mcp-oauth-setup
MCP Server Authentication & OAuth Dynamic Client Registration
Implement flexible authentication for MCP (Model Context Protocol) server connections. For OAuth providers, auto-discover endpoints and dynamically register as a client — the user just provides the MCP server URL and clicks "Connect." For bearer/API key providers, support both admin-shared and per-agent credentials so different agents can authenticate with different accounts.
When to Use
- Building an admin UI for managing MCP server connections
- Integrating with third-party MCP providers (Linear, Sentry, Granola, Render, etc.)
- Implementing the MCP Streamable HTTP transport with authenticated tool sync
- Adding per-agent credential support so each agent can use its own account
- Adding OAuth to an existing MCP connector/server management system
Core Standards
The OAuth implementation relies on three RFCs:
- RFC 8414 - OAuth Authorization Server Metadata Discovery via
.well-known/oauth-authorization-server - RFC 7591 - Dynamic Client Registration at the provider's registration endpoint
- RFC 7636 - PKCE (S256) for authorization code security
Not all MCP servers use OAuth. Some (e.g., Render) use bearer tokens with API keys and handle account/workspace selection at the MCP protocol level. The credential system must be auth-type-agnostic.
Architecture Overview
Credential Mode (Orthogonal to Auth Type)
credential_mode applies to all auth types (bearer, api_key_header, oauth), not
just OAuth. This is a critical design decision — different agents may need their own
credentials for the same MCP server (e.g., different Render accounts, different Linear
workspaces).
credential_mode = "shared" → Admin provides one credential, all agents use it
credential_mode = "per_agent" → Each agent has its own credential
OAuth Flow
Admin clicks "Connect"
|
v
Discover OAuth metadata (RFC 8414)
| GET /.well-known/oauth-authorization-server
v
Register as OAuth client (RFC 7591)
| POST /oauth/register
v
Redirect to provider consent screen
| GET /oauth/authorize?client_id=...&code_challenge=...
v
Provider redirects back with code
| GET /callback?code=...&state=...
v
Exchange code for tokens
| POST /oauth/token
v
Store tokens, sync tools
Implementation Steps
1. Database Schema
Create two tables: one for MCP server configuration (including OAuth metadata and shared tokens), and one for per-agent credentials (works for any auth type).
Refer to references/schema.md for complete migration and model setup.
Key design decisions:
- Encrypt all secrets at rest (
encrypts :oauth_client_id, etc.) - Store both shared tokens (on the server record) and per-agent tokens (join table)
- Use
credential_mode("shared"or"per_agent") — applies to ALL auth types, not just OAuth - Store
discovered_toolsas a JSON array for tool name tracking AgentMcpConnection.access_tokenstores OAuth tokens, bearer tokens, or API keys
2. OAuth Discovery and Registration
Implement three model methods on the MCP server record. Refer to references/oauth_flow.md
for complete implementation code.
Discovery (discover_oauth_metadata!):
- Derive
.well-known/oauth-authorization-serverURL from the MCP server's host - Parse the JSON response for
authorization_endpoint,token_endpoint,registration_endpoint,scopes_supported - Skip if endpoints are already manually configured
- Not all servers support this — handle 404 gracefully
Registration (register_oauth_client!):
- POST to the registration endpoint with
client_name,redirect_uris,grant_types,response_types,token_endpoint_auth_method - Store the returned
client_idandclient_secret - Skip if
client_idis already present
Combined (discover_and_register_oauth!):
- Run discovery then registration in sequence, skipping either if already configured
- Accept
redirect_uriparameter for the registration payload
3. Authorization Controller
Create an OAuth controller with authorize and callback actions.
Refer to references/oauth_flow.md for the full controller implementation.
Critical pitfalls to avoid:
Turbo Drive cross-origin redirects: Standard redirect_to with an external URL is
silently swallowed by Turbo Drive because it cannot follow cross-origin 302 redirects. The
browser stays on the current page with no feedback. Render an HTML page with
<meta http-equiv="refresh" content="0;url=..."> for the external OAuth redirect instead.
State parameter: Use a signed, expiring message (e.g., Rails message_verifier) containing
the connector ID, PKCE code verifier, optional agent ID, and timestamp. Set 10-minute expiry.
String keys from message verifier: After verifying the state token, the payload uses
string keys not symbol keys. Access with payload["connector_id"], not payload[:connector_id].
PKCE (S256): Generate a random code_verifier, compute code_challenge as URL-safe Base64
of SHA-256 digest with no padding. Send challenge in authorize request, verifier in token exchange.
Error redirects: When agent_id is present in state, redirect errors back to the agent
edit page, not the connectors index. The user initiated from the agent form and should return there.
Auto-sync on first agent connection: For per-agent OAuth, the admin may not have their own account. When the callback stores the first per-agent token, auto-sync tools using that agent's token if tools haven't been discovered yet.
