| services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| services.incron.allow | Users allowed to use incrontab
|
| nix.firewall.allowNonTCPUDP | Whether to allow traffic that is neither TCP nor UDP
|
| services.murmur.allowHtml | Allow HTML in client messages, comments, and channel
descriptions.
|
| services.ncps.cache.allowPutVerb | Whether to enable Whether to allow the PUT verb to push narinfo and nar files directly
to the cache.
.
|
| services.artalk.allowModify | allow Artalk store the settings to config file persistently
|
| services.printing.allowFrom | From which hosts to allow unconditional access.
|
| services.physlock.allowAnyUser | Whether to allow any user to lock the screen
|
| nix.firewall.allowLoopback | Whether to allow traffic on the loopback interface
|
| fonts.fontconfig.allowType1 | Allow Type-1 fonts
|
| services.hledger-web.allow | User's access level for changing data.
- view: view only permission.
- add: view and add permissions.
- edit: view, add, and edit permissions.
- sandstorm: permissions from the
X-Sandstorm-Permissions request header.
|
| services.ncps.cache.allowDeleteVerb | Whether to enable Whether to allow the DELETE verb to delete narinfo and nar files from
the cache.
.
|
| boot.zfs.allowHibernation | Allow hibernation support, this may be a unsafe option depending on your
setup
|
| fonts.fontconfig.allowBitmaps | Allow bitmap fonts
|
| networking.dhcpcd.allowSetuid | Whether to relax the security sandbox to allow running setuid
binaries (e.g. sudo) in the dhcpcd hooks.
|
| hardware.cpu.x86.msr.settings.allow-writes | Whether to allow writes to MSRs ("on") or not ("off").
|
| services.nsd.zones.<name>.allowAXFRFallback | If NSD as secondary server should be allowed to AXFR if the primary
server does not allow IXFR.
|
| users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| services.openssh.allowSFTP | Whether to enable the SFTP subsystem in the SSH daemon
|
| services.gollum.allowUploads | Enable uploads of external files
|
| services.ncps.cache.lock.allowDegradedMode | Allow falling back to local locks if Redis is unavailable (WARNING:
breaks HA guarantees).
|
| hardware.nvidia.prime.allowExternalGpu | Whether to enable configuring X to allow external NVIDIA GPUs when using Prime [Reverse] sync optimus
.
|
| services.deconz.allowSetSystemTime | Whether to enable setting the system time.
|
| services.bind.zones.<name>.allowQuery | List of address ranges allowed to query this zone
|
| nix.firewall.allowPrivateNetworks | Whether to allow traffic to local networks
|
| services.vsftpd.allowWriteableChroot | Allow the use of writeable root inside chroot().
|
| services.easytier.allowSystemForward | Whether to enable Allow the system to forward packets from easytier
|
| system.autoUpgrade.allowReboot | Reboot the system into the new generation instead of a switch
if the new generation uses a different kernel, kernel modules
or initrd than the booted system
|
| boot.initrd.luks.devices.<name>.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| services.languagetool.allowOrigin | Set the Access-Control-Allow-Origin header in the HTTP response,
used for direct (non-proxy) JavaScript-based access from browsers.
"*" to allow access from all sites.
|
| services.avahi.allowPointToPoint | Whether to use POINTTOPOINT interfaces
|
| services.atd.allowEveryone | Whether to make /var/spool/at{jobs,spool}
writeable by everyone (and sticky)
|
| services.stargazer.allowCgiUser | When enabled, the stargazer process will be given CAP_SETGID
and CAP_SETUID so that it can run cgi processes as a different
user
|
| services.deconz.allowRebootSystem | Whether to enable rebooting the system.
|
| services.mirakurun.allowSmartCardAccess | Install polkit rules to allow Mirakurun to access smart card readers
which is commonly used along with tuner devices.
|
| services.boinc.allowRemoteGuiRpc | If set to true, any remote host can connect to and control this BOINC
client (subject to password authentication)
|
| services.pdns-recursor.api.allowFrom | IP address ranges of clients allowed to make API requests.
|
| services.pdns-recursor.dns.allowFrom | IP address ranges of clients allowed to make DNS queries.
|
| nix.firewall.allowedTCPPorts | TCP ports to which traffic is allowed
|
| nix.firewall.allowedUDPPorts | UDP ports to which traffic is allowed
|
| services.ghostunnel.servers.<name>.allowCN | Allow client if common name appears in the list.
|
| boot.initrd.unl0kr.allowVendorDrivers | Whether to load additional drivers for certain vendors (I
|
| services.ghostunnel.servers.<name>.allowOU | Allow client if organizational unit name appears in the list.
|
| services.ghostunnel.servers.<name>.allowAll | If true, allow all clients, do not check client cert subject.
|
| services.ghostunnel.servers.<name>.allowURI | Allow client if URI subject alternative name appears in the list.
|
| services.ghostunnel.servers.<name>.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| services.bird-lg.proxy.allowedIPs | List of IPs or networks to allow (default all allowed).
|
| services.gotenberg.downloadFrom.allowList | Allow these URLs to be used in the downloadFrom API field
|
| services.inadyn.settings.allow-ipv6 | Whether to get IPv6 addresses from interfaces.
|
| services.namecoind.rpc.allowFrom | List of IP address ranges allowed to use the RPC API
|
| services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| services.mediamtx.allowVideoAccess | Whether to enable access to video devices like cameras on the system
.
|
| services.moonraker.allowSystemControl | Whether to allow Moonraker to perform system-level operations
|
| services.deconz.allowRestartService | Whether to enable killing/restarting processes.
|
| services.prosody.allowRegistration | Allow account creation
|
| security.allowUserNamespaces | Whether to allow creation of user namespaces
|
| swapDevices.*.randomEncryption.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| boot.initrd.allowMissingModules | Whether the initrd can be built even though modules listed in
boot.initrd.kernelModules or
boot.initrd.availableKernelModules are missing from
the kernel
|
| nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| security.pam.services.<name>.allowNullPassword | Whether to allow logging into accounts that have no password
set (i.e., have an empty password field in
/etc/passwd or
/etc/group)
|
| services.tor.torsocks.allowInbound | Set Torsocks to accept inbound connections
|
| services.sabnzbd.allowConfigWrite | By default we create the sabnzbd configuration read-only,
which keeps the nixos configuration as the single source
of truth
|
| services.borgbackup.repos.<name>.allowSubRepos | Allow clients to create repositories in subdirectories of the
specified path
|
| networking.firewall.allowPing | Whether to respond to incoming ICMPv4 echo requests
("pings")
|
| services.pgmanage.allowCustomConnections | This tells pgmanage whether or not to allow anyone to use a custom
connection from the login screen.
|
| services.avahi.allowInterfaces | List of network interfaces that should be used by the avahi-daemon
|
| services.taskchampion-sync-server.allowClientIds | Client IDs to allow (can be repeated; if not specified, all clients are allowed)
|
| services.hedgedoc.settings.allowOrigin | List of domains to whitelist.
|
| services.nsd.zones.<name>.allowNotify | Listed primary servers are allowed to notify this secondary server
|
| services.cassandra.allowClients | Enables or disables the native transport server (CQL binary protocol)
|
| services.upower.allowRiskyCriticalPowerAction | Enable the risky critical power actions "Suspend" and "Ignore".
|
| security.duosec.allowTcpForwarding | By default, when SSH forwarding, enabling Duo Security will
disable TCP forwarding
|
| services.adguardhome.allowDHCP | Allows AdGuard Home to open raw sockets (CAP_NET_RAW), which is
required for the integrated DHCP server
|
| services.logrotate.allowNetworking | Whether to enable network access for logrotate.
|
| services.kubernetes.apiserver.allowPrivileged | Whether to allow privileged containers on Kubernetes.
|
| services.sourcehut.settings."builds.sr.ht".allow-free | Whether to enable nonpaying users to submit builds.
|
| services.sourcehut.settings."lists.sr.ht".allow-new-lists | Whether to enable creation of new lists.
|
| networking.dhcpcd.allowInterfaces | Enable the DHCP client for any interface whose name matches
any of the shell glob patterns in this list
|
| services.esphome.allowedDevices | A list of device nodes to which esphome has access to
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowCN | Allow client if common name appears in the list.
|
| services.hedgedoc.settings.allowGravatar | Whether to enable Libravatar as
profile picture source on your instance
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowOU | Allow client if organizational unit name appears in the list.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowAll | If true, allow all clients, do not check client cert subject.
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_groups | List of groups to allow access to this vhost, or null to allow all.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowDNS | Allow client if DNS subject alternative name appears in the list.
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.allowURI | Allow client if URI subject alternative name appears in the list.
