| users.users | Additional user accounts to be created automatically by the system
|
| users.motd | Message of the day shown to users when they log in.
|
| users.users.<name>.home | The user's home directory.
|
| users.users.<name>.uid | The account UID
|
| users.users.<name>.group | The user's primary group.
|
| users.users.<name>.name | The name of the user account
|
| users.motdFile | A file containing the message of the day shown to users when they log in.
|
| users.users.<name>.homeMode | The user's home directory mode in numeric format
|
| users.users.<name>.shell | The path to the user's shell
|
| users.users.<name>.enable | If set to false, the user account will not be created
|
| users.users.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| users.groups | Additional groups to be created automatically by the system.
|
| users.users.<name>.extraGroups | The user's auxiliary groups.
|
| users.users.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| power.ups.users | Users that can access upsd
|
| users.extraUsers | Alias of users.users.
|
| users.users.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| users.mysql.pam | Settings for pam_mysql
|
| users.ldap.base | The distinguished name of the search base.
|
| users.users.<name>.packages | The set of packages that should be made available to the user
|
| users.users.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| users.users.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| users.users.<name>.isSystemUser | Indicates if the user is a system user or not
|
| users.users.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| users.users.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| users.users.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| users.extraGroups | Alias of users.groups.
|
| users.users.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| users.users.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| users.mysql.user | The username to use when connecting to the database
|
| users.mysql.host | The hostname of the MySQL/MariaDB server
|
| users.users.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| users.users.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| users.defaultUserHome | The default home directory for normal users.
|
| users.users.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| users.users.<name>.linger | Whether to enable or disable lingering for this user
|
| users.mysql.nss | Settings for libnss-mysql
|
| users.ldap.loginPam | Whether to include authentication against LDAP in login PAM.
|
| users.ldap.server | The URL of the LDAP server.
|
| users.ldap.useTLS | If enabled, use TLS (encryption) over an LDAP (port 389)
connection
|
| users.ldap.enable | Whether to enable authentication against an LDAP server.
|
| users.mysql.pam.where | Additional criteria for the query.
|
| users.groups.<name>.gid | The group GID
|
| users.mysql.enable | Whether to enable authentication against a MySQL/MariaDB database.
|
| users.mysql.pam.table | The name of table that maps unique login names to the passwords.
|
| users.mysql.database | The name of the database containing the users
|
| users.extraUsers.<name>.home | The user's home directory.
|
| users.groups.<name>.name | The name of the group
|
| users.ldap.timeLimit | Specifies the time limit (in seconds) to use when performing
searches
|
| users.extraUsers.<name>.uid | The account UID
|
| users.manageLingering | Whether to manage whether users linger or not.
|
| users.users.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| users.extraUsers.<name>.group | The user's primary group.
|
| boot.initrd.systemd.users | Users to include in initrd.
|
| users.users.<name>.description | A short description of the user account, typically the
user's full name
|
| users.extraUsers.<name>.name | The name of the user account
|
| users.extraGroups.<name>.gid | The group GID
|
| users.ldap.nsswitch | Whether to include lookup against LDAP in NSS.
|
| users.mysql.pam.userColumn | The name of the column that contains a unix login name.
|
| users.ldap.bind.timeLimit | Specifies the time limit (in seconds) to use when connecting
to the directory server
|
| users.extraGroups.<name>.name | The name of the group
|
| programs.weylus.users | To enable stylus and multi-touch support, the user you're going to use must be added to this list
|
| nix.settings.allowed-users | A list of names of users (separated by whitespace) that are
allowed to connect to the Nix daemon
|
| users.defaultUserShell | This option defines the default shell assigned to user
accounts
|
| users.mysql.pam.verbose | If enabled, produces logs with detailed messages that describes what
pam_mysql is doing
|
| power.ups.users.<name>.upsmon | Add the necessary actions for a upsmon process to work
|
| users.extraUsers.<name>.isSystemUser | Indicates if the user is a system user or not
|
| users.ldap.extraConfig | Extra configuration options that will be added verbatim at
the end of the ldap configuration file (ldap.conf(5))
|
| users.mutableUsers | If set to true, you are free to add new users and groups to the system
with the ordinary useradd and
groupadd commands
|
| users.extraUsers.<name>.homeMode | The user's home directory mode in numeric format
|
| users.extraUsers.<name>.shell | The path to the user's shell
|
| users.groups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| users.mysql.nss.getpwnam | SQL query for the getpwnam
syscall.
|
| users.mysql.nss.getgrgid | SQL query for the getgrgid
syscall.
|
| users.mysql.nss.getgrnam | SQL query for the getgrnam
syscall.
|
| users.mysql.nss.getspnam | SQL query for the getspnam
syscall.
|
| users.mysql.nss.getspent | SQL query for the getspent
syscall.
|
| users.mysql.nss.getgrent | SQL query for the getgrent
syscall.
|
| users.mysql.nss.getpwuid | SQL query for the getpwuid
syscall.
|
| users.mysql.nss.getpwent | SQL query for the getpwent
syscall.
|
| users.extraUsers.<name>.packages | The set of packages that should be made available to the user
|
| users.mysql.passwordFile | The path to the file containing the password for the user
|
| users.mysql.pam.updateTable | The name of the table used for password alteration
|
| users.extraUsers.<name>.enable | If set to false, the user account will not be created
|
| users.enforceIdUniqueness | Whether to require that no two users/groups share the same uid/gid.
|
| users.extraUsers.<name>.pamMount | Attributes for user's entry in
pam_mount.conf.xml
|
| boot.loader.grub.users | User accounts for GRUB
|
| programs.benchexec.users | Users that intend to use BenchExec
|
| services.nntp-proxy.users | NNTP-Proxy user configuration
|
| users.mysql.pam.cryptDefault | The default encryption method to use for passwordCrypt = 1.
|
| users.extraUsers.<name>.extraGroups | The user's auxiliary groups.
|
| power.ups.users.<name>.actions | Allow the user to do certain things with upsd
|
| users.mysql.pam.logging.table | The name of the table to which logs are written.
|
| users.extraUsers.<name>.cryptHomeLuks | Path to encrypted luks device that contains
the user's home directory.
|
| services.murmur.users | Maximum number of concurrent clients allowed.
|
| users.allowNoPasswordLogin | Disable checking that at least the root user or a user in the wheel group can log in using
a password or an SSH key
|
| users.extraUsers.<name>.createHome | Whether to create the home directory and ensure ownership as well as
permissions to match the user.
