| options/nixos/security.pam.services.<name>.allowNullPassword | Whether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group)
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.password | Credentials are used to authenticate the requests to Uyuni API.
|
| options/nixos/programs._1password-gui.package | The 1Password GUI package to use.
|
| options/darwin/programs._1password-gui.package | The 1Password GUI package to use.
|
| options/nixos/services.cadvisor.storageDriverPassword | Cadvisor storage driver password
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/security.pam.enableFscrypt | Whether to enable fscrypt, to automatically unlock directories with the user's login password
|
| packages/nixpkgs/perl540Packages.DataPassword | Perl extension for assessing password quality |
| packages/nixpkgs/perl538Packages.DataPassword | Perl extension for assessing password quality |
| options/nixos/services.matrix-appservice-irc.settings.ircService.passwordEncryptionKeyPath | Location of the key with which IRC passwords are encrypted
for storage
|
| options/nixos/services.pgadmin.emailServer.enable | Whether to enable SMTP email server
|
| options/nixos/services.rspamd-trainer.secrets | A list of files containing the various secrets
|
| options/nixos/services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.password | password for the Identity V2 and V3 APIs
|
| packages/nixpkgs/enpass | Well known password manager |
| options/nixos/services.jupyter.notebookConfig | Raw jupyter config
|
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.postgrest.pgpassFile | The password to authenticate to PostgreSQL with
|
| options/nixos/services.jirafeau.adminPasswordSha256 | SHA-256 of the desired administration password
|
| options/nixos/services.maubot.settings.admins | List of administrator users
|
| options/nixos/services.webdav.settings | Attrset that is converted and passed as config file
|
| options/nixos/users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| options/nixos/programs.msmtp.accounts | Named accounts and their respective configurations
|
| packages/nixpkgs/keeweb | Free cross-platform password manager compatible with KeePass |
| options/nixos/services.slurm.dbdserver.storagePassFile | Path to file with database password
|
| options/nixos/services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/programs._1password-gui.polkitPolicyOwners | A list of users who should be able to integrate 1Password with polkit-based authentication mechanisms.
|
| options/nixos/services.wg-access-server.secretsFile | yaml file containing all secrets. this needs to be in the same structure as the configuration
|
| options/nixos/boot.initrd.luks.gpgSupport | Enables support for authenticating with a GPG encrypted password.
|
| options/nixos/services.pgadmin.initialPasswordFile | Initial password file for the pgAdmin account
|
| options/nixos/services.amule.settings.WebServer.Password | MD5 hash of the password, obtainaible with echo "<password>" | md5sum | cut -d ' ' -f 1
|
| options/nixos/services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/security.pam.enableOTPW | Whether to enable the OTPW (one-time password) PAM module.
|
| options/home-manager/programs.rofi.pass.stores | Directory roots of your password-stores.
|
| options/nixos/services.postfixadmin.setupPasswordFile | Password file for the admin
|
| options/nixos/services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.i2pd.proto.http.pass | Password for webconsole access.
|
| options/nixos/security.pam.oath.digits | Specify the lib.length of the one-time password in number of
digits.
|
| options/nixos/security.pam.oath.enable | Enable the OATH (one-time password) PAM module.
|
| options/nixos/users.mysql.pam.updateTable | The name of the table used for password alteration
|
| options/nixos/services.grafana.settings.security.admin_password | Default admin password
|
| options/home-manager/programs.rofi.pass.enable | Whether to enable rofi integration with password-store.
|
| options/nixos/services.graylog.rootPasswordSha2 | You MUST specify a hash password for the root user (which you only need to initially set up the
system and in case you lose connectivity to your authentication backend)
This password cannot be changed using the API or via the web interface
|
| options/nixos/security.pam.services.<name>.kwallet.enable | If enabled, pam_wallet will attempt to automatically unlock the
user's default KDE wallet upon login
|
| options/nixos/services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password | HTTP password
|
| options/nixos/services.resilio.httpPass | HTTP web login password.
|
| options/nixos/services.keycloak.initialAdminPassword | Initial password set for the temporary admin user
|
| options/nixos/services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| options/nixos/services.lldap.silenceForceUserPassResetWarning | Disable warning when the admin password is set declaratively with the ldap_user_pass_file setting
but the force_ldap_user_pass_reset is set to false
|
| options/nixos/programs.udevil.enable | Whether to enable udevil, to mount filesystems without password.
