loglux

AuthMCP Gateway

Community loglux
Updated

๐Ÿ” Secure authentication proxy for MCP servers with JWT auth, real-time monitoring, and admin dashboard. Production-ready Docker deployment.

AuthMCP Gateway

Secure authentication proxy for Model Context Protocol (MCP) servers

PyPI versionLicense: MITPython 3.11+DockerMCP 2025-03-26

AuthMCP Gateway is a full MCP protocol proxy with centralized authentication, authorization, and monitoring. It transparently proxies all MCP capabilities โ€” tools, resources, prompts, and completions โ€” from multiple backend servers through a single authenticated endpoint.

OAuth + DCR ready: the gateway supports OAuth 2.0 Authorization Code flow with Dynamic Client Registration (DCR), so MCP clients like Codex can self-register and authenticate without manual client provisioning.

๐Ÿ“‹ Table of Contents

  • โœจ Features
  • ๐Ÿ“ธ Screenshots
  • ๐Ÿš€ Quick Start
  • โš™๏ธ Configuration
  • ๐Ÿ’ก Usage
  • ๐Ÿ—๏ธ Architecture
  • ๐Ÿ”Œ API Endpoints
  • ๐Ÿ” Security
  • ๐Ÿ› ๏ธ Development
  • ๐Ÿ“Š Monitoring
  • ๐Ÿ”ง Troubleshooting

โœจ Features

๐Ÿ”— Full MCP Protocol Proxy (v1.2.0)

  • Tools - tools/list, tools/call with intelligent routing (prefix, mapping, auto-discovery)
  • Resources - resources/list, resources/read, resources/templates/list
  • Prompts - prompts/list, prompts/get
  • Completions - completion/complete with ref-based routing
  • Dynamic Capabilities - queries backends on initialize and advertises only what they support
  • Multi-server aggregation - list methods merge results from all backends; read/get/call routes to the correct one
  • Protocol version - MCP 2025-03-26

๐Ÿ” Authentication & Authorization

  • OAuth 2.0 + JWT - Industry-standard authentication flow
  • Dynamic Client Registration (DCR) - MCP clients can self-register for OAuth
  • User Management - Multi-user support with role-based access
  • Backend Token Management - Secure storage and auto-refresh of MCP server credentials
  • Rate Limiting - Per-user request throttling with configurable limits

๐Ÿ“Š Real-Time Monitoring

  • Live MCP Activity Monitor - Real-time request feed with auto-refresh
  • Performance Metrics - Response times, success rates, requests/minute
  • Security Event Logging - Unauthorized access attempts, rate limiting, suspicious activity
  • Health Checking - Automatic health checks for all connected MCP servers

๐ŸŽ›๏ธ Admin Dashboard

  • User Management - Create, edit, and manage users
  • MCP Server Configuration - Add and configure backend MCP servers
  • Token Management - Monitor token health and manual refresh
  • Security Events - View and filter security events
  • Security Audit - MCP vulnerability scanning

๐Ÿ›ก๏ธ Security

  • JWT token-based authentication with refresh tokens
  • Secure credential storage with encrypted database support
  • CORS protection and request validation
  • Security event logging and monitoring
  • File-based logging - JSON logs for auth & MCP requests with rotation; security events remain in SQLite for audit/queries

๐Ÿ“ธ Screenshots

๐Ÿ–ฅ๏ธ Dashboard - Real-time Overview

Dashboard

Live statistics, server health monitoring, top tools usage, and recent activity feed

๐Ÿ”ง MCP Servers - Connection Management

MCP Servers

Manage backend MCP server connections with status monitoring and health checks

๐Ÿ“Š MCP Activity Monitor - Real-time Request Tracking

MCP Activity

Monitor live MCP requests with detailed metrics, top tools ranking, and request feed

๐Ÿ›ก๏ธ Security Events - Threat Detection

Security Events

Track security events, rate limiting, suspicious payloads, and unauthorized access attempts

๐Ÿ”’ MCP Security Audit - Vulnerability Scanner

MCP Security Audit

Test any MCP server for security vulnerabilities with comprehensive automated checks

๐Ÿš€ Quick Start

Option 1: PyPI Package (Recommended)

1. Install:

pip install authmcp-gateway

2. First Run:

authmcp-gateway start
# โœ“ Auto-creates .env with JWT_SECRET_KEY
# โœ“ Auto-creates data/ directory
# โœ“ Initializes database

