Files
openclaw-skill/openclaw-knowhow-skill/output/openclaw-docs_data/pages/Dashboard_Control_UI_37df834dcb.json
Selig 4c966a3ad2 Initial commit: OpenClaw Skill Collection
6 custom skills (assign-task, dispatch-webhook, daily-briefing,
task-capture, qmd-brain, tts-voice) with technical documentation.
Compatible with Claude Code, OpenClaw, Codex CLI, and OpenCode.
2026-03-13 10:58:30 +08:00

24 lines
2.6 KiB
JSON
Executable File

{
"title": "Dashboard (Control UI)",
"content": "The Gateway dashboard is the browser Control UI served at `/` by default\n(override with `gateway.controlUi.basePath`).\n\nQuick open (local Gateway):\n\n* [http://127.0.0.1:18789/](http://127.0.0.1:18789/) (or [http://localhost:18789/](http://localhost:18789/))\n\n* [Control UI](/web/control-ui) for usage and UI capabilities.\n* [Tailscale](/gateway/tailscale) for Serve/Funnel automation.\n* [Web surfaces](/web) for bind modes and security notes.\n\nAuthentication is enforced at the WebSocket handshake via `connect.params.auth`\n(token or password). See `gateway.auth` in [Gateway configuration](/gateway/configuration).\n\nSecurity note: the Control UI is an **admin surface** (chat, config, exec approvals).\nDo not expose it publicly. The UI stores the token in `localStorage` after first load.\nPrefer localhost, Tailscale Serve, or an SSH tunnel.\n\n## Fast path (recommended)\n\n* After onboarding, the CLI now auto-opens the dashboard with your token and prints the same tokenized link.\n* Re-open anytime: `openclaw dashboard` (copies link, opens browser if possible, shows SSH hint if headless).\n* The token stays local (query param only); the UI strips it after first load and saves it in localStorage.\n\n## Token basics (local vs remote)\n\n* **Localhost**: open `http://127.0.0.1:18789/`. If you see “unauthorized,” run `openclaw dashboard` and use the tokenized link (`?token=...`).\n* **Token source**: `gateway.auth.token` (or `OPENCLAW_GATEWAY_TOKEN`); the UI stores it after first load.\n* **Not localhost**: use Tailscale Serve (tokenless if `gateway.auth.allowTailscale: true`), tailnet bind with a token, or an SSH tunnel. See [Web surfaces](/web).\n\n## If you see “unauthorized” / 1008\n\n* Run `openclaw dashboard` to get a fresh tokenized link.\n* Ensure the gateway is reachable (local: `openclaw status`; remote: SSH tunnel `ssh -N -L 18789:127.0.0.1:18789 user@host` then open `http://127.0.0.1:18789/?token=...`).\n* In the dashboard settings, paste the same token you configured in `gateway.auth.token` (or `OPENCLAW_GATEWAY_TOKEN`).",
"code_samples": [],
"headings": [
{
"level": "h2",
"text": "Fast path (recommended)",
"id": "fast-path-(recommended)"
},
{
"level": "h2",
"text": "Token basics (local vs remote)",
"id": "token-basics-(local-vs-remote)"
},
{
"level": "h2",
"text": "If you see “unauthorized” / 1008",
"id": "if-you-see-“unauthorized”-/-1008"
}
],
"url": "llms-txt#dashboard-(control-ui)",
"links": []
}