|
| users.extraUsers.<name>.isNormalUser | Indicates whether this is an account for a “real” user
|
| users.extraUsers.<name>.subUidRanges | Subordinate user ids that user is allowed to use
|
| users.extraUsers.<name>.subGidRanges | Subordinate group ids that user is allowed to use
|
| users.ldap.bind.passwordFile | The path to a file containing the credentials to use when binding
to the LDAP server (if not binding anonymously).
|
| users.extraGroups.<name>.members | The user names of the group members, added to the
/etc/group file.
|
| services._3proxy.usersFile | Load users and passwords from this file
|
| users.mysql.nss.memsbygid | SQL query for the memsbygid
syscall.
|
| users.mysql.nss.gidsbymem | SQL query for the gidsbymem
syscall.
|
| users.ldap.daemon.extraConfig | Extra configuration options that will be added verbatim at
the end of the nslcd configuration file (nslcd.conf(5)).
|
| users.users.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| users.extraUsers.<name>.autoSubUidGidRange | Automatically allocate subordinate user and group ids for this user
|
| users.mysql.pam.logging.enable | Enables logging of authentication attempts in the MySQL database.
|
| users.extraUsers.<name>.subGidRanges.*.count | Count of subordinate group ids
|
| users.extraUsers.<name>.subUidRanges.*.count | Count of subordinate user ids
|
| users.users.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| boot.initrd.systemd.users.<name>.uid | ID of the user in initrd.
|
| users.extraUsers.<name>.useDefaultShell | If true, the user's shell will be set to
users.defaultUserShell.
|
| security.doas.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| security.sudo.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| users.users.<name>.password | Specifies the (clear text) password for the user
|
| boot.loader.grub.users.<name>.password | Specifies the clear text password for the account
|
| services.geoclue2.appConfig.<name>.users | List of UIDs of all users for which this application is allowed location
info access, Defaults to an empty string to allow it for all users.
|
| nix.settings.trusted-users | A list of names of users that have additional rights when
connecting to the Nix daemon, such as the ability to specify
additional binary caches, or to import unsigned NARs
|
| users.mysql.pam.logging.msgColumn | The name of the column in the log table to which the description
of the performed operation is stored.
|
| users.ldap.bind.policy | Specifies the policy to use for reconnecting to an unavailable
LDAP server
|
| security.sudo-rs.extraRules.*.users | The usernames / UIDs this rule should apply for.
|
| users.extraUsers.<name>.linger | Whether to enable or disable lingering for this user
|
| users.users.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| users.mysql.pam.passwordColumn | The name of the column that contains a (encrypted) password string.
|
| services.anki-sync-server.users | List of user-password pairs to provide to the sync server.
|
| users.extraUsers.<name>.subGidRanges.*.startGid | Start of the range of subordinate group ids that user is
allowed to use.
|
| users.extraUsers.<name>.subUidRanges.*.startUid | Start of the range of subordinate user ids that user is
allowed to use.
|
| users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| users.mysql.pam.logging.timeColumn | The name of the column in the log table to which the timestamp of the
log entry is stored.
|
| users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| boot.initrd.systemd.users.<name>.shell | The path to the user's shell in initrd.
|
| boot.initrd.systemd.users.<name>.group | Group the user belongs to in initrd.
|
| users.extraUsers.<name>.expires | Set the date on which the user's account will no longer be
accessible
|
| services.crossmacro.users | List of users granted permission to use CrossMacro.
|
| power.ups.users.<name>.passwordFile | The full path to a file that contains the user's (clear text)
password
|
| power.ups.users.<name>.instcmds | Let the user initiate specific instant commands
|
| systemd.user.tmpfiles.users | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically.
|
| users.ldap.daemon.enable | Whether to let the nslcd daemon (nss-pam-ldapd) handle the
LDAP lookups for NSS and PAM
|
| services._3proxy.services.*.acl.*.users | List of users, use empty list for any.
|
| users.mysql.pam.logging.rHostColumn | The name of the column in the log table to which the name of the remote
host that initiates the session is stored
|
| programs.idescriptor.users | Users to be added to the idevice group.
|
| boot.loader.grub.users.<name>.hashedPassword | Specifies the password hash for the account,
generated with grub-mkpasswd-pbkdf2
|
| services.bitcoind.<name>.rpc.users | RPC user information for JSON-RPC connections.
|
| security.pam.oath.usersFile | Set the path to file where the user's credentials are
stored
|
| users.users.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| users.users.<name>.hashedPassword | Specifies the hashed password for the user
|
| hardware.openrazer.users | Usernames to be added to the "openrazer" group, so that they
can start and interact with the OpenRazer userspace daemon.
|
| services.dokuwiki.sites.<name>.usersFile | Location of the dokuwiki users file
|
| users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| users.users.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| services.nntp-proxy.users.<name>.username | Username
|
| services.anki-sync-server.users.*.password | Password accepted by anki-sync-server for the associated username.
WARNING: This option is not secure
|
| services.bitcoind.<name>.rpc.users.<name>.name | Username for JSON-RPC connections.
|
| systemd.sysusers.enable | If enabled, users are created with systemd-sysusers instead of with
the custom update-users-groups.pl script
|
| services.influxdb2.provision.users | Users to provision.
|
| boot.loader.grub.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the account
|
| services.mosquitto.listeners.*.users | A set of users and their passwords and ACLs.
|
| services.mtprotoproxy.users | Allowed users and their secrets
|
| systemd.user.tmpfiles.users.<name>.rules | Per-user rules for creation, deletion and cleaning of volatile and
temporary files automatically
|
| users.ldap.daemon.rootpwmoddn | The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
|
| services.anki-sync-server.users.*.username | User name accepted by anki-sync-server.
|
| users.extraUsers.<name>.ignoreShellProgramCheck | By default, nixos will check that programs
|
| users.extraUsers.<name>.description | A short description of the user account, typically the
user's full name
|
| services.nntp-proxy.users.<name>.passwordHash | SHA-512 password hash (can be generated by
mkpasswd -m sha-512 <password>)
|
| users.users.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| users.ldap.daemon.rootpwmodpwFile | The path to a file containing the credentials with which to bind to
the LDAP server if the root user tries to change a user's password.
|
| services.grafana.settings.users.hidden_users | This is a comma-separated list of usernames
|
| services.anki-sync-server.users.*.passwordFile | File containing the password accepted by anki-sync-server for
the associated username
|
| boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| services.pgbouncer.settings.users | Optional
|
| services.grafana.settings.users.home_page | Path to a custom home page
|
| services.cloudlog.update-lotw-users.enable | Whether to periodically update the list of LoTW users
|
| users.mysql.pam.passwordCrypt | The method to encrypt the user's password:
0 (or "plain"):
No encryption
|
| users.ldap.bind.distinguishedName | The distinguished name to bind to the LDAP server with
|
| services.samba.settings.global."invalid users" | List of users who are denied to login via Samba.