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_emails | List of emails to allow access to this vhost, or null to allow all.
|
| services.kmonad.keyboards.<name>.defcfg.allowCommands | Whether to enable keys to run shell commands.
|
| security.pam.services.<name>.googleAuthenticator.allowNullOTP | Whether to allow login for accounts that have no OTP set
(i.e., accounts with no OTP configured or no existing
~/.google_authenticator).
|
| networking.wireless.allowAuxiliaryImperativeNetworks | Whether to allow configuring networks "imperatively" (e.g. via
wpa_supplicant_gui) and declaratively via
networking.wireless.networks.
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| services.pulseaudio.tcp.anonymousClients.allowAll | Whether to enable all anonymous clients to stream to the server.
|
| services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| services.pdfding.allowedHosts | Domains where PdfDing is allowed to run
|
| services.chhoto-url.settings.allow_capital_letters | Whether to allow capital letters in slugs.
|
| services.polipo.allowedClients | List of IP addresses or network addresses that may connect to Polipo.
|
| services.nylon.<name>.allowedIPRanges | Allowed client IP ranges are evaluated first, defaults to ARIN IPv4 private ranges:
[ "192.168.0.0/16" "127.0.0.0/8" "172.16.0.0/12" "10.0.0.0/8" ]
|
| services.matrix-conduit.settings.global.allow_check_for_updates | Whether to allow Conduit to automatically contact
https://conduit.rs hourly to check for important Conduit news
|
| services.etebase-server.settings.allowed_hosts.allowed_host1 | The main host that is allowed access.
|
| security.allowSimultaneousMultithreading | Whether to allow SMT/hyperthreading
|
| containers.<name>.allowedDevices | A list of device nodes to which the containers has access to.
|
| services.bacula-fd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.bacula-sd.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.cockpit.allowed-origins | List of allowed origins
|
| services.bacula-dir.tls.allowedCN | Common name attribute of allowed peer certificates
|
| boot.initrd.network.ifstate.allowIfstateToDrasticlyIncreaseInitrdSize | IfState in initrd drastically increases the size of initrd, your boot partition may be too small and/or you may have significantly fewer generations
|
| containers.<name>.allowedDevices.*.node | Path to device node
|
| services.vsftpd.userlistDeny | Specifies whether userlistFile is a list of user
names to allow or deny access
|
| services.grafana.settings.security.allow_embedding | When false, the HTTP header X-Frame-Options: deny will be set in Grafana HTTP responses
which will instruct browsers to not allow rendering Grafana in a <frame>, <iframe>, <embed> or <object>
|
| services.distccd.allowedClients | Client IPs which are allowed to connect to distccd in CIDR notation
|
| services.kanidm.provision.systems.oauth2.<name>.allowInsecureClientDisablePkce | Disable PKCE on this oauth2 resource server to work around insecure clients
that may not support it
|
| services.komodo-periphery.allowedIps | IP addresses or subnets allowed to call the periphery API
|
| services.prosody.muc.*.allowners_muc | Add module allowners, any user in chat is able to
kick other
|
| networking.firewall.allowedUDPPorts | List of open UDP ports.
|
| networking.firewall.allowedTCPPorts | List of TCP ports on which incoming connections are
accepted.
|
| services.morty.ipv6 | Allow IPv6 HTTP requests?
|
| services.firezone.gui-client.allowedUsers | All listed users will become part of the firezone-client group so
they can control the tunnel service
|
| services.omnom.settings.smtp.tls_allow_insecure | Whether to enable Whether to allow insecure TLS..
|
| services.nextcloud-spreed-signaling.settings.backend.allowall | Allow any hostname as backend endpoint
|
| services.jitsi-meet.prosody.allowners_muc | Add module allowners, any user in chat is able to
kick other
|
| networking.firewall.allowedUDPPortRanges | Range of open UDP ports.
|
| services.nextcloud-spreed-signaling.settings.stats.allowed_ips | List of IP addresses that are allowed to access the debug, stats and metrics endpoints
|
| networking.firewall.allowedTCPPortRanges | A range of TCP ports on which incoming connections are
accepted.
|
| services.nifi.proxyPort | Allow requests from a specific port.
|
| services.nifi.proxyHost | Allow requests from a specific host.
|
| services.taskserver.allowedClientIDs | A list of regular expressions that are matched against the reported
client id (such as task 2.3.0)
|
| programs.nix-required-mounts.allowedPatterns | The hook config, describing which paths to mount for which system features
|
| services.neo4j.readOnly | Only allow read operations from this Neo4j instance.
|
| services.matrix-continuwuity.settings.global.allow_announcements_check | If enabled, continuwuity will send a simple GET request periodically to
https://continuwuity.org/.well-known/continuwuity/announcements for any new announcements made.
|
| services.factorio.allowedPlayers | If non-empty, only these player names are allowed to connect
|
| services.bacula-sd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.bacula-fd.director.<name>.tls.allowedCN | Common name attribute of allowed peer certificates
|
| services.doh-server.settings.ecs_allow_non_global_ip | By default, non global IP addresses are never forwarded to upstream servers
|
| services.grafana.settings.users.allow_org_create | Set to false to prohibit users from creating new organizations.
|
| services.homepage-dashboard.allowedHosts | Hosts that homepage-dashboard will be running under
|
| containers.<name>.allowedDevices.*.modifier | Device node access modifier
|
| services.headscale.settings.oidc.allowed_users | Users allowed to authenticate even if not in allowedDomains.
|
| services.crab-hole.settings.blocklist.allow_list | List of allowlists
|
| services.grafana.settings.users.allow_sign_up | Set to false to prohibit users from being able to sign up / create user accounts
|
| power.ups.users.<name>.actions | Allow the user to do certain things with upsd
|
| services.pihole-ftl.lists | Deny (or allow) domain lists to use
|
| programs.nix-required-mounts.allowedPatterns.<name>.paths | A list of glob patterns, indicating which paths to expose to the sandbox
|
| services.nixseparatedebuginfod.allowOldNix | Do not fail evaluation when services.nixseparatedebuginfod.nixPackage is older than nix 2.18.
|
| services.ttyd.checkOrigin | Whether to allow a websocket connection from a different origin.
|
| services.headscale.settings.oidc.allowed_domains | Allowed principal domains. if an authenticated user's domain
is not in this list authentication request will be rejected.
|
| services.matrix-conduit.settings.global.allow_federation | Whether this server federates with other servers.
|
| services.matrix-tuwunel.settings.global.allow_federation | Whether this server federates with other servers.
|
| services.matrix-conduit.settings.global.allow_registration | Whether new users can register on this server.
|
| services.mollysocket.settings.allowed_endpoints | List of UnifiedPush servers
|
| services.taskserver.disallowedClientIDs | A list of regular expressions that are matched against the reported
client id (such as task 2.3.0)
|
| services.matrix-tuwunel.settings.global.allow_encryption | Whether new encrypted rooms can be created
|
| services.matrix-conduit.settings.global.allow_encryption | Whether new encrypted rooms can be created
|
| services.veilid.settings.core.protected_store.allow_insecure_fallback | If we can't use system-provided secure storage, should we proceed anyway?
|
| services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| services.mollysocket.settings.allowed_uuids | UUIDs of Signal accounts that may use this server
|
| programs.fuse.userAllowOther | Allow non-root users to specify the allow_other or allow_root mount
options, see mount.fuse3(8).
|
| programs.nix-required-mounts.allowedPatterns.<name>.onFeatures | Which requiredSystemFeatures should trigger relaxation of the sandbox
|
| services.hostapd.radios.<name>.networks.<name>.macAllow | Specifies the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| services.matrix-tuwunel.settings.global.allow_registration | Whether new users can register on this server
|
| hardware.brillo.enable | Whether to enable brillo in userspace
|
| services.cloud-init.xfs.enable | Allow the cloud-init service to operate xfs filesystem.
|
| networking.firewall.interfaces.<name>.allowedUDPPorts | List of open UDP ports.
|
| services._3proxy.services.*.auth | Authentication type
|
| networking.firewall.interfaces.<name>.allowedTCPPorts | List of TCP ports on which incoming connections are
accepted.
|
| services.deluge.openFilesLimit | Number of files to allow deluged to open.
|
| services.cloud-init.ext4.enable | Allow the cloud-init service to operate ext4 filesystem.
|
| networking.wg-quick.interfaces.<name>.peers.*.allowedIPs | List of IP (v4 or v6) addresses with CIDR masks from
which this peer is allowed to send incoming traffic and to which
outgoing traffic for this peer is directed
|
| services.peertube.dataDirs | Allow access to custom data locations.
|
| services.tt-rss.auth.autoCreate | Allow authentication modules to auto-create users in tt-rss internal
database when authenticated successfully.
|
| services.xserver.enableTCP | Whether to allow the X server to accept TCP connections.
|
| virtualisation.libvirtd.allowedBridges | List of bridge devices that can be used by qemu:///session
|
| networking.firewall.interfaces.<name>.allowedUDPPortRanges | Range of open UDP ports.
|
| services.knot.enableXDP | Extends the systemd unit with permissions to allow for the use of
the eXpress Data Path (XDP).