3. Access Setup Wizard:Open http://localhost:8000/ in your browser to create admin user.

4. Optional - Customize Configuration:

# Edit auto-generated .env or download full example
curl -o .env https://raw.githubusercontent.com/loglux/authmcp-gateway/main/.env.example.pypi

# Common settings to customize in .env:
# PORT=9000                          # Change server port
# PASSWORD_REQUIRE_SPECIAL=false     # Relax password requirements
# LOG_LEVEL=DEBUG                    # More detailed logs

# Restart to apply changes
authmcp-gateway start

Available Commands:

authmcp-gateway start                    # Start server (default: 0.0.0.0:8000)
authmcp-gateway start --port 9000        # Start on custom port
authmcp-gateway start --host 127.0.0.1   # Bind to localhost only
authmcp-gateway start --env-file custom.env  # Use custom config file

authmcp-gateway init-db                  # Initialize database
authmcp-gateway create-admin             # Create admin user via CLI
authmcp-gateway version                  # Show version
authmcp-gateway --help                   # Show all options

Option 2: Docker Compose

  1. Clone and configure:

    git clone https://github.com/loglux/authmcp-gateway.git
    cd authmcp-gateway
    cp .env.example .env
    # Edit .env with your settings
    
  2. Start the gateway:

    docker-compose up -d
    
  3. Access admin panel:

โš™๏ธ Configuration

Environment Variables

# Gateway Settings
GATEWAY_PORT=9105              # Host port mapping for Docker (container listens on 8000)
JWT_SECRET_KEY=your-secret-key # JWT signing key (auto-generated if not set)
AUTH_REQUIRED=true             # Enable authentication (default: true)

# Admin Settings
ADMIN_USERNAME=admin           # Initial admin username
ADMIN_PASSWORD=secure-password # Initial admin password

Adding MCP Servers

Via Admin Panel:

  1. Navigate to MCP Servers โ†’ Add Server
  2. Enter server details:

Via API:

curl -X POST http://localhost:9105/admin/api/mcp-servers \
  -H "Authorization: Bearer YOUR_TOKEN" \
  -H "Content-Type: application/json" \
  -d '{
    "name": "GitHub MCP",
    "url": "http://github-mcp:8000/mcp",
    "backend_token": "optional-token"
  }'

๐Ÿ’ก Usage

For End Users

  1. Login to get access token:

    curl -X POST http://localhost:9105/auth/login \
      -H "Content-Type: application/json" \
      -d '{"username":"your-username","password":"your-password"}'
    
  2. Use token to access MCP endpoints:

    # List tools from all backends
    curl -X POST http://localhost:9105/mcp \
      -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \
      -H "Content-Type: application/json" \
      -d '{"jsonrpc":"2.0","id":1,"method":"tools/list"}'
    
    # List resources
    curl -X POST http://localhost:9105/mcp \
      -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \
      -H "Content-Type: application/json" \
      -d '{"jsonrpc":"2.0","id":2,"method":"resources/list"}'
    
    # List prompts
    curl -X POST http://localhost:9105/mcp \
      -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \
      -H "Content-Type: application/json" \
      -d '{"jsonrpc":"2.0","id":3,"method":"prompts/list"}'
    
    # Ping
    curl -X POST http://localhost:9105/mcp \
      -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \
      -H "Content-Type: application/json" \
      -d '{"jsonrpc":"2.0","id":4,"method":"ping"}'
    

For Administrators

Admin Panel Features:

  • Dashboard - Overview of users, servers, and activity
  • MCP Activity - Real-time monitoring of all MCP requests
  • Security Events - View unauthorized access attempts and suspicious activity
  • User Management - Create and manage user accounts
  • Token Management - Monitor and refresh backend tokens