|
| services.nntp-proxy.users.<name>.maxConnections | Maximum number of concurrent connections to the proxy for this user
|
| services.mosquitto.listeners.*.users.<name>.acl | Control client access to topics on the broker.
|
| services.grafana.settings.users.allow_sign_up | Set to false to prohibit users from being able to sign up / create user accounts
|
| services.bitwarden-directory-connector-cli.sync.users | Sync users.
|
| users.mysql.pam.disconnectEveryOperation | By default, pam_mysql keeps the connection to the MySQL
database until the session is closed
|
| services.bitcoind.<name>.rpc.users.<name>.passwordHMAC | Password HMAC-SHA-256 for JSON-RPC connections
|
| services.clickhouse.usersConfig | Your users.yaml as a Nix attribute set
|
| users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| services.paretosecurity.users | Per-user Pareto Security configuration.
|
| services.influxdb2.provision.users.<name>.present | Whether to ensure that this user is present or absent.
|
| services.grafana.settings.users.login_hint | Text used as placeholder text on login page for login/username input.
|
| users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| users.extraUsers.<name>.password | Specifies the (clear text) password for the user
|
| services.mosquitto.listeners.*.users.<name>.password | Specifies the (clear text) password for the MQTT User.
|
| services.grafana.settings.users.auto_assign_org | Set to true to automatically add new users to the main organization (id 1)
|
| services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| services.vsftpd.virtualUseLocalPrivs | If enabled, virtual users will use the same privileges as local
users
|
| services.cloudlog.update-lotw-users.interval | Specification (in the format described by systemd.time(7)) of the
time at which the LoTW user update will occur.
|
| services.mysql.ensureUsers | Ensures that the specified users exist and have at least the ensured permissions
|
| services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| services.mosquitto.listeners.*.users.<name>.hashedPassword | Specifies the hashed password for the MQTT User
|
| users.extraUsers.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| users.extraUsers.<name>.hashedPassword | Specifies the hashed password for the user
|
| services.taskserver.organisations.<name>.users | A list of user names that belong to the organization.
|
| services.grafana.settings.users.password_hint | Text used as placeholder text on login page for password input.
|
| services.grafana.settings.users.default_theme | Sets the default UI theme. system matches the user's system theme.
|
| services.grafana.settings.users.allow_org_create | Set to false to prohibit users from creating new organizations.
|
| users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| services.freeciv.settings.Newusers | Whether to enable new users to login if auth is enabled.
|
| services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| services.samba.usershares.group | Name of the group members of which will be allowed to create usershares
|
| services.pgmanage.superOnly | This tells pgmanage whether or not to only allow super users to
login
|
| services.samba.usershares.enable | Whether to enable user-configurable Samba shares.
|
| users.extraUsers.<name>.initialHashedPassword | Specifies the initial hashed password for the user, i.e. the
hashed password assigned if the user does not already
exist
|
| services.grafana.settings.users.auto_assign_org_id | Set this value to automatically add new users to the provided org
|
| services.grafana.settings.users.default_language | This setting configures the default UI language, which must be a supported IETF language tag, such as en-US.
|
| services.grafana.settings.users.viewers_can_edit | Viewers can access and use Explore and perform temporary edits on panels in dashboards they have access to
|
| services.incron.allow | Users allowed to use incrontab
|
| services.grafana.settings.users.auto_assign_org_role | The role new users will be assigned for the main organization (if the auto_assign_org setting is set to true).
|
| nix.sshServe.trusted | Whether to add nix-ssh to the nix.settings.trusted-users
|
| services.postgresql.ensureUsers | Ensures that the specified users exist
|
| nix.nrBuildUsers | Number of nixbld user accounts created to
perform secure concurrent builds
|
| services.tt-rss.plugins | List of plugins to load automatically for all users
|
| services.calibre-server.auth.userDb | Choose users database file to use for authentication
|
| services.grafana.settings.users.verify_email_enabled | Require email validation before sign up completes.
|
| services.headscale.settings.oidc.allowed_users | Users allowed to authenticate even if not in allowedDomains.
|
| services.fcron.deny | Users forbidden from using fcron.
|
| services.umurmur.settings.max_users | Maximum number of concurrent clients allowed.
|
| hardware.i2c.group | Grant access to i2c devices (/dev/i2c-*) to users in this group.
|
| programs.wireshark.enable | Whether to add Wireshark to the global environment and create a 'wireshark'
group
|
| services.logrotate.checkConfig | Whether the config should be checked at build time
|
| services.incron.deny | Users forbidden from using incrontab.
|
| services.prosody.modules.blocklist | Allow users to block communications with other users
|
| programs.cdemu.group | Group that users must be in to use cdemu.
|
| security.polkit.adminIdentities | Specifies which users are considered “administrators”, for those
actions that require the user to authenticate as an
administrator (i.e. have an auth_admin
value)
|
| programs.wireshark.usbmon.enable | Whether to allow users in the 'wireshark' group to capture USB traffic
|
| programs.wireshark.dumpcap.enable | Whether to allow users in the 'wireshark' group to capture network traffic
|
| services.tor.relay.role | Your role in Tor network
|
| programs.fuse.mountMax | Set the maximum number of FUSE mounts allowed to non-root users.
|
| services.oauth2-proxy.google.adminEmail | The Google Admin to impersonate for API calls
|
| services.postgresql.identMap | Defines the mapping from system users to database users
|
| services.fcron.allow | Users allowed to use fcrontab and fcrondyn (one name per
line, all for everyone).
|
| services.guix.nrBuildUsers | Number of Guix build users to be used in the build pool.
|
| security.sudo.enable | Whether to enable the sudo command, which
allows non-root users to execute commands as root.
|
| security.doas.enable | Whether to enable the doas command, which allows
non-root users to execute commands as root.
|
| services.vsftpd.userDbPath | Only applies if enableVirtualUsers is true
|
| security.ipa.shells | List of shells which binaries should be installed to /bin/
|
| programs.ydotool.group | Group which users must be in to use ydotool.
|
| services.syncplay.chat | Chat with users in the same room.
|
| programs.rush.shell | The resolved shell path that users can inherit to set rush as their login shell
|
| services.vsftpd.localUsers | Whether to enable FTP for local users.
|
| security.ipa.ifpAllowedUids | A list of users allowed to access the ifp dbus interface.
|
| security.sudo-rs.enable | Whether to enable a memory-safe implementation of the sudo command,
which allows non-root users to execute commands as root
.
|
| hardware.sane.enable | Enable support for SANE scanners.