Make sure to read up on functional limitations
when running in XDP mode.
|
| services.ttyd.writeable | Allow clients to write to the TTY.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.allow_stale | Allow stale Consul results
(see https://www.consul.io/api/index.html#consistency-modes)
|
| networking.firewall.interfaces.<name>.allowedTCPPortRanges | A range of TCP ports on which incoming connections are
accepted.
|
| services.cloud-init.btrfs.enable | Allow the cloud-init service to operate btrfs filesystem.
|
| services.saned.enable | Enable saned network daemon for remote connection to scanners.
saned would be run from scanner user; to allow
access to hardware that doesn't have scanner group
you should add needed groups to this user.
|
| services.pulseaudio.tcp.anonymousClients.allowedIpRanges | A list of IP subnets that are allowed to stream to the server.
|
| security.sudo.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| services.chisel-server.socks5 | Allow clients access to internal SOCKS5 proxy
|
| networking.wireguard.interfaces.<name>.allowedIPsAsRoutes | Determines whether to add allowed IPs as routes or not.
|
| services.ethercalc.host | Address to listen on (use 0.0.0.0 to allow access from any address).
|
| services.diod.authRequired | Allow clients to connect without authentication, i.e. without a valid MUNGE credential.
|
| security.sudo-rs.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| services.avahi.publish.enable | Whether to allow publishing in general.
|
| services.matrix-continuwuity.settings.global.allow_federation | Whether this server federates with other servers.
|
| services.kanidm.unixSettings.pam_allowed_login_groups | Kanidm groups that are allowed to login using PAM.
|
| services.stash.settings.dangerous_allow_public_without_auth | Learn more at https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/
|
| services.prosody.modules.mam | Store messages in an archive and allow users to access it
|
| services.matrix-continuwuity.settings.global.allow_encryption | Whether new encrypted rooms can be created
|
| services.matrix-continuwuity.settings.global.allow_registration | Whether new users can register on this server
|
| services.chisel-server.reverse | Allow clients reverse port forwarding
|
| services.gnome.rygel.enable | Whether to enable Rygel UPnP Mediaserver
|
| services.hostapd.radios.<name>.networks.<name>.macAllowFile | Specifies a file containing the MAC addresses to allow if macAcl is set to "allow" or "radius"
|
| services.kanidm.unix.settings.kanidm.pam_allowed_login_groups | Kanidm groups that are allowed to login using PAM.
|
| services.mediagoblin.settings.mediagoblin.allow_registration | Whether to enable user self registration
|
| services.sabnzbd.settings.servers.<name>.ssl_verify | Level of TLS verification
|
| networking.wireguard.interfaces.<name>.peers.*.allowedIPs | List of IP (v4 or v6) addresses with CIDR masks from
which this peer is allowed to send incoming traffic and to which
outgoing traffic for this peer is directed
|
| services.prosody.modules.vcard | Allow users to set vCards
|
| programs.nix-required-mounts.allowedPatterns.<name>.unsafeFollowSymlinks | Whether to enable Instructs the hook to mount the symlink targets as well, when any of
the paths contain symlinks
|
| services.hostapd.radios.<name>.networks.<name>.macAcl | Station MAC address -based authentication
|
| boot.loader.limine.enableEditor | Whether to allow editing the boot entries before booting them
|
| security.doas.extraRules.*.runAs | Which user or group the specified command is allowed to run as
|
| services.invidious.port | The port Invidious should listen on
|
| security.loginDefs.chfnRestrict | Use chfn SUID to allow non-root users to change their account GECOS information.
|
| security.duosec.failmode | On service or configuration errors that prevent Duo
authentication, fail "safe" (allow access) or "secure" (deny
access)
|
| boot.initrd.systemd.root | Controls how systemd will interpret the root FS in initrd
|
| services.prosody.extraConfig | Additional prosody configuration
The generated file is processed by envsubst to allow secrets to be passed securely via environment variables.
|
| services.prosody.modules.roster | Allow users to have a roster
|
| security.sudo.extraRules.*.runAs | Under which user/group the specified command is allowed to run
|
| services.cloud-init.network.enable | Allow the cloud-init service to configure network interfaces
through systemd-networkd.
|
| services.ntp.restrictSource | The restriction flags to be set on source
|
| security.sudo-rs.extraRules.*.runAs | Under which user/group the specified command is allowed to run
|
| services.nsd.zones.<name>.provideXFR | Allow these IPs and TSIG to transfer zones, addr TSIG|NOKEY|BLOCKED
address range 192.0.2.0/24, 1.2.3.4&255.255.0.0, 3.0.2.20-3.0.2.40
|
| boot.loader.systemd-boot.editor | Whether to allow editing the kernel command-line before
boot
|
| hardware.acpilight.enable | Enable acpilight
|
| boot.initrd.network.ssh.ignoreEmptyHostKeys | Allow leaving config.boot.initrd.network.ssh.hostKeys empty,
to deploy ssh host keys out of band.
|
| services.oink.settings.ttl | The TTL ("Time to Live") value to set for your DNS records
|
| xdg.portal.extraPortals | List of additional portals to add to path
|
| services.firewalld.zones.<name>.ports | Ports to allow in the zone.
|
| services.syncplay.salt | Salt to allow room operator passwords generated by this server
instance to still work when the server is restarted
|
| services.postgrey.retryWindow | Allow N days for the first retry
|
| services.prosody.modules.smacks | Allow a client to resume a disconnected session, and prevent message loss
|
| services.unifi.openFirewall | Whether or not to open the minimum required ports on the firewall
|
| services.paisa.mutableSettings | Allow changes made on the web interface to persist between service
restarts.
|
| services.soju.acceptProxyIP | Allow the specified IPs to act as a proxy
|
| services.quicktun.<name>.remoteFloat | Whether to allow the remote address and port to change when properly encrypted packets are received.
|
| services.nsd.ipTransparent | Allow binding to non local addresses.
|
| services.chrony.makestep.enable | Allow chronyd to step the system clock if the error is larger than
the specified threshold.
|
| services.thermald.ignoreCpuidCheck | Whether to ignore the cpuid check to allow running on unsupported platforms
|
| services.znc.mutable | Indicates whether to allow the contents of the
dataDir directory to be changed by the user at
run-time
|
| services.nebula.networks.<name>.relays | List of IPs of relays that this node should allow traffic from.
|
| services.pgmanage.loginGroup | This tells pgmanage to only allow users in a certain PostgreSQL group to
login to pgmanage
|
| services.kubo.localDiscovery | Whether to enable local discovery for the Kubo daemon
|
| services._3proxy.services.*.acl.*.rule | ACL rule
|
| services.bitlbee.authMode | The following authentication modes are available:
Open -- Accept connections from anyone, use NickServ for user authentication
|
| services.apcupsd.enable | Whether to enable the APC UPS daemon. apcupsd monitors your UPS and
permits orderly shutdown of your computer in the event of a power
failure
|
| services.displayManager.gdm.wayland | Allow GDM to run on Wayland instead of Xserver.
|
| hardware.graphics.enable | Whether to enable hardware accelerated graphics drivers
|
| services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| services.prosody.muc.*.moderation | Allow rooms to be moderated
|
| services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| services.gitDaemon.enable | Enable Git daemon, which allows public hosting of git repositories
without any access controls
|
| services.taskserver.trust | Determines how client certificates are validated
|
| services.tlsrpt.configurePostfix | Whether to configure permissions to allow integration with Postfix.
|
| services.firewalld.zones.<name>.sourcePorts | Source ports to allow in the zone.
|
| services.prosody.modules.register | Allow users to register on this server using a client and change passwords
|
| services.kubo.settings.Mounts.FuseAllowOther | Allow all users to access the FUSE mount points
|
| services.athens.storage.mongo.insecure | Allow insecure connections to the mongo database.
|
| services.convos.reverseProxy | Enables reverse proxy support
|
| services.openldap.mutableConfig | Whether to allow writable on-line configuration
|
| services.nextjs-ollama-llm-ui.ollamaUrl | The address (including host and port) under which we can access the Ollama backend server.
