| services.code-server.auth | The type of authentication to use.
|
| programs.ente-auth.enable | Whether to enable Ente Auth.
|
| services.coturn.no-auth | This option is opposite to lt-cred-mech.
(TURN Server with no-auth option allows anonymous access)
|
| services.i2pd.proto.http.auth | Whether to enable webconsole authentication.
|
| programs.ente-auth.package | The ente-auth package to use.
|
| services.gns3-server.auth.user | Username used to access the GNS3 Server.
|
| services.tt-rss.auth.autoCreate | Allow authentication modules to auto-create users in tt-rss internal
database when authenticated successfully.
|
| services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| services.gns3-server.auth.enable | Whether to enable password based HTTP authentication to access the GNS3 Server.
|
| services.yarr.authFilePath | Path to a file containing username:password. null means no authentication required to use the service.
|
| services.tor.settings.HidServAuth.*.auth | Authentication cookie.
|
| services.freeciv.settings.auth | Whether to enable server authentication.
|
| services.nipap.settings.auth.auth_cache_timeout | Seconds to store cached auth entries for.
|
| services.calibre-server.auth.mode | Choose the type of authentication used
|
| services.oauth2-proxy.setXauthrequest | Set X-Auth-Request-User and X-Auth-Request-Email response headers (useful in Nginx auth_request mode)
|
| services.calibre-server.auth.enable | Password based authentication to access the server
|
| services.calibre-server.auth.userDb | Choose users database file to use for authentication
|
| services.freshrss.authType | Authentication type for FreshRSS.
|
| services.deluge.authFile | The file managing the authentication for deluge, the format of this
file is straightforward, each line contains a
username:password:level tuple in plaintext
|
| services.tailscale.authKeyFile | A file containing the auth key
|
| services.microsocks.authOnce | If true, once a specific ip address authed successfully with user/pass,
it is added to a whitelist and may use the proxy without auth.
|
| services._3proxy.services.*.auth | Authentication type
|
| services.diod.authRequired | Allow clients to connect without authentication, i.e. without a valid MUNGE credential.
|
| services.gns3-server.auth.passwordFile | A file containing the password to access the GNS3 Server.
This should be a string, not a nix path, since nix paths
are copied into the world-readable nix store.
|
| services.xserver.displayManager.xpra.auth | Authentication to use when connecting to xpra
|
| services.bitlbee.authBackend | How users are authenticated
storage -- save passwords internally
pam -- Linux PAM authentication
|
| services.hqplayerd.auth.password | Password used for HQPlayer's WebUI
|
| services.hqplayerd.auth.username | Username used for HQPlayer's WebUI
|
| services.geth.<name>.authrpc.port | Port number of Go Ethereum Auth RPC API.
|
| services.bitlbee.authMode | The following authentication modes are available:
Open -- Accept connections from anyone, use NickServ for user authentication
|
| services.coturn.static-auth-secret-file | Path to the file containing the static authentication secret.
|
| services.openvpn.servers.<name>.authUserPass | This option can be used to store the username / password credentials
with the "auth-user-pass" authentication method
|
| services.tailscale.authKeyParameters | Extra parameters to pass after the auth key
|
| services.geth.<name>.authrpc.enable | Whether to enable Go Ethereum Auth RPC API.
|
| services.coturn.use-auth-secret | TURN REST API flag
|
| services.tor.relay.onionServices.<name>.authorizeClient.authType | Either "basic" for a general-purpose authorization protocol
or "stealth" for a less scalable protocol
that also hides service activity from unauthorized clients.
|
| services.nipap.authBackendSettings | auth.backends options to set in /etc/nipap/nipap.conf.
|
| services.oauth2-proxy.passBasicAuth | Pass HTTP Basic Auth, X-Forwarded-User and X-Forwarded-Email information to upstream.
|
| services.geth.<name>.authrpc.address | Listen address of Go Ethereum Auth RPC API.
|
| services.ceph.global.authClientRequired | Enables requiring the cluster to authenticate itself to the client.
|
| services.coturn.static-auth-secret | 'Static' authentication secret value (a string) for TURN REST API only
|
| services.firezone.server.provision.accounts.<name>.auth.<name>.adapter | The auth adapter type
|
| networking.wireless.networks.<name>.auth | Use this option to configure advanced authentication methods
like EAP
|
| services.ceph.global.authClusterRequired | Enables requiring daemons to authenticate with eachother in the cluster.
|
| services.simplesamlphp.<name>.authSources | Auth sources options used by SimpleSAMLphp.
|
| services.microsocks.authUsername | Optional username to use for authentication.
|
| services.ceph.global.authServiceRequired | Enables requiring clients to authenticate with the cluster to access services in the cluster (e.g. radosgw, mds or osd).
|
| services.nipap.settings.auth.default_backend | Name of auth backend to use by default.
|
| services.mosquitto.listeners.*.authPlugins.*.options | Options for the auth plugin
|
| services.microsocks.authPasswordFile | Path to a file containing the password for authentication.
|
| services.firezone.server.provision.accounts.<name>.auth | All authentication providers to provision
|
| services.oauth2-proxy.basicAuthPassword | The password to set when passing the HTTP Basic Auth header.
|
| services.firezone.server.provision.accounts.<name>.auth.<name>.name | The name of this authentication provider
|
| services.saslauthd.mechanism | Auth mechanism to use
|
| services.tailscale.authKeyParameters.preauthorized | Whether to skip manual device approval.
|
| services.openvpn.servers.<name>.authUserPass.username | The username to store inside the credentials file.
|
| services.openvpn.servers.<name>.authUserPass.password | The password to store inside the credentials file.
|
| services.oauth2-proxy.tls.key | Path to private key file.
|
| services.tailscale.authKeyParameters.baseURL | Base URL for the Tailscale API.
|
| services.oauth2-proxy.scope | OAuth scope specification.
|
| services.mosquitto.listeners.*.authPlugins | Authentication plugin to attach to this listener
|
| services.gitlab.pages.settings | Configuration options to set in the GitLab Pages config
file
|
| security.pam.dp9ik.authserver | This controls the hostname for the 9front authentication server
that users will be authenticated against.
|
| services.oauth2-proxy.enable | Whether to enable oauth2-proxy.
|
| services.oauth2-proxy.clientID | The OAuth Client ID.
|
| services.mosquitto.listeners.*.authPlugins.*.plugin | Plugin path to load, should be a .so file.
|
| security.pam.u2f.settings.authfile | By default pam-u2f module reads the keys from
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set)
|
| services.oauth2-proxy.tls.enable | Whether to serve over TLS.
|
| services.chisel-server.authfile | Path to auth.json file
|
| services.oauth2-proxy.github.org | Restrict logins to members of this organisation.
|
| services.geth.<name>.authrpc.vhosts | List of virtual hostnames from which to accept requests.
|
| services.oauth2-proxy.keyFile | oauth2-proxy allows passing sensitive configuration via environment variables
|
| services.oauth2-proxy.package | The oauth2-proxy package to use.
|
| networking.wireless.networks.<name>.authProtocols | The list of authentication protocols accepted by this network
|
| services.oauth2-proxy.oidcIssuerUrl | The OAuth issuer URL.
|
| services.oauth2-proxy.cookie.name | The name of the cookie that the oauth_proxy creates.
|
| services.oauth2-proxy.github.team | Restrict logins to members of this team.
|
| services.oauth2-proxy.nginx.proxy | The address of the reverse proxy endpoint for oauth2-proxy
|
| services.oauth2-proxy.profileURL | Profile access endpoint.
|
| services.tailscale.authKeyParameters.ephemeral | Whether to register as an ephemeral node.
|
| services.oauth2-proxy.loginURL | Authentication endpoint
|
| services.oauth2-proxy.proxyPrefix | The url root path that this proxy should be nested under.
|
| services.oauth2-proxy.extraConfig | Extra config to pass to oauth2-proxy.
|
| services.outline.oidcAuthentication.authUrl | OIDC authentication URL endpoint.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.auth | Authentication to expect from remote
|
| boot.initrd.network.ssh.authorizedKeys | Authorized keys for the root user on initrd
|
| services.oauth2-proxy.passHostHeader | Pass the request Host Header to upstream.
|
| services.oauth2-proxy.provider | OAuth provider.
|
| services.oauth2-proxy.cookie.httpOnly | Set HttpOnly cookie flag.
|
| services.mosquitto.listeners.*.authPlugins.*.denySpecialChars | Automatically disallow all clients using #
or + in their name/id.
|
| services.oauth2-proxy.clientSecret | The OAuth Client Secret.
|
| services.oauth2-proxy.azure.tenant | Go to a tenant-specific or common (tenant-independent) endpoint.
|
| services.saslauthd.config | Configuration to use for Cyrus SASL authentication daemon.
|
| services.oauth2-proxy.cookie.expire | Expire timeframe for cookie.
|
| services.saslauthd.enable | Whether to enable saslauthd, the Cyrus SASL authentication daemon.
|
| services.oauth2-proxy.redirectURL | The OAuth2 redirect URL.
|
| boot.initrd.network.ssh.authorizedKeyFiles | Authorized keys taken from files for the root user on initrd
|
| services.oauth2-proxy.redeemURL | Token redemption endpoint
|
| services.oauth2-proxy.cookie.secret | The seed string for secure cookies.
|
| services.oauth2-proxy.google.groups | Restrict logins to members of these Google groups.