Users in the "scanner" group will gain access to the scanner, or the "lp" group if it's also a printer.
|
| services.syncplay.ready | Check readiness of users.
|
| services.weblate.smtp.port | SMTP port used when sending emails to users.
|
| services.weblate.smtp.host | SMTP host used when sending emails to users.
|
| hardware.brillo.enable | Whether to enable brillo in userspace
|
| programs.fuse.userAllowOther | Allow non-root users to specify the allow_other or allow_root mount
options, see mount.fuse3(8).
|
| hardware.i2c.enable | Whether to enable i2c devices support
|
| security.pam.p11.enable | Enables P11 PAM (pam_p11) module
|
| services.exim.user | User to use when no root privileges are required
|
| services.vsftpd.writeEnable | Whether any write activity is permitted to users.
|
| services.postgresql.authentication | Defines how users authenticate themselves to the server
|
| hardware.bladeRF.enable | Enables udev rules for BladeRF devices
|
| services.dovecot2.mailUser | Default user to store mail for virtual users.
|
| security.please.enable | Whether to enable please, a Sudo clone which allows a users to execute a command or edit a
file as another user
.
|
| services.ombi.enable | Whether to enable Ombi, a web application that automatically gives your shared Plex or
Emby users the ability to request content by themselves!
Optionally see https://docs.ombi.app/info/reverse-proxy
on how to set up a reverse proxy
.
|
| programs.pmount.enable | Whether to enable pmount, a tool that allows normal users to mount removable devices
without requiring root privileges
.
|
| services.tt-rss.auth.autoCreate | Allow authentication modules to auto-create users in tt-rss internal
database when authenticated successfully.
|
| services.sympa.listMasters | The list of the email addresses of the listmasters
(users authorized to perform global server commands).
|
| nix.buildMachines.*.sshUser | The username to log in as on the remote host
|
| services.dovecot2.mailGroup | Default group to store mail for virtual users.
|
| services.dawarich.smtp.host | SMTP host used when sending emails to users.
|
| services.dawarich.smtp.port | SMTP port used when sending emails to users.
|
| services.mastodon.smtp.host | SMTP host used when sending emails to users.
|
| services.mastodon.smtp.port | SMTP port used when sending emails to users.
|
| services.matrix-synapse.settings.presence.enabled | Whether to enable presence tracking
|
| security.pam.dp9ik.enable | Whether to enable the dp9ik pam module provided by tlsclient
|
| services.jupyter.group | Name of the group used to run the jupyter service
|
| security.sudo.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| security.pam.howdy.enable | Whether to enable the Howdy PAM module
|
| services.davfs2.davGroup | The group of the running mount.davfs daemon
|
| services.syncplay.motdFile | Path to text to display when users join
|
| security.sudo-rs.execWheelOnly | Only allow members of the wheel group to execute sudo by
setting the executable's permissions accordingly
|
| services.sftpgo.loadDataFile | Path to a json file containing users and folders to load (or update) on startup
|
| programs.minipro.enable | Whether to enable minipro and its udev rules
|
| security.duosec.groups | If specified, Duo authentication is required only for users
whose primary group or supplementary group list matches one
of the space-separated pattern lists
|
| services.drupal.sites.<name>.themesDir | The location for users to install Drupal themes.
|
| services.diod.allsquash | Remap all users to "nobody"
|
| services.prosody.modules.mam | Store messages in an archive and allow users to access it
|
| services.prosody.modules.motd | Send a message to users when they log in
|
| services.tt-rss.auth.autoLogin | Automatically login user on remote or other kind of externally supplied
authentication, otherwise redirect to login form as normal
|
| services.tt-rss.singleUserMode | Operate in single user mode, disables all functionality related to
multiple users and authentication
|
| networking.wireless.userControlled | Allow users of the wpa_supplicant group to control wpa_supplicant
through wpa_gui or wpa_cli
|
| virtualisation.incus.enable | Whether to enable incusd, a daemon that manages containers and virtual machines
|
| services.prosody.modules.pep | Enables users to publish their mood, activity, playing music and more
|
| services.timekpr.adminUsers | All listed users will become part of the timekpr group so they can manage timekpr settings without requiring sudo.
|
| services.syncplay.motd | Text to display when users join
|
| services.prosody.modules.vcard | Allow users to set vCards
|
| services.kea.dhcp6.configFile | Kea DHCP6 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp6-srv.html
|
| services.kea.dhcp4.configFile | Kea DHCP4 configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/dhcp4-srv.html
|
| services.coturn.no-auth | This option is opposite to lt-cred-mech.
(TURN Server with no-auth option allows anonymous access)
|
| services.hologram-server.ldapBaseDN | The base DN for your Hologram users
|
| services.bitlbee.authBackend | How users are authenticated
storage -- save passwords internally
pam -- Linux PAM authentication
|
| services.alerta.signupEnabled | Whether to prevent sign-up of new users via the web UI
|
| programs.flashrom.enable | Installs flashrom and configures udev rules for programmers
used by flashrom
|
| networking.wireless.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| services.drupal.sites.<name>.modulesDir | The location for users to install Drupal modules.
|
| services.coturn.realm | The default realm to be used for the users when no explicit
origin/realm relationship was found in the database, or if the TURN
server is not using any database (just the commands-line settings
and the userdb file)
|
| security.pam.services.<name>.unixAuth | Whether users can log in with passwords defined in
/etc/shadow.
|
| services.aria2.enable | Whether or not to enable the headless Aria2 daemon service
|
| services.vsftpd.userlistEnable | Whether users are included.
|
| security.doas.extraRules.*.runAs | Which user or group the specified command is allowed to run as
|
| security.loginDefs.chfnRestrict | Use chfn SUID to allow non-root users to change their account GECOS information.
|
| services.prosody.modules.roster | Allow users to have a roster
|
| services.tt-rss.forceArticlePurge | When this option is not 0, users ability to control feed purging
intervals is disabled and all articles (which are not starred)
older than this amount of days are purged.
|
| services.zeitgeist.enable | Whether to enable zeitgeist, a service which logs the users' activities and events.
|
| services.kea.dhcp-ddns.configFile | Kea DHCP-DDNS configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/ddns.html
|
| security.loginDefs.settings.UID_MAX | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| security.loginDefs.settings.UID_MIN | Range of user IDs used for the creation of regular users by useradd or newusers.