!Note that if the the UI service is running under a domain "https://ui.example.org",
the Ollama backend service must allow "CORS" requests from this domain, e.g. by adding
"services.ollama.environment
|
| services.firewalld.zones.<name>.services | Services to allow in the zone.
|
| services.collabora-online.aliasGroups.*.host | Hostname to allow or deny.
|
| services.prosody.modules.blocklist | Allow users to block communications with other users
|
| services.wivrn.steam.importOXRRuntimes | Whether to enable Sets PRESSURE_VESSEL_IMPORT_OPENXR_1_RUNTIMES system-wide to allow Steam to automatically discover the WiVRn server
|
| networking.firewall.extraInputRules | Additional nftables rules to be appended to the input-allow
chain
|
| services.keepalived.openFirewall | Whether to automatically allow VRRP and AH packets in the firewall.
|
| environment.freetds | Configure freetds database entries
|
| services.quorum.permissioned | Allow only a defined list of nodes to connect.
|
| services.gokapi.mutableSettings | Allow changes to the program config made by the program to persist between restarts
|
| security.pam.u2f.settings.origin | By default pam-u2f module sets the origin
to pam://$HOSTNAME
|
| services.teeworlds.game.enablePowerups | Whether to allow powerups such as the ninja.
|
| programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| services.atuin.openRegistration | Allow new user registrations with the atuin server.
|
| programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| services.teeworlds.game.enableTeamDamage | Whether to enable team damage; whether to allow team mates to inflict damage on one another.
|
| services.firewalld.zones.<name>.protocols | Protocols to allow in the zone.
|
| services.xserver.displayManager.gdm.wayland | Allow GDM to run on Wayland instead of Xserver.
|
| services.postgresql.identMap | Defines the mapping from system users to database users
|
| services.beszel.agent.smartmon.deviceAllow | List of device paths to allow access to for SMART monitoring
|
| boot.initrd.systemd.emergencyAccess | Set to true for unauthenticated emergency access, and false or
null for no emergency access
|
| services.mediatomb.customCfg | Allow the service to create and use its own config file inside the dataDir as
configured by services.mediatomb.dataDir
|
| networking.firewall.extraForwardRules | Additional nftables rules to be appended to the forward-allow
chain
|
| services.mtprotoproxy.secureOnly | Don't allow users to connect in non-secure mode (without random padding).
|
| services.whitebophir.listenAddress | Address to listen on (use 0.0.0.0 to allow access from any address).
|
| services.chrony.enableRTCTrimming | Enable tracking of the RTC offset to the system clock and automatic trimming
|
| services.pretalx.environmentFiles | Environment files that allow passing secret configuration values
|
| services.usbguard.implicitPolicyTarget | How to treat USB devices that don't match any rule in the policy
|
| services.openafsServer.dottedPrincipals | If enabled, allow principal names containing (.) dots
|
| services.openssh.settings.X11Forwarding | Whether to allow X11 connections to be forwarded.
|
| programs.uwsm.waylandCompositors | Configuration for UWSM-managed Wayland Compositors
|
| services.usbguard.presentDevicePolicy | How to treat USB devices that are already connected when the daemon
starts
|
| services.calibre-web.options.enableBookUploading | Allow books to be uploaded via Calibre-Web UI.
|
| services.slurm.enableSrunX11 | If enabled srun will accept the option "--x11" to allow for X11 forwarding
from within an interactive session or a batch job
|
| services.bitcoind.<name>.prune | Reduce storage requirements by enabling pruning (deleting) of old
blocks
|
| services.dendrite.openRegistration | Allow open registration without secondary verification (reCAPTCHA).
|
| services.wivrn.config.json | Configuration for WiVRn
|
| security.pam.services.<name>.gnupg.enable | If enabled, pam_gnupg will attempt to automatically unlock the
user's GPG keys with the login password via
gpg-agent
|
| services.rabbitmq.listenAddress | IP address on which RabbitMQ will listen for AMQP
connections
|
| services.home-assistant.configWritable | Whether to make configuration.yaml writable
|
| services.kanidm.provision.acceptInvalidCerts | Whether to allow invalid certificates when provisioning the target instance
|
| services.meilisearch.noAnalytics | Deactivates analytics
|
| security.acme.maxConcurrentRenewals | Maximum number of concurrent certificate generation or renewal jobs
|
| networking.firewall.extraCommands | Additional shell commands executed as part of the firewall
initialisation script
|
| services.minidlna.settings.wide_links | Set this to yes to allow symlinks that point outside user-defined media_dir.
|
| services.plex.accelerationDevices | A list of device paths to hardware acceleration devices that Plex should
have access to
|
| services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| services.adguardhome.mutableSettings | Allow changes made on the AdGuard Home web interface to persist between
service restarts.
|
| networking.firewall.extraReversePathFilterRules | Additional nftables rules to be appended to the rpfilter-allow
chain
|
| services.tt-rss.registration.enable | Allow users to register themselves
|
| services.firezone.server.openClusterFirewall | Opens up the erlang distribution port of all enabled components to
allow reaching the server cluster from the internet
|
| services.opensnitch.settings.DefaultAction | Default action whether to block or allow application internet
access.
|
| services.nextcloud.appstoreEnable | Allow the installation and updating of apps from the Nextcloud appstore
|
| services.yggdrasil.settings.AllowedPublicKeys | List of peer public keys to allow incoming peering connections from
|
| services.jupyterhub.jupyterhubEnv | Python environment to run jupyterhub
Customizing will affect the packages available in the hub and
proxy
|
| services.epgstation.settings.encodeProcessNum | The maximum number of processes that EPGStation would allow to run
at the same time for encoding or streaming videos.
|
| services.usbguard.presentControllerPolicy | How to treat USB controller devices that are already connected when
the daemon starts
|
| virtualisation.incus.softDaemonRestart | Allow for incus.service to be stopped without affecting running instances.
|
| services.chrony.initstepslew.enabled | DEPRECATED
|
| services.factorio.requireUserVerification | When set to true, the server will only allow clients that have a valid factorio.com account.
|
| services.pretix.settings.pretix.registration | Whether to allow registration of new admin users.
|
| services.wstunnel.servers.<name>.settings.restrict-to | Restrictions on the connections that the server will accept
|
| virtualisation.kvmgt.enable | Whether to enable KVMGT (iGVT-g) VGPU support
|
| services.beesd.filesystems.<name>.spec | Description of how to identify the filesystem to be duplicated by this
instance of bees
|
| services.home-assistant.lovelaceConfigWritable | Whether to make ui-lovelace.yaml writable
|
| networking.wireless.userControlled | Allow users of the wpa_supplicant group to control wpa_supplicant
through wpa_gui or wpa_cli
|
| networking.ipips.<name>.encapsulation.limit | For an IPv6-based tunnel, the maximum number of nested
encapsulation to allow. 0 means no nesting, "none" unlimited.
|
| services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| services.resolved.dnsovertls | If set to
"true":
all DNS lookups will be encrypted
|
| services.firewalld.settings.StrictForwardPorts | If enabled, the generated destination NAT (DNAT) rules will NOT accept traffic that was DNAT'd by other entities, e.g. docker
|
| services.cloudflared.tunnels.<name>.originRequest.noTLSVerify | Disables TLS verification of the certificate presented by your origin
|
| services.plausible.server.disableRegistration | Whether to prohibit creating an account in plausible's UI or allow on invite_only.
|
| services.rutorrent.nginx.exposeInsecureRPC2mount | If you do not enable one of the rpc or httprpc plugins you need to expose an RPC mount through scgi using this option
|
| networking.wireless.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| services.tarsnap.keyfile | The keyfile which associates this machine with your tarsnap
account
|
| services.resolved.dnssec | If set to
"true":
all DNS lookups are DNSSEC-validated locally (excluding
LLMNR and Multicast DNS)
|
| services.dendrite.environmentFile | Environment file as defined in systemd.exec(5)
|
| services.pgbouncer.settings.pgbouncer.max_db_connections | Do not allow more than this many server connections per database (regardless of user)
|
| services.discourse.database.ignorePostgresqlVersion | Whether to allow other versions of PostgreSQL than the
recommended one
|
| services.wyoming.faster-whisper.servers.<name>.useTransformers | Whether to provide the dependencies to allow using transformer models.
|
| networking.supplicant.<name>.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| documentation.man.mandoc.cachePath | Change the paths where mandoc makewhatis(8)generates the
manual page index caches. documentation.man.generateCaches
should be enabled to allow cache generation
|
| virtualisation.docker.daemon.settings.live-restore | Allow dockerd to be restarted without affecting running container
|
| services.mchprs.settings.block_in_hitbox | Allow placing blocks inside of players
(hitbox logic is simplified)
|
| security.agnos.settings.dns_listen_addr | Address for agnos to listen on
|
| services.hostapd.radios.<name>.networks.<name>.dynamicConfigScripts | All of these scripts will be executed in lexicographical order before hostapd
is started, right after the bss segment was generated and may dynamically
append bss options to the generated configuration file
|
| virtualisation.virtualbox.host.enableWebService | Build VirtualBox web service tool (vboxwebsrv) to allow managing VMs via other webpage frontend tools
|
| services.pgbouncer.settings.pgbouncer.max_user_connections | Do not allow more than this many server connections per user (regardless of database)
|
| services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| services.postgresql.systemCallFilter.<name>.priority | Set the priority of the system call filter setting
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.ports | Either a single port or port range to allow
|
| services.hercules-ci-agent.settings.concurrentTasks | Number of tasks to perform simultaneously
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters.*.protocol | The protocol to allow
|
| services.postgresql.systemCallFilter | Configures the syscall filter for postgresql.service
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saeAddToMacAllow | If set, all sae password entries that have a non-wildcard MAC associated to
them will additionally be used to populate the MAC allow list
|
| virtualisation.oci-containers.containers.<name>.volumes | List of volumes to attach to this container
|
| services.grafana.provision.datasources.settings.datasources.*.editable | Allow users to edit datasources from the UI.