|
| options/nixos/security.pam.services.<name>.enableGnomeKeyring | If enabled, pam_gnome_keyring will attempt to automatically unlock the
user's default Gnome keyring upon login
|
| options/nixos/security.doas.extraRules.*.noPass | If true, the user is not required to enter a
password.
|
| options/nixos/services.nextcloud.config.adminpassFile | The full path to a file that contains the admin's password
|
| options/nixos/services.diod.userdb | This option disables password/group lookups
|
| options/nixos/services.tt-rss.email.fromName | Name for sending outgoing mail
|
| options/nixos/services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.wstunnel.clients.<name>.httpProxy | Proxy to use to connect to the wstunnel server (USER:PASS@HOST:PORT).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing PROXY_PASSWORD=<your-password-here> and set
this option to <user>:$PROXY_PASSWORD@<host>:<port>
|
| options/nixos/services.postgres-websockets.pgpassFile | The password to authenticate to PostgreSQL with
|
| options/nixos/services.patroni.dataDir | Folder where Patroni data will be written, this is where the pgpass password file will be written.
|
| packages/nixpkgs/otpw | One-time password login package |
| options/nixos/services.blendfarm.basicSecurityPasswordFile | Path to the password file the client needs to connect to the server
|
| options/nixos/services.kanidm.provision.idmAdminPasswordFile | Path to a file containing the idm admin password for kanidm
|
| options/nixos/services.anki-sync-server.users | List of user-password pairs to provide to the sync server.
|
| options/nixos/services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password_file | HTTP password file
|
| packages/nixpkgs/wifi-qr | WiFi password sharing via QR codes |
| options/nixos/services.athens.basicAuthPass | Password for basic auth
|
| options/nixos/services.factorio.token | Authentication token
|
| options/nixos/services.ncdns.enable | Whether to enable ncdns, a Go daemon to bridge Namecoin to DNS
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth | Sets the Authorization header on every remote read request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/services.pgmanage.connections | pgmanage requires at least one PostgreSQL server be defined
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth | Sets the Authorization header on every remote write request with the
configured username and password.
password and password_file are mutually exclusive.
|
| packages/nixpkgs/fpm2 | GTK2 port from Figaro's Password Manager originally developed by John Conneely, with some new enhancements |
| options/nixos/services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password_file | HTTP password file
|
| options/nixos/services.amule.settings.ExternalConnect.ECPassword | MD5 hash of the password, obtainaible with echo "<password>" | md5sum | cut -d ' ' -f 1
|
| options/nixos/services.reposilite.settings.keyPassword | Plaintext password used to unlock the Java KeyStore set in services.reposilite.settings.keyPath
|
| packages/nixpkgs/cmospwd | Decrypt password stored in cmos used to access BIOS SETUP |
| options/nixos/services.davis.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.movim.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.slskd.nginx.basicAuth | Basic Auth protection for a vhost
|
| packages/nixpkgs/gnu-pw-mgr | Password manager designed to make it easy to reconstruct difficult passwords |
| options/nixos/services.snipe-it.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.sourcehut.settings.mail.pgp-privkey | An absolute file path (which should be outside the Nix-store)
to an OpenPGP private key
|
| options/nixos/services.writefreely.admin.initialPasswordFile | Path to a file containing the initial password for the admin user
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth | Sets the Authorization header on every scrape request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/services.gns3-server.auth.enable | Whether to enable password based HTTP authentication to access the GNS3 Server.
|
| options/nixos/services.iperf3.rsaPrivateKey | Path to the RSA private key (not password-protected) used to decrypt authentication credentials from the client.
|
| options/nixos/users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| options/nixos/services.tt-rss.feedCryptKey | Key used for encryption of passwords for password-protected feeds
in the database
|
| options/nixos/services.firebird.baseDir | Location containing data/ and system/ directories.
data/ stores the databases, system/ stores the password database security2.fdb.
|
| options/nixos/services.diod.allsquash | Remap all users to "nobody"
|
| options/nixos/services.wakapi.smtpPassword | The password used for the smtp mailed to used by Wakapi.
|
| options/nixos/services.gancio.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.basicAuth | Basic Auth protection for a vhost
|