When to Use Cloud Mode
Choose cloud mode if you need:- Team collaboration — Multiple developers viewing the same dashboards
- Persistent data — Keep message logs and analytics across machines
- Centralized management — One place to configure all your agents
- Authentication — User accounts with email/password or OAuth (Google, GitHub, Discord)
- Production deployments — Reliable infrastructure with uptime SLA
Setup
Create an account
Go to app.manifest.build and sign up:
- Email/password — Standard registration with email verification
- OAuth — Sign in with Google, GitHub, or Discord
Create an agent
Click + New Agent and give it a name (e.g.,
my-openclaw-agent).Each agent has:- Unique API key for OTLP telemetry ingestion
- Separate message log and analytics
- Independent routing configuration
Get your API key
After creating the agent, click Settings → API Key to view your key:Copy this key — you’ll need it for configuration.
API keys are scoped to a single agent. Create separate agents for different projects or environments.
Configure cloud mode
https://app.manifest.build/otlp — you don’t need to configure it unless self-hosting.Dashboard Access
Access the dashboard at app.manifest.build. After signing in, you’ll see:- Workspace — Grid of all your agents with quick stats
- Agent Overview — Token usage, costs, message count for a specific agent
- Message Log — Real-time stream of all LLM interactions
- Routing — Configure model routing tiers and provider keys
- Notifications — Set up cost and usage alerts
- Security — View security score and anomaly events
Authentication
Manifest Cloud uses Better Auth for session management:Email/Password
- Sign up with email and password
- Email verification required (check your inbox)
- Password reset via email link
OAuth Providers
Sign in with:- Google — Google Workspace or personal accounts
- GitHub — Developers and teams
- Discord — Community members
Session Management
- Sessions persist for 30 days
- Logout is per-device (sessions are stored in cookies)
- Account settings at Settings → Account
API Key Management
Each agent has one API key for OTLP ingestion. To rotate a key:Rotate the key
Click Rotate API Key. This immediately invalidates the old key and generates a new one.
Multi-Tenancy
Manifest Cloud is multi-tenant:- Tenant — Created automatically when you create your first agent. Tenant name matches your user ID.
- Agent — Each agent has a unique API key and isolated telemetry data.
- Data isolation — All queries filter by your user ID. You only see your own agents.
Endpoint Configuration
The default endpoint ishttps://app.manifest.build/otlp. If you’re self-hosting Manifest, change the endpoint:
- Start with
https://(orhttp://for local testing) - End with
/otlp(the OTLP ingestion path) - Be publicly accessible from your OpenClaw gateway
Provider Registration
Cloud mode automatically registers Manifest as a provider in OpenClaw:/v1/chat/completions.
Using Cloud Mode
Once configured, use Manifest’s routing and observability features:Telemetry Pipeline
The cloud mode telemetry pipeline:- OpenClaw gateway — Plugin hooks intercept LLM requests
- OpenTelemetry SDK — Creates traces, spans, and metrics
- OTLP exporter — Batches telemetry and sends to
https://app.manifest.build/otlp - Backend ingestion — Parses OTLP protobuf, validates API key, stores in PostgreSQL
- Dashboard — Real-time updates via Server-Sent Events (SSE)
Security
API Key Storage
API keys are stored in:- OpenClaw config:
~/.openclaw/openclaw.json(mode0600, readable only by your user) - Manifest config:
~/.openclaw/manifest/config.json(mode0600)
Transport Security
All communication with Manifest Cloud uses HTTPS. OTLP payloads are sent viaPOST requests with:
Authorization: Bearer mnfst_YOUR_KEYheaderContent-Type: application/x-protobuf(binary protobuf encoding)- TLS 1.2+ encryption
Authentication Guard
TheOtlpAuthGuard validates API keys:
- Extracts
Bearertoken fromAuthorizationheader - Checks if it starts with
mnfst_prefix - Hashes the key using scrypt KDF
- Looks up the hashed key in the
agent_api_keystable - Caches valid keys in-memory for 5 minutes
401 Unauthorized.
Troubleshooting
Connection failures
Run the connection check:“Endpoint not reachable”
- Check your internet connection
- Verify the endpoint URL is correct
- Test the endpoint manually:
“Auth invalid”
- Verify your API key starts with
mnfst_ - Check for typos in the key
- Confirm the key matches your agent in the dashboard
- If you rotated the key, update your config:
No telemetry data
If messages don’t appear in the dashboard:-
Verify the plugin is active:
-
Check connection status:
-
Restart the gateway to reset the pipeline:
-
Check for firewall or proxy issues blocking HTTPS to
app.manifest.build
401 Unauthorized errors
The backend rejected your API key. Possible causes:- Key was rotated (update your config)
- Key was deleted (create a new agent)
- Key belongs to a different agent (verify in dashboard)
- Go to dashboard → Agent → Settings → API Key
- Click Rotate API Key
- Copy the new key
- Update your config:
Switching from Local Mode
If you’re migrating from local to cloud mode:Create a cloud agent
Sign up at app.manifest.build and create an agent.
~/.openclaw/manifest/ but won’t be used. Cloud mode stores data on Manifest’s servers.
Next Steps
Multi-Agent
Organize and track multiple agents in one workspace
Custom Providers
Add your LLM provider API keys for routing