๐Ÿ—๏ธ Architecture

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚      MCP Clients (Claude, Codex, etc.)   โ”‚
โ”‚      OAuth 2.0 / JWT Authentication      โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                     โ”‚
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ–ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚               AuthMCP Gateway            โ”‚
โ”‚             MCP 2025-03-26 Proxy         โ”‚
โ”‚                                          โ”‚
โ”‚  โ€ข Full MCP Protocol Proxy               โ”‚
โ”‚  โ€ข Tools / Resources / Prompts           โ”‚
โ”‚  โ€ข OAuth 2.0 + DCR                       โ”‚
โ”‚  โ€ข JWT Auth (HS256/RS256+JWKS)           โ”‚
โ”‚  โ€ข Rate Limiting                         โ”‚
โ”‚  โ€ข Security Logging                      โ”‚
โ”‚  โ€ข Multi-Server Aggregation              โ”‚
โ”‚  โ€ข Health Monitoring                     โ”‚
โ”‚  โ€ข Admin Dashboard                       โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜
                     โ”‚
    โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ฌโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
    โ–ผ          โ–ผ          โ–ผ          โ–ผ
โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  RAG   โ”‚ โ”‚WhatsAppโ”‚ โ”‚ Docs   โ”‚ โ”‚Custom  โ”‚
โ”‚  MCP   โ”‚ โ”‚  MCP   โ”‚ โ”‚  MCP   โ”‚ โ”‚  MCP   โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐Ÿ”Œ API Endpoints

Public Endpoints

  • POST /auth/login - User login
  • POST /auth/register - User registration (if enabled)
  • POST /auth/refresh - Refresh access token
  • POST /oauth/register - OAuth dynamic client registration (if enabled)
  • GET /.well-known/oauth-authorization-server - OAuth discovery

Protected Endpoints

  • POST /mcp - Aggregated MCP endpoint (all servers)
  • POST /mcp/{server_name} - Specific MCP server endpoint
  • GET /mcp - Streamable MCP endpoint (SSE/stream clients)
  • GET /auth/me - Current user info
  • POST /auth/logout - Logout

Supported MCP Methods

Method Description
initialize Dynamic capabilities discovery from backends
ping Health check
tools/list Aggregated tools from all backends
tools/call Routed to correct backend (prefix/mapping/auto-discovery)
resources/list Aggregated resources from all backends
resources/read Routed by URI to owning backend
resources/templates/list Aggregated resource templates
prompts/list Aggregated prompts from all backends
prompts/get Routed by name to owning backend
completion/complete Routed by ref type (prompt/resource)
logging/setLevel Accepted (no-op at gateway level)
notifications/* Gracefully ignored
Direct tool name (e.g. rag_query) Codex-style: routed as tools/call (openai/codex#2264)
Unknown namespaced methods Returns JSON-RPC -32601 Method not found

Tool Annotations And Safe Retries

For tools/call, the gateway prefers standard MCP tool annotations when deciding whether a tool is read-onlyor safe to retry:

  • annotations.readOnlyHint
  • annotations.idempotentHint
  • annotations.destructiveHint

Behavior:

  • Read-only tools may use safe automatic retry.
  • Mutating tools are not retried blindly.
  • If a mutating tool is marked idempotent, the gateway preserves or generatesarguments.idempotency_key and reuses the same key on retry.
  • If metadata is missing or unclear, the gateway falls back to conservative behavior and disablesautomatic retry for tools/call.

This keeps the gateway aligned with standard MCP annotations while allowing backend MCP servers toimplement stronger idempotency semantics where needed.

๐Ÿค– Codex OAuth (DCR) Login (Manual Callback)

Codex uses OAuth Authorization Code + PKCE and Dynamic Client Registration (DCR). When running in a terminalwithout an auto-launching browser, you must manually open the authorization URL and then call the localhostcallback URL yourself to finish the login.

Steps:

  1. Add the MCP server in Codex:
codex mcp add rag --url https://your-domain.com/mcp/your-backend
  1. Codex prints an Authorize URL. Open it in your browser.
  2. Complete the login (admin/user credentials).
  3. After successful login you will be redirected to a http://127.0.0.1:<port>/callback?... URL.Copy that full URL and call it from another terminal:
curl "http://127.0.0.1:<port>/callback?code=...&state=..."

You should see: Authentication complete. You may close this window.

Once completed, Codex shows the MCP server as logged in.

Headless Token Storage (Important)

On headless servers (no desktop environment), Codex cannot access the OS keyring to store OAuth tokens.This causes "Auth required" errors even after a successful login. To fix this, switch to file-based token storage:

# ~/.codex/config.toml
mcp_oauth_credentials_store = "file"

Reference: Codex Config Reference

Without this parameter Codex fails to refresh tokens because it looks for a keyring security service andfails. That forces you to re-login each time again and again following the manual procedure above.After updating the config, restart Codex.

