| nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| nix.sshServe.trusted | Whether to add nix-ssh to the nix.settings.trusted-users
|
| nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| users.users | Additional user accounts to be created automatically by the system
|
| users.motd | Message of the day shown to users when they log in.
|
| users.users.<name>.home | The user's home directory.
|
| users.users.<name>.uid | The account UID
|
| users.motdFile | A file containing the message of the day shown to users when they log in.
|
| users.users.<name>.group | The user's primary group.
|
| users.users.<name>.name | The name of the user account
|
| nix.settings.trusted-public-keys | List of public keys used to sign binary caches
|
| users.groups | Additional groups to be created automatically by the system.
|
| power.ups.users | Users that can access upsd
|
| users.extraUsers | Alias of users.users.
|
| users.users.<name>.enable | If set to false, the user account will not be created
|
| users.users.<name>.shell | The path to the user's shell
|
| users.users.<name>.extraGroups | The user's auxiliary groups.
|
| users.users.<name>.homeMode | The user's home directory mode in numeric format
|
| users.users.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| users.mysql.pam | Settings for pam_mysql
|
| users.users.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| users.ldap.base | The distinguished name of the search base.
|
| users.users.<name>.packages | The set of packages that should be made available to the user
|
| users.users.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| users.extraGroups | Alias of users.groups.
|
| users.users.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| users.defaultUserHome | The default home directory for normal users.
|
| users.mysql.host | The hostname of the MySQL/MariaDB server
|
| users.mysql.user | The username to use when connecting to the database
|
| users.users.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| nix.settings.require-sigs | If enabled (the default), Nix will only download binaries from binary caches if
they are cryptographically signed with any of the keys listed in
nix.settings.trusted-public-keys
|
| users.ldap.server | The URL of the LDAP server.
|
| users.ldap.loginPam | Whether to include authentication against LDAP in login PAM.
|
| users.users.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| users.mysql.nss | Settings for libnss-mysql
|
| users.ldap.enable | Whether to enable authentication against an LDAP server.
|
| users.mysql.pam.where | Additional criteria for the query.
|
| users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| users.ldap.useTLS | If enabled, use TLS (encryption) over an LDAP (port 389)
connection
|
| users.mysql.pam.table | The name of table that maps unique login names to the passwords.
|
| users.mysql.enable | Whether to enable authentication against a MySQL/MariaDB database.
|
| users.mysql.database | The name of the database containing the users
|
| users.groups.<name>.gid | The group GID
|
| users.manageLingering | Whether to manage whether users linger or not.
|
| boot.initrd.systemd.users | Users to include in initrd.
|
| users.extraUsers.<name>.home | The user's home directory.
|
| users.ldap.timeLimit | Specifies the time limit (in seconds) to use when performing
searches
|
| users.groups.<name>.name | The name of the group
|
| users.extraUsers.<name>.uid | The account UID
|
| users.extraUsers.<name>.group | The user's primary group.
|
| users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| users.users.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| users.mysql.pam.userColumn | The name of the column that contains a unix login name.
|
| users.extraUsers.<name>.name | The name of the user account
|
| programs.weylus.users | To enable stylus and multi-touch support, the user you're going to use must be added to this list
|
| users.ldap.nsswitch | Whether to include lookup against LDAP in NSS.
|
| users.extraGroups.<name>.gid | The group GID
|
| users.ldap.bind.timeLimit | Specifies the time limit (in seconds) to use when connecting
to the directory server
|
| power.ups.users.<name>.upsmon | Add the necessary actions for a upsmon process to work
|
| users.extraGroups.<name>.name | The name of the group
|
| users.mysql.pam.verbose | If enabled, produces logs with detailed messages that describes what
pam_mysql is doing
|
| users.defaultUserShell | This option defines the default shell assigned to user
accounts
|
| users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| programs.benchexec.users | Users that intend to use BenchExec
|
| users.enforceIdUniqueness | Whether to require that no two users/groups share the same uid/gid.
|
| users.mysql.nss.getspnam | SQL query for the getspnam
syscall.
|
| users.mysql.nss.getgrent | SQL query for the getgrent
syscall.
|
| users.mysql.nss.getspent | SQL query for the getspent
syscall.
|
| users.mysql.nss.getgrgid | SQL query for the getgrgid
syscall.
|
| users.mysql.nss.getgrnam | SQL query for the getgrnam
syscall.
|
| users.mysql.nss.getpwuid | SQL query for the getpwuid
syscall.
|
| users.mysql.nss.getpwnam | SQL query for the getpwnam
syscall.
|
| users.mysql.nss.getpwent | SQL query for the getpwent
syscall.
|
| services.nntp-proxy.users | NNTP-Proxy user configuration
|
| users.mysql.pam.updateTable | The name of the table used for password alteration
|
| users.mysql.pam.logging.table | The name of the table to which logs are written.
