Skip to content

Commit 8f9dd5e

Browse files
Oxyjunnevikashah
authored andcommitted
Adding instructions for using Descope (#24348)
1 parent 117c321 commit 8f9dd5e

File tree

1 file changed

+9
-1
lines changed

1 file changed

+9
-1
lines changed

src/content/docs/agents/model-context-protocol/authorization.mdx

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ Read the docs for the [Workers oAuth Provider Library](https://github.com/cloudf
132132

133133
### (4) Bring your own OAuth Provider
134134

135-
If your application already implements an OAuth Provider itself, or you use [Stytch](https://stytch.com/), [Auth0](https://auth0.com/), [WorkOS](https://workos.com/), or authorization-as-a-service provider, you can use this in the same way that you would use a third-party OAuth provider, described above in (2).
135+
If your application already implements an OAuth Provider itself, or you use authorization-as-a-service provider, you can use this in the same way that you would use a third-party OAuth provider, described above in (2).
136136

137137
You can use the auth provider to:
138138
- Allow users to authenticate to your MCP server through email, social logins, SSO (single sign-on), and MFA (multi-factor authentication).
@@ -141,6 +141,7 @@ You can use the auth provider to:
141141
- Enforce the permissions so that agents can only invoke permitted tools.
142142

143143
#### Stytch
144+
144145
Get started with a [remote MCP server that uses Stytch](https://stytch.com/docs/guides/connected-apps/mcp-servers) to allow users to sign in with email, Google login or enterprise SSO and authorize their AI agent to view and manage their company's OKRs on their behalf. Stytch will handle restricting the scopes granted to the AI agent based on the user's role and permissions within their organization. When authorizing the MCP Client, each user will see a consent page that outlines the permissions that the agent is requesting that they are able to grant based on their role.
145146

146147
[![Deploy to Cloudflare](https://deploy.workers.cloudflare.com/button)](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/mcp-stytch-b2b-okr-manager)
@@ -150,6 +151,7 @@ For more consumer use cases, deploy a remote MCP server for a To Do app that use
150151
[![Deploy to Cloudflare](https://deploy.workers.cloudflare.com/button)](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/mcp-stytch-consumer-todo-list)
151152

152153
#### Auth0
154+
153155
Get started with a remote MCP server that uses Auth0 to authenticate users through email, social logins, or enterprise SSO to interact with their todos and personal data through AI agents. The MCP server securely connects to API endpoints on behalf of users, showing exactly which resources the agent will be able to access once it gets consent from the user. In this implementation, access tokens are automatically refreshed during long running interactions.
154156

155157
To set it up, first deploy the protected API endpoint:
@@ -166,6 +168,12 @@ Get started with a remote MCP server that uses WorkOS's AuthKit to authenticate
166168

167169
[![Deploy to Cloudflare](https://deploy.workers.cloudflare.com/button)](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/remote-mcp-authkit)
168170

171+
#### Descope
172+
173+
Get started with a remote MCP server that uses [Descope](https://www.descope.com/) Inbound Apps to authenticate and authorize users (for example, email, social login, SSO) to interact with their data through AI agents. Leverage Descope custom scopes to define and manage permissions for more fine-grained control.
174+
175+
[![Deploy to Cloudflare](https://deploy.workers.cloudflare.com/button)](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/remote-mcp-server-descope-auth)
176+
169177
## Using Authentication Context in Your MCP Server
170178

171179
When a user authenticates to your MCP server through Cloudflare's OAuth Provider, their identity information and tokens are made available through the `props` parameter.

0 commit comments

Comments
 (0)