_monitor_ng, a userspace application for setting and getting Ryzen SMU (System Management Unit) parameters via the ryzen_smu kernel driver
|
| options/nixos/programs.nix-required-mounts.presets.nvidia-gpu.enable | Whether to enable Declare the support for derivations that require an Nvidia GPU to be
available, e.g. derivations with requiredSystemFeatures = [ "cuda" ]
|
| options/nixos/virtualisation.qemu.networkingOptions | Networking-related command-line options that should be passed to qemu
|
| options/nixos/services.suricata.settings.dpdk | Data Plane Development Kit is a framework for fast packet processing in data plane applications running on a wide variety of CPU architectures
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer
|
| packages/nixpkgs/zeitgeist | Service which logs the users’s activities and events |
| packages/nixpkgs/ucarp | Userspace implementation of CARP |
| packages/nixpkgs/criu | Userspace checkpoint/restore for Linux |
| packages/nixpkgs/python312Packages.zeitgeist | Service which logs the users’s activities and events |
| packages/nixpkgs/python313Packages.zeitgeist | Service which logs the users’s activities and events |
| packages/nixpkgs/python314Packages.zeitgeist | Service which logs the users’s activities and events |
| packages/nixpkgs/mpvScripts.quality-menu | Userscript for MPV that allows you to change youtube video quality (ytdl-format) on the fly |
| packages/nixpkgs/mpvScripts.youtube-upnext | Userscript that allows you to play 'up next'/recommended youtube videos |
| packages/nixpkgs/vdo | Set of userspace tools for managing pools of deduplicated and/or compressed block storage |
| packages/nixpkgs/zfs_2_4 | ZFS Filesystem Linux Userspace Tools |
| packages/nixpkgs/umr | Userspace debugging and diagnostic tool for AMD GPUs |
| packages/nixpkgs/zfs | ZFS Filesystem Linux Userspace Tools |
| packages/nixpkgs/asahi-audio | Linux userspace audio configuration for Apple Silicon Macs |
| packages/nixpkgs/ipu6-camera-hal | HAL for processing of images in userspace |
| packages/nixpkgs/lttng-ust | LTTng Userspace Tracer libraries |
| packages/nixpkgs/fsverity-utils | Set of userspace utilities for fs-verity |
| packages/nixpkgs/drbd | Distributed Replicated Block Device, a distributed storage system for Linux (userspace utilities) |
| packages/nixpkgs/acpid | Daemon for delivering ACPI events to userspace programs |
| packages/nixpkgs/ulogd | Userspace logging daemon for netfilter/iptables |
| packages/nixpkgs/zfs_2_3 | ZFS Filesystem Linux Userspace Tools |
| packages/nixpkgs/mmc-utils | Configure MMC storage devices from userspace |
| packages/nixpkgs/iptsd | Userspace daemon for Intel Precise Touch & Stylus |
| packages/nixpkgs/libnbd | Network Block Device client library in userspace |
| packages/nixpkgs/zfs_2_2 | ZFS Filesystem Linux Userspace Tools |
| packages/nixpkgs/ipu6ep-camera-hal | HAL for processing of images in userspace |
| packages/nixpkgs/lxc | Userspace tools for Linux Containers, a lightweight virtualization system |
| packages/nixpkgs/lockdep | Userspace locking validation tool built on the Linux kernel |
| packages/nixpkgs/librseq | Userspace library for the Linux Restartable Sequence API |
| packages/nixpkgs/logiops | Unofficial userspace driver for HID++ Logitech devices |
| packages/nixpkgs/lttng-ust_2_12 | LTTng Userspace Tracer libraries |
| packages/nixpkgs/afuse | Automounter in userspace |
| packages/nixpkgs/aefs | Cryptographic filesystem implemented in userspace using FUSE |
| packages/nixpkgs/trickle | Lightweight userspace bandwidth shaper |
| packages/nixpkgs/joycond | Userspace daemon to combine joy-cons from the hid-nintendo kernel driver |
| packages/nixpkgs/ksmbd-tools | Userspace utilities for the ksmbd kernel SMB server |
| packages/nixpkgs/bridge-utils | Userspace tool to configure linux bridges (deprecated in favour or iproute2) |
| packages/nixpkgs/zfs_unstable | ZFS Filesystem Linux Userspace Tools |
| packages/nixpkgs/xwiimote | Userspace utilities to control connected Nintendo Wii Remotes |
| packages/nixpkgs/linuxPackages.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/ocamlPackages.nbd | Network Block Device client library in userspace |
| packages/nixpkgs/libnftnl | Userspace library providing a low-level netlink API to the in-kernel nf_tables subsystem |
| packages/nixpkgs/libsepol | SELinux binary policy manipulation library |