Discovery Compatibility

Some MCP clients probe OpenID discovery using non-standard paths after a successful token exchange. Inaddition to the standard /.well-known/openid-configuration, the gateway also serves the same discoverydocument at /oauth/token/.well-known/openid-configuration as a compatibility alias.

If you are already locked out and see this warning:

โš  The rag MCP server is not logged in. Run `codex mcp login rag`.
โš  MCP startup incomplete (failed: rag)

You can refresh tokens with the helper script without going through the manual authentication procedure again:

python3 scripts/codex_refresh_mcp.py rag https://your-domain.com/oauth/token

Codex Multi-Machine Note

If Codex runs on multiple machines, each machine stores its own local tokens. In that case, a login from onemachine can invalidate tokens on another when Enforce Single Session is enabled (one active token per user).Disable Enforce Single Session in the admin settings to avoid forced logouts in multi-machine setups.

๐Ÿ” Security

Security Features

  • โœ… JWT-based authentication with refresh tokens
  • โœ… Rate limiting per user
  • โœ… Security event logging
  • โœ… MCP request tracking with suspicious activity detection
  • โœ… Health monitoring for backend servers
  • โœ… CORS protection
  • โœ… Secure credential storage

๐Ÿ› ๏ธ Development

Release process: see docs/RELEASE.md.

Local Development

# Clone repository
git clone https://github.com/loglux/authmcp-gateway.git
cd authmcp-gateway

# Create virtual environment
python3 -m venv venv
source venv/bin/activate  # or `venv\Scripts\activate` on Windows

# Install dependencies
pip install -e .

# Run gateway
authmcp-gateway

Running Tests

pytest tests/

Project Structure

authmcp-gateway/
โ”œโ”€โ”€ src/authmcp_gateway/
โ”‚   โ”œโ”€โ”€ admin/           # Admin panel routes and logic
โ”‚   โ”œโ”€โ”€ auth/            # Authentication & authorization
โ”‚   โ”œโ”€โ”€ mcp/             # MCP proxy and handlers
โ”‚   โ”œโ”€โ”€ security/        # Security logging and monitoring
โ”‚   โ”œโ”€โ”€ middleware.py    # Request middleware
โ”‚   โ””โ”€โ”€ app.py           # Main application
โ”‚   โ”œโ”€โ”€ templates/       # Jinja2 templates (admin UI)
โ”œโ”€โ”€ docs/                # Documentation
โ”œโ”€โ”€ tests/               # Test suite
โ””โ”€โ”€ docker-compose.yml   # Docker deployment

๐Ÿ“Š Monitoring

Real-Time Dashboard

Access /admin/mcp-activity for:

  • Live request feed (updates every 3 seconds)
  • Requests per minute
  • Average response times
  • Success rates
  • Top tools usage
  • Per-server statistics

Logs

View logs in real-time:

docker logs -f authmcp-gateway

๐Ÿ”ง Troubleshooting

Cannot access admin panel:

  • Ensure you've completed the setup wizard at /setup
  • Check that cookies are enabled
  • Verify JWT_SECRET_KEY is set correctly

MCP server shows as offline:

  • Check server URL is correct and reachable
  • Verify backend token if required
  • View error details in MCP Servers page

401 Unauthorized errors:

  • Token may have expired - use refresh token
  • Verify Authorization header format: Bearer YOUR_TOKEN
  • Check user has permission for the MCP server

For more help, see the troubleshooting and usage sections above.

License

MIT License - see LICENSE file for details.

MCP Server ยท Populars

MCP Server ยท New

    mksglu

    Context Mode

    MCP is the protocol for tool access. We're the virtualization layer for context.

    Community mksglu
    Altinity

    Altinity MCP Server

    Model Context Protocol server to use ClickHouseยฎ databases in your AI agents

    Community Altinity
    Vexa-ai

    Vexa

    Open-source meeting transcription API for Google Meet, Microsoft Teams & Zoom. Auto-join bots, real-time WebSocket transcripts, MCP server for AI agents. Self-host or use hosted SaaS.

    Community Vexa-ai
    imran-siddique

    AgentOS MCP Server

    A Safety-First Kernel for Autonomous AI Agents - POSIX-inspired primitives with 0% policy violation guarantee

    Community imran-siddique
    openclaw

    ๐Ÿฆž OpenClaw โ€” Personal AI Assistant

    Your own personal AI assistant. Any OS. Any Platform. The lobster way. ๐Ÿฆž

    Community openclaw