|
| services.xserver.windowManager.xmonad.config | Configuration from which XMonad gets compiled
|
| services.pgbouncer.settings.pgbouncer.default_pool_size | How many server connections to allow per user/database pair
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.copy_dscp | Whether to copy the DSCP (Differentiated Services Field Codepoint)
header field to/from the outer IP header in tunnel mode
|
| services.strongswan-swanctl.swanctl.connections.<name>.childless | Use childless IKE_SA initiation (allow, prefer, force or never)
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_id | The project_id and project_name fields are optional for the Identity V2 API
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name | The project_id and project_name fields are optional for the Identity V2 API
|
| services.pgbouncer.settings.pgbouncer.ignore_startup_parameters | By default, PgBouncer allows only parameters it can keep track of in startup packets:
client_encoding, datestyle, timezone and standard_conforming_strings
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_id | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| services.prometheus.exporters.wireguard.singleSubnetPerField | By default, all allowed IPs and subnets are comma-separated in the
allowed_ips field
|
| system.autoUpgrade.rebootWindow | Define a lower and upper time value (in HH:MM format) which
constitute a time window during which reboots are allowed after an upgrade
|
| services.bind.cacheNetworks | What networks are allowed to use us as a resolver
|
| services.prometheus.exporters.mail.configuration.servers | List of servers that should be probed.
Note: if your mailserver has rspamd(8) configured,
it can happen that emails from this exporter are marked as spam
|
| services.quicktun.<name>.timeWindow | Allowed time window for first received packet in seconds (positive number allows packets from history)
|
| services.avahi.denyInterfaces | List of network interfaces that should be ignored by the
avahi-daemon
|
| networking.firewall.pingLimit | If pings are allowed, this allows setting rate limits on them
|
| services.rauc.bundleFormats | Allowable formats for the RAUC bundle.
|
| services.oauth2-proxy.tls.httpsAddress | addr:port to listen on for HTTPS clients
|
| services.borgbackup.repos.<name>.quota | Storage quota for the repository
|
| services.artalk.settings | The artalk configuration
|
| services.movim.podConfig.xmppwhitelist | The allowlisted XMPP servers
|
| services.hostapd.radios.<name>.networks.<name>.authentication.pairwiseCiphers | Set of accepted cipher suites (encryption algorithms) for pairwise keys (unicast packets)
|
| services.yggdrasil.openMulticastPort | Whether to open the UDP port used for multicast peer discovery
|
| lib | This option allows modules to define helper functions, constants, etc.
|
| nix.sshServe.keys | A list of SSH public keys allowed to access the binary cache via SSH.
|
| services.grafana.settings.users.auto_assign_org | Set to true to automatically add new users to the main organization (id 1)
|
| security.doas.extraRules.*.cmd | The command the user is allowed to run
|
| services.nylon.<name>.deniedIPRanges | Denied client IP ranges, these gets evaluated after the allowed IP ranges, defaults to all IPv4 addresses:
[ "0.0.0.0/0" ]
To block all other access than the allowed.
|
| services.rustus.cors | list of origins allowed to upload
|
| nix.sshServe.write | Whether to enable writing to the Nix store as a remote store via SSH
|
| containers | A set of NixOS system configurations to be run as lightweight
containers
|
| programs.fuse.mountMax | Set the maximum number of FUSE mounts allowed to non-root users.
|
| services.uptimed.enable | Enable uptimed, allowing you to track
your highest uptimes.
|
| programs.ssh.ciphers | Specifies the ciphers allowed and their order of preference.
|
| services.murmur.users | Maximum number of concurrent clients allowed.
|
| users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| users.users.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| security.doas.extraConfig | Extra configuration text appended to doas.conf
|
| services.cfssl.mutualTlsCn | Mutual TLS - regex for whitelist of allowed client CNs.
|
| services.sanoid.extraArgs | Extra arguments to pass to sanoid
|
| users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| security.ipa.ifpAllowedUids | A list of users allowed to access the ifp dbus interface.
|
| services.molly-brown.certPath | Path to TLS certificate
|
| services.pihole-ftl.lists.*.type | Whether domains on this list should be explicitly allowed, or blocked
|
| users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| services.openssh.banner | Message to display to the remote user before authentication is allowed.
|
| services.btrbk.sshAccess.*.key | SSH public key allowed to login as user btrbk to run remote backups.
|
| services.maddy.localDomains | Define list of allowed domains.
|
| services.tinyproxy.settings.Anonymous | If an Anonymous keyword is present, then anonymous proxying is enabled
|
| users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| services.soju.httpOrigins | List of allowed HTTP origins for WebSocket listeners
|
| services.sftpgo.extraReadWriteDirs | Extra directories where SFTPGo is allowed to write to.
|
| services.coturn.secure-stun | Require authentication of the STUN Binding request
|
| security.doas.extraRules | Define specific rules to be set in the
/etc/doas.conf file
|
| services.rustdesk-server.enable | Whether to enable RustDesk, a remote access and remote control software, allowing maintenance of computers and other devices.
|
| services.nginx.sslProtocols | Allowed TLS protocol versions.
|
| services.spiped.config.<name>.maxConns | Limit on the number of simultaneous connections allowed.
|
| security.audit.backlogLimit | The maximum number of outstanding audit buffers allowed; exceeding this is
considered a failure and handled in a manner specified by failureMode.
|
| services.avahi.reflector | Reflect incoming mDNS requests to all allowed network interfaces.
|
| services.httpd.sslProtocols | Allowed SSL/TLS protocol versions.
|
| services.tt-rss.email.security | Used to select a secure SMTP connection
|
| services.sanoid.settings | Free-form settings written directly to the config file
|
| boot.loader.efi.canTouchEfiVariables | Whether the installation process is allowed to modify EFI boot variables.
|
| services.avahi.enable | Whether to run the Avahi daemon, which allows Avahi clients
to use Avahi's service discovery facilities and also allows
the local machine to advertise its presence and services
(through the mDNS responder implemented by avahi-daemon).
|
| services.blendfarm.openFirewall | Whether to enable allowing blendfarm network access through the firewall.
|
| services.i2pd.inTunnels.<name>.accessList | I2P nodes that are allowed to connect to this service.
|
| hardware.enableAllFirmware | Whether to enable all firmware, including unfree packages that must be explictly allowed
|
| networking.ipips | This option allows you to define interfaces encapsulating IP
packets within IP packets; which should be automatically created
|
| services.openssh.settings.Macs | Allowed MACs
Defaults to recommended settings from both
https://stribika.github.io/2015/01/04/secure-secure-shell.html
and
https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67
|
| boot.binfmt.addEmulatedSystemsToNixSandbox | Whether to add the boot.binfmt.emulatedSystems to nix.settings.extra-platforms
|
| services.pipewire.systemWide | If true, a system-wide PipeWire service and socket is enabled
allowing all users in the "pipewire" group to use it simultaneously
|
| services.kbfs.enableRedirector | Whether to enable the Keybase root redirector service, allowing
any user to access KBFS files via /keybase,
which will show different contents depending on the requester.
|
| services.postfix.networks | Net masks for trusted - allowed to relay mail to third parties -
hosts
|
| services.tailscale.permitCertUid | Username or user ID of the user allowed to to fetch Tailscale TLS certificates for the node.
|
| services.murmur.autobanAttempts | Number of attempts a client is allowed to make in
autobanTimeframe seconds, before being
banned for autobanTime.
|
| services.ostinato.portList.include | For a port to pass the filter and appear on the port list managed
by drone, it be allowed by this include list.
|
| hardware.tuxedo-drivers.settings.fn-lock | Enables or disables the laptop keyboard's Function (Fn) lock at boot
|
| security.loginDefs.settings.DEFAULT_HOME | Indicate if login is allowed if we can't cd to the home directory.
|
| services.oauth2-proxy.email.addresses | Line-separated email addresses that are allowed to authenticate.
|
| boot.kernel.sysfs | sysfs attributes to be set as soon as they become available
|
| services.coturn.listening-port | TURN listener port for UDP and TCP
|
| services.openssh.settings.Ciphers | Allowed ciphers
Defaults to recommended settings from both
https://stribika.github.io/2015/01/04/secure-secure-shell.html
and
https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67
|
| services.geoclue2.appConfig.<name>.isAllowed | Whether the application will be allowed access to location information.
|
| services.openssh.settings.AllowUsers | If specified, login is allowed only for the listed users
|
| services.neo4j.ssl.policies.<name>.ciphers | Restrict the allowed ciphers of this policy to those defined
here
|
| services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| services.snowflake-proxy.capacity | Limits the amount of maximum concurrent clients allowed.
|
| services.nylon.<name>.nrConnections | The number of allowed simultaneous connections to the daemon, default 10.
