Your IdP supports OAuth 2.1 + DCR
Your IdP is OAuth 2.1 compatible and implements Dynamic Client Registration (DCR)
Your IdP supports OAuth 2.0 but no DCR
Your IdP is OAuth 2.0 compatible but doesn’t implement DCR
Your IdP doesn't support OAuth metadata
Your IdP doesn’t provide OAuth metadata endpoints
No IdP
You don’t have an IdP yet as you are starting from scratch
Using an OAuth 2.1 compatible Identity Providers (IdP)
If you’re already using an OAuth 2.1 identity provider with Dynamic Client Registration (DCR), you simply need to configure your MCP server to advertise your IdP through OAuth metadata endpoints. The easiest way to do so is to rely on existing SDK helpers to provide such configuration on your server:Configuring your MCP server to use an existing Identity Provider (IdP) with OAuth requires knowledge of a the different oauth endpoint URLs. We have curated a list of endpoints for the most used IdPs here.
We made Alpic to be fully compatible with your local server code. If your authentication code runs locally, it should work on Alpic. In the example above, you should keep the localhost URL for the resource server when your deploy to Alpic.
Using an OAuth 2.0 compatible Identity Provider (IdP) with no DCR
If you’re not using an OAuth 2.1 IdP with DCR, you can rely on Alpic’s Dynamic Client Registration proxy to handle the complexity associated with multiple OAuth clients registering to use your IdP. In order to leverage Alpic’s DCR proxy feature, you should configure your MCP server to advertise your IdP through OAuth metadata endpoints without mentioning aregistration_endpoint property.
The easiest way to do so is to rely on existing SDK helpers to provide such configuration on your server: