| options/nixos/services.prosody.muc.*.moderation | Allow rooms to be moderated
|
| options/home-manager/programs.zsh.prezto.editor.promptContext | Allow the Zsh prompt context to be shown.
|
| options/home-manager/accounts.email.accounts.<name>.enable | Whether this account is enabled
|
| options/nixos/services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| options/nixos/services.gitDaemon.enable | Enable Git daemon, which allows public hosting of git repositories
without any access controls
|
| options/nixos/services.taskserver.trust | Determines how client certificates are validated
|
| options/nixos/services.tlsrpt.configurePostfix | Whether to configure permissions to allow integration with Postfix.
|
| packages/nixpkgs/usbfluxd | Redirects the standard usbmuxd socket to allow connections to local and remote usbmuxd instances so remote devices appear connected locally |
| options/nixos/services.firewalld.zones.<name>.sourcePorts | Source ports to allow in the zone.
|
| options/nixos/services.prosody.modules.register | Allow users to register on this server using a client and change passwords
|
| options/nixos/services.kubo.settings.Mounts.FuseAllowOther | Allow all users to access the FUSE mount points
|
| options/nixos/services.athens.storage.mongo.insecure | Allow insecure connections to the mongo database.
|
| options/nixos/services.convos.reverseProxy | Enables reverse proxy support
|
| options/nixos/services.openldap.mutableConfig | Whether to allow writable on-line configuration
|
| options/nixos/services.nextjs-ollama-llm-ui.ollamaUrl | The address (including host and port) under which we can access the Ollama backend server.
!Note that if the the UI service is running under a domain "https://ui.example.org",
the Ollama backend service must allow "CORS" requests from this domain, e.g. by adding
"services.ollama.environment
|
| packages/nixpkgs/slurm-spank-x11 | Plugin for SLURM to allow for interactive X11 sessions |
| options/nixos/services.firewalld.zones.<name>.services | Services to allow in the zone.
|
| options/nixos/services.collabora-online.aliasGroups.*.host | Hostname to allow or deny.
|
| packages/nixpkgs/zed-editor-fhs | Wrapped variant of zed-editor which launches in a FHS compatible environment |
| options/nixos/services.prosody.modules.blocklist | Allow users to block communications with other users
|
| options/nixos/services.wivrn.steam.importOXRRuntimes | Whether to enable Sets PRESSURE_VESSEL_IMPORT_OPENXR_1_RUNTIMES system-wide to allow Steam to automatically discover the WiVRn server
|
| packages/nixpkgs/tr-patcher | Allow to update dependancies of the Tamriel-Data mod for morrowind |
| options/nixos/networking.firewall.extraInputRules | Additional nftables rules to be appended to the input-allow
chain
|
| options/nixos/services.keepalived.openFirewall | Whether to automatically allow VRRP and AH packets in the firewall.
|
| options/nixos/environment.freetds | Configure freetds database entries
|
| packages/nixpkgs/vscodium-fhs | Wrapped variant of vscodium which launches in a FHS compatible environment, should allow for easy usage of extensions without nix-specific modifications |
| options/nixos/services.quorum.permissioned | Allow only a defined list of nodes to connect.
|
| options/nixos/services.gokapi.mutableSettings | Allow changes to the program config made by the program to persist between restarts
|
| options/nixos/security.pam.u2f.settings.origin | By default pam-u2f module sets the origin
to pam://$HOSTNAME
|
| options/nixos/services.teeworlds.game.enablePowerups | Whether to allow powerups such as the ninja.
|
| options/nixos/programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| options/nixos/services.atuin.openRegistration | Allow new user registrations with the atuin server.
|
| options/nixos/programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| options/nixos/services.teeworlds.game.enableTeamDamage | Whether to enable team damage; whether to allow team mates to inflict damage on one another.
|
| options/nixos/services.firewalld.zones.<name>.protocols | Protocols to allow in the zone.
|
| options/nixos/services.xserver.displayManager.gdm.wayland | Allow GDM to run on Wayland instead of Xserver.
|
| options/home-manager/services.colima.profiles | Profiles allow multiple colima configurations
|
| options/nixos/services.postgresql.identMap | Defines the mapping from system users to database users
|
| options/nixos/services.beszel.agent.smartmon.deviceAllow | List of device paths to allow access to for SMART monitoring
|
| options/nixos/boot.initrd.systemd.emergencyAccess | Set to true for unauthenticated emergency access, and false or
null for no emergency access
|
| options/nixos/services.mediatomb.customCfg | Allow the service to create and use its own config file inside the dataDir as
configured by services.mediatomb.dataDir
|
| options/nixos/networking.firewall.extraForwardRules | Additional nftables rules to be appended to the forward-allow
chain
|
| options/nixos/services.mtprotoproxy.secureOnly | Don't allow users to connect in non-secure mode (without random padding).
|
| options/nixos/services.whitebophir.listenAddress | Address to listen on (use 0.0.0.0 to allow access from any address).
|
| options/darwin/system.defaults.magicmouse.MouseButtonMode | "OneButton": any tap is a left click. "TwoButton": allow left-
and right-clicking.
|
| packages/nixpkgs/ospd-openvas | OSP server implementation to allow GVM to remotely control an OpenVAS Scanner |
| options/nixos/services.chrony.enableRTCTrimming | Enable tracking of the RTC offset to the system clock and automatic trimming
|
| options/nixos/services.pretalx.environmentFiles | Environment files that allow passing secret configuration values
|
| options/nixos/services.usbguard.implicitPolicyTarget | How to treat USB devices that don't match any rule in the policy
|
| options/nixos/services.openafsServer.dottedPrincipals | If enabled, allow principal names containing (.) dots
|
| options/nixos/services.openssh.settings.X11Forwarding | Whether to allow X11 connections to be forwarded.
