Skip to content

OAuth Config (Optional) for Remotes #25

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
annaji-msft opened this issue May 9, 2025 · 0 comments
Open

OAuth Config (Optional) for Remotes #25

annaji-msft opened this issue May 9, 2025 · 0 comments
Labels
go-live blocker This issue is one we need to address prior to initial go-live

Comments

@annaji-msft
Copy link

annaji-msft commented May 9, 2025

An optional, OAuth server configuration could help here as well specifically for those MCP authorizations servers that do not support Dynamic Client Registration.

Described in the spec, Clients could hardcode the ClientId for the authorization server.

The metadata in the registry can help guide consumers a ClientId is expected for the specific MCP server as well as where to acquire it, usually link to service provider developer portals.

For reference see issue - microsoft/vscode#247759 and also briefly touched on DCR topic and clientId acquisition in the blog

The shape of this could be inspired from OAS and/or PRM

Created for tracking from PR comment - https://github.com/modelcontextprotocol/registry/pull/3/files/e9ad7352dd35f905e6216b94cf760d6bd124d8a0#r2077901936

@tadasant tadasant added the go-live blocker This issue is one we need to address prior to initial go-live label May 27, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
go-live blocker This issue is one we need to address prior to initial go-live
Projects
None yet
Development

No branches or pull requests

2 participants