You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/source/command-reference.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -295,7 +295,7 @@ transport:
295
295
- profile
296
296
```
297
297
298
-
## Using`rover dev`
298
+
## Run a local graph with MCP server using`rover dev`
299
299
300
300
You can use the [`rover dev`](/rover/commands/dev) command of Rover CLI `v0.35` or later to run an Apollo MCP Server instance for local development alongside your local graph. Use the `--mcp` flag to start an MCP server and provide an optional configuration file.
Copy file name to clipboardExpand all lines: docs/source/guides/index.mdx
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -186,26 +186,26 @@ introspection:
186
186
apollo-mcp-server <path to the preceding config>
187
187
```
188
188
189
-
## Authorization
189
+
## Set up authorization
190
190
191
191
The Apollo MCP server supports authorizing clients (e.g. LLMs) in accordance with [the MCP specification](https://modelcontextprotocol.io/specification/2025-06-18/basic/authorization).
192
192
193
193
Depending on whether you are connecting internal agents (first-party) or external agents (third-party, such as Claude, ChatGPT, or other public AI assistants), the steps to configure authorization will differ.
194
194
195
-
For internal / first-party agents, you will need:
195
+
For internal (first-party) agents, you need:
196
196
197
-
1. An [OAuth 2.1-compliant](https://oauth.net/2.1/) Identity Provider (for example, your own in-house IdP or a third-party IdP such as Auth0, Okta, Keycloak, etc).
198
-
2. An Apollo Router [configured to use JWT authentication](/graphos/routing/security/jwt).
197
+
1. An [OAuth 2.1-compliant](https://oauth.net/2.1/) Identity Provider (for example, your own in-house IdP or a third-party IdP such as Auth0, Okta, Keycloak, etc)
198
+
2. An Apollo Router [configured to use JWT authentication](/graphos/routing/security/jwt)
199
199
200
-
For external / third-party agents, in addition to the above, you will also need:
200
+
For external (third-party) agents, in addition to the preceding items, you also need:
201
201
202
-
3. A configuration file for the MCP server that [defines the `auth` settings](/apollo-mcp-server/command-reference#auth).
202
+
3. A configuration file for the MCP server that [defines the `auth` settings](/apollo-mcp-server/command-reference#auth)
203
203
204
-
### Example: Auth configuration with Auth0 and third-party agents
204
+
### Example: Configure authentication with Auth0 and third-party agents
205
205
206
206
Here is an example of how to set up Apollo MCP Server and Apollo Router, with Auth0 as the Identity Provider for external/third-party access.
207
207
208
-
1. [Set up an Auth0 API](https://auth0.com/docs/get-started/auth0-overview/set-up-apis). You'll need your Auth0 domain for the next step.
208
+
1. [Set up an Auth0 API](https://auth0.com/docs/get-started/auth0-overview/set-up-apis). You need your Auth0 domain for the next step.
209
209
2. Configure the Apollo Router to [use JWT authentication](/graphos/routing/security/jwt):
210
210
211
211
This example router configuration enforces authentication on all requests and uses the JWKS endpoint provided by Auth0 to validate JWTs:
@@ -222,7 +222,7 @@ Here is an example of how to set up Apollo MCP Server and Apollo Router, with Au
222
222
223
223
3. Configure the MCP server to use the same Auth0 instance for authentication.
224
224
225
-
This example MCP server configuration enforces authentication on all requests, delegating the actual login process to our previouslyconfigured Auth0 instance.
225
+
This example MCP server configuration enforces authentication on all requests, delegating the actual login process to your previously-configured Auth0 instance.
226
226
227
227
```yaml title="Example MCP config for authentication"
0 commit comments