| options/nixos/services.ghostunnel.servers.<name>.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| options/home-manager/programs.pianobar.settings.password_command | Command pianobar will use to access password for Pandora music service authentication
|
| options/nixos/services.grafana.settings.database.client_key_path | The path to the client key
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id | Identity to use as peer identity during EAP authentication
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.login | Username to use for SMTP authentication.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| options/nixos/services.openssh.settings.KbdInteractiveAuthentication | Specifies whether keyboard-interactive authentication is allowed.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| options/nixos/services.grafana.settings.database.client_cert_path | The path to the client cert
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.ca_id | Identity in CA certificate to accept for authentication
|
| options/home-manager/accounts.email.accounts.<name>.mujmap.settings.password_command | Shell command which will print a password to stdout for basic HTTP
authentication
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_secret | The application_credential_secret field is required if using an application
credential to authenticate.
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.passphrase | Password to use for SMTP authentication.
|
| options/nixos/services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/<imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| options/nixos/services.matrix-synapse.settings.macaroon_secret_key | Secret key for authentication tokens
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.mediation_peer | Identity under which the peer is registered at the mediation server, that
is, the IKE identity the other end of this connection uses as its local
identity on its connection to the mediation server
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/services.grafana.settings.security.csrf_trusted_origins | List of additional allowed URLs to pass by the CSRF check
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.password | password for the Identity V2 and V3 APIs
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.grafana.settings.security.csrf_additional_headers | List of allowed headers to be set by the user
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| packages/nixpkgs/route-detect | Find authentication (authn) and authorization (authz) security bugs in web application routes |
| packages/nixpkgs/pesign | Signing tools for PE-COFF binaries |
| packages/nixpkgs/totp-cli | Authy/Google Authenticator like TOTP CLI tool written in Go |
| packages/nixpkgs/nginx-sso | SSO authentication provider for the auth_request nginx module |
| packages/nixpkgs/pam | Pluggable Authentication Modules, a flexible mechanism for authenticating user |
| packages/nixpkgs/linux-pam | Pluggable Authentication Modules, a flexible mechanism for authenticating user |
| packages/nixpkgs/ockam | Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale |
| packages/nixpkgs/dita-ot | Open-source publishing engine for content authored in the Darwin Information Typing Architecture |
| packages/nixpkgs/elasticsearchPlugins.search-guard | Elasticsearch plugin that offers encryption, authentication, and authorisation |
| packages/nixpkgs/tacacsplus | Protocol for authentication, authorization and accounting (AAA) services for routers and network devices |
| packages/nixpkgs/kile | User-friendly TeX/LaTeX authoring tool for the KDE desktop environment |
| packages/nixpkgs/eudic | Authoritative English Dictionary Software Essential Tools for English Learners |
| packages/nixpkgs/spicedb-zed | Command line for managing SpiceDB |
| packages/nixpkgs/spicedb | Open source permission database |
| packages/nixpkgs/haskellPackages.orizentic | Token-based authentication and authorization |
| packages/nixpkgs/vouch-proxy | SSO and OAuth / OIDC login solution for NGINX using the auth_request module |
| packages/nixpkgs/python314Packages.signify | Library that verifies PE Authenticode-signed binaries |
| packages/nixpkgs/python313Packages.signify | Library that verifies PE Authenticode-signed binaries |
| packages/nixpkgs/oathkeeper | Open-source identity and access proxy that authorizes HTTP requests based on sets of rules |
| packages/nixpkgs/nsd | Authoritative only, high performance, simple and open source name server |
| packages/nixpkgs/technitium-dns-server | Authorative and Recursive DNS server for Privacy and Security |
| packages/nixpkgs/bombono | DVD authoring program for personal computers |
| packages/nixpkgs/material-maker | Procedural materials authoring tool |
| packages/nixpkgs/cntlm | NTLM/NTLMv2 authenticating HTTP proxy |
| packages/nixpkgs/haskellPackages.gssapi-wai | WAI Middleware for SPNEGO authentiaction |
| packages/nixpkgs/knot-dns | Authoritative-only DNS server from .cz domain registry |
| packages/nixpkgs/aardvark-dns | Authoritative dns server for A/AAAA container records |
| packages/nixpkgs/pomerium | Authenticating reverse proxy |
| packages/nixpkgs/pdns | Authoritative DNS server |
| packages/nixpkgs/jsign | Authenticode signing for Windows executables, installers & scripts |
| packages/nixpkgs/texlivePackages.mohe-book | Typeset authored, translated, and research books according to mohe rules |
| packages/nixpkgs/technitium-dns-server-library | Library for Authorative and Recursive DNS server for Privacy and Security |
| packages/nixpkgs/texlivePackages.munich | An alternative authordate bibliography style |
| packages/nixpkgs/typstPackages.t4t | An utility package for typst package authors |
| packages/nixpkgs/dvdstyler | DVD authoring software |
| packages/nixpkgs/texlivePackages.fcltxdoc | Macros for use in the author's documentation |
| packages/nixpkgs/texlivePackages.rgltxdoc | Common code for documentation of the author's packages |
| packages/nixpkgs/compass | Stylesheet Authoring Environment that makes your website design simpler to implement and easier to maintain |
| packages/nixpkgs/git-team | Command line interface for managing and enhancing git commit messages with co-authors |
| packages/nixpkgs/cotp | Trustworthy, encrypted, command-line TOTP/HOTP authenticator app with import functionality |
| packages/nixpkgs/cloak | Command-line OTP authenticator application |