| options/nixos/services.nginx.virtualHosts.<name>.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/programs.mouse-actions.enable | Whether to install and set up mouse-actions and it's udev rules
|
| options/nixos/services.vsftpd.forceLocalDataSSL | Only applies if sslEnable is true
|
| options/nixos/services.bookstack.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.suwayomi-server.settings.server.basicAuthUsername | The username value that you have to provide when authenticating.
|
| options/nixos/security.pam.krb5.enable | Enables Kerberos PAM modules (pam-krb5,
pam-ccreds)
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth | Sets the Authorization header on every remote write request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/darwin/system.defaults.loginwindow.RestartDisabledWhileLoggedIn | Apple menu > System Preferences > Users and Groups > Login Options
Disables the “Restart” option when users are logged in
|
| options/nixos/hardware.acpilight.enable | Enable acpilight
|
| options/nixos/security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| options/nixos/services.kea.ctrl-agent.configFile | Kea Control Agent configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/agent.html
|
| options/nixos/services.pinchflat.secretsFile | Secrets like SECRET_KEY_BASE and BASIC_AUTH_PASSWORD
should be passed to the service without adding them to the world-readable Nix store
|
| options/nixos/services.jirafeau.nginxConfig.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate users via tailscale.
|
| options/darwin/system.defaults.loginwindow.SHOWFULLNAME | Apple menu > System Preferences > Users and Groups > Login Options
Displays login window as a name and password field instead of a list of users
|
| options/nixos/security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| options/nixos/services.dawarich.smtp.fromAddress | "From" address used when sending emails to users.
|
| options/nixos/services.mastodon.smtp.fromAddress | "From" address used when sending Emails to users.
|
| options/nixos/services.vsftpd.forceLocalLoginsSSL | Only applies if sslEnable is true
|
| options/nixos/services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| options/nixos/services.prosody.modules.welcome | Welcome users who register accounts
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth | Sets the Authorization header on every scrape request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/security.pam.dp9ik.authserver | This controls the hostname for the 9front authentication server
that users will be authenticated against.
|
| options/nixos/services.displayManager.hiddenUsers | A list of users which will not be shown in the display manager.
|
| options/nixos/security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| options/nixos/services.portunus.seedSettings | Seed settings for users and groups
|
| options/nixos/services.terraria.enable | If enabled, starts a Terraria server
|
| options/nixos/services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| options/nixos/security.pam.services.<name>.ttyAudit.enable | Enable or disable TTY auditing for specified users
|
| options/nixos/networking.wireguard.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer
|
| options/nixos/programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| options/nixos/services.freshrss.api.enable | Whether to enable API access for mobile apps and third-party clients (Google Reader API and Fever API)
|
| options/nixos/virtualisation.spiceUSBRedirection.enable | Install the SPICE USB redirection helper with setuid
privileges
|
| options/nixos/services.fedimintd.<name>.nginx.config.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| options/nixos/services.prosody.modules.announce | Send announcement to all online users
|
| options/nixos/services.kanidm.provision.enable | Whether to enable provisioning of groups, users and oauth2 resource servers.
|
| options/nixos/services.xserver.imwheel.rules | Window class translation rules.
/etc/X11/imwheelrc is generated based on this config
which means this config is global for all users
|
| options/nixos/services.nextcloud.settings.mail_smtpname | This depends on mail_smtpauth
|
| options/nixos/hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| options/nixos/services.nginx.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate nginx users via tailscale.
|
| options/nixos/security.please.wheelNeedsPassword | Whether users of the wheel group must provide a password to run
commands or edit files with please and
pleaseedit respectively.
|
| options/nixos/hardware.keyboard.uhk.enable | Whether to enable non-root access to the firmware of UHK keyboards
|
| options/nixos/security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| options/nixos/services.vsftpd.anonymousMkdirEnable | Whether any uploads are permitted to anonymous users.
