| options/nixos/services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| options/nixos/services.tt-rss.singleUserMode | Operate in single user mode, disables all functionality related to
multiple users and authentication
|
| options/nixos/services.asusd.enableUserService | Activate the asusd-user service.
|
| options/nixos/services.davis.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.prosody.httpFileShare | Configures the http_file_share module to handle user uploads
|
| options/nixos/services.slskd.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.movim.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.pdfding.enable | Whether to enable PdfDing service
|
| options/nixos/services.dovecot2.imapsieve.mailbox.*.before | When an IMAP event of interest occurs, this sieve script is executed before any user script respectively
|
| packages/nixpkgs/bliss | Open source tool for computing automorphism groups and canonical forms of graphs |
| packages/nixpkgs/ding | Simple and fast dictionary lookup tool |
| packages/nixpkgs/gdm | Program that manages graphical display servers and handles graphical user logins |
| packages/nixpkgs/fuse | Library that allows filesystems to be implemented in user space |
| packages/nixpkgs/fuse2 | Library that allows filesystems to be implemented in user space |
| packages/nixpkgs/poop | Compare the performance of multiple commands with a colorful terminal user interface |
| packages/nixpkgs/termbox | Library for writing text-based user interfaces |
| packages/nixpkgs/su-exec | Switch user and group id and exec |
| packages/nixpkgs/vpp | Fast, scalable layer 2-4 multi-platform network stack running in user space |
| options/nixos/services.grav.systemSettings | Settings written to user/config/system.yaml.
|
| options/nixos/services.disnix.enableMultiUser | Whether to support multi-user mode by enabling the Disnix D-Bus service
|
| options/nixos/security.doas.extraRules.*.persist | If true, do not ask for a password again for some
time after the user successfully authenticates.
|
| options/nixos/services.couchdb.configFile | Configuration file for persisting runtime changes
|
| options/nixos/services.infinoted.group | What to call the primary group of the dedicated user under which infinoted is run
|
| options/nixos/nix.channel.enable | Whether the nix-channel command and state files are made available on the machine
|
| options/nixos/services.snipe-it.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.unpoller.loki.pass | Path of a file containing the password for Loki
|
| options/nixos/services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth.username | HTTP username
|
| options/nixos/services.dependency-track.settings."alpine.database.username" | Specifies the username to use when authenticating to the database.
|
| options/nixos/services.buildbot-master.group | Primary group of buildbot user.
|
| options/nixos/security.doas.extraRules.*.cmd | The command the user is allowed to run
|
| options/nixos/services.couchdb.viewIndexDir | Specifies location of CouchDB view index files
|
| options/nixos/services.dovecot2.enablePAM | Whether to enable creating a own Dovecot PAM service and configure PAM user logins.
|
| options/nixos/services.riemann-dash.dataDir | Location of the riemann-base dir
|
| options/nixos/services.portunus.enable | Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP.
|
| options/nixos/services.oidentd.enable | Whether to enable ‘oidentd’, an implementation of the Ident
protocol (RFC 1413)
|
| options/home-manager/programs.waveterm.themes | User defined terminal themes
|
| options/nixos/services.firefox-syncserver.database.createLocally | Whether to create database and user on the local machine if they do not exist
|
| options/nixos/services.pgbackrest.stanzas.<name>.instances | An attribute set of database instances as described in:
https://pgbackrest.org/configuration.html#section-stanza
Each instance defaults to set pg-host to the attribute's name
|
| packages/nixpkgs/clashmi | mihomo (clash.meta) graphical user interface based on Flutter |
| packages/nixpkgs/tparted | Text-based user interface (TUI) frontend for parted |
| packages/nixpkgs/vlan | User mode programs to enable VLANs on Ethernet devices |
| options/nixos/services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| options/nixos/services.grafana.settings.users.default_theme | Sets the default UI theme. system matches the user's system theme.
|
| options/nixos/services.buildbot-worker.group | Primary group of buildbot Worker user.
|
| options/nixos/services.mjolnir.accessTokenFile | File containing the matrix access token for the mjolnir user.
|
| options/nixos/services.oauth2-proxy.passBasicAuth | Pass HTTP Basic Auth, X-Forwarded-User and X-Forwarded-Email information to upstream.
|
| options/nixos/services.prefect.databaseUser | database user for postgres only
|
| options/nixos/services.grafana.settings.users.password_hint | Text used as placeholder text on login page for password input.
|
| options/nixos/services.syncthing.settings.options.urAccepted | Whether the user has accepted to submit anonymous usage data
|
| options/home-manager/services.syncthing.settings.options.urAccepted | Whether the user has accepted to submit anonymous usage data
|
| options/nixos/services.coturn.no-auth | This option is opposite to lt-cred-mech.