|
| programs.mouse-actions.enable | Whether to install and set up mouse-actions and it's udev rules
|
| services.vsftpd.forceLocalDataSSL | Only applies if sslEnable is true
|
| security.pam.krb5.enable | Enables Kerberos PAM modules (pam-krb5,
pam-ccreds)
|
| hardware.acpilight.enable | Enable acpilight
|
| security.pam.services.<name>.mysqlAuth | If set, the pam_mysql module will be used to
authenticate users against a MySQL/MariaDB database.
|
| services.kea.ctrl-agent.configFile | Kea Control Agent configuration as a path, see https://kea.readthedocs.io/en/kea-3.0.2/arm/agent.html
|
| networking.supplicant.<name>.userControlled.enable | Allow normal users to control wpa_supplicant through wpa_gui or wpa_cli
|
| security.pam.yubico.enable | Enables Yubico PAM (yubico-pam) module
|
| security.loginDefs.settings.SYS_UID_MAX | Range of user IDs used for the creation of system users by useradd or newusers.
|
| security.loginDefs.settings.SYS_UID_MIN | Range of user IDs used for the creation of system users by useradd or newusers.
|
| services.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate users via tailscale.
|
| services.dawarich.smtp.fromAddress | "From" address used when sending emails to users.
|
| security.run0.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via run0.
|
| security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| services.mastodon.smtp.fromAddress | "From" address used when sending Emails to users.
|
| services.vsftpd.forceLocalLoginsSSL | Only applies if sslEnable is true
|
| security.sudo.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| services.bepasty.servers.<name>.workDir | Path to the working directory (used for config and pidfile)
|
| security.doas.wheelNeedsPassword | Whether users of the wheel group must provide a password to
run commands as super user via doas.
|
| services.prosody.modules.welcome | Welcome users who register accounts
|
| security.sudo-rs.wheelNeedsPassword | Whether users of the wheel group must
provide a password to run commands as super user via sudo.
|
| services.displayManager.hiddenUsers | A list of users which will not be shown in the display manager.
|
| security.pam.dp9ik.authserver | This controls the hostname for the 9front authentication server
that users will be authenticated against.
|
| security.pam.services.<name>.yubicoAuth | If set, users listed in
~/.yubico/authorized_yubikeys
are able to log in with the associated Yubikey tokens.
|
| services.portunus.seedSettings | Seed settings for users and groups
|
| services.pgmanage.loginGroup | This tells pgmanage to only allow users in a certain PostgreSQL group to
login to pgmanage
|
| services.terraria.enable | If enabled, starts a Terraria server
|
| services.upower.ignoreLid | Do we ignore the lid state
Some laptops are broken
|
| services.bitlbee.authMode | The following authentication modes are available:
Open -- Accept connections from anyone, use NickServ for user authentication
|
| security.pam.services.<name>.ttyAudit.enable | Enable or disable TTY auditing for specified users
|
| services.freshrss.api.enable | Whether to enable API access for mobile apps and third-party clients (Google Reader API and Fever API)
|
| programs.soundmodem.enable | Whether to add Soundmodem to the global environment and configure a
wrapper for 'soundmodemconfig' for users in the 'soundmodem' group.
|
| services.openafsClient.daemons | Number of daemons to serve user requests
|
| virtualisation.spiceUSBRedirection.enable | Install the SPICE USB redirection helper with setuid
privileges
|
| security.pam.loginLimits | Define resource limits that should apply to users or groups
|
| services.prosody.modules.announce | Send announcement to all online users
|
| services.glitchtip.settings.ENABLE_USER_REGISTRATION | When true, any user will be able to register
|
| programs.steam.fontPackages | Font packages to use in Steam
|
| services.kanidm.provision.enable | Whether to enable provisioning of groups, users and oauth2 resource servers.
|
| services.xserver.imwheel.rules | Window class translation rules.
/etc/X11/imwheelrc is generated based on this config
which means this config is global for all users
|
| hardware.libjaylink.enable | Whether to enable udev rules for devices supported by libjaylink
|
| services.nginx.tailscaleAuth.enable | Whether to enable tailscale.nginx-auth, to authenticate nginx users via tailscale.
|
| security.pam.services.<name>.u2fAuth | If set, users listed in
$XDG_CONFIG_HOME/Yubico/u2f_keys (or
$HOME/.config/Yubico/u2f_keys if XDG variable is
not set) are able to log in with the associated U2F key
|
| security.please.wheelNeedsPassword | Whether users of the wheel group must provide a password to run
commands or edit files with please and
pleaseedit respectively.
|
| hardware.keyboard.uhk.enable | Whether to enable non-root access to the firmware of UHK keyboards
|
| services.vsftpd.anonymousMkdirEnable | Whether any uploads are permitted to anonymous users.
|
| services.biboumi.settings.admin | The bare JID of the gateway administrator
|
| services.tuliprox.apiProxySettings | Users and proxy configuration
Refer to the Tuliprox documentation for available attributes
|
| services.openssh.settings.AllowUsers | If specified, login is allowed only for the listed users
|
| services.prosody.modules.register | Allow users to register on this server using a client and change passwords
|
| security.pam.services.<name>.usshAuth | If set, users with an SSH certificate containing an authorized principal
in their SSH agent are able to log in
|
| services.kubo.settings.Mounts.FuseAllowOther | Allow all users to access the FUSE mount points
|
| services.openssh.settings.LogLevel | Gives the verbosity level that is used when logging messages from sshd(8)
|
| services.openssh.settings.DenyUsers | If specified, login is denied for all listed users
|
| services.vsftpd.userlistFile | Newline separated list of names to be allowed/denied if userlistEnable
is true
|
| services.cryptpad.settings.adminKeys | List of public signing keys of users that can access the admin panel
|
| services.dependency-track.oidc.userProvisioning | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| services.grafana.settings.users.user_invite_max_lifetime_duration | The duration in time a user invitation remains valid before expiring
|
| environment.shellAliases | An attribute set that maps aliases (the top level attribute names in
this option) to command strings or directly to build outputs
|
| fonts.fontconfig.antialias | Enable font antialiasing
|
| programs.chromium.initialPrefs | Initial preferences are used to configure the browser for the first run
|
| security.pam.services.<name>.howdy.enable | Whether to enable the Howdy PAM module
|
| services.maubot.settings.admins | List of administrator users
|
| services.snapper.configs.<name>.ALLOW_USERS | List of users allowed to operate with the config. "root" is always
implicitly included
|
| services.vsftpd.anonymousUploadEnable | Whether any uploads are permitted to anonymous users.
|
| services.vsftpd.chrootlocalUser | Whether local users are confined to their home directory.
|
| programs.hyprland.withUWSM | Launch Hyprland with the UWSM (Universal Wayland Session Manager) session manager
|
| services.iperf3.authorizedUsersFile | Path to the configuration file containing authorized users credentials to run iperf tests.
|
| services.angrr.settings.owned-only | Only monitors owned symbolic link target of GC roots.
