Skip to content

Add AuthSec: provider-list entry + provider guide#76

Open
ritamAN77 wants to merge 2 commits into
mcp-auth:masterfrom
ritamAN77:add-authsec-provider
Open

Add AuthSec: provider-list entry + provider guide#76
ritamAN77 wants to merge 2 commits into
mcp-auth:masterfrom
ritamAN77:add-authsec-provider

Conversation

@ritamAN77
Copy link
Copy Markdown

@ritamAN77 ritamAN77 commented May 12, 2026

Summary

Adds AuthSec to MCP Auth — both the Provider List table and a full provider guide.

AuthSec is an agent-first identity layer for autonomous AI (OAuth 2.1, SPIFFE/mTLS, RBAC, MFA WebAuthn, MCP Server authentication, Voice Agent authentication).

Test results

Tested URL: `https://prod.api.authsec.ai/authsec/oauth/.well-known/oauth-authorization-server\`

Result: Compatible with MCP — 5 successes, 1 warning:

  • ✅ Server metadata valid
  • ✅ Code response type supported
  • ✅ Authorization code grant supported
  • ✅ PKCE supported
  • ✅ S256 code challenge method supported
  • ⚠️ Dynamic Client Registration (RFC 7591) not supported — shipping in an upcoming release; documented in footnote [^5].

What's included

Provider list entry (`src/pages/provider-list.mdx`):

  • New table row for AuthSec
  • Footnote [^5] explaining the intentional DCR omission

Provider guide (`docs/provider-guides/authsec.mdx`):

  • Structure mirrors the Logto and Keycloak guides.
  • Sections: get issuer URL, configure scopes, retrieving user identity, token request parameters (RFC 8707), register MCP client (first-party vs third-party, native vs SPA), and a short addendum on AuthSec's `delegate-svid` endpoint for agent-on-behalf-of-user flows.

Sidebar (`sidebars.ts`):

  • New page registered alphabetically first in the Provider Guides section.

Why the DCR footnote / why the guide notes it as roadmap

AuthSec already has a client-registration endpoint, but it sits behind authentication (which violates RFC 7591's "public, no-auth" requirement for DCR). Rather than advertise an auth-gated `registration_endpoint` that MCP clients cannot use, the discovery document intentionally omits it until the public DCR handler is live. The footnote and the guide's "Register MCP client" section both spell this out, so the listing stays honest and users have manual-registration instructions in the meantime.

Resource Indicator support

AuthSec's discovery doc sets `resource_indicators_supported: true` (RFC 8707), so the Resource Indicator column is ✅. The guide covers how to use the `resource` parameter when requesting a token for an MCP server.

Why two `/.well-known` documents

The guide includes a short table near the top distinguishing AuthSec's two well-known endpoints:

  • `/authsec/.well-known/openid-configuration` — SPIRE OIDC federation only (`response_types=id_token`, no authorization endpoint). Not the URL for MCP.
  • `/authsec/oauth/.well-known/oauth-authorization-server` — User-facing OAuth 2.1, spec-compliant for MCP. This is the URL MCP clients consume.

The two are kept separate because merging them would break SPIRE federation. Calling this out in the guide is intended to prevent integrators from pointing MCP at the wrong endpoint.

ritam77 and others added 2 commits May 12, 2026 13:57
AuthSec passes the MCP compatibility test at https://prod.api.authsec.ai/authsec/oauth/.well-known/oauth-authorization-server (5 successes, 1 warning for DCR).

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Mirrors the structure of the Logto and Keycloak guides. Covers:
- Issuer URL (clarifies AuthSec's SPIRE-federation vs user-facing OAuth endpoints)
- Configuring scopes
- Retrieving user identity (incl. tenant_id and spiffe_id claims)
- RFC 8707 resource indicator usage
- Manually registering an MCP client (first-party vs third-party)
- AuthSec's delegate-svid endpoint for agent-on-behalf-of-user flows

Registers the new page in sidebars.ts under Provider Guides.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@ritamAN77 ritamAN77 changed the title Add AuthSec to MCP-compatible provider list Add AuthSec: provider-list entry + provider guide May 12, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants