FrontMCP supports two approaches for integrating external identity providers:Documentation Index
Fetch the complete documentation index at: https://docs.agentfront.dev/llms.txt
Use this file to discover all available pages before exploring further.
Transparent Mode
Pass-through tokens from the IdP. FrontMCP validates but doesn’t issue tokens.Best for: Single IdP, existing auth infrastructure
Orchestrated Remote
FrontMCP acts as OAuth server, proxying user authentication to upstream IdP.Best for: Multi-provider, progressive auth, federated scenarios
Transparent Mode
Direct token pass-through from external identity provider.Configuration Options
| Option | Type | Default | Description |
|---|---|---|---|
provider | string | Required | Base URL of the identity provider |
providerConfig.jwksUri | string | Auto-discovered | Custom JWKS endpoint |
providerConfig.jwks | JSONWebKeySet | - | Inline JWKS for offline verification |
expectedAudience | string | string[] | Issuer URL | Required audience claim value(s) |
requiredScopes | string[] | [] | Scopes that must be present in token |
allowAnonymous | boolean | false | Allow requests without tokens |
Provider Examples
- Auth0
- Okta
- Azure AD
- Google
Token Flow
Orchestrated Remote Mode
FrontMCP acts as an OAuth server while proxying user authentication to upstream IdP.Configuration Options
| Option | Type | Default | Description |
|---|---|---|---|
provider | string | Required | Upstream IdP base URL |
clientId | string | Required | OAuth client ID |
clientSecret | string | - | OAuth client secret (confidential clients) |
scopes | string[] | ['openid'] | Scopes to request from IdP |
providerConfig.dcrEnabled | boolean | false | Use Dynamic Client Registration |
consent | ConsentConfig | { enabled: false } | Show consent UI after IdP login |
When to Use Orchestrated Remote
Multiple identity providers - Federate users from different IdPs under one session
Progressive authorization - Users authorize apps incrementally
Custom token claims - Add claims not available from upstream
Consent UI - Let users select which tools/resources to grant
Token Flow
Dynamic Client Registration
When the IdP supports DCR, FrontMCP can register clients automatically:Not all providers support DCR. Check your IdP documentation.
Endpoint Overrides
Override auto-discovered endpoints for non-standard IdPs:Inline JWKS
For offline verification or non-discoverable providers:Multi-Provider Setup
Combine multiple providers with orchestrated mode:Per-App Remote Auth
Configure different providers per app:Troubleshooting
Token verification fails
Token verification fails
- Check
expectedAudiencematches the token’saudclaim - Verify JWKS endpoint is accessible
- Ensure token hasn’t expired
JWKS fetch fails
JWKS fetch fails
- Verify IdP URL is correct
- Check network connectivity
- Try providing inline JWKS via
providerConfig.jwks
Redirect URI mismatch
Redirect URI mismatch
- Register exact redirect URI with IdP
- Check for trailing slashes
- Ensure protocol (http/https) matches
Next Steps
Remote Proxy
Handle IdPs without DCR support
Progressive Authorization
Implement incremental app authorization
Local OAuth
Built-in OAuth server setup
Production Checklist
Security requirements for deployment