|
| users.extraUsers.<name>.packages | The set of packages that should be made available to the user
|
| services.murmur.users | Maximum number of concurrent clients allowed.
|
| users.mysql.passwordFile | The path to the file containing the password for the user
|
| boot.loader.grub.users | User accounts for GRUB
|
| power.ups.users.<name>.actions | Allow the user to do certain things with upsd
|
| users.mysql.pam.cryptDefault | The default encryption method to use for passwordCrypt = 1.
|
| users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| users.ldap.extraConfig | Extra configuration options that will be added verbatim at
the end of the ldap configuration file (ldap.conf(5))
|
| users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| users.extraUsers.<name>.enable | If set to false, the user account will not be created
|
| users.extraUsers.<name>.shell | The path to the user's shell
|
| users.extraUsers.<name>.extraGroups | The user's auxiliary groups.
|
| users.mutableUsers | If set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands
|
| users.extraUsers.<name>.homeMode | The user's home directory mode in numeric format
|
| users.extraUsers.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| users.extraUsers.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| users.mysql.pam.logging.enable | Enables logging of authentication attempts in the MySQL database.
|
| users.ldap.bind.passwordFile | The path to a file containing the credentials to use when binding
to the LDAP server (if not binding anonymously).
|
| users.mysql.nss.memsbygid | SQL query for the memsbygid
syscall.
|
| users.mysql.nss.gidsbymem | SQL query for the gidsbymem
syscall.
|
| boot.loader.grub.users.<name>.password | Specifies the clear text password for the account
|
| users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| users.ldap.daemon.extraConfig | Extra configuration options that will be added verbatim at
the end of the nslcd configuration file (nslcd.conf(5)).
|
| services._3proxy.usersFile | Load users and passwords from this file
|
| services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| security.doas.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| security.sudo.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| users.mysql.pam.logging.msgColumn | The name of the column in the log table to which the description
of the performed operation is stored.
|
| users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| security.sudo-rs.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| users.extraUsers.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| services.anki-sync-server.users | List of user-password pairs to provide to the sync server.
|
| boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| boot.initrd.systemd.users.<name>.shell | The path to the user's shell in initrd.
|
| users.mysql.pam.passwordColumn | The name of the column that contains a (encrypted) password string.
|
| users.mysql.pam.logging.timeColumn | The name of the column in the log table to which the timestamp of the
log entry is stored.
|
| users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| services.crossmacro.users | List of users granted permission to use CrossMacro.
|
| users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| users.extraUsers.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| systemd.user.tmpfiles.users | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically.
|
| power.ups.users.<name>.passwordFile | The full path to a file that contains the user's (clear text)
password
|
| users.ldap.bind.policy | Specifies the policy to use for reconnecting to an unavailable
LDAP server
|
| users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| power.ups.users.<name>.instcmds | Let the user initiate specific instant commands
|
| users.extraUsers.<name>.linger | Whether to enable or disable lingering for this user
|
| services._3proxy.services.*.acl.*.users | List of users, use empty list for any.
|
| services.grafana.settings.users.hidden_users | This is a comma-separated list of usernames
|
| boot.loader.grub.users.<name>.hashedPassword | Specifies the password hash for the account,
generated with grub-mkpasswd-pbkdf2
|
| programs.idescriptor.users | Users to be added to the idevice group.
|
| services.pgbouncer.settings.users | Optional
|
| users.mysql.pam.logging.rHostColumn | The name of the column in the log table to which the name of the remote
host that initiates the session is stored
|
| users.extraUsers.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| services.grafana.settings.users.home_page | Path to a custom home page
|
| services.bitcoind.<name>.rpc.users | RPC user information for JSON-RPC connections.
|
| users.ldap.daemon.enable | Whether to let the nslcd daemon (nss-pam-ldapd) handle the
LDAP lookups for NSS and PAM
|
| services.dokuwiki.sites.<name>.usersFile | Location of the dokuwiki users file
|
| services.samba.settings.global."invalid users" | List of users who are denied to login via Samba.
|
| hardware.openrazer.users | Usernames to be added to the "openrazer" group, so that they
can start and interact with the OpenRazer userspace daemon.
|
| systemd.sysusers.enable | If enabled, users are created with systemd-sysusers instead of with
the custom update-users-groups.pl script
|
| security.pam.oath.usersFile | Set the path to file where the user's credentials are
stored
|
| nix.settings.trusted-substituters | List of binary cache URLs that non-root users can use (in
addition to those specified using
nix.settings.substituters) by passing
--option binary-caches to Nix commands.
|
| services.nntp-proxy.users.<name>.username | Username
|
| services.influxdb2.provision.users | Users to provision.
|
| users.users.<name>.password | Specifies the (clear text) password for the user
|
| services.anki-sync-server.users.*.password | Password accepted by anki-sync-server for the associated username.
