Skip to content

Set up users, roles, and passkeys for the Claworc dashboard

On first run with an empty database, Claworc shows a Create admin account form before the login page. Enter a username and password to create the initial admin account.

Alternatively, create the admin account from the CLI:

Terminal window
# Docker Compose
docker compose exec claworc ./claworc --create-admin
# Kubernetes
kubectl exec -n claworc deploy/claworc -- ./claworc --create-admin

Claworc has two roles:

  • Full access to all instances
  • Create, edit, and delete users
  • Assign instances to users
  • Access the Settings page (global API keys, SSH keys, audit logs)
  • View and configure SSH source IP restrictions per instance
  • Read and write access to assigned instances only
  • Can create, list, download, and delete backups for assigned instances
  • Can manage backup schedules whose instances are all assigned to them
  • No access to the Settings page
  • Cannot view or manage other users
  • Cannot see instances not assigned to them
  • Cannot create new instances or restore from a backup unless the admin grants the Can create instances permission

Can create instances (per-user permission)

Section titled “Can create instances (per-user permission)”

Admins can grant any user the Can create instances permission. A user with this flag can:

  • Create new OpenClaw instances from the dashboard. The new instance is automatically assigned to the user.
  • Restore an assigned instance from one of its backups.

The flag has no effect on admins (admins always can).


Admins manage users from SettingsUsers:

ActionHow
Create userClick Add user, enter username and password, choose role and assigned instances, then save
Edit userClick the username in the table to open the edit dialog
Change roleOpen the user → change the Role dropdown. Selecting Admin automatically grants access to all instances
Toggle Can-create-instancesOpen the user → tick or untick Can create instances
Assign instancesOpen the user → pick instances from the list (disabled for admins, who always have access to all instances)
Reset passwordOpen the user → click Reset password
Delete userOpen the user → click Delete and confirm

Claworc supports passkeys for passwordless login using biometrics or hardware security keys.

  1. Log in with your username and password.
  2. Go to ProfileSecurity.
  3. Click Register passkey and follow your browser’s prompt.

On the login page, click Sign in with passkey instead of entering a password.

For passkeys to work, configure the Relying Party settings to match your domain:

Terminal window
CLAWORC_RP_ORIGINS=https://claworc.example.com
CLAWORC_RP_ID=claworc.example.com

Sessions use HTTP-only cookies and expire after 1 hour of inactivity. Sessions are stored in memory — restarting the Claworc process logs all users out.


For local development only, you can disable authentication entirely:

Terminal window
CLAWORC_AUTH_DISABLED=true

If the admin password is lost:

Terminal window
# Docker Compose
docker compose exec claworc ./claworc --reset-password --username admin
# Kubernetes
kubectl exec -n claworc deploy/claworc -- ./claworc --reset-password --username admin