docs/cli/configure.md
openclaw configureInteractive prompt to set up credentials, devices, and agent defaults.
<Note> The **Model** section includes a multi-select for the `agents.defaults.models` allowlist (what shows up in `/model` and the model picker). Provider-scoped setup choices merge their selected models into the existing allowlist instead of replacing unrelated providers already in the config.Re-running provider auth from configure preserves an existing agents.defaults.model.primary, even when the provider's auth step returns a config patch with its own recommended default model. That means adding or reauthing xAI, OpenRouter, or another provider should make the new model available without taking over from your current primary model. Use openclaw models auth login --provider <id> --set-default or openclaw models set <model> when you intentionally want to change the default model.
</Note>
When configure starts from a provider auth choice, the default-model and allowlist pickers prefer that provider automatically. For paired providers such as Volcengine and BytePlus, the same preference also matches their coding-plan variants (volcengine-plan/*, byteplus-plan/*). If the preferred-provider filter would produce an empty list, configure falls back to the unfiltered catalog instead of showing a blank picker.
For web search, openclaw configure --section web lets you choose a provider
and configure its credentials. Some providers also show provider-specific
follow-up prompts:
x_search setup with the same XAI_API_KEY and
let you pick an x_search model.api.moonshot.ai vs
api.moonshot.cn) and the default Kimi web-search model.Related:
--section <section>: repeatable section filterAvailable sections:
workspacemodelwebgatewaydaemonchannelspluginsskillshealthNotes:
gateway.mode. You can select "Continue" without other sections if that is all you need.gateway.auth.token is SecretRef-managed, configure validates the SecretRef but does not persist resolved plaintext token values into supervisor service environment metadata.gateway.auth.token and gateway.auth.password are configured and gateway.auth.mode is unset, configure blocks daemon install until mode is set explicitly.openclaw configure
openclaw configure --section web
openclaw configure --section model --section channels
openclaw configure --section gateway --section daemon