WARNING: This option is not secure
|
| services.grafana.settings.users.allow_sign_up | Set to false to prohibit users from being able to sign up / create user accounts
|
| services.bitcoind.<name>.rpc.users.<name>.name | Username for JSON-RPC connections.
|
| services.mosquitto.listeners.*.users | A set of users and their passwords and ACLs.
|
| services.mtprotoproxy.users | Allowed users and their secrets
|
| users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| boot.loader.grub.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the account
|
| systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| services.anki-sync-server.users.*.username | User name accepted by anki-sync-server.
|
| users.ldap.daemon.rootpwmoddn | The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
|
| services.grafana.settings.users.login_hint | Text used as placeholder text on login page for login/username input.
|
| services.nntp-proxy.users.<name>.passwordHash | SHA-512 password hash (can be generated by
mkpasswd -m sha-512 <password>)
|
| users.ldap.daemon.rootpwmodpwFile | The path to a file containing the credentials with which to bind to
the LDAP server if the root user tries to change a user's password.
|
| users.users.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| users.extraUsers.<name>.description | A short description of the user account, typically the
user's full name
|
| users.extraUsers.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| services.anki-sync-server.users.*.passwordFile | File containing the password accepted by anki-sync-server for
the associated username
|
| nix.nrBuildUsers | Number of nixbld user accounts created to
perform secure concurrent builds
|
| users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| services.grafana.settings.users.auto_assign_org | Set to true to automatically add new users to the main organization (id 1)
|
| users.users.<name>.hashedPassword | Specifies the hashed password for the user
|
| services.cloudlog.update-lotw-users.enable | Whether to periodically update the list of LoTW users
|
| users.ldap.bind.distinguishedName | The distinguished name to bind to the LDAP server with
|
| services.vsftpd.virtualUseLocalPrivs | If enabled, virtual users will use the same privileges as local
users
|
| services.bitwarden-directory-connector-cli.sync.users | Sync users.
|
| services.freeciv.settings.Newusers | Whether to enable new users to login if auth is enabled.
|
| services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| services.nntp-proxy.users.<name>.maxConnections | Maximum number of concurrent connections to the proxy for this user
|
| services.mosquitto.listeners.*.users.<name>.acl | Control client access to topics on the broker.
|
| users.mysql.pam.passwordCrypt | The method to encrypt the user's password:
0 (or "plain"):
No encryption
|
| services.grafana.settings.users.password_hint | Text used as placeholder text on login page for password input.
|
| services.grafana.settings.users.default_theme | Sets the default UI theme. system matches the user's system theme.
|
| services.grafana.settings.users.allow_org_create | Set to false to prohibit users from creating new organizations.
|
| services.bitcoind.<name>.rpc.users.<name>.passwordHMAC | Password HMAC-SHA-256 for JSON-RPC connections
|
| users.mysql.pam.disconnectEveryOperation | By default, pam_mysql keeps the connection to the MySQL
database until the session is closed
|
| users.users.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| services.paretosecurity.users | Per-user Pareto Security configuration.
|
| services.influxdb2.provision.users.<name>.present | Whether to ensure that this user is present or absent.
|
| users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| services.clickhouse.usersConfig | Your users.yaml as a Nix attribute set
|
| services.mosquitto.listeners.*.users.<name>.password | Specifies the (clear text) password for the MQTT User.
|
| services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| services.grafana.settings.users.auto_assign_org_id | Set this value to automatically add new users to the provided org
|
| services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| services.grafana.settings.users.default_language | This setting configures the default UI language, which must be a supported IETF language tag, such as en-US.
|
| services.grafana.settings.users.viewers_can_edit | Viewers can access and use Explore and perform temporary edits on panels in dashboards they have access to
|
| services.cloudlog.update-lotw-users.interval | Specification (in the format described by systemd.time(7)) of the
time at which the LoTW user update will occur.
|
| services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| services.incron.allow | Users allowed to use incrontab
|
| services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| services.mosquitto.listeners.*.users.<name>.hashedPassword | Specifies the hashed password for the MQTT User
|
| services.taskserver.organisations.<name>.users | A list of user names that belong to the organization.
|
| services.grafana.settings.users.auto_assign_org_role | The role new users will be assigned for the main organization (if the auto_assign_org setting is set to true).
|
| users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| services.headscale.settings.oidc.allowed_users | Users allowed to authenticate even if not in allowedDomains.
|
| services.umurmur.settings.max_users | Maximum number of concurrent clients allowed.
