| options/nixos/services.h2o.hosts.<name>.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| options/nixos/services.thanos.receive.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.sidecar.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.nghttpx.backends.*.params.tls | This option determines whether nghttpx will negotiate its
connection with a backend server using TLS or not
|
| options/nixos/services.thanos.sidecar.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.thanos.receive.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.portunus.ldap.tls | Whether to enable LDAPS protocol
|
| options/nixos/services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| options/nixos/services.coturn.tls-listening-port | TURN listener port for TLS
|
| options/nixos/services.movim.h2o.tls.identity | Key / certificate pairs for the virtual host.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.enable | Whether to enable TLS/SSL.
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.enable | Whether to enable TLS/SSL.
|
| options/nixos/services.thanos.query.grpc-client-tls-key | TLS Key for the client's certificate
|
| options/nixos/services.bacula-sd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-fd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-dir.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.thanos.query.grpc-client-tls-ca | TLS CA Certificates to use to verify gRPC servers
|
| options/nixos/services.h2o.hosts.<name>.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/services.foundationdb.tls | FoundationDB Transport Security Layer (TLS) settings.
|
| options/nixos/services.neo4j.bolt.tlsLevel | SSL/TSL requirement level for BOLT traffic.
|
| options/nixos/services.librespeed.tlsKey | TLS private key to use
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls | Configuration for secure connections.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls | Configuration for secure connections.
|
| options/nixos/services.thanos.query.grpc-client-tls-cert | TLS Certificates to use to identify this client to the server
|
| options/nixos/services.dolibarr.h2o.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| options/nixos/services.thanos.query-frontend.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| options/nixos/services.movim.h2o.tls.identity.*.key-file | Path to key file
|
| options/home-manager/accounts.email.accounts.<name>.msmtp.tls.fingerprint | Fingerprint of a trusted TLS certificate
|
| options/nixos/services.thanos.query-frontend.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|
| options/nixos/services.thanos.query.grpc-client-tls-secure | Use TLS when talking to the gRPC server
|
| options/nixos/services.nghttpx.frontends.*.params.tls | Enable or disable TLS
|
| options/nixos/services.coturn.alt-tls-listening-port | Alternative listening port for TLS and DTLS protocols.
|
| options/nixos/services.oauth2-proxy.tls.httpsAddress | addr:port to listen on for HTTPS clients
|
| options/nixos/services.wstunnel.servers.<name>.tlsKey | TLS key to use instead of the hardcoded on in case of HTTPS connections
|
| options/nixos/services.thanos.rule.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.wstunnel.clients.<name>.tlsSNI | Use this as the SNI while connecting via TLS
|
| options/nixos/services.soju.tlsCertificate | Path to server TLS certificate.
|
| options/nixos/services.writefreely.database.tls | Whether or not TLS should be used for the database connection.
|
| options/nixos/services.dolibarr.h2o.tls.identity | Key / certificate pairs for the virtual host.
|
| options/nixos/services.bacula-fd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-sd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.maddy.tls.certificates.*.keyPath | Path to the private key used for TLS.
|
| options/nixos/services.maddy.tls.certificates | A list of attribute sets containing paths to TLS certificates and
keys
|
| options/nixos/services.thanos.store.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.thanos.query.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.soju.tlsCertificateKey | Path to server TLS certificate key.
|
| options/nixos/services.bacula-dir.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/home-manager/accounts.email.accounts.<name>.imap.tls.useStartTls | Whether to use STARTTLS.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.tls.useStartTls | Whether to use STARTTLS.
|
| options/nixos/services.maddy.tls.certificates.*.certPath | Path to the certificate used for TLS.