(TURN Server with no-auth option allows anonymous access)
|
| options/nixos/services.fluidd.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.gancio.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.graylog.rootUsername | Name of the default administrator user
|
| options/nixos/services.akkoma.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/environment.shells | A list of permissible login shells for user accounts
|
| options/nixos/services.matomo.nginx.kTLS | Whether to enable kTLS support
|
| options/nixos/services.monica.nginx.kTLS | Whether to enable kTLS support
|
| options/home-manager/services.podman.builds.<name>.autoStart | Whether to start the build on boot
|
| options/home-manager/services.podman.images.<name>.autoStart | Whether to pull the image on boot
|
| options/nixos/services.documize.db | Database specific connection string for example:
- MySQL/Percona/MariaDB:
user:password@tcp(host:3306)/documize
- MySQLv8+:
user:password@tcp(host:3306)/documize?allowNativePasswords=true
- PostgreSQL:
host=localhost port=5432 dbname=documize user=admin password=secret sslmode=disable
- MSSQL:
sqlserver://username:password@localhost:1433?database=Documize or
sqlserver://sa@localhost/SQLExpress?database=Documize
|
| packages/nixpkgs/fuse3 | Library that allows filesystems to be implemented in user space |
| packages/nixpkgs/jftui | Jellyfin Terminal User Interface |
| options/nixos/security.loginDefs.settings.UID_MIN | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| options/nixos/security.loginDefs.settings.UID_MAX | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| options/nixos/services.siproxd.passwordFile | Path to per-user password file.
|
| options/nixos/programs.mouse-actions.autorun | Whether to start a user service to run mouse-actions on startup.
|
| options/nixos/services.gitlab.statePath | GitLab state directory
|
| options/nixos/programs.gnupg.dirmngr.enable | Enables GnuPG network certificate management daemon with socket-activation for every user session.
|
| options/nixos/services._3proxy.services.*.acl | Use this option to limit user access to resources.
|
| options/nixos/services.mailman.ldap.superUserGroup | Group where a user must be a member of to gain superuser rights.
|
| options/home-manager/programs.zed-editor.mutableUserTasks | Whether user tasks (tasks.json) can be updated by zed.
|
| options/nixos/security.pam.services.<name>.pamMount | Enable PAM mount (pam_mount) system to mount filesystems on user login.
|
| options/nixos/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/nixos/security.sudo.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| options/nixos/services.resilio.checkForUpdates | Determines whether to check for updates and alert the user
about them in the UI.
|
| options/home-manager/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| options/home-manager/programs.zed-editor.mutableUserDebug | Whether user debug configurations (debug.json) can be updated by zed.
|
| options/home-manager/targets.darwin.defaults | Set macOS user defaults
|
| options/darwin/nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| packages/nixpkgs/nsc | Tool for creating NATS account and user access configurations |
| packages/nixpkgs/pam | Pluggable Authentication Modules, a flexible mechanism for authenticating user |
| options/nixos/services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| options/nixos/services.davis.adminPasswordFile | The full path to a file that contains the admin's password
|
| options/nixos/services.dokuwiki.sites.<name>.acl.*.actor | User or group to restrict
|
| options/nixos/services.kresd.enable | Whether to enable knot-resolver (version 5) domain name server
|
| options/nixos/services.librechat.dataDir | Absolute path for where the LibreChat server will use as its data directory to store logs, user uploads, and generated images.
|
| options/nixos/services.greetd.restart | Whether to restart greetd when it terminates (e.g. on failure)
|
| options/nixos/security.acme.defaults.postRun | Commands to run after new certificates go live
|
| options/nixos/security.sudo-rs.defaultOptions | Options used for the default rules, granting root and the
wheel group permission to run any command as any user.
|
| options/nixos/services.discourse.admin.email | The admin user email address.
|
| options/nixos/services.pixelfed.runtimeDir | Ruutime directory of the pixelfed user which holds
the application's caches and temporary files.
|
| options/nixos/services.smokeping.config | Full smokeping config supplied by the user
|
| options/home-manager/programs.anki.minimalistMode | Minimalist user interface mode.
|
| options/nixos/services.vsftpd.anonymousUser | Whether to enable the anonymous FTP user.
|
| options/nixos/services.headscale.settings.oidc.allowed_users | Users allowed to authenticate even if not in allowedDomains.
|
| options/nixos/security.loginDefs.settings.SYS_UID_MAX | Range of user IDs used for the creation of system users by useradd or newusers.
|
| options/nixos/security.loginDefs.settings.SYS_UID_MIN | Range of user IDs used for the creation of system users by useradd or newusers.
|
| options/nixos/hardware.hackrf.enable | Enables hackrf udev rules and ensures 'plugdev' group exists
|