|
| services.postgresql.ensureUsers | Ensures that the specified users exist
|
| services.tt-rss.plugins | List of plugins to load automatically for all users
|
| services.calibre-server.auth.userDb | Choose users database file to use for authentication
|
| services.fcron.deny | Users forbidden from using fcron.
|
| services.grafana.settings.users.verify_email_enabled | Require email validation before sign up completes.
|
| users.extraUsers.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| hardware.i2c.group | Grant access to i2c devices (/dev/i2c-*) to users in this group.
|
| users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| users.extraUsers.<name>.hashedPassword | Specifies the hashed password for the user
|
| services.incron.deny | Users forbidden from using incrontab.
|
| programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| programs.cdemu.group | Group that users must be in to use cdemu.
|
| services.tor.relay.role | Your role in Tor network
|
| services.prosody.modules.blocklist | Allow users to block communications with other users
|
| services.logrotate.checkConfig | Whether the config should be checked at build time
|
| programs.fuse.mountMax | Set the maximum number of FUSE mounts allowed to non-root users.
|
| programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| services.oauth2-proxy.google.adminEmail | The Google Admin to impersonate for API calls
|
| programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| security.polkit.adminIdentities | Specifies which users are considered “administrators”, for those
actions that require the user to authenticate as an
administrator (i.e. have an auth_admin
value)
|
| security.pam.services.<name>.unixAuth | Whether users can log in with passwords defined in
/etc/shadow.
|
| services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| services.matrix-synapse.settings.presence.enabled | Whether to enable presence tracking
|
| services.postgresql.identMap | Defines the mapping from system users to database users
|
| security.loginDefs.settings.UID_MIN | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| security.loginDefs.settings.UID_MAX | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| services.guix.nrBuildUsers | Number of Guix build users to be used in the build pool.
|
| services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| security.sudo.enable | Whether to enable the sudo command, which
allows non-root users to execute commands as root.
|
| security.doas.enable | Whether to enable the doas command, which allows
non-root users to execute commands as root.
|
| services.samba.usershares.enable | Whether to enable user-configurable Samba shares.
|
| users.extraUsers.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| security.loginDefs.settings.SYS_UID_MAX | Range of user IDs used for the creation of system users by useradd or newusers.
|
| security.loginDefs.settings.SYS_UID_MIN | Range of user IDs used for the creation of system users by useradd or newusers.
|
| services.vsftpd.userDbPath | Only applies if enableVirtualUsers is true
|
| security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| programs.ydotool.group | Group which users must be in to use ydotool.
|
| services.syncplay.chat | Chat with users in the same room.
|
| programs.rush.shell | The resolved shell path that users can inherit to set rush as their login shell
|
| services.vsftpd.localUsers | Whether to enable FTP for local users.
|
| hardware.sane.enable | Enable support for SANE scanners.
Users in the "scanner" group will gain access to the scanner, or the "lp" group if it's also a printer.
|
| services.weblate.smtp.host | SMTP host used when sending emails to users.
|
| services.weblate.smtp.port | SMTP port used when sending emails to users.
|
| security.sudo-rs.enable | Whether to enable a memory-safe implementation of the sudo command,
which allows non-root users to execute commands as root
.
|
| security.ipa.ifpAllowedUids | A list of users allowed to access the ifp dbus interface.
|
| services.exim.user | User to use when no root privileges are required
|
| services.syncplay.ready | Check readiness of users.
|
| hardware.i2c.enable | Whether to enable i2c devices support
|
| hardware.brillo.enable | Whether to enable brillo in userspace
|
| security.pam.p11.enable | Enables P11 PAM (pam_p11) module
|
| programs.fuse.userAllowOther | Allow non-root users to specify the allow_other or allow_root mount
options, see mount.fuse3(8).
|
| services.tt-rss.auth.autoCreate | Allow authentication modules to auto-create users in tt-rss internal
database when authenticated successfully.
|
| services.ombi.enable | Whether to enable Ombi, a web application that automatically gives your shared Plex or
Emby users the ability to request content by themselves!
Optionally see https://docs.ombi.app/info/reverse-proxy
on how to set up a reverse proxy
.
|
| services.vsftpd.writeEnable | Whether any write activity is permitted to users.
|
| hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| security.please.enable | Whether to enable please, a Sudo clone which allows a users to execute a command or edit a
file as another user
.
|
| services.biboumi.settings.admin | The bare JID of the gateway administrator
|
| services.kubo.settings.Mounts.FuseAllowOther | Allow all users to access the FUSE mount points
|
| programs.pmount.enable | Whether to enable pmount, a tool that allows normal users to mount removable devices
without requiring root privileges
.
|
| services.openssh.settings.LogLevel | Gives the verbosity level that is used when logging messages from sshd(8)
|
| services.angrr.settings.owned-only | Only monitors owned symbolic link target of GC roots.