| packages/nixpkgs/linuxPackages_zen.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxPackages_lqx.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/liburcu | Userspace RCU (read-copy-update) library |
| packages/nixpkgs/boringtun | Userspace WireGuard® implementation in Rust |
| packages/nixpkgs/can-utils | CAN userspace utilities and tools (for use with Linux SocketCAN) |
| packages/nixpkgs/scx.full | Sched-ext C and Rust userspace schedulers |
| packages/nixpkgs/libusbgx | C library encapsulating the kernel USB gadget-configfs userspace API functionality |
| packages/nixpkgs/liburing | Userspace library for the Linux io_uring API |
| packages/nixpkgs/semodule-utils | SELinux policy core utilities (packaging additions) |
| packages/nixpkgs/linuxPackages_latest.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxPackages_xanmod.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/erofs-utils | Userspace utilities for linux-erofs file system |
| packages/nixpkgs/ocamlPackages_latest.nbd | Network Block Device client library in userspace |
| packages/nixpkgs/ipu6epmtl-camera-hal | HAL for processing of images in userspace |
| packages/nixpkgs/amneziawg-go | Userspace Go implementation of AmneziaWG |
| packages/nixpkgs/wireguard-go | Userspace Go implementation of WireGuard |
| packages/nixpkgs/conntrack-tools | Connection tracking userspace tools |
| packages/nixpkgs/python312Packages.libnbd | Network Block Device client library in userspace |
| packages/nixpkgs/libedgetpu | Userspace level runtime driver for Coral devices |
| packages/nixpkgs/scx.cscheds | Sched-ext C userspace schedulers |
| packages/nixpkgs/rdma-core | RDMA Core Userspace Libraries and Daemons |
| packages/nixpkgs/exfatprogs | exFAT filesystem userspace utilities |
| packages/nixpkgs/python313Packages.libnbd | Network Block Device client library in userspace |
| packages/nixpkgs/python314Packages.libnbd | Network Block Device client library in userspace |
| packages/nixpkgs/memtester | Userspace utility for testing the memory subsystem for faults |
| packages/nixpkgs/logiops_0_2_3 | Unofficial userspace driver for HID++ Logitech devices |
| packages/nixpkgs/python313Packages.ds4drv | Userspace driver for the DualShock 4 controller |
| packages/nixpkgs/python314Packages.ds4drv | Userspace driver for the DualShock 4 controller |
| packages/nixpkgs/selinux-refpolicy | SELinux Reference Policy v2 |
| packages/nixpkgs/linuxKernel.packages.linux_5_4.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/libsemanage | Policy management tools for SELinux |
| packages/nixpkgs/checkpolicy | SELinux policy compiler |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_zen.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_lqx.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_17.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_5_15.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_18.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_19.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/python312Packages.ds4drv | Userspace driver for the DualShock 4 controller |
| packages/nixpkgs/ntfsprogs-plus | NTFS filesystem userspace utilities |
| packages/nixpkgs/libselinux | SELinux core library |
| packages/nixpkgs/chickenPackages_5.chickenEggs.fuse | Filesystems in Userspace |
| packages/nixpkgs/linuxKernel.packages.linux_libre.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/tinycompress | Userspace library for anyone who wants to use the ALSA compressed APIs |
| packages/nixpkgs/haskellPackages.uacpid | Userspace Advanced Configuration and Power Interface event daemon |
| packages/nixpkgs/libnfnetlink | Low-level library for netfilter related kernel/userspace communication |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/python312Packages.libselinux | SELinux core library |
| packages/nixpkgs/linuxPackages_xanmod_stable.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxPackages_xanmod_latest.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxPackages.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxPackages_lqx.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxPackages_zen.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/perlPackages.CryptRandomTESHA2 | Random numbers using timer/schedule entropy, aka userspace voodoo entropy |
| packages/nixpkgs/scx.rustscheds | Sched-ext Rust userspace schedulers |
| packages/nixpkgs/linuxKernel.packages.linux_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/perl5Packages.CryptRandomTESHA2 | Random numbers using timer/schedule entropy, aka userspace voodoo entropy |
