#16251: docs: remove note about personal single-user access from trusted proxy auth guidance
docs
gateway
size: XS
## Summary
A small follow up PR related to #1710.
Describe the problem and fix in 2–5 bullets:
Updates the trusted proxy auth docs "when not to use" section and removes the bullet point about them not being suitable for personal use. I use an identity aware proxy for my homelab to harden access to OpenClaw as well as provide hardened access via SSH. That was the whole reason I implemented #15940. 😅
## Change Type (select all)
- [ ] Bug fix
- [ ] Feature
- [ ] Refactor
- [x] Docs
- [ ] Security hardening
- [ ] Chore/infra
## Scope (select all touched areas)
- [x] Gateway / orchestration
- [ ] Skills / tool execution
- [ ] Auth / tokens
- [ ] Memory / storage
- [ ] Integrations
- [ ] API / contracts
- [ ] UI / DX
- [ ] CI/CD / infra
## Linked Issue/PR
- Related #1710
## User-visible / Behavior Changes
List user-visible changes (including defaults/config).
If none, write `None`.
## Security Impact (required)
- New permissions/capabilities? (`Yes/No`)
- Secrets/tokens handling changed? (`Yes/No`)
- New/changed network calls? (`Yes/No`)
- Command/tool execution surface changed? (`Yes/No`)
- Data access scope changed? (`Yes/No`)
- If any `Yes`, explain risk + mitigation:
## Repro + Verification
### Environment
- OS:
- Runtime/container:
- Model/provider:
- Integration/channel (if any):
- Relevant config (redacted):
### Steps
N/A
### Expected
-
### Actual
-
## Evidence
N/A
## Human Verification (required)
What you personally verified (not just CI), and how:
N/A
## Compatibility / Migration
N/A
## Failure Recovery (if this breaks)
N/A
## Risks and Mitigations
N/A
<!-- greptile_comment -->
<h3>Greptile Summary</h3>
Removes outdated guidance from the trusted-proxy auth documentation. The removed bullet point incorrectly suggested that trusted-proxy auth wasn't suitable for personal single-user access, but as the PR author demonstrates, identity-aware proxies work well for hardening homelab deployments. The documentation still appropriately references Tailscale as a simpler alternative for tailnet-only access in the "Related" section.
<h3>Confidence Score: 5/5</h3>
- This PR is safe to merge with no risk
- Documentation-only change that removes a single bullet point from the "When NOT to Use" section. The removed guidance was outdated and contradicted the author's successful real-world use case. No code changes, no behavioral changes, and the remaining documentation is coherent and complete.
- No files require special attention
<sub>Last reviewed commit: c50b814</sub>
<!-- greptile_other_comments_section -->
<sub>(4/5) You can add custom instructions or style guidelines for the agent [here](https://app.greptile.com/review/github)!</sub>
<!-- /greptile_comment -->
Most Similar PRs
#16362: Update session-pruning.md - updated agents.defaults config std
by elliottb · 2026-02-14
79.1%
#11915: Docs: Docker + reverse proxy deployment notes and pairing pitfalls
by walshd1 · 2026-02-08
78.2%
#21305: Fix/proxy-ip-allow-list
by janaka · 2026-02-19
77.6%
#10514: Security: harden AGENTS.md with gateway, prompt injection, and supp...
by catpilothq · 2026-02-06
77.0%
#22070: docs: add minimal public safety checklist for template sharing
by MinwooKim1990 · 2026-02-20
76.7%
#22632: docs: fix redirects and small reorg
by gianpaj · 2026-02-21
76.5%
#11048: fix: address repository issues (env, author, CI comments, security ...
by cavula · 2026-02-07
76.4%
#19560: docs: refactor agent workspace default location & bootstrap configu...
by ashinkuniyil · 2026-02-17
76.3%
#7874: docs: add public/untrusted agent profile
by ichbinlucaskim · 2026-02-03
76.1%
#21829: Update update_clawdbot.md with development note
by yasir-shahhhhh · 2026-02-20
76.0%