- "auto": behaves like true for normal users, false for root.
- "true": only monitor GC roots owned by the current user.
- "false": monitor all GC roots.
|
| security.pam.howdy.enable | Whether to enable the Howdy PAM module
|
| security.pam.dp9ik.enable | Whether to enable the dp9ik pam module provided by tlsclient
|
| services.openssh.settings.DenyUsers | If specified, login is denied for all listed users
|
| services.openssh.settings.AllowUsers | If specified, login is allowed only for the listed users
|
| services.maubot.settings.admins | List of administrator users
|
| services.dawarich.smtp.host | SMTP host used when sending emails to users.
|
| services.dawarich.smtp.port | SMTP port used when sending emails to users.
|
| services.mastodon.smtp.host | SMTP host used when sending emails to users.
|
| services.mastodon.smtp.port | SMTP port used when sending emails to users.
|
| services.sympa.listMasters | The list of the email addresses of the listmasters
(users authorized to perform global server commands).
|
| services.dovecot2.mailUser | Default user to store mail for virtual users.
|
| services.cryptpad.settings.adminKeys | List of public signing keys of users that can access the admin panel
|
| security.sudo.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| services.jupyter.group | Name of the group used to run the jupyter service
|
| services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| security.sudo-rs.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| services.syncplay.motdFile | Path to text to display when users join
|
| services.sftpgo.loadDataFile | Path to a json file containing users and folders to load (or update) on startup
|
| services.openssh.settings.DenyGroups | If specified, login is denied for all users part of the listed
groups
|
| services.prosody.modules.mam | Store messages in an archive and allow users to access it
|
| services.openssh.settings.AllowGroups | If specified, login is allowed only for users part of the
listed groups
|
| services.prosody.modules.motd | Send a message to users when they log in
|
| programs.minipro.enable | Whether to enable minipro and its udev rules
|
| services.dovecot2.mailGroup | Default group to store mail for virtual users.
|
| services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| security.duosec.groups | If specified, Duo authentication is required only for users
whose primary group or supplementary group list matches one
of the space-separated pattern lists
|
| services.tt-rss.singleUserMode | Operate in single user mode, disables all functionality related to
multiple users and authentication
|
| services.prosody.modules.pep | Enables users to publish their mood, activity, playing music and more
|
| services.diod.allsquash | Remap all users to "nobody"
|
| services.drupal.sites.<name>.themesDir | The location for users to install Drupal themes.
|
| services.glitchtip.settings.ENABLE_USER_REGISTRATION | When true, any user will be able to register
|
| services.syncplay.motd | Text to display when users join
|
| services.prosody.modules.vcard | Allow users to set vCards
|
| services.timekpr.adminUsers | All listed users will become part of the timekpr group so they can manage timekpr settings without requiring sudo.
|
| services.kea.dhcp4.configFile | Kea DHCP4 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp4-srv.html
|
| services.kea.dhcp6.configFile | Kea DHCP6 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp6-srv.html
|
| services.kea.dhcp-ddns.configFile | Kea DHCP-DDNS configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/ddns.html
|
| virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| networking.wireless.userControlled | Allow users of the wpa_supplicant group to control wpa_supplicant
through wpa_gui or wpa_cli
|
| services.coturn.realm | The default realm to be used for the users when no explicit
origin/realm relationship was found in the database, or if the TURN
server is not using any database (just the commands-line settings
and the userdb file)
|
| services.coturn.no-auth | This option is opposite to lt-cred-mech.
(TURN Server with no-auth option allows anonymous access)
|
| programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| services.bitlbee.authBackend | How users are authenticated
storage -- save passwords internally
pam -- Linux PAM authentication
|
| services.alerta.signupEnabled | Whether to prevent sign-up of new users via the web UI
|
| services.prosody.modules.roster | Allow users to have a roster
|
| security.doas.extraRules.*.runAs | Which user or group the specified command is allowed to run as
|
| services.hologram-server.ldapBaseDN | The base DN for your Hologram users
|
| services.sourcehut.settings."todo.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| services.cryptpad.settings.httpUnsafeOrigin | This is the URL that users will enter to load your instance
|
| services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| services.vsftpd.userlistEnable | Whether users are included.
|
| networking.wireless.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| services.kea.ctrl-agent.configFile | Kea Control Agent configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/agent.html
|
| services.tt-rss.forceArticlePurge | When this option is not 0, users ability to control feed purging
intervals is disabled and all articles (which are not starred)
older than this amount of days are purged.
|
| security.pam.krb5.enable | Enables Kerberos PAM modules (pam-krb5,
pam-ccreds)
|
| security.pam.yubico.enable | Enables Yubico PAM (yubico-pam) module
|
| security.loginDefs.chfnRestrict | Use chfn SUID to allow non-root users to change their account GECOS information.
