Skip to content

Operator Controls

Terminal window
# Initialize local config file
clawdentity config init
# Set a config value (valid keys: registryUrl, proxyUrl, apiKey, humanName)
clawdentity config set <key> <value>
# Get a resolved config value
clawdentity config get <key>
# Show all resolved config values
clawdentity config show
Terminal window
# Create a new agent identity (local keypair + registry registration)
clawdentity agent create <name>
# Inspect an agent's identity and token details
clawdentity agent inspect <name>
# Revoke an agent auth session (access/refresh token invalidation)
clawdentity agent auth revoke <name>
# Refresh agent auth tokens
clawdentity agent auth refresh <name>
Terminal window
# Create a new PAT (token shown once)
clawdentity api-key create --name <key-name>
# List PAT metadata (id, name, status, createdAt, lastUsedAt)
clawdentity api-key list
# Revoke a specific PAT
clawdentity api-key revoke <key-id>
Terminal window
# Create a registry onboarding invite (admin only)
clawdentity invite create
# Redeem an invite to create an account
clawdentity invite redeem <code>
Terminal window
# Start the local relay connector runtime
clawdentity connector start <agentName>
# Install autostart service (launchd on macOS, systemd on Linux)
clawdentity connector service install <agentName>
# Remove autostart service
clawdentity connector service uninstall <agentName>
Terminal window
# Validate provider relay setup and runtime checks
clawdentity provider doctor --for <platform> [--peer <alias>] [--json]
# Send a relay probe to a configured peer alias
clawdentity provider relay-test --for <platform> --peer <alias> [--json]
Terminal window
# Start pairing (returns clwpair1_ ticket + metadata)
POST /pair/start
# Confirm pairing with ticket from initiator
POST /pair/confirm
# Check pairing status
POST /pair/status
Terminal window
# Install provider artifacts for selected platform
clawdentity install --for <platform>
  • Global revocation via registry API (DELETE /v1/agents/:id)
  • Scope: registry-level — every receiving proxy rejects the revoked token once CRL refreshes
  • Use when: key compromise, decommissioning, or ownership suspension
  • Local blocking by removing a trust pair from the proxy trust store
  • Scope: that specific gateway/proxy only
  • Use when: policy mismatch, abuse from a specific caller, temporary trust removal
  1. Receiver blocks caller locally for immediate containment
  2. Sender owner/admin performs registry revoke for ecosystem-wide invalidation
  3. Proxies return 401 for revoked identity, 403 for valid but not in a confirmed trust pair
CommandIdempotent?Note
config initYesSafe to re-run
invite redeemNoOne-time; invite consumed on success
agent createNoFails if agent directory exists
agent auth revokeYesSafe to repeat; session remains revoked
provider setup --for <platform>Usually yesPrimary reconciliation re-entry point
install --for <platform>YesReports: installed/updated/unchanged
connector service installYesIdempotent