| options/nixos/services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| options/nixos/services.outline.logo | Custom logo displayed on the authentication screen
|
| options/nixos/services.plantuml-server.httpAuthorization | When calling the proxy endpoint, the value of HTTP_AUTHORIZATION will be used to set the HTTP Authorization header.
|
| options/nixos/networking.openconnect.interfaces.<name>.passwordFile | File containing the password to authenticate with
|
| options/nixos/services.ttyd.username | Username for basic http authentication.
|
| options/nixos/users.mysql.pam.logging.enable | Enables logging of authentication attempts in the MySQL database.
|
| options/nixos/services.usbguard.restoreControllerDeviceState | The USBGuard daemon modifies some attributes of controller
devices like the default authorization state of new child device
instances
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| options/nixos/services.prometheus.remoteRead.*.bearer_token | Sets the Authorization header on every remote read request with
the configured bearer token
|
| options/nixos/services.outline.smtp | To support sending outgoing transactional emails such as
"document updated" or "you've been invited" you'll need to provide
authentication for an SMTP server.
|
| options/nixos/services.openssh.banner | Message to display to the remote user before authentication is allowed.
|
| options/nixos/services.prometheus.remoteWrite.*.bearer_token | Sets the Authorization header on every remote write request with
the configured bearer token
|
| options/nixos/networking.openconnect.interfaces.<name>.certificate | Certificate to authenticate with.
|
| options/nixos/services.factorio.token | Authentication token
|
| options/nixos/services.erigon.secretJwtPath | Path to the secret jwt used for the http api authentication.
|
| options/nixos/services.netbox.enableLdap | Enable LDAP-Authentication for Netbox
|
| options/nixos/services.chrony.enableNTS | Whether to enable Network Time Security authentication
|
| options/nixos/services.prometheus.scrapeConfigs.*.bearer_token | Sets the Authorization header on every scrape request with
the configured bearer token
|
| options/nixos/users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| options/nixos/services.graylog.elasticsearchHosts | List of valid URIs of the http ports of your elastic nodes
|
| options/nixos/services.coturn.secure-stun | Require authentication of the STUN Binding request
|
| options/nixos/services.opendkim.enable | Whether to enable OpenDKIM sender authentication system.
|
| options/nixos/services.mongodb.enableAuth | Enable client authentication
|
| options/nixos/services.gitea.metricsTokenFile | Path to a file containing the metrics authentication token.
|
| options/nixos/security.shadow.enable | Enable the shadow authentication suite, which provides critical programs such as su, login, passwd
|
| options/nixos/services.iperf3.rsaPrivateKey | Path to the RSA private key (not password-protected) used to decrypt authentication credentials from the client.
|
| options/nixos/services.tt-rss.email.password | SMTP authentication password used when sending outgoing mail.
|
| options/nixos/security.duosec.groups | If specified, Duo authentication is required only for users
whose primary group or supplementary group list matches one
of the space-separated pattern lists
|
| options/nixos/services.netbox.ldapConfigPath | Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
|
| options/nixos/services.portunus.enable | Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP.
|
| options/nixos/services.nsd.keys.<name>.algorithm | Authentication algorithm for this key.
|
| options/nixos/services.ttyd.passwordFile | File containing the password to use for basic http authentication
|
| options/nixos/security.pam.u2f.control | This option sets pam "control"
|
| options/nixos/security.duosec.failmode | On service or configuration errors that prevent Duo
authentication, fail "safe" (allow access) or "secure" (deny
access)
|
| options/nixos/services.gitea.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/security.pam.p11.control | This option sets pam "control"
|
| options/nixos/services.openssh.settings.UsePAM | Whether to enable PAM authentication.
|
| options/nixos/services.lavalink.password | The password for Lavalink's authentication in plain text.
|
| options/nixos/services.ncps.cache.redis.password | Redis password for authentication (for Redis ACL).
|
| options/nixos/services.ncps.cache.redis.username | Redis username for authentication (for Redis ACL).
|
| options/nixos/security.pam.ussh.control | This option sets pam "control"
|
| options/nixos/services.prometheus.exporters.fritz.settings.devices.*.password_file | Path to a file which contains the password to authenticate with the target device
|
| options/nixos/services.misskey.settings.db.pass | The password used for database authentication.
|
| options/nixos/services.podgrab.passwordFile | The path to a file containing the PASSWORD environment variable
definition for Podgrab's authentication.
|
| options/nixos/services.misskey.settings.db.user | The user used for database authentication.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username | Credentials are used to authenticate the requests to Uyuni API.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.password | Credentials are used to authenticate the requests to Uyuni API.
|
| options/nixos/programs.ssh.pubkeyAcceptedKeyTypes | Specifies the key lib.types that will be used for public key authentication.
|
| options/nixos/services.moodle.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.dovecot2.showPAMFailure | Whether to enable showing the PAM failure message on authentication error (useful for OTPW).
|
| options/nixos/services.kapacitor.alerta.token | Default Alerta authentication token
|
| options/nixos/services.grafana.settings.smtp.user | User used for authentication.
|
| options/nixos/services.slurm.server.enable | Whether to enable the slurm control daemon
|
| options/nixos/services.prosody.s2sSecureAuth | Force certificate authentication for server-to-server connections?