|
| services.zeitgeist.enable | Whether to enable zeitgeist, a service which logs the users' activities and events.
|
| services.vsftpd.forceLocalDataSSL | Only applies if sslEnable is true
|
| services.aria2.enable | Whether or not to enable the headless Aria2 daemon service
|
| programs.mouse-actions.enable | Whether to install and set up mouse-actions and it's udev rules
|
| services.sourcehut.settings."lists.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| services.sourcehut.settings."builds.sr.ht".allow-free | Whether to enable nonpaying users to submit builds.
|
| services.sourcehut.settings."todo.sr.ht::mail".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| services.sourcehut.settings."pages.sr.ht".user-domain | Configures the user domain, if enabled
|
| security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| hardware.acpilight.enable | Enable acpilight
|
| services.dawarich.smtp.fromAddress | "From" address used when sending emails to users.
|
| services.mastodon.smtp.fromAddress | "From" address used when sending Emails to users.
|
| services.prosody.modules.welcome | Welcome users who register accounts
|
| services.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate users via tailscale.
|
| security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| services.vsftpd.forceLocalLoginsSSL | Only applies if sslEnable is true
|
| services.spacecookie.settings.log.hide-ips | If enabled, spacecookie will hide personal
information of users like IP addresses from
log output.
|
| security.sudo.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| security.doas.wheelNeedsPassword | Whether users of the wheel group must provide a password to
run commands as super user via doas.
|
| security.pam.dp9ik.authserver | This controls the hostname for the 9front authentication server
that users will be authenticated against.
|
| services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| networking.supplicant.<name>.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| security.sudo-rs.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| services.upower.ignoreLid | Do we ignore the lid state
Some laptops are broken
|
| services.pgmanage.loginGroup | This tells pgmanage to only allow users in a certain PostgreSQL group to
login to pgmanage
|
| services.freshrss.api.enable | Whether to enable API access for mobile apps and third-party clients (Google Reader API and Fever API)
|
| services.dependency-track.settings."alpine.oidc.user.provisioning" | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| services.bitlbee.authMode | The following authentication modes are available:
Open -- Accept connections from anyone, use NickServ for user authentication
|
| security.pam.services.<name>.ttyAudit.enable | Enable or disable TTY auditing for specified users
|
| security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| services.terraria.enable | If enabled, starts a Terraria server
|
| security.run0.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via run0.
|
| services.portunus.seedSettings | Seed settings for users and groups
|
| services.displayManager.hiddenUsers | A list of users which will not be shown in the display manager.
|
| services.anuko-time-tracker.settings.multiorgMode | Defines whether users see the Register option in the menu of Time Tracker that allows them
to self-register and create new organizations (top groups).
|
| security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| services.sourcehut.settings."lists.sr.ht::worker".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| services.xserver.imwheel.rules | Window class translation rules.
/etc/X11/imwheelrc is generated based on this config
which means this config is global for all users
|
| services.prosody.modules.announce | Send announcement to all online users
|
| services.openafsClient.daemons | Number of daemons to serve user requests
|
| services.kanidm.provision.enable | Whether to enable provisioning of groups, users and oauth2 resource servers.
|
| hardware.keyboard.uhk.enable | Whether to enable non-root access to the firmware of UHK keyboards
|
| programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| programs.steam.fontPackages | Font packages to use in Steam
|
| services.nginx.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate nginx users via tailscale.
|
| services.szurubooru.server.settings.secretFile | File containing a secret used to salt the users' password hashes and generate filenames for static content.
|
| security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| services.prosody.modules.register | Allow users to register on this server using a client and change passwords
|
| hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| security.please.wheelNeedsPassword | Whether users of the wheel group must provide a password to run
commands or edit files with please and
pleaseedit respectively.
|
| virtualisation.spiceUSBRedirection.enable | Install the SPICE USB redirection helper with setuid
privileges
|
| security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| services.vsftpd.anonymousMkdirEnable | Whether any uploads are permitted to anonymous users.
|
| services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| services.tuliprox.apiProxySettings | Users and proxy configuration
Refer to the Tuliprox documentation for available attributes
|
| programs.hyprland.withUWSM | Launch Hyprland with the UWSM (Universal Wayland Session Manager) session manager
|
| programs.chromium.initialPrefs | Initial preferences are used to configure the browser for the first run
|
| fonts.fontconfig.antialias | Enable font antialiasing
|
| services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| services.dependency-track.oidc.userProvisioning | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| services.userdbd.enableSSHSupport | Whether to enable exposing OpenSSH public keys defined in userdb
|
| services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| services.pipewire.systemWide | If true, a system-wide PipeWire service and socket is enabled
allowing all users in the "pipewire" group to use it simultaneously
|
| services.pretix.settings.pretix.registration | Whether to allow registration of new admin users.
