Secure MCP clients and servers using OAuth 2.1 and OpenID Connect, with user authentication, controlled API access, standards-based client registration, and scoped token exchange.


User authentication
Require users to sign in before they or their AI agents connect to MCP servers. Auth0 Universal Login supports social, enterprise, and custom identity providers so users can sign in with existing credentials. Access tokens issued by Auth0 include identity details that MCP servers can validate on every request. For enterprise environments, you can use your organization’s identity provider and Single Sign-On (SSO) to authenticate users to your MCP servers. Auth0 connects to Okta, Entra ID, Ping, Google Workspace, and other IdPs so employees authenticate with existing credentials before any MCP interaction begins.Learn more about the benefits of using Auth for MCP
Metadata Discovery and Client Registration for MCP
Register MCP clients and servers using standards-aligned discovery and registration so agents connect only to approved resources. Auth0 validates client metadata, issues client credentials, and exposes the necessary discovery endpoints. This lets MCP clients find the right authorization server and request tokens without manual configuration.Learn how to register your MCP client application
Call your APIs on user’s behalf
When an AI agent connects to your MCP server, the server may need to call your internal APIs to read data or trigger workflows. Those APIs need tokens that reflect who the user is and what the server is allowed to do. Auth0 Custom Token Exchange enables that delegation. The MCP server exchanges the token it received from the client for a new, short-lived access token scoped to the internal API. This lets MCP servers call internal APIs on behalf of users while Auth0 issues and governs access centrally.Use this quickstart to call your APIs on user's behalf from your MCP server
Call third-party APIs on user’s behalf
MCP Servers often connect AI Agents to third-party services such as Google, Microsoft, Jira, or Notion. Auth0’s Token Vault handles these integrations by managing token issuance, storage, rotation, and revocation for external APIs. Token Vault eliminates manual credential handling and makes it easy to extend MCP connectivity across the modern SaaS ecosystem.Get started
To begin using Auth for MCP in your MCP server, refer to the following resources:Quickstarts
Guides
Registering your MCP Client Application
Resource Parameter Compatibility Profile
Test you MCP Server with MCP Inspector
Cloudflare MCP
Sample apps
SDKs
Early access
Auth for MCP delivers a more secure and scalable authentication and authorization for MCP servers using Auth0. It offers OAuth-compliant solutions for developers building applications that integrate AI agents.Early Access Program
Auth for MCP is currently available in Early Access. To join the Early Access program, please complete this form and we’ll reach out to you when your request is processed.