|
| services.oauth2-proxy.cookie.secure | Set secure (HTTPS) cookie flag.
|
| services.oauth2-proxy.skipAuthRegexes | Skip authentication for requests matching any of these regular
expressions.
|
| services.oauth2-proxy.email.domains | Authenticate emails with the specified domains
|
| services.saslauthd.package | The bin package to use.
|
| services.oauth2-proxy.passAccessToken | Pass OAuth access_token to upstream via X-Forwarded-Access-Token header.
|
| services.oauth2-proxy.clientSecretFile | The path to a file containing the OAuth Client Secret.
|
| services.oauth2-proxy.httpAddress | HTTPS listening address
|
| services.oauth2-proxy.upstream | The http url(s) of the upstream endpoint or file://
paths for static files
|
| services.iperf3.authorizedUsersFile | Path to the configuration file containing authorized users credentials to run iperf tests.
|
| services.nipap.nipap-www.xmlrpcURIFile | Path to file containing XMLRPC URI for use by web UI - this is a secret, since it contains auth credentials
|
| services.oauth2-proxy.azure.resource | The resource that is protected.
|
| services.oauth2-proxy.cookie.refresh | Refresh the cookie after this duration; 0 to disable.
|
| services.oauth2-proxy.cookie.secretFile | The path to a file containing the seed string for secure cookies.
|
| services.geth.<name>.authrpc.jwtsecret | Path to a JWT secret for authenticated RPC endpoint.
|
| services.oauth2-proxy.requestLogging | Log requests to stdout.
|
| services.oauth2-proxy.approvalPrompt | OAuth approval_prompt.
|
| services.oauth2-proxy.signatureKey | GAP-Signature request signature key.
|
| services.oauth2-proxy.htpasswd.file | Additionally authenticate against a htpasswd file
|
| services.oauth2-proxy.tls.httpsAddress | addr:port to listen on for HTTPS clients
|
| services.oauth2-proxy.cookie.domain | Optional cookie domains to force cookies to (ie: .yourcompany.com)
|
| services.oauth2-proxy.nginx.domain | The domain under which the oauth2-proxy will be accesible and the path of cookies are set to
|
| services.prometheus.exporters.collectd.collectdBinary.authFile | File mapping user names to pre-shared keys (passwords).
|
| services.authelia.instances | Multi-domain protection currently requires multiple instances of Authelia
|
| services.oauth2-proxy.validateURL | Access token validation endpoint
|
| services.authelia.instances.<name>.user | The name of the user for this authelia instance.
|
| services.opkssh.authorizations | User authorization mappings
|
| services.opkssh.authorizations.*.user | Linux user to authorize
|
| services.sftpgo.settings.smtp.auth_type |
0: Plain
1: Login
2: CRAM-MD5
|
| services.oauth2-proxy.reverseProxy | In case when running behind a reverse proxy, controls whether headers
like X-Real-Ip are accepted
|
| services.oauth2-proxy.email.addresses | Line-separated email addresses that are allowed to authenticate.
|
| services.authelia.instances.<name>.group | The name of the group for this authelia instance.
|
| services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| services.oauth2-proxy.nginx.virtualHosts | Nginx virtual hosts to put behind the oauth2 proxy
|
| services.prosody.modules.saslauth | Authentication for clients and servers
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.auth | Authentication to perform locally.
- The default
pubkey uses public key authentication
using a private key associated to a usable certificate.
psk uses pre-shared key authentication.
- The IKEv1 specific
xauth is used for XAuth or Hybrid
authentication,
- while the IKEv2 specific
eap keyword defines EAP
authentication.
- For
xauth, a specific backend name may be appended,
separated by a dash
|
| services.grafana-to-ntfy.settings.bauthPass | The path to the password you will use in the Grafana webhook settings.
|
| services.firezone.server.provision.accounts.<name>.auth.<name>.adapter_config.clientSecretFile | A file containing a the client secret for an openid_connect adapter
|
| services.oauth2-proxy.customTemplatesDir | Path to custom HTML templates.
|
| services.authelia.instances.<name>.enable | Whether to enable Authelia instance.
|
| services.cjdns.authorizedPasswords | Any remote cjdns nodes that offer these passwords on
connection will be allowed to route through this node.
|
| users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| services.authelia.instances.<name>.name | Name is used as a suffix for the service name, user, and group
|
| services.oauth2-proxy.google.adminEmail | The Google Admin to impersonate for API calls
|
| services.openssh.authorizedKeysCommandUser | Specifies the user under whose account the AuthorizedKeysCommand
is run
|
| services.prosody.authentication | Authentication mechanism used for logins.
|
| services.grafana-to-ntfy.settings.bauthUser | The user that you will authenticate with in the Grafana webhook settings
|
| services.mastodon.smtp.authenticate | Authenticate with the SMTP server using username and password.
|
| services.gitlab.smtp.authentication | Authentication type to use, see http://api.rubyonrails.org/classes/ActionMailer/Base.html
|
| services.authelia.instances.<name>.package | The authelia package to use.
|
| services.opkssh.authorizations.*.issuer | Issuer URI
|
| services.openssh.authorizedKeysCommand | Specifies a program to be used to look up the user's public
keys
|
| services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| services.oauth2-proxy.htpasswd.displayForm | Display username / password login form if an htpasswd file is provided.
|
| users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| services.alerta.authenticationRequired | Whether users must authenticate when using the web UI or command-line tool
|
| services.wg-access-server.secretsFile | yaml file containing all secrets. this needs to be in the same structure as the configuration
|
| users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| services.oauth2-proxy.tls.certificate | Path to certificate file.
|
| services.oauth2-proxy.google.serviceAccountJSON | The path to the service account JSON credentials.
|
| security.pam.sshAgentAuth.authorizedKeysFiles | A list of paths to files in OpenSSH's authorized_keys format, containing
the keys that will be trusted by the pam_ssh_agent_auth module
|
| services.kanidm.provision.systems.oauth2 | Provisioning of oauth2 resource servers
|
| users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| services.icingaweb2.authentications | authentication.ini contents
|
| services.tor.relay.onionServices.<name>.authorizeClient | See torrc manual.
|
| security.pam.rssh.settings.auth_key_file | Path to file with trusted public keys in OpenSSH's authorized_keys format
|
| services.prosody.modules.legacyauth | Legacy authentication
|
| security.pam.ussh.authorizedPrincipals | Comma-separated list of authorized principals to permit; if the user
presents a certificate with one of these principals, then they will be
authorized
|
| services.jupyterhub.authentication | Jupyterhub authentication to use
There are many authenticators available including: oauth, pam,
ldap, kerberos, etc.
|
| security.pam.ussh.authorizedPrincipalsFile | Path to a list of principals; if the user presents a certificate with
one of these principals, then they will be authorized
|
| services.jitsi-meet.secureDomain.authentication | The authentication type to be used by jitsi
|
| users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| services.authelia.instances.<name>.settings.theme | The theme to display.
|
| services.athens.basicAuthUser | Username for basic auth.
|
| services.sourcehut.settings."hg.sr.ht".oauth-client-id | hg.sr.ht's OAuth client id for meta.sr.ht.
|
| services.authelia.instances.<name>.settings | Your Authelia config.yml as a Nix attribute set
|
| services.sourcehut.settings."man.sr.ht".oauth-client-id | man.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."git.sr.ht".oauth-client-id | git.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."hub.sr.ht".oauth-client-id | hub.sr.ht's OAuth client id for meta.sr.ht.
|
| services.opkssh.authorizations.*.principal | Principal identifier (email, repo, etc.)
|
| services.authelia.instances.<name>.secrets | It is recommended you keep your secrets separate from the configuration
|
| services.sourcehut.settings."todo.sr.ht".oauth-client-id | todo.sr.ht's OAuth client id for meta.sr.ht.
|
| services.authelia.instances.<name>.settings.log.level | Level of verbosity for logs.
|
| services.authelia.instances.<name>.secrets.jwtSecretFile | Path to your JWT secret used during identity verificaton.
|
| services.sourcehut.settings."lists.sr.ht".oauth-client-id | lists.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."pages.sr.ht".oauth-client-id | pages.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."paste.sr.ht".oauth-client-id | paste.sr.ht's OAuth client id for meta.sr.ht.
|
| services.borgbackup.repos.<name>.authorizedKeys | Public SSH keys that are given full write access to this repository
|
| services.tor.relay.onionServices.<name>.authorizedClients | Authorized clients for a v3 onion service,
as a list of public key, in the format:
descriptor:x25519:<base32-public-key>
See torrc manual.
|
| services.authelia.instances.<name>.settings.log.format | Format the logs are written as.
|
| services.authelia.instances.<name>.secrets.manual | Configuring authelia's secret files via the secrets attribute set
is intended to be convenient and help catch cases where values are required
to run at all
|
| services.sourcehut.settings."builds.sr.ht".oauth-client-id | builds.sr.ht's OAuth client id for meta.sr.ht.
|
| services.sourcehut.settings."hg.sr.ht".oauth-client-secret | hg.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.authelia.instances.<name>.settingsFiles | Here you can provide authelia with configuration files or directories
|
| services.athens.basicAuthPass | Password for basic auth
|
| services.sourcehut.settings."git.sr.ht".oauth-client-secret | git.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."hub.sr.ht".oauth-client-secret | hub.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."man.sr.ht".oauth-client-secret | man.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.guix.substituters.authorizedKeys | A list of signing keys for each substitute server to be authorized as
a source of substitutes
|
| services.kanidm.provision.systems.oauth2.<name>.public | Whether this is a public client (enforces PKCE, doesn't use a basic secret)
|
| services.authelia.instances.<name>.secrets.oidcHmacSecretFile | Path to your HMAC secret used to sign OIDC JWTs.