|
| services.vsftpd.chrootlocalUser | Whether local users are confined to their home directory.
|
| services.vsftpd.anonymousUploadEnable | Whether any uploads are permitted to anonymous users.
|
| services.transmission.settings.umask | Sets transmission's file mode creation mask
|
| services.thelounge.public | Make your The Lounge instance public
|
| services.grafana.settings.users.user_invite_max_lifetime_duration | The duration in time a user invitation remains valid before expiring
|
| services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| services.movim.minifyStaticFiles | Do minification on public static files which reduces the size of
assets — saving data for the server & users as well as offering a
performance improvement
|
| environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| services.matrix-tuwunel.settings.global.allow_registration | Whether new users can register on this server
|
| services.firezone.gui-client.allowedUsers | All listed users will become part of the firezone-client group so
they can control the tunnel service
|
| services.buildbot-master.reporters | List of reporter objects used to present build status to various users.
|
| services.systembus-notify.enable | Whether to enable System bus notification support
WARNING: enabling this option (while convenient) should not be done on a
machine where you do not trust the other users as it allows any other
local user to DoS your session by spamming notifications
.
|
| services.grafana.settings.server.enable_gzip | Set this option to true to enable HTTP compression, this can improve transfer speed and bandwidth utilization
|
| services.iperf3.authorizedUsersFile | Path to the configuration file containing authorized users credentials to run iperf tests.
|
| services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| fonts.fontconfig.hinting.enable | Enable font hinting
|
| services.anubis.defaultOptions.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| services.pgbouncer.settings.pgbouncer.max_client_conn | Maximum number of client connections allowed
|
| services.tt-rss.registration.maxUsers | Maximum amount of users which will be allowed to register on this
system. 0 - no limit.
|
| services.hylafax.userAccessFile | The hosts.hfaxd
file entry in the spooling area
will be symlinked to the location given here
|
| services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| system.extraDependencies | A list of paths that should be included in the system
closure but generally not visible to users
|
| services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| services.userborn.static | Whether to generate the password files at build time and store them directly
in the system closure, without requiring any services at boot time
|
| services.dependency-track.settings."alpine.oidc.teams.default" | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| services.mtprotoproxy.secureOnly | Don't allow users to connect in non-secure mode (without random padding).
|
| services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| services.akkoma.config.":pleroma".":frontends" | Frontend configuration
|
| services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| boot.initrd.network.ssh.hostKeys | Specify SSH host keys to import into the initrd
|
| networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| services.sourcehut.settings."meta.sr.ht::settings".onboarding-redirect | Where to redirect new users upon registration.
|
| programs._1password-gui.polkitPolicyOwners | A list of users who should be able to integrate 1Password with polkit-based authentication mechanisms.
|
| services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| services.matrix-continuwuity.settings.global.allow_registration | Whether new users can register on this server
|
| services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| fonts.fontconfig.subpixel.lcdfilter | FreeType LCD filter
|
| environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| services.syncthing.openDefaultPorts | Whether to open the default ports in the firewall: TCP/UDP 22000 for transfers
and UDP 21027 for discovery
|
| services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| services.umurmur.settings.default_channel | The channel in which users will appear in when connecting.
|
| services.nginx.tailscaleAuth.expectedTailnet | If you want to prevent node sharing from allowing users to access services
across tailnets, declare your expected tailnets domain here.
|
| services.pulseaudio.systemWide | If false, a PulseAudio server is launched automatically for
each user that tries to use the sound system
|
| services.tt-rss.registration.enable | Allow users to register themselves
|
| services.xserver.displayManager.startx.enable | Whether to enable the dummy "startx" pseudo-display manager, which
allows users to start X manually via the startx command from a
virtual terminal.
The X server will run under the current user, not as root.
|
| services.meilisearch.noAnalytics | Deactivates analytics
|
| services.aria2.downloadDirPermission | The permission for settings.dir
|
| services.postfix.localRecipients | List of accepted local users
|
| security.unprivilegedUsernsClone | When disabled, unprivileged users will not be able to create new namespaces
|
| networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| services.dependency-track.oidc.teams.default | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| services.prosody.modules.vcard_legacy | Converts users profiles and Avatars between old and new formats
|
| services.hydra.useSubstitutes | Whether to use binary caches for downloading store paths
|
| documentation.man.man-db.manualPages | The manual pages to generate caches for if documentation.man.generateCaches
is enabled
|
| services.paperless.consumptionDirIsPublic | Whether all users can write to the consumption dir.
|
| services.warpgate.settings.config_provider | Source of truth of users
|
| services.smartd.notifications.wall.enable | Whenever to send wall notifications to all users.
