Documentation Index
Fetch the complete documentation index at: https://terminal49-codex-data-8540-workos-only-mcp-auth.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
OAuth E2E Smoke Test
Use this runbook to validate the hosted MCP OAuth 2.1 integration.Prerequisites
curlandjqinstalled.- Reachable API and MCP endpoints.
- A redirect URI for client registration (for example
http://localhost:5050/callback). - Optional: a valid OAuth access token to run authenticated MCP calls.
Environment variables
Run
From theAPI repo root:
What this validates
- Discovery endpoint returns required metadata:
issuerauthorization_endpointtoken_endpointrevocation_endpointcode_challenge_methods_supported
- Dynamic registration succeeds:
POST /oauth/registerreturnsclient_id- no
client_secretis returned
- Unauthenticated MCP request is standards-compliant:
POST /mcpreturns401WWW-Authenticateincludes:Bearer resource_metadata="https://api.terminal49.com/.well-known/oauth-authorization-server"
- Authenticated MCP calls (if
MCP_ACCESS_TOKENprovided):
initializereturns successtools/listreturns a non-empty tools list
Troubleshooting
401with missingresource_metadata:
- Verify
T49_MCP_RESOURCE_METADATA_URLin the MCP deployment.
- Registration fails with
invalid_client_metadata:
- Validate
redirect_urisformat. - Use
https://callbacks or localhost http callbacks.
- OAuth bearer token rejected:
- Confirm token contains
mcpscope. - Confirm issuer/audience/JWKS env vars:
WORKOS_MCP_ISSUER,WORKOS_MCP_AUDIENCE,WORKOS_MCP_JWKS_URL.
- Internal fallback verification fails:
- Confirm
T49_MCP_TOKEN_VERIFY_URLandT49_MCP_INTERNAL_AUTH_TOKENmatch Rails internal endpoint config.