|
| services.sourcehut.settings."todo.sr.ht".oauth-client-secret | todo.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.kanidm.provision.systems.oauth2.<name>.scopeMaps | Maps kanidm groups to returned oauth scopes
|
| services.kanidm.provision.systems.oauth2.<name>.originUrl | The redirect URL of the service
|
| services.mailman.ldap.enable | Whether to enable LDAP auth.
|
| services.strongswan-swanctl.swanctl.authorities | Section defining complementary attributes of certification authorities, each
in its own subsection with an arbitrary yet unique name
|
| services.kanidm.provision.systems.oauth2.<name>.claimMaps | Adds additional claims (and values) based on which kanidm groups an authenticating party belongs to
|
| services.discourse.mail.outgoing.authentication | Authentication type to use, see https://api.rubyonrails.org/classes/ActionMailer/Base.html
|
| services.tor.relay.onionServices.<name>.authorizeClient.clientNames | Only clients that are listed here are authorized to access the hidden service
|
| services.sourcehut.settings."lists.sr.ht".oauth-client-secret | lists.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."paste.sr.ht".oauth-client-secret | paste.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.sourcehut.settings."pages.sr.ht".oauth-client-secret | pages.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| services.kanidm.provision.systems.oauth2.<name>.present | Whether to ensure that this oauth2 resource server is present or absent.
|
| services.kanidm.provision.systems.oauth2.<name>.displayName | Display name
|
| services.davis.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.movim.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.slskd.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.kubernetes.apiserver.authorizationMode | Kubernetes apiserver authorization mode (AlwaysAllow/AlwaysDeny/ABAC/Webhook/RBAC/Node)
|
| services.borgbackup.repos.<name>.authorizedKeysAppendOnly | Public SSH keys that can only be used to append new data (archives) to the repository
|
| services.prometheus.remoteRead.*.basic_auth | Sets the Authorization header on every remote read request with the
configured username and password.
password and password_file are mutually exclusive.
|
| services.authelia.instances.<name>.settings.server.address | The address to listen on.
|
| services.sourcehut.settings."builds.sr.ht".oauth-client-secret | builds.sr.ht's OAuth client secret for meta.sr.ht.
|
| services.snipe-it.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.keycloak.settings.http-relative-path | The path relative to / for serving
resources.
In versions of Keycloak using Wildfly (<17),
this defaulted to /auth
|
| services.pinchflat.secretsFile | Secrets like SECRET_KEY_BASE and BASIC_AUTH_PASSWORD
should be passed to the service without adding them to the world-readable Nix store
|
| services.authelia.instances.<name>.secrets.sessionSecretFile | Path to your session secret
|
| services.prometheus.scrapeConfigs.*.authorization | Sets the Authorization header on every scrape request with the configured credentials.
|
| services.strongswan-swanctl.swanctl.authorities.<name>.slot | Optional slot number of the token that stores the certificate.
|
| services.radicle.publicKey | An SSH public key (as an absolute file path or directly as a string),
usually generated by rad auth.
|
| services.kubernetes.apiserver.authorizationPolicy | Kubernetes apiserver authorization policy file
|
| services.kanidm.provision.systems.oauth2.<name>.imageFile | Application image to display in the WebUI
|
| services.prometheus.remoteWrite.*.basic_auth | Sets the Authorization header on every remote write request with the
configured username and password.
password and password_file are mutually exclusive.
|
| services.oncall.settings.db.conn.require_auth | Whether authentication is required to access the web app.
|
| services.tt-rss.singleUserMode | Operate in single user mode, disables all functionality related to
multiple users and authentication
|
| services.tailscaleAuth.user | User which runs tailscale-nginx-auth
|
| services.strongswan-swanctl.swanctl.authorities.<name>.file | Absolute path to the certificate to load
|
| services.gancio.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.fluidd.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.akkoma.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.monica.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.matomo.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.strongswan-swanctl.swanctl.authorities.<name>.module | Optional PKCS#11 module name.
|
| services.authelia.instances.<name>.secrets.oidcIssuerPrivateKeyFile | Path to your private key file used to encrypt OIDC JWTs.
|
| services.strongswan-swanctl.swanctl.secrets.xauth | EAP secret section for a specific secret
|
| services.kanidm.provision.systems.oauth2.<name>.basicSecretFile | The basic secret to use for this service
|
| services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.joinType | Determines how multiple values are joined to create the claim value
|
| services.authelia.instances.<name>.settings.log.file_path | File path where the logs will be written
|
| services.tailscaleAuth.group | Group which runs tailscale-nginx-auth
|
| services.prometheus.scrapeConfigs.*.basic_auth | Sets the Authorization header on every scrape request with the
configured username and password.
password and password_file are mutually exclusive.
|
| services.strongswan-swanctl.swanctl.authorities.<name>.handle | Hex-encoded CKA_ID or handle of the certificate on a token or TPM,
respectively
|
| services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| services.kanidm.provision.systems.oauth2.<name>.originLanding | When redirecting from the Kanidm Apps Listing page, some linked applications may need to land on a specific page to trigger oauth2/oidc interactions.
|
| services.kanidm.provision.systems.oauth2.<name>.claimMaps.<name>.valuesByGroup | Maps kanidm groups to values for the claim.
|
| services.strongswan-swanctl.swanctl.authorities.<name>.cacert | The certificates may use a relative path from the swanctl
x509ca directory or an absolute path
|
| services.kanidm.provision.systems.oauth2.<name>.enableLegacyCrypto | Enable legacy crypto on this client
|
| services.prometheus.remoteRead.*.basic_auth.username | HTTP username
|
| services.prometheus.remoteRead.*.basic_auth.password | HTTP password
|
| services.strongswan-swanctl.swanctl.authorities.<name>.crl_uris | List of CRL distribution points (ldap, http, or file URI)
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saeAddToMacAllow | If set, all sae password entries that have a non-wildcard MAC associated to
them will additionally be used to populate the MAC allow list
|
| services.davis.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.movim.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.slskd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.remoteWrite.*.basic_auth.password | HTTP password
|
| services.prometheus.remoteWrite.*.basic_auth.username | HTTP username
|
| services.kanidm.provision.systems.oauth2.<name>.preferShortUsername | Use 'name' instead of 'spn' in the preferred_username claim
|
| services.plausible.mail.smtp.user | The username/email in case SMTP auth is enabled.
|
| services.snipe-it.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.strongswan-swanctl.swanctl.authorities.<name>.ocsp_uris | List of OCSP URIs
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.authentication_method | The authentication method, either OAuth or ManagedIdentity
|
| services.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate users via tailscale.
|
| services.authelia.instances.<name>.settings.log.keep_stdout | Whether to also log to stdout when a file_path is defined.
|
| services.gitlab-runner.services.<name>.authenticationTokenConfigFile | Absolute path to a file containing environment variables used for
gitlab-runner registrations with runner authentication tokens
|
| services.draupnir.secrets.web.synapseHTTPAntispam.authorization | File containing the secret token when using the Synapse HTTP Antispam module
to be used in place of
services.draupnir.settings.web.synapseHTTPAntispam.authorization
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| services.authelia.instances.<name>.secrets.storageEncryptionKeyFile | Path to your storage encryption key.
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| services.kanidm.provision.systems.oauth2.<name>.removeOrphanedClaimMaps | Whether claim maps not specified here but present in kanidm should be removed from kanidm.
|
| services.nextcloud.settings.mail_smtpauth | This depends on mail_smtpmode
|
| services.strongswan-swanctl.swanctl.secrets.xauth.<name>.secret | Value of the EAP/XAuth secret
|
| services.librenms.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.agorakit.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.cachix-watch-store.cachixTokenFile | Required file that needs to contain the cachix auth token.
|
| services.fluidd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.akkoma.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.gancio.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.dolibarr.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.kanboard.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.fediwall.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.matomo.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.tailscaleAuth.package | The tailscale-nginx-auth package to use.
|
| services.mainsail.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.monica.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.pixelfed.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.id | If this attribute is given with non-zero length, it will set the password identifier
for this entry
|
| services.prometheus.scrapeConfigs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.basic_auth.password | HTTP password
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPasswordFile | Sets the password for WPA-PSK
|
| services.freeciv.settings.Guests | Whether to enable guests to login if auth is enabled.
|
| services.radicle.httpd.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.authelia.instances.<name>.settings.telemetry.metrics.enabled | Enable Metrics.
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.mac | If this attribute is not included, or if is set to the wildcard address (ff:ff:ff:ff:ff:ff),
the entry is available for any station (client) to use
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.pk | If this attribute is given, SAE-PK will be enabled for this connection
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.vlanid | If this attribute is given, all clients using this entry will get tagged with the given VLAN ID.
|
| services.anuko-time-tracker.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.nginx.virtualHosts.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.authelia.instances.<name>.settings.telemetry.metrics.address | The address to listen on for metrics
|
| services.radicle.privateKeyFile | Absolute file path to an SSH private key,
usually generated by rad auth
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_emails | List of emails to allow access to this vhost, or null to allow all.
