Authentication
Management API
OAuth 2.1 and PAT authentication for administrative operations
The Management API handles administrative operations for MCP server connections using two authentication methods.
OAuth 2.1 Client Credentials
Standard OAuth flow for production applications:
Response:
Using the token:
Personal Access Tokens (PATs)
Long-lived tokens generated directly in the platform web interface for automated access and scripting scenarios.
Key Characteristics:
- Long-lived (no expiration by default)
- Generated via web UI rather than OAuth flow
- Uses same JWT structure as OAuth tokens for compatibility
- Suitable for CI/CD, automation, and development workflows
Token Claims Structure:
PAT tokens follow standard JWT structure with these key claims:
Using PAT tokens:
Available Scopes
- mgmt.read - Read MCP server configurations and status
- mgmt.write - Create, update, and delete MCP server connections
- mgmt.admin - Administrative operations and system management
Token Security Best Practices
OAuth Token Lifecycle
- Tokens expire in 1 hour by default
- Refresh tokens automatically before expiration
- Store tokens securely in memory or secure storage
PAT Security
- Rotate PATs regularly (recommended every 90 days)
- Store PATs in secure credential management systems
- Limit scope to minimum required permissions
- Monitor PAT usage for anomalies
General Security
- Always use HTTPS for token requests
- Never log or expose tokens in application code
- Implement proper error handling for authentication failures