Auth model
Gateway token + browser pairing + WebSocket session
The browser-native surface: no external messenger, but all the same trust and session questions.
WebChat for OpenClaw covers browser access, WebSocket reachability, token bootstrap, pairing, and safe remote exposure for the built-in chat surface.
Auth model
Gateway token + browser pairing + WebSocket session
Safety stance
Because it feels local and simple, operators often underestimate the trust model and remote-access implications.
Verification ritual
Test the exact local or remote URL, token path, and browser profile you expect real operators to use.
Rollout mode
10–20 min setup
Gateway WebChat
WebChat is a native Gateway WebSocket UI that uses the same sessions and routing rules as other channels and always routes replies back to WebChat.
Watch gateway reachability
WebChat failures frequently mix up reachability, auth, pairing, and browser security-context problems.
WebChat is the most deceptively simple OpenClaw channel. It looks like “just a browser tab,” but in practice it is a three-part system: gateway reachability, token authentication, and browser device trust. Most WebChat failures are really confusion between those layers.
WebChat is the fastest route from a working gateway to a usable interface:
That speed is exactly why operators underestimate it.
When WebChat is local, it feels trivial. When it becomes remote, multi-browser, or reverse-proxied, it starts behaving like a real security surface. That is why this page treats WebChat as a channel-grade operational lane, not a convenience feature.
If Telegram taught us to separate platform visibility from OpenClaw policy, WebChat teaches a slightly different split.
Before auth or pairing even matters, the browser must be talking to the right OpenClaw instance.
This can break when you switch between:
localhostMany “WebChat auth” reports are actually simple reachability mistakes.
WebChat and Control UI auth depend on opening the right tokenized dashboard link, not just any raw port.
If the browser uses a stale URL or a mismatched token source, the result often looks like:
unauthorizedThis is still not pairing. It is token auth.
Once the browser reaches the gateway and presents the right auth material, OpenClaw may still require device identity and pairing approval.
That is why WebChat behaves differently when you switch:
http vs https),The key operator lesson is simple:
WebChat is not “just a UI.” The browser itself is part of the trust boundary.
For first-time setups, keep WebChat boring and predictable:
openclaw dashboard,openclaw gateway restart
openclaw dashboard
Then:
The safest “first real remote test” is usually an SSH tunnel:
ssh -N -L 18789:127.0.0.1:18789 user@host
Then open the tokenized dashboard URL locally.
That removes reverse proxy, public TLS, and host binding confusion from the first validation pass.
This is the most important WebChat lesson.
When you open WebChat on the same machine as the gateway, several hard problems are already solved for you:
That happy path is real, but it teaches the wrong mental model if you stop there.
The moment you move WebChat to another machine or browser, you are now testing:
This is why a remote WebChat failure can look chaotic even when the gateway itself is healthy.
Do not stop at “the chat box loaded.”
Run this verification sequence:
openclaw dashboardIf you intend to use WebChat remotely, test the exact remote access path you plan to operate:
Do not call WebChat “ready” if you have only tested localhost but plan to use it through a different path.
unauthorized or reconnect loopThis usually means token bootstrap drift or that the browser is not actually hitting the gateway instance you think it is.
Start here:
disconnected (1008): pairing requiredThis means the browser identity is not approved yet, or a scope upgrade now needs approval.
Start here:
device identity requiredThis is the classic remote HTTP / insecure-context failure.
If the browser is opened over plain HTTP on a remote host, WebCrypto-backed identity can fail and the gateway rejects the connection.
Start here:
This is a UI-specific limitation, not a routing mystery.
Start here:
This is another WebChat-specific ergonomics issue, not a gateway failure.
Start here:
If WebChat is your primary operator surface, treat these as baseline rules:
| Concern | Recommended posture | Why |
|---|---|---|
| First setup | Use openclaw dashboard + local or tunneled access | Removes stale URL and proxy confusion |
| Remote access | Prefer HTTPS or a trusted tunnel path | Browser identity depends on secure context assumptions |
| Pairing | Approve explicitly and retest after restart | Trust state matters more than a single successful page load |
| Bookmarks | Refresh from a fresh tokenized link when debugging auth | Old links cause misleading failures |
| Validation | Test the exact browser profile and access path you will actually operate | Device trust is browser-specific enough to matter |
WebChat is strongest in three roles:
Best for solo operators or small teams who want the shortest path to an OpenClaw-native interface.
Even if the “public” channel is Telegram, Slack, or WhatsApp, WebChat is often the cleanest fallback for debugging because it removes third-party platform variability.
When you want to keep the most powerful access path close to the gateway host or a trusted tunnel, WebChat is usually the right answer.
Verification & references
References