| services.bacula-sd.tls.require | Require TLS or TLS-PSK encryption
|
| services.bacula-fd.tls.require | Require TLS or TLS-PSK encryption
|
| services.bacula-dir.tls.require | Require TLS or TLS-PSK encryption
|
| services.movim.h2o.tls.policy | add will additionally listen for TLS connections. only will
disable TLS connections. force will redirect non-TLS traffic
to the TLS connection.
|
| services.movim.h2o.tls | TLS options for virtual host
|
| services.bacula-sd.tls.key | The path of a PEM encoded TLS private key
|
| services.bacula-fd.tls.key | The path of a PEM encoded TLS private key
|
| services.h2o.hosts.<name>.tls.policy | add will additionally listen for TLS connections. only will
disable TLS connections. force will redirect non-TLS traffic
to the TLS connection.
|
| services.bacula-dir.tls.key | The path of a PEM encoded TLS private key
|
| services.h2o.hosts.<name>.tls | TLS options for virtual host
|
| services.bacula-sd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| services.bacula-fd.director.<name>.tls.require | Require TLS or TLS-PSK encryption
|
| services.nghttpx.tls | TLS certificate and key paths
|
| services.bacula-fd.tls | TLS Options for the File Daemon
|
| services.bacula-sd.tls | TLS Options for the Storage Daemon
|
| services.bacula-dir.tls | TLS Options for the Director
|
| services.vault.tlsKeyFile | TLS private key file
|
| services.gitlab.smtp.tls | Whether to use TLS wrapper-mode.
|
| services.movim.h2o.tls.port | Override the default TLS port for this virtual host.
|
| services.coder.tlsKey | The path to the TLS key.
|
| services.vault.tlsCertFile | TLS certificate file
|
| services.dolibarr.h2o.tls.policy | add will additionally listen for TLS connections. only will
disable TLS connections. force will redirect non-TLS traffic
to the TLS connection.
|
| services.nghttpx.tls.key | Path to the TLS key file.
|
| services.nghttpx.tls.crt | Path to the TLS certificate file.
|
| services.coder.tlsCert | The path to the TLS certificate.
|
| services.h2o.hosts.<name>.tls.port | Override the default TLS port for this virtual host.
|
| services.dendrite.tlsKey | The path to the TLS key.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| services.cfssl.tlsCert | Other endpoint's CA to set up TLS protocol.
|
| services.bacula-fd.tls.enable | Specifies if TLS should be enabled
|
| services.bacula-sd.tls.enable | Specifies if TLS should be enabled
|
| services.coturn.no-tls | Disable TLS client listener
|
| services.dendrite.tlsCert | The path to the TLS certificate.
nix-shell -p dendrite --command "generate-keys --tls-cert server.crt --tls-key server.key"
|
| services.bacula-dir.tls.enable | Specifies if TLS should be enabled
|
| services.llama-swap.tls.enable | Whether to enable TLS encryption.
|
| services.pgmanage.tls.key | TLS key
|
| services.llama-swap.tls.keyFile | Path to the TLS private key file
|
| services.llama-swap.tls.certFile | Path to the TLS certificate file
|
| services.movim.h2o.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| services.dolibarr.h2o.tls | TLS options for virtual host
|
| services.pgmanage.tls.cert | TLS certificate
|
| services.zitadel.tlsMode | The TLS mode to use
|
| services.athens.tlsKeyFile | Path to the TLS key file.
|
| services.pgmanage.tls | These options tell pgmanage where the TLS Certificate and Key files
reside
|
| services.h2o.hosts.<name>.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| services.glusterfs.tlsSettings.tlsPem | Path to the certificate used for TLS.
|
| services.oauth2-proxy.tls.enable | Whether to serve over TLS.
|
| services.athens.tlsCertFile | Path to the TLS certificate file.
|
| services.cfssl.tlsRemoteCa | CAs to trust for remote TLS requests.
|
| services.acme-dns.settings.api.tls | TLS backend to use.
|
| services.glusterfs.tlsSettings.tlsKeyPath | Path to the private key used for TLS.
|
| services.dolibarr.h2o.tls.port | Override the default TLS port for this virtual host.
|
| services.skydns.etcd.tlsPem | Skydns path of TLS client certificate - public key.
|
| services.skydns.etcd.tlsKey | Skydns path of TLS client certificate - private key.
|
| services.synergy.server.tls.cert | The TLS certificate to use for encryption.
|
| services.bacula-sd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| services.bacula-fd.director.<name>.tls.key | The path of a PEM encoded TLS private key
|
| services.oauth2-proxy.tls.key | Path to private key file.
|
| services.prosody.modules.tls | Add support for secure TLS on c2s/s2s connections
|
| services.thanos.rule.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.synergy.server.tls.enable | Whether TLS encryption should be used
|
| services.nezha-agent.settings.tls | Enable SSL/TLS encryption.
|
| services.omnom.settings.smtp.tls | Whether to enable Whether TLS encryption should be used..
|
| services.thanos.rule.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| services.bacula-sd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| services.bacula-fd.director.<name>.tls | TLS Options for the Director in this Configuration.
|
| services.thanos.store.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.thanos.query.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.cfssl.tlsKey | Other endpoint's CA private key
|
| services.dolibarr.h2o.tls.quic | Enables HTTP/3 over QUIC on the UDP port for TLS
|
| services.thanos.query.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| services.thanos.store.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| services.maddy.tls.extraConfig | Arguments for the specified certificate loader
|
| services.movim.h2o.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| services.bacula-sd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| services.bacula-fd.director.<name>.tls.enable | Specifies if TLS should be enabled
|
| services.h2o.hosts.<name>.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| services.thanos.receive.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.thanos.sidecar.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.nghttpx.backends.*.params.tls | This option determines whether nghttpx will negotiate its
connection with a backend server using TLS or not
|
| services.portunus.ldap.tls | Whether to enable LDAPS protocol
|
| services.thanos.sidecar.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| services.thanos.receive.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| services.maddy.tls.loader | TLS certificates are obtained by modules called "certificate
loaders"
|
| services.coturn.tls-listening-port | TURN listener port for TLS
|
| services.movim.h2o.tls.identity | Key / certificate pairs for the virtual host.
|
| services.thanos.query.grpc-client-tls-key | TLS Key for the client's certificate
|
| services.bacula-sd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.bacula-fd.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.bacula-dir.tls.caCertificateFile | The path specifying a PEM encoded TLS CA certificate(s)
|
| services.thanos.query.grpc-client-tls-ca | TLS CA Certificates to use to verify gRPC servers
|
| services.neo4j.bolt.tlsLevel | SSL/TSL requirement level for BOLT traffic.
|
| services.h2o.hosts.<name>.tls.identity | Key / certificate pairs for the virtual host.
|
| services.librespeed.tlsKey | TLS private key to use
|
| services.foundationdb.tls | FoundationDB Transport Security Layer (TLS) settings.
|
| services.thanos.query.grpc-client-tls-cert | TLS Certificates to use to identify this client to the server
|
| services.dolibarr.h2o.tls.extraSettings | Additional TLS/SSL-related configuration options
|
| services.movim.h2o.tls.identity.*.key-file | Path to key file
|
| services.thanos.query-frontend.grpc-server-tls-key | TLS Key for the gRPC server, leave blank to disable TLS
|
| services.thanos.query-frontend.grpc-server-tls-cert | TLS Certificate for gRPC server, leave blank to disable TLS
|
| services.h2o.hosts.<name>.tls.identity.*.key-file | Path to key file
|