| options/nixos/services.authelia.instances.<name>.settings.theme | The theme to display.
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".oauth-client-id | hg.sr.ht's OAuth client id for meta.sr.ht.
|
| options/home-manager/accounts.email.accounts.<name>.smtp.authentication | The authentication mechanism.
|
| options/home-manager/accounts.email.accounts.<name>.imap.authentication | The authentication mechanism.
|
| options/nixos/services.opkssh.authorizations.*.principal | Principal identifier (email, repo, etc.)
|
| options/nixos/services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| options/nixos/services.sourcehut.settings."man.sr.ht".oauth-client-id | man.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."git.sr.ht".oauth-client-id | git.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."hub.sr.ht".oauth-client-id | hub.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| options/nixos/services.sourcehut.settings."todo.sr.ht".oauth-client-id | todo.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.authelia.instances.<name>.settings.log.level | Level of verbosity for logs.
|
| options/nixos/services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| options/nixos/services.athens.basicAuthPass | Password for basic auth
|
| options/nixos/services.sourcehut.settings."lists.sr.ht".oauth-client-id | lists.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".oauth-client-id | pages.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."paste.sr.ht".oauth-client-id | paste.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeys | Public SSH keys that are given full write access to this repository
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizedClients | Authorized clients for a v3 onion service,
as a list of public key, in the format:
descriptor:x25519:<base32-public-key>
See torrc manual.
|
| options/nixos/services.authelia.instances.<name>.settings.log.format | Format the logs are written as.
|
| options/nixos/services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| options/nixos/services.mailman.ldap.enable | Whether to enable LDAP auth.
|
| options/nixos/services.sourcehut.settings."builds.sr.ht".oauth-client-id | builds.sr.ht's OAuth client id for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."hg.sr.ht".oauth-client-secret | hg.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| options/nixos/services.sourcehut.settings."git.sr.ht".oauth-client-secret | git.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."hub.sr.ht".oauth-client-secret | hub.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."man.sr.ht".oauth-client-secret | man.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.guix.substituters.authorizedKeys | A list of signing keys for each substitute server to be authorized as
a source of substitutes
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.public | Whether this is a public client (enforces PKCE, doesn't use a basic secret)
|
| options/home-manager/programs.hexchat.channels.<name>.loginMethod | The login method
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| options/nixos/services.davis.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.movim.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.slskd.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.sourcehut.settings."todo.sr.ht".oauth-client-secret | todo.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.scopeMaps | Maps kanidm groups to returned oauth scopes
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originUrl | The redirect URL of the service
|
| options/nixos/services.snipe-it.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.keycloak.settings.http-relative-path | The path relative to / for serving
resources.
In versions of Keycloak using Wildfly (<17),
this defaulted to /auth
|
| options/nixos/services.pinchflat.secretsFile | Secrets like SECRET_KEY_BASE and BASIC_AUTH_PASSWORD
should be passed to the service without adding them to the world-readable Nix store
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities | Section defining complementary attributes of certification authorities, each
in its own subsection with an arbitrary yet unique name
|
| options/nixos/services.discourse.mail.outgoing.authentication | Authentication type to use, see https://api.rubyonrails.org/classes/ActionMailer/Base.html
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps | Adds additional claims (and values) based on which kanidm groups an authenticating party belongs to
|
| options/nixos/services.tor.relay.onionServices.<name>.authorizeClient.clientNames | Only clients that are listed here are authorized to access the hidden service
|
| options/nixos/services.sourcehut.settings."lists.sr.ht".oauth-client-secret | lists.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."paste.sr.ht".oauth-client-secret | paste.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.sourcehut.settings."pages.sr.ht".oauth-client-secret | pages.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.imapOauth2Params.client_id | The OAuth2 client identifier.
|
| options/home-manager/accounts.email.accounts.<name>.aerc.smtpOauth2Params.client_id | The OAuth2 client identifier.
|
| options/nixos/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/darwin/services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.present | Whether to ensure that this oauth2 resource server is present or absent.
|
| options/nixos/services.radicle.publicKey | An SSH public key (as an absolute file path or directly as a string),
usually generated by rad auth.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.displayName | Display name
|
| options/nixos/services.tt-rss.singleUserMode | Operate in single user mode, disables all functionality related to
multiple users and authentication
|
| options/nixos/services.tailscaleAuth.user | User which runs tailscale-nginx-auth
|
| options/nixos/services.kubernetes.apiserver.authorizationMode | Kubernetes apiserver authorization mode (AlwaysAllow/AlwaysDeny/ABAC/Webhook/RBAC/Node)
|
| options/nixos/services.authelia.instances.<name>.settings.server.address | The address to listen on.
|
| options/nixos/services.borgbackup.repos.<name>.authorizedKeysAppendOnly | Public SSH keys that can only be used to append new data (archives) to the repository
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth | Sets the Authorization header on every remote read request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/services.gancio.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.fluidd.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.akkoma.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.monica.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.matomo.nginx.basicAuth | Basic Auth protection for a vhost
|
| options/nixos/services.sourcehut.settings."builds.sr.ht".oauth-client-secret | builds.sr.ht's OAuth client secret for meta.sr.ht.
|
| options/nixos/services.prometheus.scrapeConfigs.*.authorization | Sets the Authorization header on every scrape request with the configured credentials.
|
| options/nixos/services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.slot | Optional slot number of the token that stores the certificate.
|
| options/nixos/services.kubernetes.apiserver.authorizationPolicy | Kubernetes apiserver authorization policy file
|
| options/nixos/services.prometheus.remoteWrite.*.basic_auth | Sets the Authorization header on every remote write request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.imageFile | Application image to display in the WebUI
|
| options/nixos/services.oncall.settings.db.conn.require_auth | Whether authentication is required to access the web app.
|
| options/nixos/services.tailscaleAuth.group | Group which runs tailscale-nginx-auth
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.file | Absolute path to the certificate to load
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.module | Optional PKCS#11 module name.
|
| options/nixos/services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth | EAP secret section for a specific secret
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.basicSecretFile | The basic secret to use for this service
|
| options/nixos/services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.joinType | Determines how multiple values are joined to create the claim value
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| options/nixos/services.prometheus.scrapeConfigs.*.basic_auth | Sets the Authorization header on every scrape request with the
configured username and password.
password and password_file are mutually exclusive.
|
| options/nixos/services.davis.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.movim.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.slskd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.originLanding | When redirecting from the Kanidm Apps Listing page, some linked applications may need to land on a specific page to trigger oauth2/oidc interactions.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.valuesByGroup | Maps kanidm groups to values for the claim.
|
| options/nixos/services.plausible.mail.smtp.user | The username/email in case SMTP auth is enabled.
|
| options/nixos/services.snipe-it.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.cacert | The certificates may use a relative path from the swanctl
x509ca directory or an absolute path
|
| options/nixos/services.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate users via tailscale.
|
| options/nixos/services.kanidm.provision.systems.oauth2.<name>.enableLegacyCrypto | Enable legacy crypto on this client
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.username | HTTP username
|
| options/nixos/services.prometheus.remoteRead.*.basic_auth.password | HTTP password
|
| packages/nixpkgs/python313Packages.gotrue | Python Client Library for Supabase Auth |
| packages/nixpkgs/python314Packages.gotrue | Python Client Library for Supabase Auth |
| options/nixos/services.strongswan-swanctl.swanctl.authorities.<name>.crl_uris | List of CRL distribution points (ldap, http, or file URI)
|