- "auto": behaves like true for normal users, false for root.
- "true": only monitor GC roots owned by the current user.
- "false": monitor all GC roots.
|
| services.userdbd.enableSSHSupport | Whether to enable exposing OpenSSH public keys defined in userdb
|
| services.pipewire.systemWide | If true, a system-wide PipeWire service and socket is enabled
allowing all users in the "pipewire" group to use it simultaneously
|
| services.openssh.settings.AllowGroups | If specified, login is allowed only for users part of the
listed groups
|
| services.thelounge.public | Make your The Lounge instance public
|
| services.buildbot-master.reporters | List of reporter objects used to present build status to various users.
|
| services.openssh.settings.DenyGroups | If specified, login is denied for all users part of the listed
groups
|
| virtualisation.virtualbox.host.enableHardening | Enable hardened VirtualBox, which ensures that only the binaries in the
system path get access to the devices exposed by the kernel modules
instead of all users in the vboxusers group.
Disabling this can put your system's security at risk, as local users
in the vboxusers group can tamper with the VirtualBox device files.
|
| services.systembus-notify.enable | Whether to enable System bus notification support
WARNING: enabling this option (while convenient) should not be done on a
machine where you do not trust the other users as it allows any other
local user to DoS your session by spamming notifications
.
|
| services.movim.minifyStaticFiles | Do minification on public static files which reduces the size of
assets — saving data for the server & users as well as offering a
performance improvement
|
| services.gitlab.secrets.jwsFile | A file containing the secret used to encrypt session
keys
|
| services.firezone.gui-client.allowedUsers | All listed users will become part of the firezone-client group so
they can control the tunnel service
|
| system.extraDependencies | A list of paths that should be included in the system
closure but generally not visible to users
|
| services.gitlab.secrets.otpFile | A file containing the secret used to encrypt secrets for OTP
tokens
|
| services.cryptpad.settings.httpUnsafeOrigin | This is the URL that users will enter to load your instance
|
| fonts.fontconfig.hinting.enable | Enable font hinting
|
| services.tt-rss.registration.maxUsers | Maximum amount of users which will be allowed to register on this
system. 0 - no limit.
|
| networking.wg-quick.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| programs._1password-gui.polkitPolicyOwners | A list of users who should be able to integrate 1Password with polkit-based authentication mechanisms.
|
| services.mtprotoproxy.secureOnly | Don't allow users to connect in non-secure mode (without random padding).
|
| services.hylafax.userAccessFile | The hosts.hfaxd
file entry in the spooling area
will be symlinked to the location given here
|
| services.sourcehut.settings."todo.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| security.pam.u2f.enable | Enables U2F PAM (pam-u2f) module
|
| services.akkoma.config.":pleroma".":frontends" | Frontend configuration
|
| services.ntfy-sh.environmentFile | Path to a file containing extra ntfy environment variables in the systemd EnvironmentFile
format
|
| services.userborn.static | Whether to generate the password files at build time and store them directly
in the system closure, without requiring any services at boot time
|
| services.prometheus.remoteRead.*.name | Name of the remote read config, which if specified must be unique among remote read configs
|
| services.dependency-track.settings."alpine.oidc.user.provisioning" | Specifies if mapped OpenID Connect accounts are automatically created upon successful
authentication
|
| services.sourcehut.settings."lists.sr.ht".notify-from | Outgoing email for notifications generated by users.
|
| services.sourcehut.settings."builds.sr.ht".allow-free | Whether to enable nonpaying users to submit builds.
|
| environment.systemPackages | The set of packages that appear in
/run/current-system/sw
|
| services.pgbackrest.repos.<name>.sftp-private-key-file | SFTP private key file
|
| services.prometheus.remoteWrite.*.name | Name of the remote write config, which if specified must be unique among remote write configs
|
| services.sourcehut.settings."pages.sr.ht".user-domain | Configures the user domain, if enabled
|
| services.sourcehut.settings."todo.sr.ht::mail".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| services.dependency-track.oidc.teamSynchronization | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| services.aria2.downloadDirPermission | The permission for settings.dir
|
| security.unprivilegedUsernsClone | When disabled, unprivileged users will not be able to create new namespaces
|
| networking.wireguard.interfaces.<name>.peers.*.persistentKeepalive | This is optional and is by default off, because most
users will not need it
|
| services.unbound.localControlSocketPath | When not set to null this option defines the path
at which the unbound remote control socket should be created at
|
| services.syncthing.openDefaultPorts | Whether to open the default ports in the firewall: TCP/UDP 22000 for transfers
and UDP 21027 for discovery
|
| services.zwave-js.secretsConfigFile | JSON file containing secret keys
|
| services.meilisearch.noAnalytics | Deactivates analytics
|
| fonts.fontconfig.subpixel.lcdfilter | FreeType LCD filter
|
| services.spacecookie.settings.log.hide-ips | If enabled, spacecookie will hide personal
information of users like IP addresses from
log output.
|
| services.pulseaudio.systemWide | If false, a PulseAudio server is launched automatically for
each user that tries to use the sound system
|
| services.anuko-time-tracker.settings.multiorgMode | Defines whether users see the Register option in the menu of Time Tracker that allows them
to self-register and create new organizations (top groups).
|
| nix.settings.trusted-substituters | List of binary cache URLs that non-root users can use (in
addition to those specified using
nix.settings.substituters) by passing
--option binary-caches to Nix commands.
|
| services.nginx.tailscaleAuth.expectedTailnet | If you want to prevent node sharing from allowing users to access services
across tailnets, declare your expected tailnets domain here.
|
| services.paperless.consumptionDirIsPublic | Whether all users can write to the consumption dir.
|
| services.postfix.localRecipients | List of accepted local users
|
| services.tt-rss.registration.enable | Allow users to register themselves
|
| services.sourcehut.settings."lists.sr.ht::worker".sock-group | The lmtp daemon will make the unix socket group-read/write
for users in this group.
|
| services.hydra.useSubstitutes | Whether to use binary caches for downloading store paths
|
| services._3proxy.services.*.auth | Authentication type
|
| services.prosody.modules.vcard_legacy | Converts users profiles and Avatars between old and new formats
|
| services.matrix-tuwunel.settings.global.allow_registration | Whether new users can register on this server
|
| services.xserver.displayManager.startx.enable | Whether to enable the dummy "startx" pseudo-display manager, which
allows users to start X manually via the startx command from a
virtual terminal.