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_groups | List of groups to allow access to this vhost, or null to allow all.
|
| services.bookstack.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.nginx.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate nginx users via tailscale.
|
| services.influxdb2.provision.organizations.<name>.auths | API tokens to provision for the user in this organization.
|
| services.authelia.instances.<name>.environmentVariables | Additional environment variables to provide to authelia
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords | Sets allowed passwords for WPA3-SAE
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token_file | Optional authentication information for token-based authentication:
https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token
It is mutually exclusive with auth_token and other authentication mechanisms.
|
| services.kanboard.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.librenms.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.dolibarr.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.agorakit.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.fediwall.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.mainsail.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.pixelfed.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.jirafeau.nginxConfig.basicAuth | Basic Auth protection for a vhost
|
| services.kanidm.provision.systems.oauth2.<name>.enableLocalhostRedirects | Allow localhost redirects
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPassword | Sets the password for WPA-PSK that will be converted to the pre-shared key
|
| services.kanidm.provision.systems.oauth2.<name>.allowInsecureClientDisablePkce | Disable PKCE on this oauth2 resource server to work around insecure clients
that may not support it
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.xauth_id | Client XAuth username used in the XAuth exchange.
|
| services.zabbixWeb.nginx.virtualHost.basicAuth | Basic Auth protection for a vhost
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.id | A unique identifier for this authentication token
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswordsFile | Sets the password for WPA3-SAE
|
| services.radicle.httpd.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.passwordFile | The password for this entry, read from the given file when starting hostapd
|
| services.freeciv.settings.Newusers | Whether to enable new users to login if auth is enabled.
|
| services.hostapd.radios.<name>.networks.<name>.authentication.pairwiseCiphers | Set of accepted cipher suites (encryption algorithms) for pairwise keys (unicast packets)
|
| services.hostapd.radios.<name>.networks.<name>.authentication.wpaPskFile | Sets the password(s) for WPA-PSK
|
| services.anuko-time-tracker.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.nginx.virtualHosts.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.mongodb.initialRootPasswordFile | Path to the file containing the password for the root user if auth is enabled.
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.allAccess | Grants all permissions in the associated organization.
|
| services.hostapd.radios.<name>.networks.<name>.authentication.mode | Selects the authentication mode for this AP.
- "none": Don't configure any authentication
|
| services.sabnzbd.settings.misc.inet_exposure | Restrictions for access from non-local IP addresses
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.tokenFile | The token value
|
| services.hostapd.radios.<name>.networks.<name>.authentication.saePasswords.*.password | The password for this entry
|
| services.bookstack.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.present | Whether to ensure that this user is present or absent.
|
| services.nginx.tailscaleAuth.virtualHosts | A list of nginx virtual hosts to put behind tailscale.nginx-auth
|
| services.prometheus.remoteRead.*.basic_auth.password_file | HTTP password file
|
| services.kanidm.provision.systems.oauth2.<name>.supplementaryScopeMaps | Maps kanidm groups to additionally returned oauth scopes
|
| services.davis.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.slskd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.movim.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.plausible.mail.smtp.passwordFile | The path to the file with the password in case SMTP auth is enabled.
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.readBuckets | The organization's buckets which should be allowed to be read
|
| services.prometheus.remoteWrite.*.basic_auth.password_file | HTTP password file
|
| services.snipe-it.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.operator | Grants all permissions in all organizations.
|
| services.vmagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| services.vlagent.remoteWrite.basicAuthUsername | Basic Auth username used to connect to remote_write endpoint
|
| services.jirafeau.nginxConfig.basicAuthFile | Basic Auth password file for a vhost
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.writeBuckets | The organization's buckets which should be allowed to be written
|
| services.strongswan-swanctl.swanctl.authorities.<name>.cert_uri_base | Defines the base URI for the Hash and URL feature supported by
IKEv2
|
| services.postgresql.identMap | Defines the mapping from system users to database users
|
| services.gancio.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.fedimintd.<name>.nginx.config.basicAuth | Basic Auth protection for a vhost
|
| services.fluidd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.akkoma.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.matomo.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.monica.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.zammad.secretKeyBaseFile | The path to a file containing the
secret_key_base secret
|
| services.zabbixWeb.nginx.virtualHost.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.basic_auth.password_file | HTTP password file
|
| services.calibre-web.options.reverseProxyAuth.header | Auth proxy header name.
|
| services.calibre-web.options.reverseProxyAuth.enable | Enable authorization using auth proxy.
|
| services.strongswan-swanctl.swanctl.connections.<name>.reauth_time | Time to schedule IKE reauthentication
|
| services.vmagent.remoteWrite.basicAuthPasswordFile | File that contains the Basic Auth password used to connect to remote_write endpoint
|
| services.vlagent.remoteWrite.basicAuthPasswordFile | File that contains the Basic Auth password used to connect to remote_write endpoint
|
| services.mattermost.database.peerAuth | If set, will use peer auth instead of connecting to a Postgres server
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.davis.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.movim.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.slskd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.auth_token | Optional authentication information for token-based authentication:
https://docs.mesosphere.com/1.11/security/ent/iam-api/#passing-an-authentication-token
It is mutually exclusive with auth_token_file and other authentication mechanisms.
|
| services.snipe-it.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.teleport.insecure.enable | Whether to enable starting teleport in insecure mode
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.fediwall.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.akkoma.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.fluidd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.kanboard.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.librenms.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.dolibarr.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.fedimintd.<name>.nginx.config.basicAuthFile | Basic Auth password file for a vhost
|
| services.gancio.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.agorakit.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.monica.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.matomo.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.mainsail.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.pixelfed.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.kubernetes.apiserver.clientCaFile | Kubernetes apiserver CA file for client auth.
|
| services.keycloak.database.passwordFile | The path to a file containing the database password
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.type | Sets the authentication type
|
| services.limesurvey.nginx.virtualHost.basicAuth | Basic Auth protection for a vhost
|
| services.hostapd.radios.<name>.networks.<name>.authentication.enableRecommendedPairwiseCiphers | Additionally enable the recommended set of pairwise ciphers
|
| services.radicle.httpd.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.anuko-time-tracker.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.nginx.virtualHosts.<name>.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth | Authentication information used to authenticate to the API server.
password and password_file are mutually exclusive.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.sabnzbd.settings.misc.html_login | Prompt for login with an html login mask if enabled,
otherwise prompt for basic auth (useful for SSO)
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.bookstack.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.discourse.secretKeyBaseFile | The path to a file containing the
secret_key_base secret
|
| services.victorialogs.basicAuthUsername | Basic Auth username used to protect VictoriaLogs instance by authorization
|
| services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.description | Optional description for the API token
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.type | Sets the authentication type
|
| services.opencloud.environmentFile | An environment file as defined in systemd.exec(5)
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.dolibarr.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.kanboard.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.librenms.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.agorakit.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.fediwall.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.mainsail.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.pixelfed.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.jirafeau.nginxConfig.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.maubot.settings.homeservers | Known homeservers
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.limesurvey.nginx.virtualHost.basicAuthFile | Basic Auth password file for a vhost
|
| services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.victorialogs.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaLogs instance by authorization
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.radicle.httpd.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.misskey.reverseProxy.webserver.nginx.basicAuth | Basic Auth protection for a vhost
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.anuko-time-tracker.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.nginx.virtualHosts.<name>.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password | HTTP password
|
| services.bookstack.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.jirafeau.nginxConfig.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.fedimintd.<name>.nginx.config.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.zabbixWeb.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.username | HTTP username
|
| services.misskey.reverseProxy.webserver.nginx.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.outline.azureAuthentication | To configure Microsoft/Azure auth, you'll need to create an OAuth
Client
|
| services.outline.oidcAuthentication | To configure generic OIDC auth, you'll need some kind of identity
provider
|
| networking.wireless.networks.<name>.pskRaw | Either the raw pre-shared key in hexadecimal format
or the name of the secret (as defined inside
networking.wireless.secretsFile and prefixed
with ext:) containing the network pre-shared key.
Be aware that this will be written to the Nix store
in plaintext! Always use an external reference.
The external secret can be either the plaintext
passphrase or the raw pre-shared key.
