Documentation Index
Fetch the complete documentation index at: https://docs.openclaw.ai/llms.txt
Use this file to discover all available pages before exploring further.
openclaw devices
Manage device pairing requests and device-scoped tokens.
Commands
openclaw devices list
List pending pairing requests and paired devices.
openclaw devices remove <deviceId>
Remove one paired device entry.
When you are authenticated with a paired device token, non-admin callers can
remove only their own device entry. Removing some other device requires
operator.admin.
openclaw devices clear --yes [--pending]
Clear paired devices in bulk.
openclaw devices approve [requestId] [--latest]
Approve a pending device pairing request by exact requestId. If requestId
is omitted or --latest is passed, OpenClaw only prints the selected pending
request and exits; rerun approval with the exact request ID after verifying
the details.
If a device retries pairing with changed auth details (role, scopes, or public key), OpenClaw supersedes the previous pending entry and issues a new
requestId. Run openclaw devices list right before approval to use the current ID.Requested vs Approved columns in openclaw devices list
or use openclaw devices approve --latest to preview the exact upgrade before
approving it.
If the Gateway is explicitly configured with
gateway.nodes.pairing.autoApproveCidrs, first-time role: node requests from
matching client IPs can be approved before they appear in this list. That policy
is disabled by default and never applies to operator/browser clients or upgrade
requests.
openclaw devices reject <requestId>
Reject a pending device pairing request.
openclaw devices rotate --device <id> --role <role> [--scope <scope...>]
Rotate a device token for a specific role (optionally updating scopes).
The target role must already exist in that device’s approved pairing contract;
rotation cannot mint a new unapproved role.
If you omit --scope, later reconnects with the stored rotated token reuse that
token’s cached approved scopes. If you pass explicit --scope values, those
become the stored scope set for future cached-token reconnects.
Non-admin paired-device callers can rotate only their own device token.
The target token scope set must stay within the caller session’s own operator
scopes; rotation cannot mint or preserve a broader operator token than the
caller already has.
openclaw devices revoke --device <id> --role <role>
Revoke a device token for a specific role.
Non-admin paired-device callers can revoke only their own device token.
Revoking some other device’s token requires operator.admin.
The target token scope set must also fit within the caller session’s own
operator scopes; pairing-only callers cannot revoke admin/write operator tokens.
Common options
--url <url>: Gateway WebSocket URL (defaults togateway.remote.urlwhen configured).--token <token>: Gateway token (if required).--password <password>: Gateway password (password auth).--timeout <ms>: RPC timeout.--json: JSON output (recommended for scripting).
Notes
- Token rotation returns a new token (sensitive). Treat it like a secret.
- These commands require
operator.pairing(oroperator.admin) scope. gateway.nodes.pairing.autoApproveCidrsis an opt-in Gateway policy for fresh node device pairing only; it does not change CLI approval authority.- Token rotation and revocation stay inside the approved pairing role set and approved scope baseline for that device. A stray cached token entry does not grant a token-management target.
- For paired-device token sessions, cross-device management is admin-only:
remove,rotate, andrevokeare self-only unless the caller hasoperator.admin. - Token mutation is also caller-scope contained: a pairing-only session cannot
rotate or revoke a token that currently carries
operator.adminoroperator.write. devices clearis intentionally gated by--yes.- If pairing scope is unavailable on local loopback (and no explicit
--urlis passed), list/approve can use a local pairing fallback. devices approverequires an explicit request ID before minting tokens; omittingrequestIdor passing--latestonly previews the newest pending request.
Token drift recovery checklist
Use this when Control UI or other clients keep failing withAUTH_TOKEN_MISMATCH or AUTH_DEVICE_TOKEN_MISMATCH.
- Confirm current gateway token source:
- List paired devices and identify the affected device id:
- Rotate operator token for the affected device:
- If rotation is not enough, remove stale pairing and approve again:
- Retry client connection with the current shared token/password.
- Normal reconnect auth precedence is explicit shared token/password first, then explicit
deviceToken, then stored device token, then bootstrap token. - Trusted
AUTH_TOKEN_MISMATCHrecovery can temporarily send both the shared token and the stored device token together for the one bounded retry.