| options/nixos/services.tt-rss.auth.autoCreate | Allow authentication modules to auto-create users in tt-rss internal
database when authenticated successfully.
|
| options/nixos/services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| options/nixos/services.gns3-server.auth.enable | Whether to enable password based HTTP authentication to access the GNS3 Server.
|
| options/nixos/services.yarr.authFilePath | Path to a file containing username:password. null means no authentication required to use the service.
|
| options/nixos/services.tor.settings.HidServAuth.*.auth | Authentication cookie.
|
| options/home-manager/services.pizauth.accounts.<name>.authUri | The OAuth2 server's authentication URI.
|
| options/nixos/services.freeciv.settings.auth | Whether to enable server authentication.
|
| options/nixos/services.nipap.settings.auth.auth_cache_timeout | Seconds to store cached auth entries for.
|
| options/home-manager/vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/services.calibre-server.auth.mode | Choose the type of authentication used
|
| options/nixos/services.oauth2-proxy.setXauthrequest | Set X-Auth-Request-User and X-Auth-Request-Email response headers (useful in Nginx auth_request mode)
|
| options/nixos/services.calibre-server.auth.enable | Password based authentication to access the server
|
| options/nixos/services.calibre-server.auth.userDb | Choose users database file to use for authentication
|
| options/nixos/services.freshrss.authType | Authentication type for FreshRSS.
|
| options/nixos/services.tailscale.authKeyFile | A file containing the auth key
|
| options/nixos/services.deluge.authFile | The file managing the authentication for deluge, the format of this
file is straightforward, each line contains a
username:password:level tuple in plaintext
|
| options/nixos/services.microsocks.authOnce | If true, once a specific ip address authed successfully with user/pass,
it is added to a whitelist and may use the proxy without auth.
|
| options/nixos/services._3proxy.services.*.auth | Authentication type
|
| options/nixos/services.diod.authRequired | Allow clients to connect without authentication, i.e. without a valid MUNGE credential.
|
| options/nixos/services.gns3-server.auth.passwordFile | A file containing the password to access the GNS3 Server.
This should be a string, not a nix path, since nix paths
are copied into the world-readable nix store.
|
| options/home-manager/services.podman.builds.<name>.authFile | Path of the authentication file.
|
| options/nixos/services.xserver.displayManager.xpra.auth | Authentication to use when connecting to xpra
|
| options/home-manager/services.podman.images.<name>.authFile | Path of the authentication file used to connect to registry.
|
| options/nixos/services.bitlbee.authBackend | How users are authenticated
storage -- save passwords internally
pam -- Linux PAM authentication
|
| options/home-manager/programs.sftpman.mounts.<name>.authType | The authentication method to use.
|
| options/nixos/services.hqplayerd.auth.password | Password used for HQPlayer's WebUI
|
| options/nixos/services.hqplayerd.auth.username | Username used for HQPlayer's WebUI
|
| options/nixos/services.geth.<name>.authrpc.port | Port number of Go Ethereum Auth RPC API.
|
| options/nixos/services.bitlbee.authMode | The following authentication modes are available:
Open -- Accept connections from anyone, use NickServ for user authentication
|
| options/nixos/services.coturn.static-auth-secret-file | Path to the file containing the static authentication secret.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| options/nixos/services.tailscale.authKeyParameters | Extra parameters to pass after the auth key
|
| options/nixos/services.geth.<name>.authrpc.enable | Whether to enable Go Ethereum Auth RPC API.
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.authType | Either "basic" for a general-purpose authorization protocol
or "stealth" for a less scalable protocol
that also hides service activity from unauthorized clients.
|
| options/nixos/services.coturn.use-auth-secret | TURN REST API flag
|
| options/nixos/services.nipap.authBackendSettings | auth.backends options to set in /etc/nipap/nipap.conf.
|
| options/nixos/services.oauth2-proxy.passBasicAuth | Pass HTTP Basic Auth, X-Forwarded-User and X-Forwarded-Email information to upstream.
|
| options/nixos/services.geth.<name>.authrpc.address | Listen address of Go Ethereum Auth RPC API.
|
| options/nixos/services.ceph.global.authClientRequired | Enables requiring the cluster to authenticate itself to the client.
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/nixos/services.coturn.static-auth-secret | 'Static' authentication secret value (a string) for TURN REST API only
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.adapter | The auth adapter type
|
| options/nixos/networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| options/nixos/services.simplesamlphp.<name>.authSources | Auth sources options used by SimpleSAMLphp.
|
| options/nixos/services.ceph.global.authClusterRequired | Enables requiring daemons to authenticate with eachother in the cluster.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.auth | Authentication settings
|
| options/nixos/services.microsocks.authUsername | Optional username to use for authentication.
|
| options/nixos/services.nipap.settings.auth.default_backend | Name of auth backend to use by default.
|
| options/nixos/services.ceph.global.authServiceRequired | Enables requiring clients to authenticate with the cluster to access services in the cluster (e.g. radosgw, mds or osd).
