Your IdP supports OAuth 2.1 + DCR
Your IdP is OAuth 2.1 compatible and implements Dynamic Client Registration (DCR)
Your IdP supports OAuth 2.0 but no DCR
Your IdP is OAuth 2.0 compatible but doesn’t implement DCR
Your IdP doesn't support OAuth metadata
Your IdP doesn’t provide OAuth metadata endpoints
No IdP
You don’t have an IdP yet as you are starting from scratch
Using an OAuth 2.1 compatible Identity Providers (IdP)
If you’re already using an OAuth 2.1 identity provider with Dynamic Client Registration (DCR), you simply need to configure your MCP server to advertise your IdP through OAuth metadata endpoints. The easiest way to do so is to rely on existing SDK helpers to provide such configuration on your server:Configuring your MCP server to use an existing Identity Provider (IdP) with OAuth requires knowledge of a the different oauth endpoint URLs. We have curated a list of endpoints for the most used IdPs here.
If you want to use your deployed MCP server URL as the OAuth server instead of
localhost, the ALPIC_HOST environment variable was conceived for this use
case. It’s automatically set at both build and runtime, allowing Alpic to
treat your deployed host as an internal host for OAuth metadata discovery.
Learn more about system environment
variables.Using an OAuth 2.0 compatible Identity Provider (IdP) with no DCR
If you’re not using an OAuth 2.1 IdP with DCR, you can rely on Alpic’s Dynamic Client Registration proxy to handle the complexity associated with multiple OAuth clients registering to use your IdP. In order to leverage Alpic’s DCR proxy feature, you should configure your MCP server to advertise your IdP through OAuth metadata endpoints without mentioning aregistration_endpoint property.
The easiest way to do so is to rely on existing SDK helpers to provide such configuration on your server: