Caricamento in corso...
Caricamento in corso...
Last synced: Today, 22:00
Technical reference for the OpenClaw framework. Real-time synchronization with the official documentation engine.
Use this file to discover all available pages before exploring further.
openclaw devicesManage device pairing requests and device-scoped tokens.
openclaw devices listList pending pairing requests and paired devices.
textopenclaw devices list openclaw devices list --json
Pending request output shows the requested access next to the device's current approved access when the device is already paired. This makes scope/role upgrades explicit instead of looking like the pairing was lost.
openclaw devices remove <deviceId>Remove one paired device entry.
When you are authenticated with a paired device token, non-admin callers can remove only their own device entry. Removing some other device requires
operator.admintextopenclaw devices remove <deviceId> openclaw devices remove <deviceId> --json
openclaw devices clear --yes [--pending]Clear paired devices in bulk.
textopenclaw devices clear --yes openclaw devices clear --yes --pending openclaw devices clear --yes --pending --json
openclaw devices approve [requestId] [--latest]Approve a pending device pairing request by exact
requestIdrequestId--latestIf the device is already paired and asks for broader scopes or a broader role, OpenClaw keeps the existing approval in place and creates a new pending upgrade request. Review the
RequestedApprovedopenclaw devices listopenclaw devices approve --latestIf the Gateway is explicitly configured with
gateway.nodes.pairing.autoApproveCidrsrole: nodetextopenclaw devices approve openclaw devices approve <requestId> openclaw devices approve --latest
openclaw devices reject <requestId>Reject a pending device pairing request.
textopenclaw devices reject <requestId>
openclaw devices rotate --device <id> --role <role> [--scope <scope...>]Rotate a device token for a specific role (optionally updating scopes). The target role must already exist in that device's approved pairing contract; rotation cannot mint a new unapproved role. If you omit
--scope--scopetextopenclaw devices rotate --device <deviceId> --role operator --scope operator.read --scope operator.write
Returns rotation metadata as JSON. If the caller is rotating its own token while authenticated with that device token, the response also includes the replacement token so the client can persist it before reconnecting. Shared/admin rotations do not echo the bearer token.
openclaw devices revoke --device <id> --role <role>Revoke a device token for a specific role.
Non-admin paired-device callers can revoke only their own device token. Revoking some other device's token requires
operator.admintextopenclaw devices revoke --device <deviceId> --role node
Returns the revoke result as JSON.
--url <url>gateway.remote.url--token <token>--password <password>--timeout <ms>--jsonoperator.pairingoperator.admingateway.nodes.pairing.autoApproveCidrsremoverotaterevokeoperator.adminoperator.adminoperator.writedevices clear--yes--urldevices approverequestId--latestUse this when Control UI or other clients keep failing with
AUTH_TOKEN_MISMATCHAUTH_DEVICE_TOKEN_MISMATCHbashopenclaw config get gateway.auth.token
bashopenclaw devices list
bashopenclaw devices rotate --device <deviceId> --role operator
bashopenclaw devices remove <deviceId> openclaw devices list openclaw devices approve <requestId>
Notes:
deviceTokenAUTH_TOKEN_MISMATCHRelated:
© 2024 TaskFlow Mirror
Powered by TaskFlow Sync Engine