Mutually exclusive with psk and auth.
|
| services.outline.slackAuthentication | To configure Slack auth, you'll need to create an Application at
https://api.slack.com/apps
When configuring the Client ID, add a redirect URL under "OAuth & Permissions"
to https://[publicUrl]/auth/slack.callback.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.victoriatraces.basicAuthUsername | Basic Auth username used to protect VictoriaTraces instance by authorization
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.username | HTTP username
|
| services.outline.googleAuthentication | To configure Google auth, you'll need to create an OAuth Client ID at
https://console.cloud.google.com/apis/credentials
When configuring the Client ID, add an Authorized redirect URI to
https://[publicUrl]/auth/google.callback.
|
| services.oauth2-proxy.nginx.virtualHosts.<name>.allowed_email_domains | List of email domains to allow access to this vhost, or null to allow all.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.fedimintd.<name>.nginx.config.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.outline.discordAuthentication | To configure Discord auth, you'll need to create an application at
https://discord.com/developers/applications/
See https://docs.getoutline.com/s/hosting/doc/discord-g4JdWFFub6
for details on setting up your Discord app.
|
| services.victoriatraces.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaTraces instance by authorization
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.limesurvey.nginx.virtualHost.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.type | Sets the authentication type
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.victoriametrics.basicAuthUsername | Basic Auth username used to protect VictoriaMetrics instance by authorization
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.type | Sets the authentication type
|
| services.limesurvey.nginx.virtualHost.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization | Optional Authorization header configuration.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.victoriametrics.basicAuthPasswordFile | File that contains the Basic Auth password used to protect VictoriaMetrics instance by authorization
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuth | Basic Auth protection for a vhost
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.misskey.reverseProxy.webserver.nginx.locations.<name>.basicAuthFile | Basic Auth password file for a vhost
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2 | Optional OAuth 2.0 configuration
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials | Sets the credentials
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.scopes | Scopes for the token request.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth | Optional HTTP basic authentication information.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_id | OAuth client ID.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.token_url | The URL to fetch the token from.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password | HTTP password
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.username | HTTP username
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.authorization.credentials_file | Sets the credentials to the credentials read from the configured file
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret | OAuth client secret.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.endpoint_params | Optional parameters to append to the token URL.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.basic_auth.password_file | HTTP password file
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.oauth2.client_secret_file | Read the client secret from a file
|
| services.stash.settings.dangerous_allow_public_without_auth | Learn more at https://docs.stashapp.cc/networking/authentication-required-when-accessing-stash-from-the-internet/
|
| services.tt-rss.plugins | List of plugins to load automatically for all users
|
| security.googleOsLogin.enable | Whether to enable Google OS Login
|
| security.pam.services.<name>.p11Auth | If set, keys listed in
~/.ssh/authorized_keys and
~/.eid/authorized_certificates
can be used to log in with the associated PKCS#11 tokens.
|
| security.polkit.adminIdentities | Specifies which users are considered “administrators”, for those
actions that require the user to authenticate as an
administrator (i.e. have an auth_admin
value)
|
| services.hostapd.enable | Whether to enable hostapd, a user space daemon for access point and
authentication servers
|
| security.duosec.fallbackLocalIP | Duo Unix reports the IP address of the authorizing user, for
the purposes of authorization and whitelisting
|
| services.prometheus.exporters.pgbouncer.connectionString | Connection string for accessing pgBouncer
|
| security.pam.services.<name>.sshAgentAuth | If set, the calling user's SSH agent is used to authenticate
against the keys in the calling user's
~/.ssh/authorized_keys
|
| security.pam.dp9ik.enable | Whether to enable the dp9ik pam module provided by tlsclient
|
| security.pam.howdy.enable | Whether to enable the Howdy PAM module
|
| services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| services.prosody.s2sInsecureDomains | Some servers have invalid or self-signed certificates
|
| services.postgresql.ensureUsers | Ensures that the specified users exist
|
| services.cntlm.proxy | A list of NTLM/NTLMv2 authenticating HTTP proxies
|
| services.gitlab-runner.services.<name>.registrationConfigFile | Absolute path to a file with environment variables
used for gitlab-runner registration with runner registration
tokens
|
| security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| services.crowdsec-firewall-bouncer.secrets.apiKeyPath | Path to the API key to authenticate with a local CrowdSec API
|
| security.pam.krb5.enable | Enables Kerberos PAM modules (pam-krb5,
pam-ccreds)
|
| services.prosody.s2sRequireEncryption | Force servers to use encrypted connections? This option will
prevent servers from authenticating unless they are using encryption
|
| services.postgrest.pgpassFile | The password to authenticate to PostgreSQL with
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote | Section for a remote authentication round
|
| services.postgres-websockets.pgpassFile | The password to authenticate to PostgreSQL with
|
| services.wstunnel.clients.<name>.upgradeCredentials | Use these credentials to authenticate during the HTTP upgrade request
(Basic authorization type, USER:[PASS]).
Passwords specified here will be world-readable in the Nix store!
To pass a password to the service, point the environmentFile option
to a file containing HTTP_PASSWORD=<your-password-here> and set this
option to <user>:$HTTP_PASSWORD
|
| services.dependency-track.oidc.userProvisioning | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| services.headscale.settings.oidc.allowed_domains | Allowed principal domains. if an authenticated user's domain
is not in this list authentication request will be rejected.
|
| services.dependency-track.settings."alpine.oidc.user.provisioning" | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| security.pam.yubico.enable | Enables Yubico PAM (yubico-pam) module
|
| services.nsd.enable | Whether to enable NSD authoritative DNS server.
|
| services.knot.enable | Whether to enable Knot authoritative-only DNS server.
|
| security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.groups | Authorization group memberships to require
|
| security.pki.caBundle | (Read-only) the path to the final bundle of certificate authorities as a single file.
|
| security.doas.extraRules.*.persist | If true, do not ask for a password again for some
time after the user successfully authenticates.
|
| security.duosec.prompts | If a user fails to authenticate with a second factor, Duo
Unix will prompt the user to authenticate again
|
| services.bind.zones | List of zones we claim authority over.
|
| services.netbird.server.dashboard.settings | An attribute set that will be used to substitute variables when building the dashboard
|
| boot.initrd.luks.gpgSupport | Enables support for authenticating with a GPG encrypted password.
|
| security.pam.ussh.group | If set, then the authenticating user must be a member of this group
to use this module.
|
| services.pdns-recursor.forwardZones | DNS zones to be forwarded to other authoritative servers.
|
| services.step-ca.port | The port the certificate authority should listen on
|
| security.pam.rssh.enable | Whether to enable authenticating using a signature performed by the ssh-agent.
|
| boot.initrd.luks.fido2Support | Enables support for authenticating with FIDO2 devices.
|
| services.step-ca.enable | Whether to enable the smallstep certificate authority server.
|
| services.strongswan.ca | A set of CAs (certification authorities) and their options for
the ‘ca xxx’ sections of the ipsec.conf
file.
|
| services.rutorrent.nginx.exposeInsecureRPC2mount | If you do not enable one of the rpc or httprpc plugins you need to expose an RPC mount through scgi using this option
|
| services.bcg.mqtt.cafile | Certificate Authority file for MQTT server access.
|
| services.dnscache.domainServers | Table of {hostname: server} pairs to use as authoritative servers for hosts (and subhosts)
|
| services.skydns.nameservers | Skydns list of nameservers to forward DNS requests to when not authoritative for a domain.
|
| users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| services.skydns.etcd.caCert | Skydns path of TLS certificate authority public key.
|
| services.etcd.trustedCaFile | Certificate authority file to use for clients
|
| services.flannel.etcd.caFile | Etcd certificate authority file
|
| services.prometheus.alertmanagerGotify.environmentFile | File containing additional config environment variables for alertmanager-gotify-bridge
|
| services.pomerium.enable | Whether to enable the Pomerium authenticating reverse proxy.
|
| services.openssh.settings.UseDns | Specifies whether sshd(8) should look up the remote host name, and to check that the resolved host name for
the remote IP address maps back to the very same IP address
|
| services.sympa.listMasters | The list of the email addresses of the listmasters
(users authorized to perform global server commands).
|
| services.step-ca.address | The address (without port) the certificate authority should listen at
|
| services.etcd.peerTrustedCaFile | Certificate authority file to use for peer to peer communication
|
| services.jitsi-meet.secureDomain.enable | Whether to enable Authenticated room creation.
|
| services.step-ca.openFirewall | Whether to enable opening the certificate authority server port.
|
| security.pam.sshAgentAuth.enable | Whether to enable authenticating using a signature performed by the ssh-agent
|
| boot.initrd.luks.yubikeySupport | Enables support for authenticating with a YubiKey on LUKS devices
|
| services.nebula.networks.<name>.ca | Path to the certificate authority certificate.
|
| services.hologram-server.roleAttr | Which LDAP group attribute to search for authorized role ARNs
|
| services.kubernetes.caFile | Default kubernetes certificate authority
|
| security.pam.services.<name>.ttyAudit.openOnly | Set the TTY audit flag when opening the session,
but do not restore it when closing the session
|
| security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| boot.initrd.luks.devices.<name>.allowDiscards | Whether to allow TRIM requests to the underlying device
|
| services.postfix.tlsTrustedAuthorities | File containing trusted certification authorities (CA) to verify certificates of mailservers contacted for mail delivery
|
| services.irkerd.listenAddress | Specifies the bind address on which the irker daemon listens
|
| boot.initrd.systemd.emergencyAccess | Set to true for unauthenticated emergency access, and false or
null for no emergency access
|
| services.nitter.config.tokenCount | Minimum amount of usable tokens
|
| security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| services.mysql.galeraCluster.sstMethod | Method for the initial state transfer (wsrep_sst_method) when a node joins the cluster
|
| services.cfdyndns.email | The email address to use to authenticate to CloudFlare.
|
| services.duckdns.tokenFile | The path to a file containing the token
used to authenticate with DuckDNS.
|
| services.tor.client.onionServices.<name>.clientAuthorizations | Clients' authorizations for a v3 onion service,
as a list of files containing each one private key, in the format:
descriptor:x25519:<base32-private-key>
See torrc manual.
|
| programs.ssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| services.aesmd.settings.whitelistUrl | URL to retrieve authorized Intel SGX enclave signers.
|
| services.grafana-to-ntfy.settings.ntfyBAuthUser | The ntfy-sh user to use for authenticating with the ntfy-sh instance
|
| services.glusterfs.tlsSettings.caCert | Path certificate authority used to sign the cluster certificates.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_id | Optional client ID
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tenant_id | Optional tenant ID
|
| services.prosody.c2sRequireEncryption | Force clients to use encrypted connections? This option will
prevent clients from authenticating unless they are using encryption.