4. Routes
Mount the OAuth authorize as a member action on the connector resource, and the callback as a standalone route (since it doesn't carry a connector ID — that comes from state).
resources :connectors do
member do
get "oauth/authorize", to: "mcp_oauth#authorize", as: :mcp_oauth_authorize
end
end
get "mcp_oauth/callback", to: "mcp_oauth#callback", as: :mcp_oauth_callback
Note on Rails route helper naming: A member route mcp_oauth_authorize on resources :connectors
generates mcp_oauth_authorize_connector_path(connector) — the resource name comes last.
This is a common source of NoMethodError bugs.
5. Token Management
Implement token refresh for both shared and per-agent OAuth tokens.
Refer to references/oauth_flow.md for the ensure_token_fresh! pattern.
- Check expiry with a 5-minute buffer (
token_expires_at < 5.minutes.from_now) - Use
with_lockfor thread-safe updates on shared tokens - Return the appropriate token based on credential mode
- Bearer/API key per-agent tokens are static (no refresh flow needed)
6. MCP Tool Sync (Streamable HTTP Protocol)
After connection, sync available tools from the MCP server.
Refer to references/tool_sync.md for the complete implementation.
The MCP Streamable HTTP protocol requires a two-step handshake:
- Send
initializeJSON-RPC request to get aMcp-Session-Idheader - Send
tools/listwith the session ID header
Critical details:
- Set
Accept: application/json, text/event-stream— some servers return 406 without this - Some servers return SSE format instead of JSON — parse both formats
- The
Mcp-Session-Idfrom the initialize response must be included on subsequent requests sync_tools!must accept anagent:parameter for per-agent auth token resolution- Some servers (e.g., Render) allow unauthenticated tool listing — auth is only needed for tool execution
7. UI Considerations
Refer to references/ui_patterns.md for form and index view patterns.
Connector form:
credential_moderadio (Shared vs Per-agent) applies to ALL auth types, not just OAuth- When per-agent is selected for bearer/API key, hide the admin token input
- Show OAuth-specific fields (advanced config, Connect button) only for OAuth auth type
- Use Stimulus controller to toggle visibility based on both
auth_typeANDcredential_mode
Connectors index:
- Show "Connect" button only for shared OAuth that isn't connected yet
- Show "Per-agent" label for any per-agent connector (not just OAuth)
- Show "Sync" button for everything else
Agent edit form — three states for per-agent connectors:
- Per-agent OAuth, not connected → grayed card, "Connect" button (OAuth redirect)
- Per-agent bearer/API key, not connected → card with inline password input for token entry
- Connected (any type) → normal card with tool checkboxes + "Token configured" badge
Verified MCP Providers
Tested and confirmed working with:
- Linear (
https://mcp.linear.app/mcp) - 45 tools, SSE response format, OAuth - Sentry (
https://mcp.sentry.dev/mcp) - 14 tools, standard JSON responses, OAuth - Granola (
https://mcp.granola.ai/mcp) - 4 tools, standard JSON responses, OAuth - Render (
https://mcp.render.com/mcp) - 24 tools, bearer token auth (no OAuth), per-agent API keys
Common Failure Modes
| Symptom | Root Cause | Fix |
|---|---|---|
| Page stays on form after create, no redirect | Turbo Drive swallows cross-origin 302 | Use HTML meta refresh instead of redirect_to |
NoMethodError on route helper |
Wrong helper name ordering | Member route on :connectors generates mcp_oauth_authorize_connector_path |
payload[:connector_id] returns nil |
Message verifier returns string keys | Use payload["connector_id"] |
| 406 from MCP server | Missing Accept header | Add Accept: application/json, text/event-stream |
| 400 "Mcp-Session-Id required" | Skipped initialize handshake | Send initialize first, use returned session ID |
| JSON parse error on tool sync | Server returns SSE format | Detect and parse both text/event-stream and JSON |
| Token exchange fails silently | Missing code_verifier in token request |
Include PKCE verifier from signed state |
| OAuth discovery 404 | MCP server doesn't use OAuth | Use bearer or API key auth instead; not all MCP servers support RFC 8414 |
| Per-agent connector shows no tools | Admin can't sync without a token | Tools auto-sync on first agent connection |
| Error redirect goes to wrong page | agent_id not checked in rescue |
Redirect to agent edit when agent_id present |
More from obie/skills
better-stimulus
Apply Better Stimulus best practices for writing maintainable, reusable StimulusJS controllers following SOLID principles
31rails-activity-timeline
Add polymorphic activity timelines with live Turbo Stream updates to any Rails model. Covers migration, model, concern, shared partials, broadcasting, and optional AI-generated change summaries.
2rails-tiptap-autosave
Add Tiptap rich text editing with debounced autosave to Rails models using Stimulus. Stores markdown in text columns (not ActionText). Covers installation, Stimulus controller, shared partials, Turbo cache handling, and optional change tracking.
2