|
| services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| security.googleOsLogin.enable | Whether to enable Google OS Login
|
| services.traefik.dynamic.files | Dynamic configuration files to write
|
| programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| services.gotenberg.chromium.disableRoutes | Disable all routes allowing Chromium-based conversion.
|
| services.cassandra.jmxRoles | Roles that are allowed to access the JMX (e.g. nodetool)
BEWARE: The passwords will be stored world readable in the nix store
|
| services.snapper.configs.<name>.ALLOW_GROUPS | List of groups allowed to operate with the config
|
| services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| services.pdfding.consume.enable | Bulk PDF import from consume directory
|
| services.openssh.settings.AllowGroups | If specified, login is allowed only for users part of the
listed groups
|
| services.gnome.gnome-browser-connector.enable | Whether to enable native host connector for the GNOME Shell browser extension, a DBus service
allowing to install GNOME Shell extensions from a web browser
.
|
| networking.interfaces.<name>.virtualOwner | In case of a virtual device, the user who owns it.
null will not set owner, allowing access to any user.
|
| services.paperless.exporter.onCalendar | When to run the exporter
|
| services.portunus.dex.oidcClients | List of OIDC clients
|
| services.mtprotoproxy.users | Allowed users and their secrets
|
| networking.defaultGatewayWindowSize | The window size of the default gateway
|
| services.nginx.tailscaleAuth.expectedTailnet | If you want to prevent node sharing from allowing users to access services
across tailnets, declare your expected tailnets domain here.
|
| services.kerberos_server.settings.realms.<name>.acl.*.access | The changes the principal is allowed to make.
The "all" permission does not imply the "get-keys" permission
|
| services.umurmur.settings.max_users | Maximum number of concurrent clients allowed.
|
| services.gitlab.sidekiq.memoryKiller.maxMemory | The maximum amount of memory, in MiB, a Sidekiq worker is
allowed to consume before being killed.
|
| services.openssh.settings.GatewayPorts | Specifies whether remote hosts are allowed to connect to
ports forwarded for the client
|
| services.nsd.ratelimit.ratelimit | Max qps allowed from any query source.
0 means unlimited
|
| services.rabbitmq.unsafeCookie | Erlang cookie is a string of arbitrary length which must
be the same for several nodes to be allowed to communicate
|
| services.tt-rss.registration.maxUsers | Maximum amount of users which will be allowed to register on this
system. 0 - no limit.
|
| services.tailscale.derper.verifyClients | Whether to verify clients against a locally running tailscale daemon if they are allowed to connect to this node or not.
|
| services.ferm.config | Verbatim ferm.conf configuration.
|
| services.agate.onlyTls_1_3 | Only use TLSv1.3 (default also allows TLSv1.2).
|
| services.cjdns.authorizedPasswords | Any remote cjdns nodes that offer these passwords on
connection will be allowed to route through this node.
|
| services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| services.reaction.runAsRoot | Whether to run reaction as root
|
| services.diod.exports | List the file systems that clients will be allowed to mount
|
| services.gitlab.sidekiq.memoryKiller.shutdownWait | The time allowed for all jobs to finish before Sidekiq is
killed forcefully.
|
| services.gotenberg.libreoffice.disableRoutes | Disable all routes allowing LibreOffice-based conversion.
|
| services.nntp-proxy.upstreamMaxConnections | Upstream server maximum allowed concurrent connections
|
| services.cron.systemCronJobs | A list of Cron jobs to be appended to the system-wide
crontab
|
| services.openssh.settings.KexAlgorithms | Allowed key exchange algorithms
Uses the lower bound recommended in both
https://stribika.github.io/2015/01/04/secure-secure-shell.html
and
https://infosec.mozilla.org/guidelines/openssh#modern-openssh-67
|
| services.gitlab-runner.services.<name>.dockerAllowedImages | Whitelist allowed images.
|
| security.sudo.enable | Whether to enable the sudo command, which
allows non-root users to execute commands as root.
|
| security.doas.enable | Whether to enable the doas command, which allows
non-root users to execute commands as root.
|
| services.fwupd.enable | Whether to enable fwupd, a DBus service that allows
applications to update firmware.
|
| hardware.wirelessRegulatoryDatabase | Whether to enable loading the wireless regulatory database at boot.
|
| services.syncthing.settings.folders.<name>.path | The path to the folder which should be shared
|
| virtualisation.libvirtd.qemu.package | The qemu package to use. pkgs.qemu can emulate alien architectures (e.g. aarch64 on x86)
pkgs.qemu_kvm saves disk space allowing to emulate only host architectures.
|
| networking.sits | This option allows you to define interfaces encapsulating IPv6
packets within IPv4 packets; which should be automatically created.
|
| services.foundationdb.extraReadWritePaths | An extra set of filesystem paths that FoundationDB can read to
and write from
|
| services.nix-store-gcs-proxy | An attribute set describing an HTTP to GCS proxy that allows us to use GCS
bucket via HTTP protocol.
|
| services.diod.userdb | This option disables password/group lookups
|
| security.sudo-rs.enable | Whether to enable a memory-safe implementation of the sudo command,
which allows non-root users to execute commands as root
.
|
| boot.kernelPatches | A list of additional patches to apply to the kernel
|
| services.gitlab-runner.services.<name>.dockerAllowedServices | Whitelist allowed services.
|
| services.postfix.settings.main.mynetworks | List of trusted remote SMTP clients, that are allowed to relay mail
|
| hardware.enableRedistributableFirmware | Whether to enable firmware with a license allowing redistribution.
|
| programs.firefox.preferences | Preferences to set from about:config
|
| networking.vswitches.<name>.controllers | Specify the controller targets
|
| services.thanos.store.store.limits.request-samples | The maximum samples allowed for a single Series request
|
| services.znapzend.zetup.<name>.timestampFormat | The timestamp format to use for constructing snapshot names
|
| services.xserver.xrandrHeads | Multiple monitor configuration, just specify a list of XRandR
outputs
|
| services.fediwall.nginx | Allows customizing the nginx virtualHost settings
|
| services.coturn.tls-listening-port | TURN listener port for TLS
|
| security.please.enable | Whether to enable please, a Sudo clone which allows a users to execute a command or edit a
file as another user
.
|
| nix.buildMachines.*.maxJobs | The number of concurrent jobs the build machine supports
|
| services.nsd.ratelimit.whitelistRatelimit | Max qps allowed from whitelisted sources.
0 means unlimited
|
| programs.pmount.enable | Whether to enable pmount, a tool that allows normal users to mount removable devices
without requiring root privileges
.
|
| networking.fooOverUDP | This option allows you to configure Foo Over UDP and Generic UDP Encapsulation
endpoints
|
| services.prometheus.exporters.postfix.group | Group under which the postfix exporter shall be run
|
| services.firefox-syncserver.singleNode.capacity | How many sync accounts are allowed on this server
|
| services.udisks2.enable | Whether to enable udisks2, a DBus service that allows applications to query and manipulate storage devices.
|
| services.openssh.enable | Whether to enable the OpenSSH secure shell daemon, which
allows secure remote logins.
|
| services.swapspace.settings.max_swapsize | Greatest allowed size for individual swapfiles
|
| services.swapspace.settings.min_swapsize | Smallest allowed size for individual swapfiles
|
| services.hostapd.radios.<name>.wifi5.capabilities | VHT (Very High Throughput) capabilities given as a list of flags
|
| services.siproxd.sipDscp | DSCP (differentiated services) value to be assigned
to SIP packets
|
| services.siproxd.rtpDscp | DSCP (differentiated services) value to be assigned
to RTP packets
|
| networking.greTunnels | This option allows you to define Generic Routing Encapsulation (GRE) tunnels.
|
| services.murmur.bonjour | Whether to enable Bonjour auto-discovery, which allows clients over your LAN to automatically discover Mumble servers.
|
| services.hostapd.radios.<name>.wifi4.capabilities | HT (High Throughput) capabilities given as a list of flags
|
| services.nextcloud-spreed-signaling.settings.app.debug | Set to "true" to install pprof debug handlers
|
| networking.macvlans | This option allows you to define macvlan interfaces which should
be automatically created.
|
| networking.vlans | This option allows you to define vlan devices that tag packets
on top of a physical interface
|
| services.oauth2-proxy.keyFile | oauth2-proxy allows passing sensitive configuration via environment variables
|
| services.hostapd.radios.<name>.countryCode | Country code (ISO/IEC 3166-1)
|
| services.oidentd.enable | Whether to enable ‘oidentd’, an implementation of the Ident
protocol (RFC 1413)
|
| containers.<name>.enableTun | Allows the container to create and setup tunnel interfaces
by granting the NET_ADMIN capability and
enabling access to /dev/net/tun.
|
| services.kismet.extraConfig | Literal Kismet config lines appended to the site config
|
| security.wrappers | This option effectively allows adding setuid/setgid bits, capabilities,
changing file ownership and permissions of a program without directly
modifying it
|
| networking.bonds | This option allows you to define bond devices that aggregate multiple,
underlying networking interfaces together
|
| services.knot.keyFiles | A list of files containing additional configuration
to be included using the include directive
|
| services.weechat.headless | Allows specifying if weechat should run in TUI or headless mode.
|
| services.nextcloud-spreed-signaling.backends | A list of backends from which clients are allowed to connect from
|
| security.pam.sshAgentAuth.enable | Whether to enable authenticating using a signature performed by the ssh-agent
|
| services.bitlbee.enable | Whether to run the BitlBee IRC to other chat network gateway
|
| services.nixops-dns.dnsmasq | Enable dnsmasq forwarding to nixops-dns
|
| services.prosody.modules.csi | Implements the CSI protocol that allows clients to report their active/inactive state to the server
|
| services.taler.includes | Files to include into the config file using Taler's @inline@ directive
|
| services.samba.nsswins | Whether to enable WINS NSS (Name Service Switch) plug-in
|
| services.webhook.enable | Whether to enable Webhook, a server written in Go that allows you to create HTTP endpoints (hooks),
which execute configured commands for any person or service that knows the URL
.
|
| services.sabnzbd.settings.misc.bandwidth_perc | Percentage of bandwidth_max that sabnzbd is allowed to use.
