Skip to content

How to Connect Your Hosted OpenClaw Bot to Your Tailscale Tailnet

A step-by-step guide to connecting a hosted OpenClaw bot to your own Tailscale tailnet for private resource access and private web chat.

March 15, 2026

If you want a hosted OpenClaw bot to reach internal systems or use a private web URL, the flow is straightforward.

What You Need

  • a paid hosted OpenClaw bot
  • your Tailscale tailnet
  • a Tailscale OAuth client with the right scope to mint auth keys for the fixed bot tag

Step 1: Open the bot config

Go to the bot’s Config tab in the dashboard.

You will now see a Private networking section.

Step 2: Save your Tailscale workspace

Enter:

  • your tailnet name
  • your OAuth client ID
  • your OAuth client secret
  • the bot tag you want OpenClaw to use

OpenClaw validates that configuration before it saves it.

Step 3: Decide what the bot should do on the tailnet

You can turn on:

  • private resource access if the bot needs internal apps, APIs, or databases
  • private web chat if the browser UI should stay inside your tailnet

Step 4: Pick web exposure

Choose one of these:

  • public
  • private
  • both
  • disabled

If you are not sure, start with both.

That keeps your normal public web path while adding a private tailnet URL for internal users.

Step 5: Keep the channel rules straight

This is the part that matters most:

  • public web chat stays on Cloudflare
  • private web chat runs on your tailnet
  • Telegram stays public-only
  • custom domains stay public-only

So yes, you can have a bot with a private web URL and a public Telegram bot at the same time.

Step 6: Test the private path

From a device on your tailnet:

  1. open the private web URL shown in the dashboard
  2. confirm the bot can answer
  3. if needed, confirm it can reach the internal service you wanted

If that works, you can keep mixed mode or switch to private only.

What OpenClaw Does Behind The Scenes

OpenClaw does not put your OAuth client secret inside the bot container.

Instead it:

  1. uses your OAuth client on the control plane
  2. mints a one-off join key
  3. injects only that short-lived join key into the bot runtime

That keeps the trust boundary tighter than shipping the full OAuth secret with the bot.

Get the free guide

The 10 Costly Mistakes Hosting Your AI Assistant on DIY VPS — plus a short series on migration, self-audit, and when to pay for managed.

Ready to run OpenClaw without infrastructure headaches?

Start your free 7-day Pro trial on OpenClaw VPS and get a production-ready bot online with managed hosting, updates, and support.

Share this post

Related Posts