Getting Started

Install the CLI and start using Console in minutes.

Account required

Console requires a free account. Sign up first, then run tedigo-console setup to link your API key. All sessions are authenticated and encrypted end-to-end.

Install

# macOS / Linux

curl -fsSL https://console.tedigo.com/install.sh | bash

First-Time Setup

After installing, configure your API key. This links the CLI to your Console account.

# Link your account (requires API key from console.tedigo.com)

tedigo-console setup

# Check your version

tedigo-console version

# Update to the latest version

tedigo-console update

Remote Sessions

Share your local Claude Code, Codex, or Cursor session with your team through the browser. Each session is authenticated with your API key and accessible only to your organization.

# Start a session

tedigo-console connect

# Start with a custom name and directory

tedigo-console connect --name my-project --dir ~/code/my-app

# List active sessions

tedigo-console sessions

How it works

The CLI creates a secure WebSocket tunnel from your machine to the Console dashboard. Team members can view and interact with your terminal session in the browser. Works behind firewalls and NAT — no port forwarding needed.

HTTP Tunnels

Expose any local server to the internet with a public HTTPS URL. Share a dev build, test webhooks, or demo a feature — no ngrok needed.

# Expose localhost:3000 with a random URL

tedigo-console tunnel 3000

Tunnel active!

Public URL: https://t-a8k3m9x2.tunnel.tedigo.com

Forwarding: localhost:3000

# Use a custom subdomain (requires access token)

tedigo-console tunnel 3000 my-api

Public URL: https://my-api.tunnel.tedigo.com

Access Token: tk_9f3a7b2e1d...

Custom names are protected

Random tunnels use unguessable IDs and are open by default. Custom-named tunnels automatically generate an access token — requests must include it as a Authorization: Bearer header or ?token= query parameter.

Custom names are first-come, first-served and not reserved to your organization. Avoid sensitive names — anyone who knows the URL and token can access the tunnel while it is active. Tunnels are removed shortly after you disconnect.

Domain limitation

Browser features tied to a specific domain — like passkeys, WebAuthn, and domain-scoped cookies — won't work through tunnels. Use email and password login for testing authenticated flows.

Security

Your code and data stay yours. Console is a relay — we move bytes, we don't read them.

Authenticated connections

Every CLI connection requires a valid API key linked to your Console account. Unauthenticated connections are rejected.

Encrypted end-to-end

All traffic uses TLS 1.3 (HTTPS/WSS). Terminal data and HTTP tunnel payloads are encrypted in transit. No data is transmitted in the clear.

Organization isolation

Sessions and tunnels are scoped to your organization. Other orgs cannot see, access, or intercept them.

No storage, no logging

Terminal data and HTTP tunnel traffic are live streams. We do not store, log, record, or retain your session content or tunnel payloads. Ever.

No payload inspection

We do not inspect, analyze, parse, or read the content of your terminal sessions or HTTP tunnel requests. The relay forwards bytes — it does not look at them.

No third-party sharing

Your session data and tunnel traffic are never shared with third parties, analytics services, or AI training pipelines.

What we do track: session metadata only — connection time, duration, org ID, device ID. This powers your usage dashboard and quota enforcement. The content of your sessions and tunnel traffic is never part of this metadata.