0 means no limit.
|
| services.keter.bundle.secretScript | Allows loading of private environment variables
|
| services.firezone.server.provision.accounts.<name>.policies.<name>.group | The group which should be allowed access to the given resource.
|
| services.coturn.no-auth | This option is opposite to lt-cred-mech.
(TURN Server with no-auth option allows anonymous access)
|
| services.consul.leaveOnStop | If enabled, causes a leave action to be sent when closing consul
|
| services.avahi.nssmdns4 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv4
|
| services.rspamd.locals.<name>.enable | Whether this file locals should be generated
|
| nixpkgs.overlays | List of overlays to apply to Nixpkgs
|
| security.auditd.plugins.<name>.args | This allows you to pass arguments to the child program
|
| environment.etc.<name>.enable | Whether this /etc file should be generated
|
| services.keter.bundle.publicScript | Allows loading of public environment variables,
these are emitted to the log so it shouldn't contain secrets.
|
| services.multipath.pathGroups | This option allows you to define multipath groups as described
in http://christophe.varoqui.free.fr/usage.html.
|
| services.nginx.resolver.valid | By default, nginx caches answers using the TTL value of a response
|
| services.thanos.rule.alert.label-drop | Labels by name to drop before sending to alertmanager
|
| boot.initrd.systemd.dmVerity.enable | Mount verity-protected block devices in the initrd
|
| services.multipath.devices | This option allows you to define arrays for use in multipath
groups.
|
| services.openssh.settings.PasswordAuthentication | Specifies whether password authentication is allowed.
|
| networking.bridges | This option allows you to define Ethernet bridge devices
that connect physical networks together
|
| services.firezone.server.provision.accounts.<name>.policies.<name>.resource | The resource to which access should be allowed.
|
| services.matrix-synapse.settings.max_upload_size | The largest allowed upload size in bytes
|
| programs.neovim.runtime.<name>.enable | Whether this runtime directory should be generated
|
| services.umami.settings.BASE_PATH | Allows you to host Umami under a subdirectory
|
| services.thanos.rule.web.route-prefix | Prefix for API and UI endpoints
|
| services.bitlbee.protocols | This option allows to remove the support of protocol, even if compiled
in
|
| security.dhparams.defaultBitSize | This allows to override the default bit size for all of the
Diffie-Hellman parameters set in
security.dhparams.params.
|
| services.syncplay.saltFile | Path to the file that contains the server salt
|
| services.firezone.server.provision.accounts.<name>.resources.<name>.filters | A list of filter to restrict traffic
|
| services.nginx.enableQuicBPF | Enables routing of QUIC packets using eBPF
|
| services.thanos.query.web.route-prefix | Prefix for API and UI endpoints
|
| services.restic.server.appendOnly | Enable append only mode
|
| services.sympa.settingsFile.<name>.enable | Whether this file should be generated
|
| virtualisation.spiceUSBRedirection.enable | Install the SPICE USB redirection helper with setuid
privileges
|
| programs.tuxclocker.useUnfree | Whether to use components requiring unfree dependencies
|
| services.immich.settings | Configuration for Immich
|
| programs.zsh.vteIntegration | Whether to enable Zsh integration for VTE terminals
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.readBuckets | The organization's buckets which should be allowed to be read
|
| services.actkbd.enable | Whether to enable the actkbd key mapping daemon
|
| services.xserver.logFile | Controls the file Xorg logs to
|
| services.xserver.displayManager.lightdm.greeters.gtk.indicators | List of allowed indicator modules to use for the lightdm gtk
greeter panel
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.writeBuckets | The organization's buckets which should be allowed to be written
|
| services.sabnzbd.settings.misc.inet_exposure | Restrictions for access from non-local IP addresses
|
| programs.bash.vteIntegration | Whether to enable Bash integration for VTE terminals
|
| networking.vswitches | This option allows you to define Open vSwitches that connect
physical networks together
|
| services.fwupd.extraTrustedKeys | Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files
|
| services.openssh.settings.KbdInteractiveAuthentication | Specifies whether keyboard-interactive authentication is allowed.
|
| services.caddy.adapter | Name of the config adapter to use
|
| services.rspamd.overrides.<name>.enable | Whether this file overrides should be generated
|
| services.power-profiles-daemon.enable | Whether to enable power-profiles-daemon, a DBus daemon that allows
changing system behavior based upon user-selected power profiles.
|
| services.upower.noPollBatteries | Don't poll the kernel for battery level changes
|
| services.keter.globalKeterConfig.ip-from-header | You want that ip-from-header in the nginx setup case
|
| programs.atop.atopacctService.enable | Whether to enable the atopacct service which manages process accounting
|
| services.systembus-notify.enable | Whether to enable System bus notification support
WARNING: enabling this option (while convenient) should not be done on a
machine where you do not trust the other users as it allows any other
local user to DoS your session by spamming notifications
.
|
| services.pgmanage.tls | These options tell pgmanage where the TLS Certificate and Key files
reside
|
| services.avahi.nssmdns6 | Whether to enable the mDNS NSS (Name Service Switch) plug-in for IPv6
|
| services.umami.settings.TRACKER_SCRIPT_NAME | Allows you to assign a custom name to the tracker script different from the default script.js.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in_sa | Whether to set mark_in on the inbound SA
|
| systemd.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| services.ejabberd.imagemagick | Add ImageMagick to server's path; allows for image thumbnailing
|
| services.spiped.config.<name>.waitForDNS | Wait for DNS
|
| services.mullvad-vpn.enableExcludeWrapper | This option activates the wrapper that allows the use of mullvad-exclude
|
| programs.msmtp.accounts | Named accounts and their respective configurations
|
| services.prosody.modules.bookmarks | Allows interop between older clients that use XEP-0048: Bookmarks in its 1.0 version and recent clients which use it in PEP
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.mac | If this attribute is not included, or if is set to the wildcard address (ff:ff:ff:ff:ff:ff),
the entry is available for any station (client) to use
|
| hardware.alsa.enableRecorder | Whether to set up a loopback device that continuously records and
allows to play back audio from the computer
|
| services.keter.globalKeterConfig.rotate-logs | emits keter logs and it's applications to stderr.
which allows journald to capture them
|
| services.matrix-synapse.extraConfigFiles | Extra config files to include
|
| boot.loader.systemd-boot.netbootxyz.enable | Make netboot.xyz available from the
systemd-boot menu. netboot.xyz
is a menu system that allows you to boot OS installers and
utilities over the network.
|
| systemd.user.services.<name>.reloadIfChanged | Whether the service should be reloaded during a NixOS
configuration switch if its definition has changed
|
| security.pam.services.<name>.startSession | If set, the service will register a new session with
systemd's login manager
|
| boot.kernelPackages | This option allows you to override the Linux kernel used by
NixOS
|
| services.umami.settings.COLLECT_API_ENDPOINT | Allows you to send metrics to a location different than the default /api/send.
|
| services.thanos.rule.web.external-prefix | Static prefix for all HTML links and redirect URLs in the UI query web
interface
|
| services.renovate.credentials | Allows configuring environment variable credentials for renovate, read from files
|
| virtualisation.host.pkgs | Package set to use for the host-specific packages of the VM runner
|
| services.thanos.query.web.external-prefix | Static prefix for all HTML links and redirect URLs in the UI query web
interface
|
| services.wg-access-server.settings.dns.enabled | Enable/disable the embedded DNS proxy server
|
| services.lasuite-docs.collaborationServer.settings.COLLABORATION_SERVER_ORIGIN | Origins allowed to connect to the collaboration server
|
| services.jenkins.jobBuilder.enable | Whether to enable the Jenkins Job Builder (JJB) service
|
| security.acme.certs.<name>.credentialFiles | Environment variables suffixed by "_FILE" to set for the cert's service
for your selected dnsProvider
|
| services.trilium-server.environmentFile | File to load as the environment file
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords | Sets allowed passwords for WPA3-SAE
|
| services.firezone.server.settings | Environment variables for the Firezone server
|
| services.prosody.modules.admin_adhoc | Allows administration via an XMPP client that supports ad-hoc commands
|
| services.prosody.muc.*.tombstones | When a room is destroyed, it leaves behind a tombstone which
prevents the room being entered or recreated
|
| networking.wireless.fallbackToWPA2 | Whether to fall back to WPA2 authentication protocols if WPA3 failed
|
| services.keter.globalKeterConfig.listeners | You want that ip-from-header in
the nginx setup case
|
| services.anuko-time-tracker.settings.multiorgMode | Defines whether users see the Register option in the menu of Time Tracker that allows them
to self-register and create new organizations (top groups).
