Naptha AI OAuth MCP
STDIOReference implementation for OAuth-authorized MCP server supporting HTTP and SSE transports.
Reference implementation for OAuth-authorized MCP server supporting HTTP and SSE transports.
This repo provides a reference implementation for creating a remote MCP server that supports the Streamable HTTP & SSE Transports, authorized with OAuth based on the MCP specification.
Note that the MCP server in this repo is logically separate from the application that handles the report SSE + HTTP transports, and from OAuth.
As a result, you can easily fork this repo, and plug in your own MCP server and OAuth credentials for a working SSE/HTTP + OAuth MCP server with your own functionality.
But, why?
Great question! The MCP specification added the authorization specification based on OAuth on March 25, 2025. At present, as of May 1, 2025:
StreamableHttpClientTransport
classAt Naptha AI, we really wanted to build an OAuth-authorized MCP server on the streamable HTTP transport, and couldn't find any reference implementations, so we decided to build one ourselves!
Bun, a fast all-in-one JavaScript runtime, is the recommended runtime and package manager for this repository. Limited compatibility testing has been done with npm
+ tsc
.
This repository provides the following:
This express application is what you plug your credentials and MCP server into.
Note that while this express app implements the required OAuth endpoints including /authorize
and the Authorization Server Metadata endpoint (RFC8414), it does not implement an OAuth authorization server!
This example proxies OAuth to an upstream OAuth server which supports dynamic client registration (RFC7591). To use this example, you will need to bring your own authorization server. We recommend using Auth0; see the "Setting up OAuth" Section below.
To use this example, you need an OAuth authorization server. Do not implement this yourself! For the purposes of creating our demo, we used Auth0 -- this is a great option, though there are many others.
The MCP specification requires support for an uncommon OAuth feature, specifically RFC7591, Dynamic Client Registration. The MCP specification specifies that MCP clients and servers should support the Dynamic client registration protocol, so that MCP clients (whever your client transport lives) can obtain Client IDs without user registration. This allows new clients (agents, apps, etc.) to automatically register with new servers. More details on this can be found in the authorization section of the MCP specification, but this means that unfortunately, you cannot simply proxy directly to a provider like Google or GitHub, which do not support dynamic client registration (they require you to register clients in their UI).
This leaves you with two options:
For simplicity, we have opted for the former option using Auth0.
[!NOTE]
Since this implementation proxies the upstream OAuth server, the default approach of forwarding the access token from the OAuth server to the client would expose the user's upstream access token to the downstream client & MCP host. This is not suitable for many use-cases, so this approach re-implements some@modelcontextprotocol/typescript-sdk
classes to fix this issue.
Note that while we are proxying the upstream authorization server, we are not returning the end-user's auth token to the MCP client / host - instead, we are issuing our own, and allowing the client / host to use that token to authorize with our server. This prevents a malicious client or host from abusing the token, or from it being abused if it's leaked.
To get started with Auth0:
Once all of this has been set up, you will need the following information:
Make sure to fill this information into your .env
. Copy .env.template
and then update the values with your configurations & secrets.
This repository includes two separate stand-alone servers:
src/app.stateless.ts
. This only supports the streamable HTTP transport, and is (theoretically) suitable for serverless deploymentsrc/app.stateful.ts
. This app offers both transports, but maintains in-memory state even when using the redis
storage strategy (connections must be persisted in-memory), so it is not suitable for serverless deployment or trivial horizontal scaling.You can run either of them with bun
:
bun run src/app.stateless.ts # or, bun run src/app.stateful.ts
To test out our MCP server with streamable HTTP and OAuth support, you have a couple options.
As noted above, the Python MCP SDK does not support these features, so currently you can either plug our remote server into an MCP host like Cursor or Claude Desktop, or into a TypeScript/JavaScript application directly - but not into a Python one.
Since most MCP hosts don't support either streamable HTTP (which is superior to SSE in a number of ways) or OAuth, we recommend using the mcp-remote
npm package which will handle the OAuth authorization, and bridging the remote transport into a STDIO transport for your host.
the command will look like this:
bunx mcp-remote --transport http-first https://some-domain.server.com/mcp # or, npx mcp-remote --transport http-first https://some-domain.server.com/mcp
You have a couple of options for the --transport
option:
http-first
(default): Tries HTTP transport first, falls back to SSE if HTTP fails with a 404 errorsse-first
: Tries SSE transport first, falls back to HTTP if SSE fails with a 405 errorhttp-only
: Only uses HTTP transport, fails if the server doesn't support itsse-only
: Only uses SSE transport, fails if the server doesn't support it[!NOTE] If you launch the stateless version of the server with
src/app.stateless.ts
, the SSE transport is not available, so you should use--transport http-only
. SSE transport should not be expected to work if you use this entrypoint.
You can plug your Streamable HTTP server into an agent in JS/TS using StreamableHTTPClientTransport
. However, this will not work with OAuth-protected servers. Instead, you should use the Authorization
header on the client side, with a valid access token on the server side.
You can implement this with client credentials, API keys or something else. That pattern is not supported in this repository, but it would look like this using the Vercel AI SDK:
import { openai } from '@ai-sdk/openai'; import { experimental_createMCPClient as createMcpClient, generateText } from 'ai'; import { StreamableHTTPClientTransport } from "@modelcontextprotocol/sdk/client/streamableHttp.js"; const mcpClient = await createMcpClient({ transport: new StreamableHTTPClientTransport( new URL("http://localhost:5050/mcp"), { requestInit: { headers: { Authorization: "Bearer YOUR TOKEN HERE", }, }, // TODO add OAuth client provider if you want authProvider: undefined, }), }); const tools = await mcpClient.tools(); await generateText({ model: openai("gpt-4o"), prompt: "Hello, world!", tools: { ...(await mcpClient.tools()) } });