The X server will run under the current user, not as root.
|
| boot.initrd.network.ssh.hostKeys | Specify SSH host keys to import into the initrd
|
| documentation.man.man-db.manualPages | The manual pages to generate caches for if documentation.man.generateCaches
is enabled
|
| services.transmission.enable | Whether to enable the headless Transmission BitTorrent daemon
|
| services.szurubooru.server.settings.secretFile | File containing a secret used to salt the users' password hashes and generate filenames for static content.
|
| services.dependency-track.oidc.teams.default | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| services.smartd.notifications.wall.enable | Whenever to send wall notifications to all users.
|
| services.prosody.modules.cloud_notify | Push notifications to inform users of new messages or other pertinent information even when they have no XMPP clients online
|
| virtualisation.docker.enable | This option enables docker, a daemon that manages
linux containers
|
| environment.defaultPackages | Set of default packages that aren't strictly necessary
for a running system, entries can be removed for a more
minimal NixOS installation
|
| services.dependency-track.frontend.baseUrl | The base URL of the API server
|
| virtualisation.lxd.enable | This option enables lxd, a daemon that manages
containers
|
| services.dependency-track.settings."alpine.oidc.team.synchronization" | This option will ensure that team memberships for OpenID Connect users are dynamic and
synchronized with membership of OpenID Connect groups or assigned roles
|
| virtualisation.kvmgt.enable | Whether to enable KVMGT (iGVT-g) VGPU support
|
| security.dhparams.params | Diffie-Hellman parameters to generate
|
| services.pgbouncer.settings.pgbouncer.max_client_conn | Maximum number of client connections allowed
|
| services.linkwarden.enableRegistration | Whether to enable registration for new users.
|
| services.pretix.settings.pretix.registration | Whether to allow registration of new admin users.
|
| services.transmission.settings.umask | Sets transmission's file mode creation mask
|
| services.bitwarden-directory-connector-cli.sync.userFilter | LDAP filter for users.
|
| environment.corePackages | Set of core packages for a normal interactive system
|
| services.strongswan-swanctl.swanctl.secrets.eap.<name>.id | Identity the EAP/XAuth secret belongs to
|
| services.strongswan-swanctl.swanctl.secrets.ntlm.<name>.id | Identity the NTLM secret belongs to
|
| virtualisation.libvirtd.enable | This option enables libvirtd, a daemon that manages
virtual machines
|
| services.firezone.server.provision.accounts.<name>.actors | All actors (users) to provision
|
| services.taskserver.organisations | An attribute set where the keys name the organisation and the values
are a set of lists of users and
groups.
|
| hardware.display.edid.linuxhw | Exposes EDID files from users-sourced database at https://github.com/linuxhw/EDID
Attribute names will be mapped to EDID filenames <NAME>.bin
|
| services.nullmailer.config.adminaddr | If set, all recipients to users at either "localhost" (the literal string)
or the canonical host name (from the me control attribute) are remapped to this address
|
| services.matrix-continuwuity.settings.global.allow_registration | Whether new users can register on this server
|
| services.bitwarden-directory-connector-cli.sync.largeImport | Enable if you are syncing more than 2000 users/groups.
|
| services.prosody.xmppComplianceSuite | The XEP-0423 defines a set of recommended XEPs to implement
for a server
|
| services.xserver.displayManager.sx.enable | Whether to enable the "sx" pseudo-display manager, which allows users
to start manually via the "sx" command from a vt shell
|
| services.strongswan-swanctl.swanctl.secrets.xauth.<name>.id | Identity the EAP/XAuth secret belongs to
|
| services.bitwarden-directory-connector-cli.sync.userObjectClass | Class that users must have.
|
| services.grafana.settings.server.enable_gzip | Set this option to true to enable HTTP compression, this can improve transfer speed and bandwidth utilization
|
| services.i2pd.precomputation.elgamal | Whenever to use precomputated tables for ElGamal.
i2pd defaults to false
to save 64M of memory (and looses some performance)
|
| programs.opengamepadui.fontPackages | Font packages to use in OpenGamepadUI
|
| services.wstunnel.clients.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.wstunnel.servers.<name>.environmentFile | Environment file to be passed to the systemd service
|
| services.alerta.authenticationRequired | Whether users must authenticate when using the web UI or command-line tool
|
| services.anubis.defaultOptions.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| services.anubis.instances.<name>.settings.WEBMASTER_EMAIL | If set, shows a contact email address when rendering error pages
|
| services.angrr.settings.profile-policies.<name>.profile-paths | Paths to the Nix profile
|
| services.netbird.server.management.singleAccountModeDomain | Enables single account mode
|
| services.gitea.captcha.requireForExternalRegistration | Displays a CAPTCHA challenge for users that register externally.
|
| networking.networkmanager.enable | Whether to use NetworkManager to obtain an IP address and other
configuration for all network interfaces that are not manually
configured
|
| services.nextcloud.settings."profile.enabled" | Makes user-profiles globally available under nextcloud.tld/u/user.name
|
| virtualisation.podman.dockerSocket.enable | Make the Podman socket available in place of the Docker socket, so
Docker tools can find the Podman socket
|
| services.dependency-track.settings."alpine.oidc.teams.default" | Defines one or more team names that auto-provisioned OIDC users shall be added to
|
| services.bitwarden-directory-connector-cli.sync.removeDisabled | Remove users from bitwarden groups if no longer in the ldap group.
|
| security.pam.services.<name>.googleAuthenticator.enable | If set, users with enabled Google Authenticator (created
~/.google_authenticator) will be required
to provide Google Authenticator token to log in.
|
| virtualisation.docker.rootless.setSocketVariable | Point DOCKER_HOST to rootless Docker instance for
normal users by default.
|
| services.umurmur.settings.default_channel | The channel in which users will appear in when connecting.
|
| services.bitwarden-directory-connector-cli.sync.userEmailAttribute | Attribute for a users email.
|
| system.stateVersion | This option defines the first version of NixOS you have installed on this particular machine,
and is used to maintain compatibility with application data (e.g. databases) created on older NixOS versions
|
| services.earlyoom.enableNotifications | Send notifications about killed processes via the system d-bus
|
| services.firezone.server.smtp.configureManually | Outbound email configuration is mandatory for Firezone and supports
many different delivery adapters
|
| services.bitwarden-directory-connector-cli.sync.emailPrefixAttribute | The attribute that contains the users username.