|
| services.klipper.octoprintIntegration | Allows Octoprint to control Klipper.
|
| virtualisation.useBootLoader | Use a boot loader to boot the system
|
| services.dsnet.settings.ExternalHostname | The hostname that clients should use to connect to this server
|
| services.tarsnap.archives.<name>.cachedir | The cache allows tarsnap to identify previously stored data
blocks, reducing archival time and bandwidth usage
|
| services.tor.relay.role | Your role in Tor network
|
| services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| security.acme.defaults.credentialFiles | Environment variables suffixed by "_FILE" to set for the cert's service
for your selected dnsProvider
|
| services.xserver.displayManager.startx.enable | Whether to enable the dummy "startx" pseudo-display manager, which
allows users to start X manually via the startx command from a
virtual terminal.
The X server will run under the current user, not as root.
|
| services.lighttpd.collectd.collectionCgi | Path to collection.cgi script from (collectd sources)/contrib/collection.cgi
This option allows to use a customized version
|
| services.grafana.settings.security.csrf_trusted_origins | List of additional allowed URLs to pass by the CSRF check
|
| services.pgbouncer.settings.pgbouncer.max_client_conn | Maximum number of client connections allowed
|
| services.hardware.openrgb.motherboard | CPU family of motherboard
|
| documentation.man.generateCaches | Whether to generate the manual page index caches
|
| services.thanos.rule.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| services.maubot.settings.homeservers | Known homeservers
|
| services.meilisearch.dumplessUpgrade | Whether to enable (experimental) dumpless upgrade
|
| services.fail2ban.bantime-increment.enable | "bantime.increment" allows to use database for searching of previously banned ip's to increase
a default ban time using special formula, default it is banTime * 1, 2, 4, 8, 16, 32 ...
|
| virtualisation.xen.enable | Whether to enable the Xen Project Hypervisor, a virtualisation technology defined as a type-1 hypervisor, which allows multiple virtual machines, known as domains, to run concurrently on the physical machine
|
| services.thanos.query.web.prefix-header | Name of HTTP request header used for dynamic prefixing of UI links and
redirects
|
| services.strongswan-swanctl.swanctl.connections.<name>.proposals | A proposal is a set of algorithms
|
| services.hostapd.radios | This option allows you to define APs for one or multiple physical radios
|
| services.firezone.server.settingsSecret | This is a convenience option which allows you to set secret values for
environment variables by specifying a file which will contain the value
at runtime
|
| services.matrix-synapse.settings.presence.enabled | Whether to enable presence tracking
|
| virtualisation.forwardPorts | When using the SLiRP user networking (default), this option allows to
forward ports to/from the host/guest.
If the NixOS firewall on the virtual machine is enabled, you also
have to open the guest ports to enable the traffic between host and
guest.
Currently QEMU supports only IPv4 forwarding.
|
| services.coturn.use-auth-secret | TURN REST API flag
|
| services.prometheus.exporters.chrony.user | User name under which the chrony exporter shall be run
|
| services.alloy.configPath | Alloy configuration file/directory path
|
| virtualisation.libvirtd.qemu.swtpm.enable | Allows libvirtd to use swtpm to create an emulated TPM.
|
| virtualisation.libvirtd.qemu.ovmf.enable | Allows libvirtd to take advantage of OVMF when creating new
QEMU VMs with UEFI boot.
|
| services.libinput.mouse.accelProfile | Sets the pointer acceleration profile to the given profile
|
| services.prometheus.exporters.chrony.group | Group under which the chrony exporter shall be run
|
| services.mastodon.elasticsearch.prefix | If provided, adds a prefix to indexes in Elasticsearch
|
| services.xserver.displayManager.sx.enable | Whether to enable the "sx" pseudo-display manager, which allows users
to start manually via the "sx" command from a vt shell
|
| services.kanidm.provision.systems.oauth2.<name>.enableLegacyCrypto | Enable legacy crypto on this client
|
| services.matrix-synapse.enableRegistrationScript | Whether to install the register_new_matrix_user script, that
allows account creation on the terminal.
This script does not work when the client listener uses UNIX domain sockets
|
| services.keepalived.vrrpInstances.<name>.noPreempt | VRRP will normally preempt a lower priority machine when a higher
priority machine comes online. "nopreempt" allows the lower priority
machine to maintain the master role, even when a higher priority machine
comes back online
|
| services.grafana.settings.security.csrf_additional_headers | List of allowed headers to be set by the user
|
| services.libinput.touchpad.accelProfile | Sets the pointer acceleration profile to the given profile
|
| services.kanidm.provision.groups.<name>.overwriteMembers | Whether the member list should be overwritten each time (true) or appended
(false)
|
| boot.binfmt.registrations.<name>.wrapInterpreterInShell | Whether to wrap the interpreter in a shell script
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.ah_proposals | AH proposals to offer for the CHILD_SA
|
| virtualisation.podman.networkSocket.enable | Make the Podman and Docker compatibility API available over the network
with TLS client certificate authentication
|
| services.grafana-image-renderer.settings.rendering.mode | Rendering mode of grafana-image-renderer:
default: Creates on browser-instance
per rendering request.
reusable: One browser instance
will be started and reused for each rendering request.
clustered: allows to precisely
configure how many browser-instances are supposed to be used
|
| services.jellyfin.forceEncodingConfig | Whether to overwrite Jellyfin's encoding.xml configuration file on each service start
|
| _module.args | Additional arguments passed to each module in addition to ones
like lib, config,
and pkgs, modulesPath
|
| services.earlyoom.enableNotifications | Send notifications about killed processes via the system d-bus
|
| services.suricata.settings.dpdk | Data Plane Development Kit is a framework for fast packet processing in data plane applications running on a wide variety of CPU architectures
|
| services.postgresqlWalReceiver.receivers.<name>.statusInterval | Specifies the number of seconds between status packets sent back to the server
|
| services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| services.dependency-track.oidc.userProvisioning | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| services.smartd.notifications.systembus-notify.enable | Whenever to send systembus-notify notifications
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.esp_proposals | ESP proposals to offer for the CHILD_SA
|
| services.grafana.settings.security.data_source_proxy_whitelist | Define a whitelist of allowed IP addresses or domains, with ports,
to be used in data source URLs with the Grafana data source proxy
|
| networking.wireguard.interfaces.<name>.dynamicEndpointRefreshSeconds | Periodically refresh the endpoint hostname or address for all peers
|
| services.strongswan-swanctl.swanctl.connections.<name>.mobike | Enables MOBIKE on IKEv2 connections
|
| services.strongswan-swanctl.swanctl.connections.<name>.aggressive | Enables Aggressive Mode instead of Main Mode with Identity
Protection
|
| services.dependency-track.settings."alpine.oidc.user.provisioning" | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| services.matrix-synapse.settings.url_preview_ip_range_whitelist | List of IP address CIDR ranges that the URL preview spider is allowed
to access even if they are specified in url_preview_ip_range_blacklist.
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_in | XFRM interface ID set on inbound policies/SA
|
| services.postfix.settings.main.recipient_delimiter | Set of characters used as the delimiters for address extensions
|
| services.strongswan-swanctl.swanctl.authorities.<name>.cert_uri_base | Defines the base URI for the Hash and URL feature supported by
IKEv2
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.if_id_out | XFRM interface ID set on outbound policies/SA
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_out | Netfilter mark and mask for output traffic
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.mark_in | Netfilter mark and mask for input traffic
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.per_cpu_sas | Enable per-CPU CHILD_SAs
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.set_mark_out | Netfilter mark applied to packets after the outbound IPsec SA processed
them
|
| services.grafana.settings.security.content_security_policy | Set to true to add the Content-Security-Policy header to your requests
|
| services.nextcloud.settings.mail_send_plaintext_only | Email will be sent by default with an HTML and a plain text body
|
| services.strongswan-swanctl.swanctl.connections.<name>.children.<name>.local_ts | List of local traffic selectors to include in CHILD_SA
|
| services.matrix-synapse.settings.registration_shared_secret | If set, allows registration by anyone who also has the shared
secret, even if registration is otherwise disabled
|