mirror of
https://github.com/openclaw/openclaw.git
synced 2026-05-05 16:30:23 +00:00
docs: refresh web surface auth mirrors
This commit is contained in:
@@ -139,7 +139,7 @@ Short version: **keep the Gateway loopback-only** unless you’re sure you need
|
||||
- **Loopback + SSH/Tailscale Serve** is the safest default (no public exposure).
|
||||
- Plaintext `ws://` is loopback-only by default. For trusted private networks,
|
||||
set `OPENCLAW_ALLOW_INSECURE_PRIVATE_WS=1` on the client process as break-glass.
|
||||
- **Non-loopback binds** (`lan`/`tailnet`/`custom`, or `auto` when loopback is unavailable) must use auth tokens/passwords.
|
||||
- **Non-loopback binds** (`lan`/`tailnet`/`custom`, or `auto` when loopback is unavailable) must use gateway auth: token, password, or an identity-aware reverse proxy with `gateway.auth.mode: "trusted-proxy"`.
|
||||
- `gateway.remote.token` / `.password` are client credential sources. They do **not** configure server auth by themselves.
|
||||
- Local call paths can use `gateway.remote.*` as fallback only when `gateway.auth.*` is unset.
|
||||
- If `gateway.auth.token` / `gateway.auth.password` is explicitly configured via SecretRef and unresolved, resolution fails closed (no remote fallback masking).
|
||||
@@ -148,6 +148,8 @@ Short version: **keep the Gateway loopback-only** unless you’re sure you need
|
||||
headers when `gateway.auth.allowTailscale: true`; HTTP API endpoints still
|
||||
require token/password auth. This tokenless flow assumes the gateway host is
|
||||
trusted. Set it to `false` if you want tokens/passwords everywhere.
|
||||
- **Trusted-proxy** auth is for non-loopback identity-aware proxy setups only.
|
||||
Same-host loopback reverse proxies do not satisfy `gateway.auth.mode: "trusted-proxy"`.
|
||||
- Treat browser control like operator access: tailnet-only + deliberate node pairing.
|
||||
|
||||
Deep dive: [Security](/gateway/security).
|
||||
|
||||
Reference in New Issue
Block a user