|
| services.transmission.enable | Whether to enable the headless Transmission BitTorrent daemon
|
| services._3proxy.services.*.auth | Authentication type
|
| services.prosody.modules.cloud_notify | Push notifications to inform users of new messages or other pertinent information even when they have no XMPP clients online
|
| services.dependency-track.frontend.baseUrl | The base URL of the API server
|
| security.dhparams.params | Diffie-Hellman parameters to generate
|
| virtualisation.docker.enable | This option enables docker, a daemon that manages
linux containers
|
| virtualisation.lxd.enable | This option enables lxd, a daemon that manages
containers
|
| hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| services.xserver.displayManager.sx.enable | Whether to enable the "sx" pseudo-display manager, which allows users
to start manually via the "sx" command from a vt shell
|
| environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| services.firezone.server.provision.accounts.<name>.actors | All actors (users) to provision
|
| virtualisation.kvmgt.enable | Whether to enable KVMGT (iGVT-g) VGPU support
|
| services.linkwarden.enableRegistration | Whether to enable registration for new users.
|
| services.bitwarden-directory-connector-cli.sync.userFilter | LDAP filter for users.
|
| services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| services.healthchecks.settings.REGISTRATION_OPEN | A boolean that controls whether site visitors can create new accounts
|
| virtualisation.libvirtd.enable | This option enables libvirtd, a daemon that manages
virtual machines
|
| services.prosody.xmppComplianceSuite | The XEP-0423 defines a set of recommended XEPs to implement
for a server
|
| services.bitwarden-directory-connector-cli.sync.largeImport | Enable if you are syncing more than 2000 users/groups.
|
| environment.corePackages | Set of core packages for a normal interactive system
|
| services.i2pd.precomputation.elgamal | Whenever to use precomputated tables for ElGamal.
i2pd defaults to false
to save 64M of memory (and looses some performance)
|
| services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| services.bitwarden-directory-connector-cli.sync.userObjectClass | Class that users must have.
|
| services.netbird.server.management.singleAccountModeDomain | Enables single account mode
|
| services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| programs.opengamepadui.fontPackages | Font packages to use in OpenGamepadUI
|
| services.alerta.authenticationRequired | Whether users must authenticate when using the web UI or command-line tool
|
| services.grafana.provision.datasources.settings.datasources.*.editable | Allow users to edit datasources from the UI.
|
| services.gitea.captcha.requireForExternalRegistration | Displays a CAPTCHA challenge for users that register externally.
|
| services.nextcloud.settings.skeletondirectory | The directory where the skeleton files are located
|
| virtualisation.podman.dockerSocket.enable | Make the Podman socket available in place of the Docker socket, so
Docker tools can find the Podman socket
|
| networking.networkmanager.enable | Whether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured
|
| services.bitwarden-directory-connector-cli.sync.removeDisabled | Remove users from bitwarden groups if no longer in the ldap group.
|
| security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| virtualisation.docker.rootless.setSocketVariable | Point DOCKER_HOST to rootless Docker instance for
normal users by default.
|
| services.firezone.server.smtp.configureManually | Outbound email configuration is mandatory for Firezone and supports
many different delivery adapters
|
| system.stateVersion | This option defines the first version of NixOS you have installed on this particular machine,
and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions
|
| services.bitwarden-directory-connector-cli.sync.userEmailAttribute | Attribute for a users email.
|
| services.matrix-conduit.settings.global.allow_registration | Whether new users can register on this server.
|
| services.earlyoom.enableNotifications | Send notifications about killed processes via the system d-bus
|
| services.bitwarden-directory-connector-cli.sync.emailPrefixAttribute | The attribute that contains the users username.
|
| services.matrix-synapse.settings.enable_registration | Enable registration for new users.
|
| security.pam.services.<name>.googleOsLoginAccountVerification | If set, will use the Google OS Login PAM modules
(pam_oslogin_login,
pam_oslogin_admin) to verify possible OS Login
users and set sudoers configuration accordingly
|
| security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| services.bitwarden-directory-connector-cli.sync.overwriteExisting | Remove and re-add users/groups, See https://bitwarden.com/help/user-group-filters/#overwriting-syncs for more details.
|
| services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| services.smartd.notifications.systembus-notify.enable | Whenever to send systembus-notify notifications
|
| virtualisation.lxc.unprivilegedContainers | Whether to enable support for unprivileged users to launch containers.
|
| services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| services.biboumi.settings.realname_customization | Whether the users will be able to use
the ad-hoc commands that lets them configure
their realname and username.
|
| services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| services.pgbouncer.settings.pgbouncer.max_user_connections | Do not allow more than this many server connections per user (regardless of database)
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|