|
| security.pam.services.<name>.rootOK | If set, root doesn't need to authenticate (e.g. for the
useradd service).
|
| services.cfdyndns.apiTokenFile | The path to a file containing the API Token
used to authenticate with CloudFlare.
|
| services.openssh.knownHosts.<name>.certAuthority | This public key is an SSH certificate authority, rather than an
individual host's key.
|
| services.cfdyndns.apikeyFile | The path to a file containing the API Key
used to authenticate with CloudFlare.
|
| services.aria2.rpcSecretFile | A file containing the RPC secret authorization token
|
| services.nbd.server.exports.<name>.allowAddresses | IPs and subnets that are authorized to connect for this device
|
| services.outline.smtp.username | Username to authenticate with.
|
| nix.buildMachines.*.sshKey | The path to the SSH private key with which to authenticate on
the build machine
|
| services.headscale.settings.oidc.pkce.enabled | Enable or disable PKCE (Proof Key for Code Exchange) support
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.client_secret | Optional client secret
|
| services.cjdns.UDPInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| services.cjdns.ETHInterface.connectTo.<name>.password | Authorized password to the opposite end of the tunnel.
|
| security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| services.mastodon.elasticsearch.user | Used for optionally authenticating with Elasticsearch.
|
| services.mqtt2influxdb.mqtt.cafile | Certification Authority file for MQTT
|
| services.outline.smtp.passwordFile | File path containing the password to authenticate with.
|
| services.kubernetes.kubeconfig.caFile | Default kubeconfig certificate authority file used to connect to kube-apiserver.
|
| services.murmur.clientCertRequired | Whether to enable requiring clients to authenticate via certificates.
|
| services.lldap.enable | Whether to enable lldap, a lightweight authentication server that provides an opinionated, simplified LDAP interface for authentication.
|
| programs.light.brightnessKeys.minBrightness | The minimum authorized brightness value, e.g. to avoid the
display going dark.
|
| services.suwayomi-server.settings.server.basicAuthUsername | The username value that you have to provide when authenticating.
|
| services.isso.enable | Whether to enable isso, a commenting server similar to Disqus
|
| security.pam.services.<name>.rssh | If set, the calling user's SSH agent is used to authenticate
against the configured keys
|
| services.kubernetes.proxy.kubeconfig.caFile | Kubernetes proxy certificate authority file used to connect to kube-apiserver.
|
| services.suwayomi-server.settings.server.basicAuthPasswordFile | The password file containing the value that you have to provide when authenticating.
|
| services.sssd.sshAuthorizedKeysIntegration | Whether to make sshd look up authorized keys from SSS
|
| services.oncall.secretFile | A YAML file containing secrets such as database or user passwords
|
| services.headscale.settings.oidc.extra_params | Custom query parameters to send with the Authorize Endpoint request.
|
| services.kubernetes.kubelet.kubeconfig.caFile | Kubelet certificate authority file used to connect to kube-apiserver.
|
| services.tailscaleAuth.socketPath | Path of the socket listening to authorization requests.
|
| users.ldap.loginPam | Whether to include authentication against LDAP in login PAM.
|
| services.mastodon.elasticsearch.passwordFile | Path to file containing password for optionally authenticating with Elasticsearch.
|
| services.hickory-dns.settings.zones.*.zone_type | One of:
- "Primary" (the master, authority for the zone).
- "Secondary" (the slave, replicated from the primary).
- "External" (a cached zone that queries other nameservers)
|
| services.prometheus.exporters.unbound.unbound.ca | Path to the Unbound server certificate authority
|
| services.meme-bingo-web.enable | Whether to enable a web app for the meme bingo, rendered entirely on the web server and made interactive with forms
|
| services.firezone.server.smtp.username | Username to authenticate against the SMTP relay
|
| services.matrix-appservice-irc.settings.ircService.mediaProxy.signingKeyPath | Path to the signing key file for authenticated media.
|
| services.kubernetes.controllerManager.rootCaFile | Kubernetes controller manager certificate authority file included in
service account's token secret.
|
| services.nextcloud.settings.mail_smtpname | This depends on mail_smtpauth
|
| services.cloudflared.tunnels.<name>.originRequest.caPool | Path to the certificate authority (CA) for the certificate of your origin
|
| services.murmur.registerPassword | Public server registry password, used authenticate your
server to the registry to prevent impersonation; required for
subsequent registry updates.
|
| users.ldap.enable | Whether to enable authentication against an LDAP server.
|
| services.dependency-track.settings."alpine.database.username" | Specifies the username to use when authenticating to the database.
|
| services.redis.servers.<name>.masterAuth | If the master is password protected (using the requirePass configuration)
it is possible to tell the slave to authenticate before starting the replication synchronization
process, otherwise the master will refuse the slave request.
(STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)
|
| services.crowdsec-firewall-bouncer.registerBouncer.enable | Whether to automatically register the bouncer to the locally running
crowdsec service
|
| services.rkvm.client.settings.password | Shared secret token to authenticate the client
|
| services.rkvm.server.settings.password | Shared secret token to authenticate the client
|
| services.bacula-sd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| services.bacula-fd.director.<name>.password | Specifies the password that must be supplied for the default Bacula
Console to be authorized
|
| services.kubernetes.scheduler.kubeconfig.caFile | Kubernetes scheduler certificate authority file used to connect to kube-apiserver.
|
| services.neo4j.ssl.policies.<name>.allowKeyGeneration | Allows the generation of a private key and associated self-signed
certificate
|
| users.mysql.enable | Whether to enable authentication against a MySQL/MariaDB database.
|
| security.soteria.enable | Whether to enable Soteria, a Polkit authentication agent
for any desktop environment.
You should only enable this if you are on a Desktop Environment that
does not provide a graphical polkit authentication agent, or you are on
a standalone window manager or Wayland compositor.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local | Section for a local authentication round
|
| services.blackfire-agent.settings.server-id | Sets the server id used to authenticate with Blackfire
You can find your personal server-id at https://blackfire.io/my/settings/credentials
|
| services.prometheus.remoteWrite.*.sigv4.profile | The named AWS profile used to authenticate.
|
| services.vsftpd.userDbPath | Only applies if enableVirtualUsers is true
|
| services.blackfire-agent.settings.server-token | Sets the server token used to authenticate with Blackfire
You can find your personal server-token at https://blackfire.io/my/settings/credentials
|
| services.biboumi.settings.password | The password used to authenticate the XMPP component to your XMPP server
|
| services.kubernetes.controllerManager.kubeconfig.caFile | Kubernetes controller manager certificate authority file used to connect to kube-apiserver.
|
| networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| services.prometheus.exporters.mqtt.mqttUsername | Username which should be used to authenticate against the MQTT broker.
|
| networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| networking.openconnect.interfaces.<name>.user | Username to authenticate with.
|
| services.howdy.enable | Whether to enable Howdy and its PAM module for face recognition
|
| users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| programs.ssh.macs | Specifies the MAC (message authentication code) algorithms in order of preference
|
| services.postgrest.jwtSecretFile | The secret or JSON Web Key (JWK) (or set) used to decode JWT tokens clients provide for authentication
|
| services.bitwarden-directory-connector-cli.ldap.username | The user to authenticate as.
|
| networking.supplicant | Interfaces for which to start wpa_supplicant
|
| services.db-rest.redis.user | Optional username used for authentication with redis.
|
| services.firezone.server.provision.accounts.<name>.actors.<name>.email | The email address used to authenticate as this account
|
| networking.openconnect.interfaces.<name>.privateKey | Private key to authenticate with.
|
| services.tt-rss.email.login | SMTP authentication login used when sending outgoing mail.
|
| services.ncps.netrcFile | The path to netrc file for upstream authentication
|
| services.headscale.settings.oidc.allowed_users | Users allowed to authenticate even if not in allowedDomains.
|
| services.prometheus.exporters.klipper.moonrakerApiKey | API Key to authenticate with the Moonraker APIs
|
| services.etcd.clientCertAuth | Whether to use certs for client authentication
|
| services.opkssh.enable | Whether to enable OpenID Connect SSH authentication.
|
| services.crowdsec-firewall-bouncer.settings.api_key | API key to authenticate with a local crowdsec API
|
| services.foundationdb.tls.allowedPeers | "Peer verification string"
|
| services.outline.logo | Custom logo displayed on the authentication screen
|
| services.plantuml-server.httpAuthorization | When calling the proxy endpoint, the value of HTTP_AUTHORIZATION will be used to set the HTTP Authorization header.
|
| networking.openconnect.interfaces.<name>.passwordFile | File containing the password to authenticate with
|
| services.ttyd.username | Username for basic http authentication.
|
| users.mysql.pam.logging.enable | Enables logging of authentication attempts in the MySQL database.
|
| services.usbguard.restoreControllerDeviceState | The USBGuard daemon modifies some attributes of controller
devices like the default authorization state of new child device
instances
|
| services.prometheus.exporters.fritz.settings.devices.*.username | Username to authenticate with the target device.
|
| services.prometheus.remoteRead.*.bearer_token | Sets the Authorization header on every remote read request with
the configured bearer token
|
| services.openssh.banner | Message to display to the remote user before authentication is allowed.
|
| services.outline.smtp | To support sending outgoing transactional emails such as
"document updated" or "you've been invited" you'll need to provide
authentication for an SMTP server.