|
| options/darwin/environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| options/nixos/services.biboumi.settings.admin | The bare JID of the gateway administrator
|
| options/nixos/services.openssh.settings.AllowUsers | If specified, login is allowed only for the listed users
|
| options/nixos/services.prosody.modules.register | Allow users to register on this server using a client and change passwords
|
| options/nixos/services.tuliprox.apiProxySettings | Users and proxy configuration
Refer to the Tuliprox documentation for available attributes
|
| options/nixos/services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| options/nixos/services.kubo.settings.Mounts.FuseAllowOther | Allow all users to access the FUSE mount points
|
| options/nixos/security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| options/nixos/services.openssh.settings.DenyUsers | If specified, login is denied for all listed users
|
| options/nixos/services.openssh.settings.LogLevel | Gives the verbosity level that is used when logging messages from sshd(8)
|
| options/nixos/services.cryptpad.settings.adminKeys | List of public signing keys of users that can access the admin panel
|
| options/nixos/fonts.fontconfig.antialias | Enable font antialiasing
|
| options/nixos/security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| options/nixos/programs.chromium.initialPrefs | Initial preferences are used to configure the browser for the first run
|
| options/nixos/environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| options/nixos/services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| options/nixos/services.vsftpd.chrootlocalUser | Whether local users are confined to their home directory.
|
| options/nixos/services.vsftpd.anonymousUploadEnable | Whether any uploads are permitted to anonymous users.
|
| options/nixos/services.limesurvey.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.iperf3.authorizedUsersFile | Path to the configuration file containing authorized users credentials to run iperf tests.
|
| options/nixos/programs.hyprland.withUWSM | Launch Hyprland with the UWSM (Universal Wayland Session Manager) session manager
|
| options/nixos/services.openssh.settings.AllowGroups | If specified, login is allowed only for users part of the
listed groups
|
| options/nixos/services.buildbot-master.reporters | List of reporter objects used to present build status to various users.
|
| options/nixos/services.openssh.settings.DenyGroups | If specified, login is denied for all users part of the listed
groups
|
| options/nixos/virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| options/nixos/services.movim.minifyStaticFiles | Do minification on public static files which reduces the size of
assets — saving data for the server & users as well as offering a
performance improvement
|
| options/home-manager/accounts.email.accounts.<name>.getmail.readAll | Enable if you want to fetch all, even the read messages from the
server
|
| options/nixos/services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| options/nixos/services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| options/nixos/services.firezone.gui-client.allowedUsers | All listed users will become part of the firezone-client group so
they can control the tunnel service
|
| options/nixos/system.extraDependencies | A list of paths that should be included in the system
closure but generally not visible to users
|
| options/nixos/services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| options/home-manager/accounts.email.accounts.<name>.getmail.delete | Enable if you want to delete read messages from the server
|
| options/nixos/services.cryptpad.settings.httpUnsafeOrigin | This is the URL that users will enter to load your instance
|
| options/nixos/fonts.fontconfig.hinting.enable | Enable font hinting
|
| options/nixos/services.tt-rss.registration.maxUsers | Maximum amount of users which will be allowed to register on this
system. 0 - no limit.
|
| options/nixos/networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| options/nixos/programs._1password-gui.polkitPolicyOwners | A list of users who should be able to integrate 1Password with polkit-based authentication mechanisms.
|
| options/nixos/services.mtprotoproxy.secureOnly | Don't allow users to connect in non-secure mode (without random padding).
|
| options/nixos/services.sourcehut.settings."todo.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| options/nixos/services.akkoma.config.":pleroma".":frontends" | Frontend configuration
|
| options/nixos/services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.xauth_id | Client XAuth username used in the XAuth exchange.
|
| options/nixos/services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| options/nixos/services.sourcehut.settings."lists.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| options/nixos/services.sourcehut.settings."builds.sr.ht".allow-free | Whether to enable nonpaying users to submit builds.
|
| options/nixos/environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| options/darwin/environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| options/nixos/services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| options/nixos/services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| options/nixos/services.sourcehut.settings."todo.sr.ht::mail".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| options/nixos/services.prometheus.exporters.mail.configuration.servers.*.login | Username to use for SMTP authentication.
|