Skip to content

Commit 43ef10d

Browse files
committed
Fix inaccurate wording in backend auth docs
Address PR review feedback: - Add static credentials to frontmatter description - Clarify credential delivery covers headers and env vars - Scope DCR descriptions to ToolHive registration
1 parent 9fbce99 commit 43ef10d

1 file changed

Lines changed: 10 additions & 8 deletions

File tree

docs/toolhive/concepts/backend-auth.mdx

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Backend authentication
33
description:
44
Understanding how MCP servers authenticate to external services using
5-
ToolHive's backend authentication patterns, including token exchange,
6-
federated identity, and the embedded authorization server.
5+
ToolHive's backend authentication patterns, including static credentials,
6+
token exchange, and the embedded authorization server.
77
---
88

99
This document explains how ToolHive helps MCP servers authenticate to
@@ -52,8 +52,9 @@ ToolHive sits between clients and MCP servers, and can acquire backend
5252
credentials on behalf of the MCP server. Depending on the pattern, it might
5353
exchange the client's token, run an OAuth flow against an external provider, or
5454
inject static credentials. In each case, the MCP server receives ready-to-use
55-
credentials—typically in the `Authorization: Bearer` header—without needing to
56-
implement custom authentication logic or manage secrets directly.
55+
credentials—via an `Authorization: Bearer` header, another header, or
56+
environment variables, depending on the pattern—without needing to implement
57+
custom authentication logic or manage secrets directly.
5758

5859
## Backend authentication patterns
5960

@@ -191,8 +192,8 @@ mechanism, see [Token storage and forwarding](#token-storage-and-forwarding).
191192

192193
The embedded authorization server runs in-process within the ToolHive proxy—no
193194
separate infrastructure is needed. It supports Dynamic Client Registration
194-
(DCR), so MCP clients can register automatically without manual configuration at
195-
the external provider.
195+
(DCR), so MCP clients can register automatically with ToolHive—no manual client
196+
configuration in ToolHive is required.
196197

197198
:::note
198199

@@ -213,8 +214,9 @@ deployments using the ToolHive Operator.
213214
- **Configurable token lifespans:** Access tokens, refresh tokens, and
214215
authorization codes have configurable durations with sensible defaults.
215216
- **Dynamic Client Registration (DCR):** Supports OAuth 2.0 Dynamic Client
216-
Registration (RFC 7591), allowing MCP clients to register automatically
217-
without manual configuration at the identity provider.
217+
Registration (RFC 7591), allowing MCP clients to register automatically with
218+
ToolHive's authorization server—no manual client registration in ToolHive is
219+
required.
218220
- **Direct upstream redirect:** The embedded authorization server redirects
219221
clients directly to the upstream provider for authentication (for example,
220222
GitHub or Atlassian).

0 commit comments

Comments
 (0)