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.options | Options for the auth plugin
|
| options/nixos/services.microsocks.authPasswordFile | Path to a file containing the password for authentication.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth | All authentication providers to provision
|
| options/nixos/services.oauth2-proxy.basicAuthPassword | The password to set when passing the HTTP Basic Auth header.
|
| options/nixos/services.firezone.server.provision.accounts.<name>.auth.<name>.name | The name of this authentication provider
|
| options/nixos/services.saslauthd.mechanism | Auth mechanism to use
|
| options/nixos/services.tailscale.authKeyParameters.preauthorized | Whether to skip manual device approval.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.username | The username to store inside the credentials file.
|
| options/nixos/services.openvpn.servers.<name>.authUserPass.password | The password to store inside the credentials file.
|
| options/nixos/services.oauth2-proxy.tls.key | Path to private key file.
|
| options/nixos/services.tailscale.authKeyParameters.baseURL | Base URL for the Tailscale API.
|
| options/nixos/services.oauth2-proxy.scope | OAuth scope specification.
|
| options/nixos/services.gitlab.pages.settings | Configuration options to set in the GitLab Pages config
file
|
| options/home-manager/programs.darcs.author | If this list has a single entry, it will be used as the author
when you record a patch
|
| options/nixos/services.mosquitto.listeners.*.authPlugins | Authentication plugin to attach to this listener
|
| options/nixos/security.pam.dp9ik.authserver | This controls the hostname for the 9front authentication server
that users will be authenticated against.
|
| options/nixos/services.oauth2-proxy.enable | Whether to enable oauth2-proxy.
|
| options/home-manager/services.pizauth.enable | Whether to enable Pizauth, a commandline OAuth2 authentication daemon
.
|
| options/nixos/services.oauth2-proxy.clientID | The OAuth Client ID.
|
| options/nixos/services.mosquitto.listeners.*.authPlugins.*.plugin | Plugin path to load, should be a .so file.
|
| options/nixos/security.pam.u2f.settings.authfile | By default pam-u2f module reads the keys from
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set)
|
| options/home-manager/accounts.contact.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/home-manager/services.pizauth.package | The pizauth package to use.
|
| options/nixos/services.chisel-server.authfile | Path to auth.json file
|
| options/nixos/services.oauth2-proxy.tls.enable | Whether to serve over TLS.
|
| options/home-manager/pam.yubico.authorizedYubiKeys.path | File path to write the authorized YubiKeys,
relative to HOME.
|
| options/nixos/services.oauth2-proxy.github.org | Restrict logins to members of this organisation.
|
| options/home-manager/programs.lapce.plugins.*.author | Author of the plugin.
|
| options/home-manager/pam.yubico.authorizedYubiKeys.ids | List of authorized YubiKey token IDs
|
| options/nixos/services.geth.<name>.authrpc.vhosts | List of virtual hostnames from which to accept requests.
|
| options/nixos/services.oauth2-proxy.keyFile | oauth2-proxy allows passing sensitive configuration via environment variables
|
| options/nixos/services.oauth2-proxy.package | The oauth2-proxy package to use.
|
| options/home-manager/accounts.calendar.accounts.<name>.vdirsyncer.authCert | Either a path to a certificate with a client certificate and
the key or a list of paths to the files with them.
|
| options/nixos/networking.wireless.networks.<name>.authProtocols | The list of authentication protocols accepted by this network
|
| options/nixos/services.oauth2-proxy.oidcIssuerUrl | The OAuth issuer URL.
|
| options/nixos/services.oauth2-proxy.cookie.name | The name of the cookie that the oauth_proxy creates.
|
| options/nixos/services.oauth2-proxy.github.team | Restrict logins to members of this team.
|
| options/nixos/services.oauth2-proxy.nginx.proxy | The address of the reverse proxy endpoint for oauth2-proxy
|
| options/nixos/services.oauth2-proxy.profileURL | Profile access endpoint.
|
| options/nixos/services.tailscale.authKeyParameters.ephemeral | Whether to register as an ephemeral node.
|
| options/nixos/services.oauth2-proxy.loginURL | Authentication endpoint
|
| options/nixos/services.oauth2-proxy.proxyPrefix | The url root path that this proxy should be nested under.
|
| options/nixos/services.oauth2-proxy.extraConfig | Extra config to pass to oauth2-proxy.
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| options/nixos/services.outline.oidcAuthentication.authUrl | OIDC authentication URL endpoint.
|
| options/nixos/boot.initrd.network.ssh.authorizedKeys | Authorized keys for the root user on initrd
|
| options/home-manager/services.pizauth.extraConfig | Additional global configuration
|
| options/home-manager/services.pizauth.accounts | Pizauth accounts that should be configured
|
| options/nixos/services.oauth2-proxy.passHostHeader | Pass the request Host Header to upstream.
|
| options/nixos/services.oauth2-proxy.provider | OAuth provider.
|
| options/nixos/services.oauth2-proxy.cookie.httpOnly | Set HttpOnly cookie flag.
|