| packages/nixpkgs/linuxPackages_xanmod.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxPackages_latest.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/python313Packages.libselinux | SELinux core library |
| packages/nixpkgs/python314Packages.libselinux | SELinux core library |
| packages/nixpkgs/perl540Packages.CryptRandomTESHA2 | Random numbers using timer/schedule entropy, aka userspace voodoo entropy |
| packages/nixpkgs/perl538Packages.CryptRandomTESHA2 | Random numbers using timer/schedule entropy, aka userspace voodoo entropy |
| packages/nixpkgs/stressapptest | Userspace memory and IO stress test tool |
| packages/nixpkgs/speakersafetyd | Userspace daemon that implements the Smart Amp protection model |
| packages/nixpkgs/linuxKernel.packages.linux_5_4.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_1.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_6.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_zen.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_lqx.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_17.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_5_10.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_19.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_12.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_5_15.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_18.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_libre.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_1_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_latest_libre.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/policycoreutils | SELinux policy core utilities |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_5_4_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_6_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxPackages_xanmod_stable.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxPackages_xanmod_latest.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_5_10_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_5_15_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_stable.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_latest.iio-utils | Userspace tool for interacting with Linux IIO |
| packages/nixpkgs/libnetfilter_log | Userspace library providing interface to packets that have been logged by the kernel packet filter |
| packages/nixpkgs/linuxKernel.packages.linux_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/libnetfilter_acct | Userspace library providing interface to extended accounting infrastructure |
| packages/nixpkgs/linuxKernel.packages.linux_6_6_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_1_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_latest_libre.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_5_4_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/libnetfilter_queue | Userspace API to packets queued by the kernel packet filter |
| packages/nixpkgs/linuxKernel.packages.linux_5_10_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_5_15_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_6_12_hardened.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_stable.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/linuxKernel.packages.linux_xanmod_latest.framework-laptop-kmod | Kernel module that exposes the Framework Laptop (13, 16)'s battery charge limit and LEDs to userspace |
| packages/nixpkgs/libnetfilter_cthelper | Userspace library that provides the programming interface to the user-space connection tracking helper infrastructure |
| packages/nixpkgs/libnetfilter_cttimeout | Userspace library that provides the programming interface to the connection tracking timeout infrastructure |
| packages/nixpkgs/libnetfilter_conntrack | Userspace library providing an API to the in-kernel connection tracking state table |
| packages/nur/vladexa.SteamTokenDumper | 🔢 Submit users' PICS access tokens to SteamDB |
| packages/nur/renesat.tukai | The app provides an interactive typing experience with switchable templates, designed to help users improve their typing speed and accuracy |
| packages/nur/lennis-dev.hackit | This is a simple web application that allows users to try and solve a series of challenges |
| packages/nur/linyinfeng.zeronsd | A DNS server for ZeroTier users |
| packages/nur/codgician.samsung-dc-toolkit-3 | Samsung DC Toolkit is designed to help users with easy-to-use disk management and diagnostic features for server
