Replies: 1 comment 1 reply
-
|
Hi @0xAttra, great questions. Let me address each one: 1. Is authentication designed to remain at the MCP server level? ContextForge uses a two-tier authentication model:
These are intentionally separate concerns. The gateway authenticates and authorizes the user first (via RBAC), then uses per-gateway OAuth credentials to forward requests to upstream servers. 2. How does ContextForge handle heterogeneous OAuth across multiple MCP servers? Each registered gateway (upstream MCP server) has its own independent OAuth configuration stored in the
OAuth tokens are stored per gateway + per user (keyed by 3. Recommended architectural patterns?
4. Roadmap for centralized auth? The current design intentionally keeps upstream auth per-gateway because different MCP servers often require different IdPs, scopes, and audiences. However, for environments where all upstream servers share a single IdP, you can configure SSO at the gateway level via 5. Can ContextForge propagate upstream auth requirements to the client (pass-through)? Yes, this is exactly what the RFC 9728 OAuth Protected Resource metadata endpoint does. Each virtual server exposes: This tells MCP clients which external Authorization Server to authenticate against, what scopes are needed, and the resource indicator — enabling spec-compliant clients (like Claude) to handle the OAuth flow directly. The gateway acts purely as a Resource Server in this model. See |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
I have a question regarding the OAuth 2.1 security model in ContextForge when aggregating multiple remote MCP servers.
From what I understand, authentication currently seems to be handled at the MCP server level, meaning each remote MCP server manages its own OAuth configuration.
I have a few related questions:
Is authentication officially designed to remain at the MCP server level in ContextForge’s current architecture?
When aggregating multiple remote MCP servers that use different OAuth flows, identity providers, or scopes, how does ContextForge handle this heterogeneity?
Are there recommended architectural patterns for securely aggregating MCP servers with different authentication mechanisms?
Is there any roadmap item or plan to move authentication handling to a more centralized model (e.g., at the gateway/tool level rather than per MCP server)?
Is it possible (or planned) for ContextForge to propagate the remote server’s authentication requirements back to the client — essentially acting as a transparent pass-through for the authentication type and flow — so that the client can handle the appropriate OAuth interaction directly?
Thank you in advance for your clarification!
Beta Was this translation helpful? Give feedback.
All reactions