You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add auth provider integrations, authentication context, and permission controls to MCP authz docs (#21440)
Include example integration with Stytch, Auth0, and WorkOS. Add a section on how to use authentication context in the MCP server and how to implement permission/role based access control within MCP tools.
Copy file name to clipboardExpand all lines: src/content/docs/agents/model-context-protocol/authorization.mdx
+113-1Lines changed: 113 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -124,7 +124,119 @@ Read the docs for the [Workers oAuth Provider Library](https://github.com/cloudf
124
124
125
125
### (3) Bring your own OAuth Provider
126
126
127
-
If your application already implements an Oauth Provider itself, or you use Stytch, Auth0, or authorization-as-a-service provider, you can use this in the same way that you would use a third-party OAuth provider, described above in (2).
127
+
If your application already implements an Oauth Provider itself, or you use [Stytch](https://stytch.com/), [Auth0](https://auth0.com/), [WorkOS](https://workos.com/), or authorization-as-a-service provider, you can use this in the same way that you would use a third-party OAuth provider, described above in (2).
128
+
129
+
You can use the auth provider to:
130
+
- Allow users to authenticate to your MCP server through email, social logins, SSO (single sign-on), and MFA (multi-factor authentication).
131
+
- Define scopes and permissions that directly map to your MCP tools.
132
+
- Present users with a consent page corresponding with the requested permissions.
133
+
- Enforce the permissions so that agents can only invoke permitted tools.
134
+
135
+
#### Stytch
136
+
Get started with a [remote MCP server that uses Stytch](https://stytch.com/docs/guides/connected-apps/mcp-servers) to allow users to sign in with email, Google login or enterprise SSO and authorize their AI agent to view and manage their company’s OKRs on their behalf. Stytch will handle restricting the scopes granted to the AI agent based on the user’s role and permissions within their organization. When authorizing the MCP Client, each user will see a consent page that outlines the permissions that the agent is requesting that they are able to grant based on their role.
137
+
138
+
[](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/mcp-stytch-b2b-okr-manager)
139
+
140
+
For more consumer use cases, deploy a remote MCP server for a To Do app that uses Stytch for authentication and MCP client authorization. Users can sign in with email and immediately access the To Do lists associated with their account, and grant access to any AI assistant to help them manage their tasks.
141
+
142
+
[](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/mcp-stytch-consumer-todo-list)
143
+
144
+
#### Auth0
145
+
Get started with a remote MCP server that uses Auth0 to authenticate users through email, social logins, or enterprise SSO to interact with their todos and personal data through AI agents. The MCP server securely connects to API endpoints on behalf of users, showing exactly which resources the agent will be able to access once it gets consent from the user. In this implementation, access tokens are automatically refreshed during long running interactions.
146
+
147
+
To set it up, first deploy the protected API endpoint:
148
+
149
+
[](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/remote-mcp-auth0/packages/todos-api)
150
+
151
+
Then, deploy the MCP server that handles authentication through Auth0 and securely connects AI agents to your API endpoint.
152
+
153
+
[](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/remote-mcp-auth0/packages/mcp-auth0-oidc)
154
+
155
+
#### WorkOS
156
+
157
+
Get started with a remote MCP server that uses WorkOS's AuthKit to authenticate users and manage the permissions granted to AI agents. In this example, the MCP server dynamically exposes tools based on the user's role and access rights. All authenticated users get access to the `add` tool, but only users who have been assigned the `image_generation` permission in WorkOS can grant the AI agent access to the image generation tool. This showcases how MCP servers can conditionally expose capabilities to AI agents based on the authenticated user's role and permission.
158
+
159
+
[](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/remote-mcp-authkit)
160
+
161
+
## Using Authentication Context in Your MCP Server
162
+
163
+
When a user authenticates to your MCP server through Cloudflare's OAuth Provider, their identity information and tokens are made available through the `props` parameter.
- Accessing user-specific data by using the user ID (this.props.claims.sub) as a key
178
+
- Checking user permissions before performing operations
179
+
- Customizing responses based on user preferences or attributes
180
+
- Using authentication tokens to make requests to external services on behalf of the user
181
+
- Ensuring consistency when users interact with your application through different interfaces (dashboard, API, MCP server)
182
+
183
+
## Implementing Permission-Based Access for MCP Tools
184
+
185
+
You can implement fine-grained authorization controls for your MCP tools based on user permissions. This allows you to restrict access to certain tools based on the user's role or specific permissions.
0 commit comments