| options/nixos/services.pgmanage.loginGroup | This tells pgmanage to only allow users in a certain PostgreSQL group to
login to pgmanage
|
| options/nixos/services.hardware.lcd.server.usbGroup | The group to use for settings permissions
|
| options/nixos/hardware.ckb-next.gid | Limit access to the ckb daemon to a particular group.
|
| options/nixos/services.kanidm.provision.groups | Provisioning of kanidm groups
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.name | The name of this group
|
| options/nixos/services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| options/nixos/users.mutableUsers | If set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands
|
| options/nixos/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/darwin/services.github-runners.<name>.runnerGroup | Name of the runner group to add this runner to (defaults to the default runner group)
|
| options/nixos/users.extraGroups.<name>.gid | The group GID
|
| options/nixos/systemd.enableCgroupAccounting | Whether to enable cgroup accounting; see cgroups(7).
|
| options/nixos/services.kanidm.provision.groups.<name>.overwriteMembers | Whether the member list should be overwritten each time (true) or appended
(false)
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.name | Name of the rule group
|
| options/nixos/programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| options/nixos/services.taskserver.organisations.<name>.groups | A list of group names that belong to the organization.
|
| options/nixos/users.extraGroups.<name>.name | The name of the group
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.members | The members of this group
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.folder | Name of the folder the rule group will be stored in
|
| options/nixos/programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| options/nixos/programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| options/nixos/services.firezone.server.provision.accounts.<name>.groups.<name>.forceMembers | Ensure that only the given members are part of this group at every server start.
|
| options/nixos/services.grafana.provision.alerting.rules.settings.groups.*.interval | Interval that the rule group should be evaluated at
|
| packages/nixpkgs/ugm | Terminal based UNIX user and group browser |
| options/nixos/users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| options/nixos/services.prometheus.exporters.dovecot.socketPath | Path under which the stats socket is placed
|
| options/nixos/services.reposilite.useACMEHost | Host of an existing Let's Encrypt certificate to use for SSL
|
| options/nixos/users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/services.kanidm.provision.persons.<name>.groups | List of groups this person should belong to.
|
| packages/nixpkgs/lie | Computer algebra package for Lie group computations |
| options/nixos/services.diod.userdb | This option disables password/group lookups
|
| options/nixos/users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| options/nixos/programs.light.enable | Whether to install Light backlight control command
and udev rules granting access to members of the "video" group.
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| options/nixos/services.kmonad.keyboards.<name>.extraGroups | Extra permission groups to attach to the KMonad instance for
this keyboard
|
| options/nixos/users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| packages/nixpkgs/su-exec | Switch user and group id and exec |
| options/nixos/services.suricata.settings.vars.address-groups.HOME_NET | HOME_NET variable.
|
| options/nixos/hardware.brillo.enable | Whether to enable brillo in userspace
|
| options/nixos/users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| options/nixos/services.jack.jackd.enable | Whether to enable JACK Audio Connection Kit
|
| options/nixos/hardware.i2c.enable | Whether to enable i2c devices support
|
| packages/nixpkgs/fatrop | Nonlinear optimal control problem solver that aims to be fast, support a broad class of optimal control problems and achieve a high numerical robustness |
| options/nixos/hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| options/nixos/services.userdbd.enable | Whether to enable the systemd JSON user/group record lookup service
.
|
| options/nixos/services.dependency-track.oidc.teams.claim | Defines the name of the claim that contains group memberships or role assignments in the provider's userinfo endpoint
|
| options/nixos/services.saned.enable | Enable saned network daemon for remote connection to scanners.
saned would be run from scanner user; to allow
access to hardware that doesn't have scanner group
you should add needed groups to this user.
|
| options/nixos/services.suricata.settings.vars.address-groups.DNP3_SERVER | DNP3_SERVER variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.DNP3_CLIENT | DNP3_CLIENT variable.
|
| options/nixos/programs.tcpdump.enable | Whether to configure a setcap wrapper for tcpdump
|
| options/nixos/users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| options/nixos/services.suricata.settings.vars.address-groups.ENIP_CLIENT | ENIP_CLIENT variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.ENIP_SERVER | ENIP_SERVER variable.
|
| options/nixos/services.dovecot2.mailGroup | Default group to store mail for virtual users.
|
| options/nixos/security.isolate.cgRoot | Control group which subgroups are placed under
|
| packages/nixpkgs/lnch | Launches a process and moves it out of the process group |
| options/nixos/services.suricata.settings.vars.address-groups.DC_SERVERS | DC_SERVERS variable.
