Skip to main content

Add your description here

Project description

MCP Server with OAuth 2.1 Authentication

This is a secure Model Context Protocol (MCP) server that implements OAuth 2.1 authentication using Scalekit as the authorization server. The server provides web search capabilities through the Tavily API while ensuring proper authentication and authorization.

What is MCP?

MCP (Model Context Protocol) is a protocol designed for communication between LLMs and tools or resources. This implementation adds enterprise-grade security through OAuth 2.1 authentication, making it suitable for production deployments where access control is critical.

MCP

Features

  • OAuth 2.1 Authentication: Secure access using Scalekit authorization server
  • MCP Compliance: Implements the MCP authorization specification
  • Web Search: Provides web search functionality via Tavily API
  • Dynamic Client Registration: Supports automatic client registration
  • Token Validation: Validates access tokens with proper audience checking
  • Security Best Practices: Implements PKCE, proper error handling, and token audience validation

Prerequisites

  1. Scalekit Account: Sign up at Scalekit
  2. Tavily API Key: Get your API key from Tavily
  3. Python 3.11+: Required for running the server

Setup

1. Install Dependencies

pip install -e .

2. Configure Environment Variables

Copy the example environment file and configure your settings:

cp .env.example .env

Edit .env with your actual values:

# Your Scalekit environment URL
SCALEKIT_ENVIRONMENT_URL=https://your-company.scalekit.com

# Your MCP server's resource identifier
RESOURCE_IDENTIFIER=https://your-mcp-server.com

# Server port (optional)
PORT=10000

# Tavily API key
TAVILY_API_KEY=your_tavily_api_key_here

3. Configure Scalekit

In the Scalekit dashboard:

  1. Navigate to MCP servers and click Add MCP server
  2. Configure your server:
    • Server name: "Web Search MCP Server"
    • Resource identifier: Your server URL (e.g., https://your-mcp-server.com)
    • Allow dynamic client registration: Enable this
    • Access token lifetime: 300-3600 seconds
    • Scopes: web-search:read, web-search:write

Running the Server

python src/server.py

The server will start on http://localhost:10000 (or your configured port).

API Endpoints

OAuth Discovery Endpoints

  • GET /.well-known/oauth-protected-resource - Resource metadata for MCP client discovery
  • GET /.well-known/oauth-authorization-server - Authorization server metadata (proxied from Scalekit)

OAuth Endpoints

  • POST /oauth/register - Dynamic client registration (proxied to Scalekit)

MCP Endpoints

  • POST /web-search/mcp - Main MCP endpoint (requires authentication)

Authentication Flow

  1. Discovery: MCP client discovers authorization server via /.well-known/oauth-protected-resource
  2. Registration: Client registers with authorization server (if using dynamic registration)
  3. Authorization: User authorizes the client through OAuth 2.1 flow
  4. Token Usage: Client includes access token in Authorization: Bearer <token> header
  5. Validation: Server validates token with Scalekit and checks audience

Error Handling

The server returns proper HTTP status codes and WWW-Authenticate headers:

  • 401 Unauthorized: Missing or invalid token
  • 403 Forbidden: Valid token but insufficient permissions
  • 503 Service Unavailable: Unable to validate token with authorization server

Security Features

  • Token Audience Validation: Ensures tokens are issued specifically for this server
  • PKCE Support: Protects against authorization code interception
  • Proper Error Responses: Returns WWW-Authenticate headers as required by MCP spec
  • Scope-based Authorization: Controls access to specific functionality

Troubleshooting

Common Issues

  1. Client Registration Fails

    • Check that SCALEKIT_ENVIRONMENT_URL is correct
    • Ensure dynamic client registration is enabled in Scalekit dashboard
    • Verify network connectivity to Scalekit
  2. Token Validation Fails

    • Check that RESOURCE_IDENTIFIER matches what's configured in Scalekit
    • Ensure the token was issued for the correct audience
    • Verify token hasn't expired
  3. Web Search Not Working

    • Check that TAVILY_API_KEY is set correctly
    • Verify Tavily API key is valid and has sufficient quota

Debug Mode

For debugging, you can add logging to see detailed error messages:

import logging
logging.basicConfig(level=logging.DEBUG)

Project Structure

src/
├── server.py          # Main FastAPI server with OAuth middleware
├── tavily_mcp.py      # MCP server implementation with Tavily integration
├── utils.py           # Token validation utilities
├── auth-mcp.md        # MCP authorization specification
└── upscalekit-docs.md # Scalekit integration documentation

Key Implementation Details

This implementation addresses the main issues you were facing:

  1. Fixed OAuth Endpoints:

    • Corrected the protected resource metadata endpoint to /.well-known/oauth-protected-resource
    • Added proper dynamic client registration endpoint at /oauth/register
    • Fixed authorization server metadata proxying
  2. Proper Error Handling:

    • Returns WWW-Authenticate headers as required by MCP specification
    • Provides detailed error messages for debugging
    • Handles different error scenarios appropriately
  3. Token Validation:

    • Validates tokens with Scalekit's introspection endpoint
    • Checks audience claims to ensure tokens are for this specific server
    • Handles token validation errors gracefully
  4. Security Compliance:

    • Implements OAuth 2.1 best practices
    • Supports PKCE for authorization code protection
    • Validates resource parameters as required by MCP spec

The server is now fully compliant with the MCP authorization specification and should work properly with MCP clients that support OAuth 2.1 authentication.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iflow_mcp_alejandro_ao_mcp_remote-0.1.0.tar.gz (90.9 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file iflow_mcp_alejandro_ao_mcp_remote-0.1.0.tar.gz.

File metadata

  • Download URL: iflow_mcp_alejandro_ao_mcp_remote-0.1.0.tar.gz
  • Upload date:
  • Size: 90.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.2 {"installer":{"name":"uv","version":"0.10.2","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_alejandro_ao_mcp_remote-0.1.0.tar.gz
Algorithm Hash digest
SHA256 36e4ab15113f78805da2d410232c2658250c1e1e8343443a59e592e63d626b2f
MD5 009a3eec67eb41999876d64a24ccf7ee
BLAKE2b-256 13d6d01cd5ce250b784dab63a7b8df86c6ede224284ac5b76b3b915b8e18205f

See more details on using hashes here.

File details

Details for the file iflow_mcp_alejandro_ao_mcp_remote-0.1.0-py3-none-any.whl.

File metadata

  • Download URL: iflow_mcp_alejandro_ao_mcp_remote-0.1.0-py3-none-any.whl
  • Upload date:
  • Size: 6.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: uv/0.10.2 {"installer":{"name":"uv","version":"0.10.2","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Debian GNU/Linux","version":"13","id":"trixie","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":null}

File hashes

Hashes for iflow_mcp_alejandro_ao_mcp_remote-0.1.0-py3-none-any.whl
Algorithm Hash digest
SHA256 44485a82e2b0e004366a19fce51436833a30a9a914abe4bbc21c935702c4ac81
MD5 b0f11cbc8face951dbf142232abc6dc6
BLAKE2b-256 7fce87fa63eff14b28a64b8b3e013c03e9106b1f99d45343fc6d2157d993e369

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page