|
| security.pam.services.<name>.googleOsLoginAuthentication | If set, will use the pam_oslogin_login's user
authentication methods to authenticate users using 2FA
|
| security.pam.services.<name>.googleOsLoginAccountVerification | If set, will use the Google OS Login PAM modules
(pam_oslogin_login,
pam_oslogin_admin) to verify possible OS Login
users and set sudoers configuration accordingly
|
| services.warpgate.settings.config_provider | Source of truth of users
|
| services.sourcehut.settings."meta.sr.ht::settings".onboarding-redirect | Where to redirect new users upon registration.
|
| services.bitwarden-directory-connector-cli.sync.overwriteExisting | Remove and re-add users/groups, See https://bitwarden.com/help/user-group-filters/#overwriting-syncs for more details.
|
| services.vaultwarden.environmentFile | Additional environment file or files as defined in systemd.exec(5)
|
| virtualisation.lxc.unprivilegedContainers | Whether to enable support for unprivileged users to launch containers.
|
| services.vaultwarden.config | The configuration of vaultwarden is done through environment variables,
therefore it is recommended to use upper snake case (e.g. DISABLE_2FA_REMEMBER)
|
| services.smartd.notifications.systembus-notify.enable | Whenever to send systembus-notify notifications
|
| services.healthchecks.settings.REGISTRATION_OPEN | A boolean that controls whether site visitors can create new accounts
|
| services.bacula-sd.autochanger.<name>.changerCommand | The name-string specifies an external program to be called that will
automatically change volumes as required by Bacula
|
| services.transmission.downloadDirPermissions | If not null, is used as the permissions
set by system.activationScripts.transmission-daemon
on the directories services.transmission.settings.download-dir,
services.transmission.settings.incomplete-dir.
and services.transmission.settings.watch-dir
|
| services.nextcloud.settings.skeletondirectory | The directory where the skeleton files are located
|
| services.grafana.provision.datasources.settings.datasources.*.editable | Allow users to edit datasources from the UI.
|
| services.matrix-conduit.settings.global.allow_registration | Whether new users can register on this server.
|
| services.matrix-synapse.settings.enable_registration | Enable registration for new users.
|
| services.authelia.instances.<name>.settings.default_2fa_method | Default 2FA method for new users and fallback for preferred but disabled methods.
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.readPermissions | The read permissions to include for this token
|
| services.influxdb2.provision.organizations.<name>.auths.<name>.writePermissions | The read permissions to include for this token
|
| services.biboumi.settings.realname_customization | Whether the users will be able to use
the ad-hoc commands that lets them configure
their realname and username.
|
| services.pgbouncer.settings.pgbouncer.max_user_connections | Do not allow more than this many server connections per user (regardless of database)
|
| programs.zsh.enable | Whether to configure zsh as an interactive shell
|
| services.memos.group | The group to run Memos as.
If changing the default value, you are responsible of creating the corresponding group with users.groups.
|
| services.memos.user | The user to run Memos as.
If changing the default value, you are responsible of creating the corresponding user with users.users.
|
| programs.gphoto2.enable | Whether to configure system to use gphoto2
|
| programs.bash.enable | Whenever to configure Bash as an interactive shell
|
| programs.rust-motd.enableMotdInSSHD | Whether to let openssh print the
result when entering a new ssh-session
|
| services.reaction.runAsRoot | Whether to run reaction as root
|
| services.vault.extraSettingsPaths | Configuration files to load besides the immutable one defined by the NixOS module
|
| services.kubo.settings.Addresses.API | Multiaddr or array of multiaddrs describing the address to serve the local HTTP API on
|
| services.openssh.authorizedKeysFiles | Specify the rules for which files to read on the host
|
| services.pdfding.enable | Whether to enable PdfDing service
|
| services.openssh.authorizedKeysInHomedir | Enables the use of the ~/.ssh/authorized_keys file
|
| services.gvfs.enable | Whether to enable GVfs, a userspace virtual filesystem.
|
| services.iptsd.enable | Whether to enable the userspace daemon for Intel Precise Touch & Stylus.
|
| services.ulogd.enable | Whether to enable ulogd, a userspace logging daemon for netfilter/iptables related logging.
|
| services.netbird.tunnels.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| services.netbird.clients.<name>.hardened | Hardened service:
- runs as a dedicated user with minimal set of permissions (see caveats),
- restricts daemon configuration socket access to dedicated user group
(you can grant access to it with
users.users."<user>".extraGroups = [ netbird-‹name› ]),
Even though the local system resources access is restricted:
CAP_NET_RAW, CAP_NET_ADMIN and CAP_BPF still give unlimited network manipulation possibilites,
- older kernels don't have
CAP_BPF and use CAP_SYS_ADMIN instead,
Known security features that are not (yet) integrated into the module:
- 2024-02-14:
rosenpass is an experimental feature configurable solely
through --enable-rosenpass flag on the netbird up command,
see the docs
|
| security.tpm2.abrmd.enable | Whether to enable Trusted Platform 2 userspace resource manager daemon
.
|
| services.scx.enable | Whether to enable SCX service, a daemon to run schedulers from userspace.
This service requires a kernel with the Sched-ext feature
|
| networking.ucarp.enable | Whether to enable ucarp, userspace implementation of CARP.
|
| hardware.openrazer.enable | Whether to enable OpenRazer drivers and userspace daemon
.
|
| services.kmscon.enable | Whether to enable kmscon as the virtual console instead of gettys.
kmscon is a kms/dri-based userspace virtual terminal implementation
|
| services.tee-supplicant.enable | Whether to enable OP-TEE userspace supplicant.
|
| services.hardware.bolt.enable | Whether to enable Bolt, a userspace daemon to enable
security levels for Thunderbolt 3 on GNU/Linux
|
| services.esdm.enableLinuxCompatServices | Enable /dev/random, /dev/urandom and /proc/sys/kernel/random/* userspace wrapper.
|
| services.tailscale.interfaceName | The interface name for tunnel traffic
|
| programs.ryzen-monitor-ng.enable | Whether to enable ryzen_monitor_ng, a userspace application for setting and getting Ryzen SMU (System Management Unit) parameters via the ryzen_smu kernel driver
|
| programs.nix-required-mounts.presets.nvidia-gpu.enable | Whether to enable Declare the support for derivations that require an Nvidia GPU to be
available, e.g. derivations with requiredSystemFeatures = [ "cuda" ]
|
| virtualisation.qemu.networkingOptions | Networking-related command-line options that should be passed to qemu
|
| services.suricata.settings.dpdk | Data Plane Development Kit is a framework for fast packet processing in data plane applications running on a wide variety of CPU architectures
|
| networking.wireguard.interfaces.<name>.peers.*.endpoint | Endpoint IP or hostname of the peer, followed by a colon,
and then a port number of the peer
|