|
| options/nixos/security.sudo.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/security.sudo.keepTerminfo | Whether to preserve the TERMINFO and TERMINFO_DIRS
environment variables, for root and the wheel group.
|
| options/darwin/security.sudo.keepTerminfo | Whether to preserve the TERMINFO and TERMINFO_DIRS
environment variables, for root and the admin group.
|
| options/nixos/services.fastnetmon-advanced.hostgroups | Hostgroups to declaratively load into FastNetMon Advanced
|
| options/nixos/services.suricata.settings.vars.address-groups.AIM_SERVERS | AIM_SERVERS variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.DNS_SERVERS | DNS_SERVERS variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.SQL_SERVERS | SQL_SERVERS variable.
|
| options/nixos/systemd.tmpfiles.settings.<config-name>.<path>.<tmpfiles-type>.user | The user of the file
|
| options/nixos/security.sudo-rs.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| options/nixos/hardware.glasgow.enable | Enables Glasgow udev rules and ensures 'plugdev' group exists
|
| packages/nixpkgs/lwgrp | Data structures and operations to group MPI processes as an ordered set |
| options/nixos/services.suricata.settings.vars.address-groups.SMTP_SERVERS | SMTP_SERVERS variable.
|
| options/nixos/services.suricata.settings.vars.address-groups.HTTP_SERVERS | HTTP_SERVERS variable.
|
| options/nixos/programs.minipro.enable | Whether to enable minipro and its udev rules
|
| options/nixos/users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| options/nixos/services.suricata.settings.vars.address-groups.MODBUS_CLIENT | MODBUS_CLIENT variable
|
| options/nixos/services.suricata.settings.vars.address-groups.MODBUS_SERVER | MODBUS_SERVER variable.
|
| options/nixos/programs.sedutil.enable | Whether to enable sedutil, to manage self encrypting drives that conform to the Trusted Computing Group OPAL 2.0 SSC specification.
|
| options/nixos/services.nginx.upstreams | Defines a group of servers to use as proxy target.
|
| options/nixos/users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| options/nixos/virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| options/nixos/services.suricata.settings.vars.address-groups.EXTERNAL_NET | EXTERNAL_NET variable.
|
| options/nixos/programs.gphoto2.enable | Whether to configure system to use gphoto2
|
| options/nixos/services.couchdb.configFile | Configuration file for persisting runtime changes
|
| options/nixos/services.pdfding.enable | Whether to enable PdfDing service
|
| options/nixos/services.smokeping.user | User that runs smokeping and (optionally) thttpd
|
| packages/nixpkgs/element-call | Group calls powered by Matrix |
| options/nixos/services.onlyoffice.securityNonceFile | File holding nginx configuration that sets the nonce used to create secret links
|
| options/nixos/services.bitwarden-directory-connector-cli.sync.groups | Whether to sync ldap groups into BitWarden.
|
| options/nixos/security.loginDefs.settings.GID_MAX | Range of group IDs used for the creation of regular groups by useradd, groupadd, or newusers.
|
| options/nixos/security.loginDefs.settings.GID_MIN | Range of group IDs used for the creation of regular groups by useradd, groupadd, or newusers.
|
| options/nixos/services.molly-brown.certPath | Path to TLS certificate
|
| options/nixos/services.timekpr.adminUsers | All listed users will become part of the timekpr group so they can manage timekpr settings without requiring sudo.
|
| options/nixos/services.portunus.enable | Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP.
|
| options/nixos/services.grafana.settings.server.socket_gid | GID where the socket should be set when protocol=socket
|
| options/nixos/services.suricata.settings.vars.address-groups.TELNET_SERVERS | TELNET_SERVERS variable.
|
| options/nixos/hardware.rtl-sdr.enable | Enables rtl-sdr udev rules, ensures 'plugdev' group exists, and blacklists DVB kernel modules
|
| options/nixos/services.nomad.enableDocker | Enable Docker support
|
| options/nixos/services.traefik.supplementaryGroups | Additional groups under which Traefik runs
|
| options/home-manager/accounts.email.accounts.<name>.mbsync.groups.<name>.channels.<name>.extraConfig | Extra configuration lines to add to THIS channel's
configuration.
|
| options/nixos/programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| options/nixos/hardware.openrazer.users | Usernames to be added to the "openrazer" group, so that they
can start and interact with the OpenRazer userspace daemon.
|