|
| packages/nixpkgs/cargo-temp | CLI tool that allow you to create a temporary new Rust project using cargo with already installed dependencies |
| packages/nixpkgs/plugdata | Plugin wrapper around Pure Data to allow patching in a wide selection of DAWs |
| options/nixos/programs.uwsm.waylandCompositors | Configuration for UWSM-managed Wayland Compositors
|
| options/nixos/services.usbguard.presentDevicePolicy | How to treat USB devices that are already connected when the daemon
starts
|
| options/nixos/services.calibre-web.options.enableBookUploading | Allow books to be uploaded via Calibre-Web UI.
|
| options/nixos/services.slurm.enableSrunX11 | If enabled srun will accept the option "--x11" to allow for X11 forwarding
from within an interactive session or a batch job
|
| options/nixos/services.bitcoind.<name>.prune | Reduce storage requirements by enabling pruning (deleting) of old
blocks
|
| options/nixos/services.dendrite.openRegistration | Allow open registration without secondary verification (reCAPTCHA).
|
| options/nixos/services.wivrn.config.json | Configuration for WiVRn
|
| options/nixos/security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| options/nixos/services.rabbitmq.listenAddress | IP address on which RabbitMQ will listen for AMQP
connections
|
| options/nixos/services.home-assistant.configWritable | Whether to make configuration.yaml writable
|
| options/nixos/services.kanidm.provision.acceptInvalidCerts | Whether to allow invalid certificates when provisioning the target instance
|
| options/nixos/services.meilisearch.noAnalytics | Deactivates analytics
|
| options/nixos/security.acme.maxConcurrentRenewals | Maximum number of concurrent certificate generation or renewal jobs
|
| options/nixos/networking.firewall.extraCommands | Additional shell commands executed as part of the firewall
initialisation script
|
| options/nixos/services.minidlna.settings.wide_links | Set this to yes to allow symlinks that point outside user-defined media_dir.
|
| packages/nixpkgs/discord-gamesdk | Library to allow other programs to interact with the Discord desktop application |
| options/nixos/services.plex.accelerationDevices | A list of device paths to hardware acceleration devices that Plex should
have access to
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups | Some email providers (Gmail) have a different directory hierarchy for
synchronized email messages
|
| options/nixos/services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| options/nixos/services.adguardhome.mutableSettings | Allow changes made on the AdGuard Home web interface to persist between
service restarts.
|
| options/nixos/networking.firewall.extraReversePathFilterRules | Additional nftables rules to be appended to the rpfilter-allow
chain
|
| options/nixos/services.tt-rss.registration.enable | Allow users to register themselves
|
| options/nixos/services.firezone.server.openClusterFirewall | Opens up the erlang distribution port of all enabled components to
allow reaching the server cluster from the internet
|
| options/nixos/services.opensnitch.settings.DefaultAction | Default action whether to block or allow application internet
access.
|
| options/nixos/services.nextcloud.appstoreEnable | Allow the installation and updating of apps from the Nextcloud appstore
|
| options/nixos/services.yggdrasil.settings.AllowedPublicKeys | List of peer public keys to allow incoming peering connections from
|
| options/nixos/services.jupyterhub.jupyterhubEnv | Python environment to run jupyterhub
Customizing will affect the packages available in the hub and
proxy
|
| options/nixos/services.epgstation.settings.encodeProcessNum | The maximum number of processes that EPGStation would allow to run
at the same time for encoding or streaming videos.
|
| options/darwin/system.defaults.loginwindow.GuestEnabled | Apple menu > System Preferences > Users and Groups > Login Options
Allow users to login to the machine as guests using the Guest account
|
| packages/nixpkgs/almanah | Small GTK application to allow to keep a diary of your life |
| options/nixos/services.usbguard.presentControllerPolicy | How to treat USB controller devices that are already connected when
the daemon starts
|
| options/darwin/security.pam.services.sudo_local.touchIdAuth | Whether to enable Touch ID with sudo
|
| packages/nixpkgs/ocamlPackages.irmin-chunk | Irmin backend which allow to store values into chunks |
| options/nixos/virtualisation.incus.softDaemonRestart | Allow for incus.service to be stopped without affecting running instances.
|
| packages/nixpkgs/iceshelf | Simple tool to allow storage of signed, encrypted, incremental backups using Amazon's Glacier storage |
| packages/nixpkgs/tie | Allow multiple web change files |
| options/nixos/services.chrony.initstepslew.enabled | DEPRECATED
|
| options/nixos/services.factorio.requireUserVerification | When set to true, the server will only allow clients that have a valid factorio.com account.
|
| options/nixos/services.pretix.settings.pretix.registration | Whether to allow registration of new admin users.
|
| options/nixos/services.wstunnel.servers.<name>.settings.restrict-to | Restrictions on the connections that the server will accept
|
| options/nixos/virtualisation.kvmgt.enable | Whether to enable KVMGT (iGVT-g) VGPU support
|
| options/nixos/services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| packages/nixpkgs/pandoc-include | Pandoc filter to allow file and header includes |
| options/nixos/services.home-assistant.lovelaceConfigWritable | Whether to make ui-lovelace.yaml writable
|
| options/home-manager/programs.thunderbird.profiles.<name>.withExternalGnupg | Allow using external GPG keys with GPGME.
|
| options/nixos/networking.wireless.userControlled | Allow users of the wpa_supplicant group to control wpa_supplicant
through wpa_gui or wpa_cli
|
| options/nixos/networking.ipips.<name>.encapsulation.limit | For an IPv6-based tunnel, the maximum number of nested
encapsulation to allow. 0 means no nesting, "none" unlimited.
|