22title : Backend authentication
33description :
44 Understanding how MCP servers authenticate to external services using
5- ToolHive's backend authentication patterns, including token exchange ,
6- federated identity , and the embedded authorization server.
5+ ToolHive's backend authentication patterns, including static credentials ,
6+ token exchange , and the embedded authorization server.
77---
88
99This document explains how ToolHive helps MCP servers authenticate to
@@ -52,8 +52,9 @@ ToolHive sits between clients and MCP servers, and can acquire backend
5252credentials on behalf of the MCP server. Depending on the pattern, it might
5353exchange the client's token, run an OAuth flow against an external provider, or
5454inject static credentials. In each case, the MCP server receives ready-to-use
55- credentials—typically in the ` Authorization: Bearer ` header—without needing to
56- implement custom authentication logic or manage secrets directly.
55+ credentials—via an ` Authorization: Bearer ` header, another header, or
56+ environment variables, depending on the pattern—without needing to implement
57+ custom authentication logic or manage secrets directly.
5758
5859## Backend authentication patterns
5960
@@ -191,8 +192,8 @@ mechanism, see [Token storage and forwarding](#token-storage-and-forwarding).
191192
192193The embedded authorization server runs in-process within the ToolHive proxy—no
193194separate infrastructure is needed. It supports Dynamic Client Registration
194- (DCR), so MCP clients can register automatically without manual configuration at
195- the external provider .
195+ (DCR), so MCP clients can register automatically with ToolHive—no manual client
196+ configuration in ToolHive is required .
196197
197198:::note
198199
@@ -213,8 +214,9 @@ deployments using the ToolHive Operator.
213214- ** Configurable token lifespans:** Access tokens, refresh tokens, and
214215 authorization codes have configurable durations with sensible defaults.
215216- ** Dynamic Client Registration (DCR):** Supports OAuth 2.0 Dynamic Client
216- Registration (RFC 7591), allowing MCP clients to register automatically
217- without manual configuration at the identity provider.
217+ Registration (RFC 7591), allowing MCP clients to register automatically with
218+ ToolHive's authorization server—no manual client registration in ToolHive is
219+ required.
218220- ** Direct upstream redirect:** The embedded authorization server redirects
219221 clients directly to the upstream provider for authentication (for example,
220222 GitHub or Atlassian).
0 commit comments