| Name | Client ID | Service Principal | Created | Status | Actions |
|---|
| Name | Client ID | Created | Status | Actions |
|---|
| App ID | Scopes | Active | Actions |
|---|
Enter an App ID and select scopes to grant.
Generate OAuth2.1 authorization codes with PKCE support for MCP clients.
Use this URL to initiate the OAuth2.1 authorization flow:
Store this code verifier securely. It's needed to exchange the authorization code for tokens:
Fill out the form to generate an authorization code
| App | Scopes | Redirect URI | Created | Expires | Status | Actions |
|---|
| App | Scopes | Created | Expires | Status | Actions |
|---|
Your OAuth2 server metadata is automatically available for MCP client discovery.
MCP clients can discover your OAuth2 capabilities at:
Use these settings to configure MCP clients to use your OAuth2 server.
MCP-Protocol-Version headerAuthorization: Bearer headerExample configuration for popular MCP clients.
const { Client } = require('@modelcontextprotocol/sdk/client');
const client = new Client({
name: 'my-mcp-client',
version: '1.0.0'
});
// OAuth2 configuration
client.setOAuth2Config({
authorizationServer: 'https://api.jumpcaller.se/.well-known/oauth-authorization-server',
clientId: 'your-client-id',
clientSecret: 'your-client-secret',
redirectUri: 'http://localhost:3000/callback',
scopes: ['read', 'write']
});
await client.connect();
from mcp import Client
client = Client(
name="my-mcp-client",
version="1.0.0"
)
# OAuth2 configuration
client.configure_oauth2(
authorization_server="https://api.jumpcaller.se/.well-known/oauth-authorization-server",
client_id="your-client-id",
client_secret="your-client-secret",
redirect_uri="http://localhost:3000/callback",
scopes=["read", "write"]
)
await client.connect()