Open source upgrade for MCP Servers to support OAuth 2.0 with Okta SSO. Easily replace .env-based auth with secure, enterprise-grade single sign-on.
{
"mcpServers": {
"mcp-servers-oauth": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
Open source upgrade for MCP Servers to support OAuth 2.0 with Okta SSO. Easily replace .env-based auth with secure, enterprise-grade single sign-on.
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 248 days ago. 6 stars.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Search, evaluate, and compare 17,000+ MCP servers — each scored on security, maintenance, and efficiency.
AI agents get on-chain identity, credentials, reputation, escrow, and persistent memory on XRPL.
MCP server for scanning and remediating hardcoded secrets using GitGuardian’s API. Detect over 500 secret types and prevent credential leaks before code goes public.
Trust infrastructure for AI agents — DIDs, reputation, verifiable credentials, USDC.
MCP Security Weekly
Get CVE alerts and security updates for Mcp Servers Oauth and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
Upgrading your MCP server to use OAuth 2.0 is a significant improvement. It eliminates the need for users to store sensitive credentials in a configuration file and enhances security by using short-lived access tokens and refresh tokens. This guide explains the process by walking through the transformation of a Salesforce MCP server with only username/password authentication to a server that supports OAuth. The changes detailed below reflect the refactoring shown in this commit: https://github.com/xeris-ai/mcp-servers-oauth/commit/37a7c16d0dc2f36e45226c744a24be68340387bc.
Instead of relying on a username and password, OAuth works by:
Before you write any code, you need to set up an OAuth application with your service provider. This process is similar for most services, such as Salesforce and Atlassian.
http://localhost:8080/callback.api, offline access).This section explains the code changes required in server.py to integrate with the existing oauth_flow.py module, as seen in the linked commit.
oauth_flow.py ModuleThis is a new file that handles the entire user-facing OAuth process. Its primary job is to open a browser window for the user, listen for the callback from the service provider, and exchange the authorization code for tokens. The full code for this module can be found here: oauth_flow.py
Here are the key components and their functions:
callback() endpoint: This is the destination for the redirect_uri you configured in Step 1. It captures the authorization code or any error messages from the service provider._generate_pkce() function creates a secure challenge that the server sends to the service provider and a verifier that it uses to confirm its identity when requesting the final token.perform_oauth_flow(): This method orchestrates the entire process: