| boot.loader.grub.users.<name>.hashedPasswordFile | Specifies the path to a file containing the password hash
for the account, generated with grub-mkpasswd-pbkdf2
|
| services.nntp-proxy.users.<name>.passwordHash | SHA-512 password hash (can be generated by
mkpasswd -m sha-512 <password>)
|
| services.anki-sync-server.users.*.username | User name accepted by anki-sync-server.
|
| boot.uki.name | Name of the UKI
|
| users.extraUsers.<name>.hashedPasswordFile | The full path to a file that contains the hash of the user's
password
|
| users.extraUsers.<name>.initialPassword | Specifies the initial password for the user, i.e. the
password assigned if the user does not already exist
|
| users.mysql.database | The name of the database containing the users
|
| users.mysql.pam.updateTable | The name of the table used for password alteration
|
| users.extraUsers.<name>.openssh.authorizedKeys.keys | A list of verbatim OpenSSH public keys that should be added to the
user's authorized keys
|
| services.nntp-proxy.users.<name>.maxConnections | Maximum number of concurrent connections to the proxy for this user
|
| users.mysql.pam.logging.userColumn | The name of the column in the log table to which the name of the
user being authenticated is stored.
|
| users.mysql.pam.logging.hostColumn | The name of the column in the log table to which the name of the user
being authenticated is stored.
|
| services.mosquitto.listeners.*.users.<name>.acl | Control client access to topics on the broker.
|
| users.extraUsers.<name>.openssh.authorizedKeys.keyFiles | A list of files each containing one OpenSSH public key that should be
added to the user's authorized keys
|
| users.mysql.pam.logging.table | The name of the table to which logs are written.
|
| users.mysql.pam.logging.rHostColumn | The name of the column in the log table to which the name of the remote
host that initiates the session is stored
|
| services.influxdb2.provision.users.<name>.present | Whether to ensure that this user is present or absent.
|
| users.mysql.pam.statusColumn | The name of the column or an SQL expression that indicates the status of
the user
|
| users.mysql.pam.logging.msgColumn | The name of the column in the log table to which the description
of the performed operation is stored.
|
| users.mysql.pam.logging.pidColumn | The name of the column in the log table to which the pid of the
process utilising the pam_mysql authentication
service is stored.
|
| system.name | The name of the system used in the system.build.toplevel derivation
|
| services.mosquitto.listeners.*.users.<name>.password | Specifies the (clear text) password for the MQTT User.
|
| users.extraUsers.<name>.openssh.authorizedPrincipals | A list of verbatim principal names that should be added to the user's
authorized principals.
|
| users.mysql.pam.logging.timeColumn | The name of the column in the log table to which the timestamp of the
log entry is stored.
|
| users.mysql.pam.passwordColumn | The name of the column that contains a (encrypted) password string.
|
| services.influxdb2.provision.users.<name>.passwordFile | Password for the user
|
| security.pam.services.<name>.makeHomeDir | Whether to try to create home directories for users
with $HOMEs pointing to nonexistent
locations on session login.
|
| services.mosquitto.listeners.*.users.<name>.passwordFile | Specifies the path to a file containing the
clear text password for the MQTT user
|
| services.paretosecurity.users.<name>.inviteId | A unique ID that links the agent to Pareto Cloud
|
| services.mosquitto.listeners.*.users.<name>.hashedPassword | Specifies the hashed password for the MQTT User
|
| services.mosquitto.listeners.*.users.<name>.hashedPasswordFile | Specifies the path to a file containing the
hashed password for the MQTT user
|
| services.nylon.<name>.name | The name of this nylon instance.
|
| services.taskserver.organisations.<name>.users | A list of user names that belong to the organization.
|
| systemd.units.<name>.name | The name of this systemd unit, including its extension
|
| systemd.paths.<name>.name | The name of this systemd unit, including its extension
|
| services.bind.zones.<name>.name | Name of the zone.
|
| systemd.timers.<name>.name | The name of this systemd unit, including its extension
|
| systemd.slices.<name>.name | The name of this systemd unit, including its extension
|
| services.pppd.peers.<name>.name | Name of the PPP peer.
|
| systemd.user.units.<name>.name | The name of this systemd unit, including its extension
|
| systemd.user.paths.<name>.name | The name of this systemd unit, including its extension
|
| image.repart.name | Name of the image
|
| systemd.user.slices.<name>.name | The name of this systemd unit, including its extension
|
| systemd.user.timers.<name>.name | The name of this systemd unit, including its extension
|
| users.ldap.daemon.rootpwmoddn | The distinguished name to use to bind to the LDAP server
when the root user tries to modify a user's password.
|
| systemd.targets.<name>.name | The name of this systemd unit, including its extension
|
| systemd.sockets.<name>.name | The name of this systemd unit, including its extension
|
| services.i2pd.inTunnels.<name>.name | The endpoint name.
|
| systemd.user.sockets.<name>.name | The name of this systemd unit, including its extension
|
| systemd.user.targets.<name>.name | The name of this systemd unit, including its extension
|
| services.etcd.name | Etcd unique node name.
|
| services.i2pd.outTunnels.<name>.name | The endpoint name.
|
| systemd.services.<name>.name | The name of this systemd unit, including its extension
|
| hardware.alsa.controls.<name>.name | Name of the control, as it appears in alsamixer
|
| security.pam.services.<name>.name | Name of the PAM service.
|
| services.netbird.tunnels.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| services.netbird.clients.<name>.name | Primary name for use (as a suffix) in:
- systemd service name,
- hardened user name and group,
- systemd
*Directory= names,
- desktop application identification,
|
| services.rspamd.workers.<name>.name | Name of the worker
|
| systemd.user.services.<name>.name | The name of this systemd unit, including its extension
|
| users.ldap.bind.distinguishedName | The distinguished name to bind to the LDAP server with
|
| services.i2pd.upnp.name | Name i2pd appears in UPnP forwardings list.
|
| services.hylafax.modems.<name>.name | Name of modem device,
will be searched for in /dev.
|
| services.tinc.networks.<name>.name | The name of the node which is used as an identifier when communicating
with the remote nodes in the mesh
|
| systemd.mounts.*.name | The name of this systemd unit, including its extension
|
| services.bacula-sd.name | Specifies the Name of the Storage daemon.
|
| systemd.network.networks.<name>.name | The name of the network interface to match against.
|
| services.github-runners.<name>.name | Name of the runner to configure
|
| hardware.sane.brscan5.netDevices.<name>.name | The friendly name you give to the network device
|
| hardware.sane.brscan4.netDevices.<name>.name | The friendly name you give to the network device
|
| services.restic.backups.<name>.createWrapper | Whether to generate and add a script to the system path, that has the same environment variables set
as the systemd service
|
| services.i2pd.proto.bob.name | The endpoint name.
|
| services.i2pd.proto.sam.name | The endpoint name.
|
| services.kimai.sites.<name>.database.name | Database name.
|
| services.kimai.sites.<name>.database.createLocally | Create the database and database user locally.
|
| services.send.redis.name | Name of the redis server
|
| services.bcg.name | Name for the device
|
| services.i2pd.proto.http.name | The endpoint name.
|
| services.i2pd.proto.i2cp.name | The endpoint name.
|
| services.k3s.autoDeployCharts.<name>.name | The name of the Helm chart
|
| services.bacula-dir.name | The director name used by the system administrator
|
| services.bacula-fd.name | The client name that must be used by the Director when connecting
|
| services.netbird.clients.<name>.user.name | A system user name for this client instance.
|
| services.netbird.tunnels.<name>.user.name | A system user name for this client instance.
|
| services.snipe-it.mail.from.name | Mail "from" name.
|
| services.drupal.sites.<name>.database.createLocally | Create the database and database user locally.
|
| services.kmonad.keyboards.<name>.name | Keyboard name.
|
| services.drupal.sites.<name>.database.name | Database name.
|
| services.akkoma.frontends.<name>.name | Akkoma frontend name.
|
| services.patroni.name | The name of the host
|
| services.rke2.autoDeployCharts.<name>.name | The name of the Helm chart
|
| services.k3s.autoDeployCharts.<name>.createNamespace | Whether to create the target namespace if not present.
|
| services.postfix.masterConfig.<name>.name | The name of the service to run
|
| services.buildkite-agents.<name>.name | The name of the agent as seen in the buildkite dashboard.
|
| services.cachix-agent.name | Agent name, usually same as the hostname
|
| services.v4l2-relayd.instances.<name>.name | The name of the instance.
|
| services.rke2.autoDeployCharts.<name>.createNamespace | Whether to create the target namespace if not present.
|
| services.kmscon.fonts.*.name | Font name, as used by fontconfig.
|
| services.snipe-it.mail.replyTo.name | Mail "reply-to" name.
|
| programs.regreet.font.name | Name of the font to use for regreet.
|
| services.varnish.listen.*.name | Name is referenced in logs
|