Authentication
OpenClaw supports OAuth and API keys for model providers. For always-on gateway hosts, API keys are usually the most predictable option. Subscription/OAuth flows are also supported when they match your provider account model. See /concepts/oauth for the full OAuth flow and storage layout. For SecretRef-based auth (env/file/exec providers), see Secrets Management.
For credential eligibility/reason-code rules used by models status --probe, see
Auth Credential Semantics.
Recommended setup (API key, any provider)
If you’re running a long-lived gateway, start with an API key for your chosen provider. For Anthropic specifically, API key auth is the safe path and is recommended over subscription setup-token auth.- Create an API key in your provider console.
- Put it on the gateway host (the machine running
openclaw gateway).
- If the Gateway runs under systemd/launchd, prefer putting the key in
~/.openclaw/.envso the daemon can read it:
openclaw onboard.
See Help for details on env inheritance (env.shellEnv,
~/.openclaw/.env, systemd/launchd).
Anthropic: setup-token (subscription auth)
If you’re using a Claude subscription, the setup-token flow is supported. Run it on the gateway host:auth-profiles.json + updates config):
api_keycredentials can usekeyRef: { source, provider, id }tokencredentials can usetokenRef: { source, provider, id }
1 when expired/missing, 2 when expiring):
claude setup-token requires an interactive TTY.
Checking model auth status
API key rotation behavior (gateway)
Some providers support retrying a request with alternative keys when an API call hits a provider rate limit.- Priority order:
OPENCLAW_LIVE_<PROVIDER>_KEY(single override)<PROVIDER>_API_KEYS<PROVIDER>_API_KEY<PROVIDER>_API_KEY_*
- Google providers also include
GOOGLE_API_KEYas an additional fallback. - The same key list is deduplicated before use.
- OpenClaw retries with the next key only for rate-limit errors (for example
429,rate_limit,quota,resource exhausted). - Non-rate-limit errors are not retried with alternate keys.
- If all keys fail, the final error from the last attempt is returned.
Controlling which credential is used
Per-session (chat command)
Use/model <alias-or-id>@<profileId> to pin a specific provider credential for the current session (example profile ids: anthropic:default, anthropic:work).
Use /model (or /model list) for a compact picker; use /model status for the full view (candidates + next auth profile, plus provider endpoint details when configured).
Per-agent (CLI override)
Set an explicit auth profile order override for an agent (stored in that agent’sauth-profiles.json):
--agent <id> to target a specific agent; omit it to use the configured default agent.
Troubleshooting
”No credentials found”
If the Anthropic token profile is missing, runclaude setup-token on the
gateway host, then re-check:
Token expiring/expired
Runopenclaw models status to confirm which profile is expiring. If the profile
is missing, rerun claude setup-token and paste the token again.
Requirements
- Anthropic subscription account (for
claude setup-token) - Claude Code CLI installed (
claudecommand available)
This page is sourced from openclaw/openclaw.