and data center usage. |
| packages/nur/codgician.samsung-dc-toolkit-2 | Samsung DC Toolkit is designed to help users with easy-to-use disk management and diagnostic features for server
and data center usage. |
| packages/nur/ohheyrj.openaudible | OpenAudible is a cross-platform desktop app that lets Audible users download, convert, and manage their audiobooks in MP3 or M4B formats for offline listening. |
| packages/nur/c2vi.mac-telnet | Open source MAC Telnet client and server for connecting to Mikrotik RouterOS routers and Posix devices using MAC addresses |
| packages/nur/rycee.firefox-addons.maya-light | Soft pastel pink light theme with a few darker Evil maya accents |
| packages/nur/rycee.firefox-addons.passff | Add-on that allows users of the unix password manager 'pass' to access their password store from Firefox |
| packages/nur/rycee.firefox-addons.jabref | Browser extension for users of the bibliographic reference manager JabRef |
| packages/nur/rycee.firefox-addons.about-sync | Show information about Firefox Sync |
| packages/nur/rycee.firefox-addons.binnen-i-be-gone | This add-on likely is only useful for users who speak German or visit German language websites - it will remove so called "Binnen-Is" on webpages. |
| packages/nur/rycee.firefox-addons.metamask | The most secure wallet for crypto, NFTs, and DeFi, trusted by millions of users |
| packages/nur/sikmir.capture2text | Capture2Text enables users to quickly OCR a portion of the screen using a keyboard shortcut |
| packages/nur/kira-bruneau.powertools | Steam Deck power tweaks for power users |
| packages/nur/xeals.koillection | Self-hosted service allowing users to manage any kind of collections |
| packages/nur/rycee.firefox-addons.clearcache | Advanced cache clearing with time periods, current tab filter, and smart notifications |
| packages/nur/meain.firefox-addons.mastodon4-redirect | Redirects users from Mastodon4 supported instances to their home instance |
| packages/nur/rycee.firefox-addons.startpage-private-search | This extension protects users from being tracked while allowing them to search the web in complete private mode. |
| packages/nur/rycee.firefox-addons.flexheaders-alter-http-headers | A lightweight yet powerful extension to modify HTTP headers on the fly |
| packages/nur/sikmir.qute-gemini | A qutebrowser userscripts that allows viewing Gemini pages |
| packages/nur/rycee.firefox-addons.stylus | Redesign your favorite websites with Stylus, an actively developed and community driven userstyles manager |
| packages/nur/xddxdd.uksmd | Userspace KSM helper daemon |
| packages/nur/dtomvan.violentmonkey | Violentmonkey provides userscripts support for browsers |
| packages/nur/rycee.firefox-addons.tampermonkey | Tampermonkey is the world's most popular userscript manager. |
| packages/nur/colinsane.bunpen | userspace sandbox helper |
| packages/nur/rycee.firefox-addons.violentmonkey | Userscript support for browsers, open source. |
| packages/nur/colinsane.libfuse-sane | provides `mount.fuse3.sane`, which behaves identically to `mount.fuse3` except
it supports an additional mount flag, `-o pass_fuse_fd`.
when mounting with `-o pass_fuse_fd`, `mount.fuse3.sane` opens the `/dev/fuse` device (which requires CAP_SYS_ADMIN),
and then `exec`s the userspace implementation, which inherits this file descriptor.
`mount.fuse3.sane` invokes the userspace implementation with the device argument set to something like `/dev/fd/3`, indicating which fd holds the fuse device.
the aim of this flag is to provide a clear handoff point at which the filesystem may drop CAP_SYS_ADMIN.
in this regard, it's much like `-o drop_privileges`, only it leaves the responsibility for that to the fs impl,
in case the fs needs to preserve _other_ privileges besides CAP_SYS_ADMIN.
|
| packages/nur/xddxdd.uncategorized.uksmd | Userspace KSM helper daemon |
| packages/nur/xddxdd.libnftnl-fullcone | Userspace library providing a low-level netlink API to the in-kernel nf_tables subsystem |
| packages/nur/xddxdd.libcrystalhd | Broadcom Crystal HD Hardware Decoder (BCM70012/70015) userspace library |
| packages/nur/xddxdd.uncategorized.libnftnl-fullcone | Userspace library providing a low-level netlink API to the in-kernel nf_tables subsystem |
| packages/nur/xddxdd.uncategorized.libcrystalhd | Broadcom Crystal HD Hardware Decoder (BCM70012/70015) userspace library |