|
| services.prometheus.remoteWrite.*.bearer_token | Sets the Authorization header on every remote write request with
the configured bearer token
|
| networking.openconnect.interfaces.<name>.certificate | Certificate to authenticate with.
|
| services.erigon.secretJwtPath | Path to the secret jwt used for the http api authentication.
|
| services.factorio.token | Authentication token
|
| services.netbox.enableLdap | Enable LDAP-Authentication for Netbox
|
| services.chrony.enableNTS | Whether to enable Network Time Security authentication
|
| services.prometheus.scrapeConfigs.*.bearer_token | Sets the Authorization header on every scrape request with
the configured bearer token
|
| users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| services.graylog.elasticsearchHosts | List of valid URIs of the http ports of your elastic nodes
|
| services.coturn.secure-stun | Require authentication of the STUN Binding request
|
| services.opendkim.enable | Whether to enable OpenDKIM sender authentication system.
|
| services.mongodb.enableAuth | Enable client authentication
|
| services.gitea.metricsTokenFile | Path to a file containing the metrics authentication token.
|
| services.iperf3.rsaPrivateKey | Path to the RSA private key (not password-protected) used to decrypt authentication credentials from the client.
|
| security.shadow.enable | Enable the shadow authentication suite, which provides critical programs such as su, login, passwd
|
| services.tt-rss.email.password | SMTP authentication password used when sending outgoing mail.
|
| security.duosec.groups | If specified, Duo authentication is required only for users
whose primary group or supplementary group list matches one
of the space-separated pattern lists
|
| services.netbox.ldapConfigPath | Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
|
| services.nsd.keys.<name>.algorithm | Authentication algorithm for this key.
|
| services.portunus.enable | Whether to enable Portunus, a self-contained user/group management and authentication service for LDAP.
|
| services.ttyd.passwordFile | File containing the password to use for basic http authentication
|
| services.gitea.database.socket | Path to the unix socket file to use for authentication.
|
| security.pam.u2f.control | This option sets pam "control"
|
| security.duosec.failmode | On service or configuration errors that prevent Duo
authentication, fail "safe" (allow access) or "secure" (deny
access)
|
| security.pam.p11.control | This option sets pam "control"
|
| services.openssh.settings.UsePAM | Whether to enable PAM authentication.
|
| services.lavalink.password | The password for Lavalink's authentication in plain text.
|
| services.ncps.cache.redis.username | Redis username for authentication (for Redis ACL).
|
| services.ncps.cache.redis.password | Redis password for authentication (for Redis ACL).
|
| security.pam.ussh.control | This option sets pam "control"
|
| services.prometheus.exporters.fritz.settings.devices.*.password_file | Path to a file which contains the password to authenticate with the target device
|
| services.misskey.settings.db.user | The user used for database authentication.
|
| services.misskey.settings.db.pass | The password used for database authentication.
|
| services.podgrab.passwordFile | The path to a file containing the PASSWORD environment variable
definition for Podgrab's authentication.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.password | Credentials are used to authenticate the requests to Uyuni API.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.username | Credentials are used to authenticate the requests to Uyuni API.
|
| programs.ssh.pubkeyAcceptedKeyTypes | Specifies the key lib.types that will be used for public key authentication.
|
| services.moodle.database.socket | Path to the unix socket file to use for authentication.
|
| services.dovecot2.showPAMFailure | Whether to enable showing the PAM failure message on authentication error (useful for OTPW).
|
| services.grafana.settings.smtp.user | User used for authentication.
|
| services.kapacitor.alerta.token | Default Alerta authentication token
|
| services.slurm.server.enable | Whether to enable the slurm control daemon
|
| services.prosody.s2sSecureAuth | Force certificate authentication for server-to-server connections?
This provides ideal security, but requires servers you communicate
with to support encryption AND present valid, trusted certificates
|
| services.zabbixWeb.database.socket | Path to the unix socket file to use for authentication.
|
| services.boinc.allowRemoteGuiRpc | If set to true, any remote host can connect to and control this BOINC
client (subject to password authentication)
|
| services.ncps.cache.redis.passwordFile | File containing the redis password for authentication (for Redis ACL).
|
| services.magnetico.web.credentials | The credentials to access the web interface, in case authentication is
enabled, in the format username:hash
|
| security.pam.yubico.control | This option sets pam "control"
|
| services.peering-manager.enableOidc | Enable OIDC-Authentication for Peering Manager
|
| services.forgejo.database.socket | Path to the unix socket file to use for authentication.
|
| services.redmine.database.socket | Path to the unix socket file to use for authentication.
|
| services.peering-manager.enableLdap | Enable LDAP-Authentication for Peering Manager
|
| programs.i3lock.u2fSupport | Whether to enable U2F support in the i3lock program
|
| services.neo4j.ssl.policies.<name>.clientAuth | The client authentication stance for this policy.
|
| services.librenms.settings | Attrset of the LibreNMS configuration
|
| services.zabbixProxy.database.socket | Path to the unix socket file to use for authentication.
|
| services.prometheus.remoteRead.*.bearer_token_file | Sets the Authorization header on every remote read request with the bearer token
read from the configured file
|
| services.cassandra.remoteJmx | Cassandra ships with JMX accessible only from localhost
|
| services.rspamd-trainer.settings | IMAP authentication configuration for rspamd-trainer
|
| services.prometheus.remoteWrite.*.bearer_token_file | Sets the Authorization header on every remote write request with the bearer token
read from the configured file
|
| services.kimai.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| services.gotenberg.enableBasicAuth | HTTP Basic Authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.id | IKE identity to use for authentication round
|
| security.pam.services.<name>.logFailures | Whether to log authentication failures in /var/log/faillog.
|
| security.pam.services.<name>.forwardXAuth | Whether X authentication keys should be passed from the
calling user to the target user (e.g. for
su)
|
| services.zabbixServer.database.socket | Path to the unix socket file to use for authentication.
|
| services.peering-manager.oidcConfigPath | Path to the Configuration-File for OIDC-Authentication, will be loaded as oidc_config.py
|
| security.duosec.autopush | If true, Duo Unix will automatically send
a push login request to the user’s phone, falling back on a
phone call if push is unavailable
|
| services.movim.database.createLocally | local database using UNIX socket authentication
|
| services.peering-manager.ldapConfigPath | Path to the Configuration-File for LDAP-Authentication, will be loaded as ldap_config.py
|
| services.prometheus.scrapeConfigs.*.bearer_token_file | Sets the Authorization header on every scrape request with
the bearer token read from the configured file
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.id | IKE identity to expect for authentication round
|
| services.drupal.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| services.fwupd.extraTrustedKeys | Installing a public key allows firmware signed with a matching private key to be recognized as trusted, which may require less authentication to install than for untrusted files
|
| services.linux-enable-ir-emitter.enable | Whether to enable IR emitter hardware
|
| services.gitlab-runner.services.<name>.tagList | Tag list
|
| services.pixelfed.redis.createLocally | Whether to enable a local Redis database using UNIX socket authentication.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_id | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| services.mediawiki.database.socket | Path to the unix socket file to use for authentication.
|
| services.anuko-time-tracker.settings.email.smtpAuth | MTA requires authentication.
|
| services.anuko-time-tracker.settings.email.smtpUser | MTA authentication username.
|
| services.onlyoffice.postgresUser | The username OnlyOffice should use to connect to Postgresql
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.certs | List of certificate candidates to use for
authentication
|
| services.openafsServer.enable | Whether to enable the OpenAFS server
|
| services.keycloak.database.host | Hostname of the database to connect to
|
| services.kubernetes.kubelet.clientCaFile | Kubernetes apiserver CA file for client authentication.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_name | The application_credential_id or application_credential_name fields are
required if using an application credential to authenticate
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.pubkeys | List of raw public key candidates to use for
authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.send_cert | Send certificate payloads when using certificate authentication.
- With the default of
ifasked the daemon sends
certificate payloads only if certificate requests have been received.
never disables sending of certificate payloads
altogether,
always causes certificate payloads to be sent
unconditionally whenever certificate authentication is used
|
| services.limesurvey.database.socket | Path to the unix socket file to use for authentication.
|
| services.slurm.rest.environment.SLURM_JWT | This variable must be set to use JWT token authentication.
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.aaa_id | Server side EAP-Identity to expect in the EAP method
|
| boot.initrd.luks.devices.<name>.yubikey.iterationStep | How much the iteration count for PBKDF2 is increased at each successful authentication.
|
| programs._1password-gui.polkitPolicyOwners | A list of users who should be able to integrate 1Password with polkit-based authentication mechanisms.
|
| security.pam.services.<name>.duoSecurity.enable | If set, use the Duo Security pam module
pam_duo for authentication
|
| services.pixelfed.database.createLocally | Whether to enable a local database using UNIX socket authentication.
|
| services.wordpress.sites.<name>.database.socket | Path to the unix socket file to use for authentication.
|
| services.graylog.rootPasswordSha2 | You MUST specify a hash password for the root user (which you only need to initially set up the
system and in case you lose connectivity to your authentication backend)
This password cannot be changed using the API or via the web interface
|
| services.scrutiny.settings.web.influxdb.token | Authentication token for connecting to InfluxDB.
|
| services.mysql.galeraCluster.clusterPassword | Optional password for securing cluster communications
|
| services.chatgpt-retrieval-plugin.bearerTokenPath | Path to the secret bearer token used for the http api authentication.
|
| services.guacamole-client.settings | Configuration written to guacamole.properties.
