-
Notifications
You must be signed in to change notification settings - Fork 2.7k
Description
Feature Request: Support Client ID Metadata Document (CIMD) for OAuth Configuration
Please explain the motivation behind the feature request.
Client ID Metadata Documents (CIMD) enable automatic OAuth client configuration without manual registration. This would allow Goose to work seamlessly with MCP servers that support CIMD, providing:
- Zero-configuration OAuth setup - Developers could connect Goose to MCP servers without manual OAuth client registration
- Standardized discovery - Following the emerging CIMD pattern documented in the MCP authorization spec
- Improved developer experience - Particularly valuable for teams using Goose with enterprise identity providers
- Broader compatibility - Goose would work out-of-the-box with MCP servers that support CIMD
The CIMD spec (draft-ietf-oauth-client-id-metadata-document-00) provides a standardized way for OAuth clients to publish their metadata, making automated client discovery and configuration possible. This is particularly relevant for MCP servers that need secure authentication. Learn more at client.dev.
Describe the solution you'd like
Goose should host a Client ID Metadata Document at a well-known location (e.g., https://goose.ai/oauth/client-metadata.json or https://goose.ai/.well-known/oauth-client) that contains:
- OAuth client metadata (redirect URIs, grant types, scopes)
- Application identifiers
- Public key information (if applicable)
This would allow authorization servers and identity-aware proxies to automatically discover and configure Goose as an OAuth client without manual registration, following the pattern described in the IETF draft and discussed in resources like this Auth0 blog post comparing CIMD vs DCR for MCP and Den Delimarsky's deep dive on CIMD for VS Code and MCP.
Describe alternatives you've considered
- Dynamic Client Registration (DCR) - While DCR is more flexible, CIMD is simpler for well-known clients and doesn't require server-side registration endpoints. The MCP spec now positions CIMD as the preferred default over DCR. This is meant to be replaced by CIMD anyway.
Additional context
The MCP specification references CIMD as the recommended approach for OAuth client discovery in the authorization section. The November 2025 MCP spec update made CIMD the preferred default for client authentication (via SEP-991). Supporting CIMD would align Goose with this emerging standard and make it easier to integrate with security-focused infrastructure.
Example CIMD implementation:
As noted by Den Delimarsky (MCP Steering Committee member) in his analysis, CIMD enables a streamlined OAuth flow where clients can self-describe their configuration, making integration with MCP servers significantly easier. The approach has already been adopted in production by platforms like Bluesky for their OAuth API.
This would be particularly valuable for organizations implementing secure MCP deployments where automated client discovery and fine-grained authorization are important.
- I have verified this does not duplicate an existing feature request