|
| options/nixos/services.movim.h2o.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| options/nixos/services.bacula-sd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.bacula-fd.director.<name>.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| options/nixos/services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| options/nixos/services.vsftpd.ssl_tlsv1 | Only applies if ssl_enable is activated
|
| options/nixos/services.h2o.hosts.<name>.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| options/nixos/services.bacula-sd.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.dolibarr.h2o.tls.identity.*.key-file | Path to key file
|
| packages/nixpkgs/perlPackages.NetSMTPTLS | SMTP client supporting TLS and AUTH |
| options/nixos/services.bacula-dir.tls.certificate | The full path to the PEM encoded TLS certificate
|
| packages/nixpkgs/perl5Packages.NetSMTPTLS | SMTP client supporting TLS and AUTH |
| options/nixos/services.foundationdb.tls.key | Private key file for the certificate.
|
| options/nixos/services.neo4j.ssl.policies.<name>.tlsVersions | Restrict the TLS protocol versions of this policy to those
defined here.
|
| options/nixos/services.thanos.sidecar.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.thanos.receive.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.outline.smtp.tlsCiphers | Override SMTP cipher configuration.
|
| options/nixos/services.matrix-synapse.settings.listeners.*.tls | Whether to enable TLS on the listener socket.
This option will be ignored for UNIX domain sockets.
|
| options/nixos/services.matrix-synapse.settings.tls_private_key_path | PEM encoded private key for TLS
|
| options/nixos/services.bacula-fd.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.bacula-sd.tls.verifyPeer | Verify peer certificate
|
| options/home-manager/services.podman.builds.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/home-manager/services.podman.images.<name>.tlsVerify | Require HTTPS and verification of certificates when contacting registries.
|
| options/nixos/services.oauth2-proxy.tls.certificate | Path to certificate file.
|
| options/nixos/services.movim.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.bacula-dir.tls.verifyPeer | Verify peer certificate
|
| options/nixos/services.h2o.hosts.<name>.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.nghttpx.backends.*.params.redirect-if-not-tls | If true, a backend match requires the frontend connection be
TLS encrypted
|
| options/nixos/services.dolibarr.h2o.tls.redirectCode | HTTP status used by globalRedirect & forceSSL
|
| options/nixos/services.glusterfs.tlsSettings | Make the server communicate via TLS
|
| options/nixos/services.dolibarr.h2o.tls.recommendations | By default, H2O, without prejudice, will use as many TLS versions &
cipher suites as it & the TLS library (OpenSSL) can support
|
| options/nixos/services.headscale.settings.tls_letsencrypt_hostname | Domain name to request a TLS certificate for.
|
| options/nixos/services.thanos.query-frontend.grpc-server-tls-client-ca | TLS CA to verify clients against
|
| options/nixos/services.foundationdb.tls.certificate | Path to the TLS certificate file
|
| options/nixos/services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| options/nixos/services.bacula-sd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.bacula-fd.director.<name>.tls.certificate | The full path to the PEM encoded TLS certificate
|
| options/nixos/services.omnom.settings.smtp.tls_allow_insecure | Whether to enable Whether to allow insecure TLS..
|
| options/nixos/services.librespeed.tlsCertificate | TLS certificate to use
|
| options/nixos/services.movim.h2o.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.h2o.hosts.<name>.tls.identity.*.certificate-file | Path to certificate file
|
| options/nixos/services.glusterfs.tlsSettings.caCert | Path certificate authority used to sign the cluster certificates.
|
| options/nixos/services.headscale.settings.tls_letsencrypt_challenge_type | Type of ACME challenge to use, currently supported types:
HTTP-01 or TLS-ALPN-01.
|
| options/nixos/services.wstunnel.servers.<name>.tlsCertificate | TLS certificate to use instead of the hardcoded one in case of HTTPS connections
|
| options/nixos/services.kubernetes.kubelet.tlsKeyFile | File containing x509 private key matching tlsCertFile.
|
| options/nixos/services.matrix-synapse.settings.tls_certificate_path | PEM encoded X509 certificate for TLS
|
| options/nixos/services.coturn.no-dtls | Disable DTLS client listener
|
| options/nixos/services.kubernetes.kubelet.tlsCertFile | File containing x509 Certificate for HTTPS.
|