Skip to content

Aembit’s Model Context Protocol: A standard protocol for AI agent and server interactions that defines how AI assistants communicate with external tools and data sources.Learn more(opens in new tab) Authorization Server secures MCP workloads using OAuth 2.1 authorization flows. It implements the authorization functionality defined in the MCP specification. AI agents and MCP clients authenticate and receive access tokens governed by Aembit Access Policy: Access Policies define, enforce, and audit access between Client and Server Workloads by cryptographically verifying workload identity and contextual factors rather than relying on static secrets.Learn more.

  • Handles OAuth for MCP - Implements the OAuth 2.1 authorization code flow from the MCP specification so you don’t have to build it yourself
  • Works with existing MCP clients - Supports Dynamic Client Registration: An OAuth mechanism that allows MCP clients to register with the Authorization Server at runtime without pre-configuration, receiving unique credentials for subsequent authorization requests.Learn more, so tools like Gemini CLI and Claude Desktop can connect without pre-configuration
  • Uses your existing identity provider - Integrates with OIDC and SAML providers (Okta, Azure AD, Google) for user authentication, or skip user authentication entirely for use cases that don’t require it
  • Adds access control - Apply Aembit Access Policy: Access Policies define, enforce, and audit access between Client and Server Workloads by cryptographically verifying workload identity and contextual factors rather than relying on static secrets.Learn more to restrict who can access which MCP servers, with optional time and location conditions
  • Runs in Aembit Cloud - Available in v1.27+ with no additional agents to deploy

Use Aembit’s MCP Authorization Server when you need to:

  • Secure MCP-compliant workloads or AI agents using OAuth 2.1 flows
  • Apply fine-grained access control, including geo/time-based conditions and integration with OIDC identity providers
  • Enable dynamic client registration and seamless integration with MCP clients like Claude Desktop and Gemini CLI, or use MCP Jam for testing and debugging your authorization flows

Aembit’s MCP Authorization Server processes requests through these steps:

  1. Client registration - MCP clients register with the MCP Authorization Server using a redirect URI as their identifier, via dynamic client registration
  2. Authorization request - Clients initiate OAuth 2.1 flows. When Enforce SSO is on (the default), users authenticate through their configured identity provider. When Enforce SSO is off, the flow skips user authentication
  3. Policy evaluation - Aembit evaluates Access Policies, including access conditions. When Enforce SSO is on, Trust Provider attestation also applies
  4. Token issuance - On successful authorization, the server issues access tokens for use with MCP servers using the OIDC ID Token Credential Provider
  5. Token validation - MCP servers validate tokens using standard OIDC/JWKS: JSON Web Key Set - A set of cryptographic keys published at a well-known endpoint, used to verify the signatures of JSON Web Tokens (JWTs) issued by an authorization server.Learn more mechanisms. Aembit lets you configure the audience, issuer, subject claims, and token lifetime

For an architecture diagram showing these components, see MCP Authorization Server architecture.

Aembit’s MCP Authorization Server supports human/user authentication through OIDC and SAML Identity Providers, as well as flows that skip user authentication entirely.

Authentication typeDescriptionSupported?
Human/user (SSO)Users authenticate via OIDC or SAML Identity Providers (Azure AD, Okta, Google)
No user authenticationOAuth flow completes without user sign-in, for use cases like ChatGPT apps
Non-human workloadService accounts, AWS IAM roles, Azure Managed Identity

The Enforce SSO option on your Client Workload controls which flow applies. Enforce SSO is on by default, requiring user authentication. To skip user authentication, turn off Enforce SSO on your Client Workload. See Set up the MCP Authorization Server for configuration details.

When Enforce SSO is on, Aembit’s MCP Authorization Server supports both OIDC and SAML identity providers. Both require a Credential Provider to generate access tokens, but they differ in Trust Provider support:

ProtocolTrust ProviderCredential Provider
OIDCOIDC ID Token Trust ProviderRequired
SAMLSAMLv2 Response Trust ProviderRequired
No user auth (Enforce SSO off)NoneRequired
  • OIDC: Use the OIDC ID Token Trust Provider in your Access Policy to validate identity tokens. A Credential Provider generates the access token.
  • SAML: Use the SAMLv2 Response Trust Provider in your Access Policy to validate SAML responses. A Credential Provider generates the access token.
  • No user auth: When Enforce SSO is off, no Trust Provider or identity provider is needed. A Credential Provider still generates the access token.

When Enforce SSO is on, both protocols require an identity provider configured in your Aembit tenant under Administration > Identity Providers.

If you configure multiple identity providers for your tenant, users select their IdP during the authentication flow.