This provides ideal security, but requires servers you communicate
with to support encryption AND present valid, trusted certificates
|
| options/nixos/services.zabbixWeb.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.boinc.allowRemoteGuiRpc | If set to true, any remote host can connect to and control this BOINC
client (subject to password authentication)
|
| options/nixos/services.ncps.cache.redis.passwordFile | File containing the redis password for authentication (for Redis ACL).
|
| options/nixos/services.magnetico.web.credentials | The credentials to access the web interface, in case authentication is
enabled, in the format username:hash
|
| options/nixos/security.pam.yubico.control | This option sets pam "control"
|
| options/nixos/services.peering-manager.enableOidc | Enable OIDC-Authentication for Peering Manager
|
| options/nixos/services.forgejo.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.redmine.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.peering-manager.enableLdap | Enable LDAP-Authentication for Peering Manager
|
| options/home-manager/programs.ssh.matchBlocks.<name>.forwardAgent | Whether the connection to the authentication agent (if any)
will be forwarded to the remote machine.
|
| options/home-manager/programs.pianobar.settings.user | Username or emaill address for Pandora music service authentication
|
| options/home-manager/programs.senpai.config.password | Your password, used for SASL authentication
|
| options/nixos/programs.i3lock.u2fSupport | Whether to enable U2F support in the i3lock program
|
| options/nixos/services.neo4j.ssl.policies.<name>.clientAuth | The client authentication stance for this policy.
|
| options/nixos/services.librenms.settings | Attrset of the LibreNMS configuration
|
| options/nixos/services.zabbixProxy.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.prometheus.remoteRead.*.bearer_token_file | Sets the Authorization header on every remote read request with the bearer token
read from the configured file
|
| options/nixos/services.cassandra.remoteJmx | Cassandra ships with JMX accessible only from localhost
|
| options/nixos/services.rspamd-trainer.settings | IMAP authentication configuration for rspamd-trainer
|
| options/nixos/services.prometheus.remoteWrite.*.bearer_token_file | Sets the Authorization header on every remote write request with the bearer token
read from the configured file
|
| options/nixos/services.kimai.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.gotenberg.enableBasicAuth | HTTP Basic Authentication
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapAuth | Sets the authentication mechanism if imap is used as the incoming
method
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpAuth | Sets the authentication mechanism if smtp is used as the outgoing
method
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.id | IKE identity to use for authentication round
|
| options/nixos/security.pam.services.<name>.logFailures | Whether to log authentication failures in /var/log/faillog.
|
| options/nixos/security.pam.services.<name>.forwardXAuth | Whether X authentication keys should be passed from the
calling user to the target user (e.g. for
su)
|
| options/nixos/services.zabbixServer.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.peering-manager.oidcConfigPath | Path to the Configuration-File for OIDC-Authentication, will be loaded as oidc_config.py
|
| options/nixos/security.duosec.autopush | If true, Duo Unix will automatically send
a push login request to the user’s phone, falling back on a
phone call if push is unavailable
|
| options/nixos/services.peering-manager.ldapConfigPath | Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
|
| options/nixos/services.movim.database.createLocally | local database using UNIX socket authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id | IKE identity to expect for authentication round
|
| options/nixos/services.prometheus.scrapeConfigs.*.bearer_token_file | Sets the Authorization header on every scrape request with
the bearer token read from the configured file
|
| options/nixos/services.fwupd.extraTrustedKeys | Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files
|
| options/nixos/services.drupal.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.linux-enable-ir-emitter.enable | Whether to enable IR emitter hardware
|
| options/home-manager/programs.hyprlock.enable | Whether to enable Hyprlock, Hyprland's GPU-accelerated lock screen
utility
|
| options/nixos/services.gitlab-runner.services.<name>.tagList | Tag list
|
| options/nixos/services.pixelfed.redis.createLocally | Whether to enable a local Redis database using UNIX socket authentication.
|
| options/home-manager/accounts.contact.accounts.<name>.remote.userName | User name for authentication.
|
| options/home-manager/programs.ssh.matchBlocks.<name>.addKeysToAgent | When enabled, a private key that is used during authentication will be
added to ssh-agent if it is running (with confirmation enabled if
set to 'confirm')
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_id | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| options/nixos/services.mediawiki.database.socket | Path to the unix socket file to use for authentication.
|
| options/nixos/services.anuko-time-tracker.settings.email.smtpUser | MTA authentication username.
|
| options/nixos/services.anuko-time-tracker.settings.email.smtpAuth | MTA requires authentication.
|