Authentication

Authentication, claims, and machine continuity

FlyDex separates browser account authentication from machine readiness. The phone proves the user identity, the connector proves the machine identity, and the control plane binds the two without exposing local Codex publicly.

Reference map

Public docs sections

Authentication

Account auth, QR claims, local-connect tokens, and machine continuity.

Agent control

Thread access, send/resume turns, and remote approvals.

WebSocket API

Bridge lifecycle, documented endpoints, and status model.

Security

Threat model, data boundaries, and transport safeguards.

Architecture

Control plane, connector, and local Codex runtime topology.

Artifacts

Credentials and scopes

ArtifactLifetimeScopeNotes
Clerk account sessionRolling server-side expiry windowUser identityUsed for browser account continuity and account-scoped machine access.
QR pairing claimShort-lived, single-useSingle machine handoffBound to the desktop session that generated it.
Local-connect bearer tokenShort-livedConnector to control planeUsed for authenticated agent status reporting during setup.
Machine key materialLonger-lived until rotationMachine identityAllows reconnecting the same machine identity without re-pairing every session.

Phone browser

What the user proves

The phone flow proves the authenticated user session that is allowed to claim the machine. It does not directly talk to the Codex app server.

Connector

What the machine proves

The local connector proves that the desktop is the same machine that owns the saved state, device keys, and readiness signals required for reconnect.