-
Notifications
You must be signed in to change notification settings - Fork 1.2k
feat: enhance auth server discovery with OAuth2 and OIDC metadata support #677
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: enhance auth server discovery with OAuth2 and OIDC metadata support #677
Conversation
81eca51 to
005d8de
Compare
005d8de to
79b3dcc
Compare
|
Hi @aaronpk , thanks again for your earlier review 🙏. I’ve addressed the changes you requested, would you have a moment to take another look? |
pcarleton
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
we'll also need support for this in the SDKs
|
Hi @pcarleton , I add this support in the client SDK in this PR, PTAL ❤️ |
|
this is missing an entry to changelog.mdx. @xiaoyijun please follow up and make an entry to changelog.mdx |
|
Just FYI. I will revert this. I think in general its a good idea, but coming in too hot for a spec release that we are cutting today from the draft. This means it will require you to reopen the PR again once we have a new draft. There are also open question how clients should handle the difference in fields between OICD and OAuth 2.0 AS metadata, that the PR should address. |
Add OpenID Connect Discovery Support for Authorization Server Discovery
Motivation and Context
This PR enhances the authorization server discovery mechanism by adding support for OpenID Connect Discovery 1.0 alongside the existing OAuth 2.0 Authorization Server Metadata.
OpenID Connect (OIDC) is built on top of OAuth 2.0, extending it with standardized identity functionality. Many modern authorization servers implement OIDC as their primary protocol, making it crucial for MCP to support both discovery mechanisms. Popular authorization providers such as Keycloak, Auth0, and Logto all implement OIDC discovery by default.
Key benefits:
How Has This Been Tested?
N/A
Breaking Changes
None. This change is fully backwards compatible:
Types of changes
Checklist
Additional context
The addition of OIDC discovery support is particularly valuable because:
.well-known/openid-configurationendpoint is widely supported