The Guacamole web application uses one main configuration file called
guacamole.properties
|
| services.kubernetes.apiserver.tokenAuthFile | Kubernetes apiserver token authentication file
|
| services.kubernetes.apiserver.basicAuthFile | Kubernetes apiserver basic authentication file
|
| services.canaille.settings.CANAILLE.SMTP | SMTP configuration
|
| networking.wireless.fallbackToWPA2 | Whether to fall back to WPA2 authentication protocols if WPA3 failed
|
| services.gitlab-runner.services.<name>.runUntagged | Register to run untagged builds; defaults to
true when tagList is empty
|
| networking.wireless.networks.<name>.psk | The network's pre-shared key in plaintext defaulting
to being a network without any authentication.
Be aware that this will be written to the Nix store
in plaintext! Use pskRaw with an external
reference to keep it safe.
Mutually exclusive with pskRaw.
|
| services.prometheus.exporters.nut.nutUser | The user to log in into NUT server
|
| services.grafana.settings.smtp.password | Password used for authentication
|
| services.anuko-time-tracker.settings.email.smtpPasswordFile | Path to file containing the MTA authentication password.
|
| services.umami.createPostgresqlDatabase | Whether to automatically create the database for Umami using PostgreSQL
|
| services.gitlab-runner.services.<name>.protected | When set to true Runner will only run on pipelines
triggered on protected branches
|
| services.onlyoffice.postgresPasswordFile | Path to a file that contains the password OnlyOffice should use to connect to Postgresql
|
| services.prometheus.exporters.ipmi.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| services.strongswan-swanctl.swanctl.connections.<name>.unique | Connection uniqueness policy to enforce
|
| services.listmonk.database.settings.smtp.*.tls_type | Type of TLS authentication with the SMTP server
|
| services.gitlab-runner.services.<name>.maximumTimeout | What is the maximum timeout (in seconds) that will be set for
job when using this Runner. 0 (default) simply means don't limit
|
| services.roundcube.database.passwordFile | Password file for the postgresql connection
|
| services.sourcehut.settings."git.sr.ht::api".internal-ipnet | Set of IP subnets which are permitted to utilize internal API
authentication
|
| services.grafana.settings.server.root_url | This is the full URL used to access Grafana from a web browser
|
| services.mosquitto.listeners.*.omitPasswordAuth | Omits password checking, allowing anyone to log in with any user name unless
other mandatory authentication methods (eg TLS client certificates) are configured.
|
| services.sourcehut.settings."meta.sr.ht::api".internal-ipnet | Set of IP subnets which are permitted to utilize internal API
authentication
|
| services.kerberos_server.enable | Whether to enable the kerberos authentication server.
|
| services.strongswan-swanctl.swanctl.secrets.eap | EAP secret section for a specific secret
|
| services.sourcehut.settings."pages.sr.ht::api".internal-ipnet | Set of IP subnets which are permitted to utilize internal API
authentication
|
| services.dependency-track.settings."alpine.ldap.enabled" | Defines if LDAP will be used for user authentication
|
| services.suwayomi-server.settings.server.basicAuthEnabled | Whether to enable basic access authentication for Suwayomi-Server
|
| services.dependency-track.settings."alpine.oidc.enabled" | Defines if OpenID Connect will be used for user authentication
|
| services.strongswan-swanctl.swanctl.secrets.ntlm | NTLM secret section for a specific secret
|
| services.outline.oidcAuthentication.scopes | OpenID authentication scopes.
|
| services.outline.oidcAuthentication.clientId | Authentication client identifier.
|
| services.hercules-ci-agent.settings.clusterJoinTokenPath | Location of the cluster-join-token.key file
|
| services.dysnomia.enableAuthentication | Whether to publish privacy-sensitive authentication credentials
|
| services.outline.slackAuthentication.clientId | Authentication key.
|
| virtualisation.podman.networkSocket.tls.cacert | Path to CA certificate to use for client authentication.
|
| services.firefox-syncserver.database.createLocally | Whether to create database and user on the local machine if they do not exist
|
| services.outline.azureAuthentication.clientId | Authentication client identifier.
|
| services.prometheus.remoteRead.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.cloudflare-ddns.credentialsFile | Path to a file containing the Cloudflare API authentication token
|
| services.hostapd.radios.<name>.networks.<name>.macAcl | Station MAC address -based authentication
|
| services.outline.googleAuthentication.clientId | Authentication client identifier.
|
| services.prometheus.exporters.pgbouncer.webConfigFile | Path to configuration file that can enable TLS or authentication.
|
| services.prometheus.remoteWrite.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.outline.slackAuthentication.secretFile | File path containing the authentication secret.
|
| services.outline.oidcAuthentication.displayName | Display name for OIDC authentication.
|
| services.outline.discordAuthentication.clientId | Authentication client identifier.
|
| services.prometheus.remoteRead.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.mattermost.database.fromEnvironment | Use services.mattermost.environmentFile to configure the database instead of writing the database URI
to the Nix store
|
| services.prometheus.remoteWrite.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.outline.oidcAuthentication.clientSecretFile | File path containing the authentication secret.
|
| services.openssh.settings.AuthorizedPrincipalsFile | Specifies a file that lists principal names that are accepted for certificate authentication
|
| services.prometheus.scrapeConfigs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.outline.azureAuthentication.resourceAppId | Authentication application resource ID.
|
| services.prometheus.exporters.nextcloud.username | Username for connecting to Nextcloud
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_id | The project_id and project_name fields are optional for the Identity V2 API
|
| services.outline.azureAuthentication.clientSecretFile | File path containing the authentication secret.
|
| virtualisation.podman.networkSocket.enable | Make the Podman and Docker compatibility API available over the network
with TLS client certificate authentication
|
| services.outline.googleAuthentication.clientSecretFile | File path containing the authentication secret.
|
| services.prometheus.scrapeConfigs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| security.pam.services.<name>.googleAuthenticator.forwardPass | The authentication provides a single field requiring
the user's password followed by the one-time password (OTP).
|
| services.magnetico.web.credentialsFile | The path to the file holding the credentials to access the web
interface
|
| services.outline.discordAuthentication.clientSecretFile | File path containing the authentication secret.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.project_name | The project_id and project_name fields are optional for the Identity V2 API
|
| services.openssh.settings.PasswordAuthentication | Specifies whether password authentication is allowed.
|
| services.prometheus.exporters.artifactory.artiUsername | Username for authentication against JFrog Artifactory API.
|
| services.prometheus.exporters.artifactory.artiAccessToken | Access token for authentication against JFrog Artifactory API
|
| services.prometheus.exporters.artifactory.artiPassword | Password for authentication against JFrog Artifactory API
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.cert | Section for a certificate candidate to use for
authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cert | Section for a certificate candidate to use for
authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.local.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| services.ghostunnel.servers.<name>.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| services.grafana.settings.database.client_key_path | The path to the client key
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.certs | List of certificates to accept for authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.round | Optional numeric identifier by which authentication rounds are
sorted
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacert | Section for a CA certificate to accept for authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.eap_id | Identity to use as peer identity during EAP authentication
|
| services.prometheus.exporters.mail.configuration.servers.*.login | Username to use for SMTP authentication.
|
| services.openssh.settings.KbdInteractiveAuthentication | Specifies whether keyboard-interactive authentication is allowed.
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.cacerts | List of CA certificates to accept for
authentication
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.pubkeys | List of raw public keys to accept for
authentication
|
| services.grafana.settings.database.client_cert_path | The path to the client cert
|
| services.strongswan-swanctl.swanctl.connections.<name>.remote.<name>.ca_id | Identity in CA certificate to accept for authentication
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.application_credential_secret | The application_credential_secret field is required if using an application
credential to authenticate.
|
| services.prometheus.exporters.mail.configuration.servers.*.passphrase | Password to use for SMTP authentication.
|
| services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| <imports = [ pkgs.ghostunnel.services.default ]>.ghostunnel.disableAuthentication | Disable client authentication, no client certificate will be required.
|
| services.strongswan-swanctl.swanctl.connections.<name>.send_certreq | Send certificate request payloads to offer trusted root CA certificates to
the peer
|
| services.matrix-synapse.settings.macaroon_secret_key | Secret key for authentication tokens
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.http_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.kuma_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.strongswan-swanctl.swanctl.connections.<name>.mediation_peer | Identity under which the peer is registered at the mediation server, that
is, the IKE identity the other end of this connection uses as its local
identity on its connection to the mediation server
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| services.grafana.settings.security.csrf_trusted_origins | List of additional allowed URLs to pass by the CSRF check
|
| services.prometheus.scrapeConfigs.*.uyuni_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.azure_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.eureka_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.consul_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.triton_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.linode_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.docker_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.password | password for the Identity V2 and V3 APIs
|
| services.prometheus.scrapeConfigs.*.hetzner_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.puppetdb_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.scaleway_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.marathon_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.grafana.settings.security.csrf_additional_headers | List of allowed headers to be set by the user
|
| services.prometheus.scrapeConfigs.*.openstack_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.kubernetes_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.dockerswarm_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.key_file | Key file for client cert authentication to the server.
|
| services.prometheus.scrapeConfigs.*.digitalocean_sd_configs.*.tls_config.cert_file | Certificate file for client cert authentication to the server.
|