When IdP Configuration is Required
The IdP configuration in the Connections page is required when you have in-house MCP servers where you control the identity provider. In this scenario:- Users authenticate with your IdP and receive a JWT token
- MCP clients present this token to Golf Gateway
- Gateway validates the token using your IdP’s JWKS endpoint
- Gateway extracts user identity for RBAC and audit logging
For third-party MCP servers that have their own OAuth authorization, users authenticate through Golf Gateway’s Authorization Server, which proxies the OAuth flow between the MCP client and the upstream server. The IdP configuration in Connections is not used in this flow.
Prerequisites
- Auth0
- Microsoft Entra ID
- Descope
Create a Single Page Application or Regular Web Application in Auth0.Required:
- Domain (e.g.,
your-tenant.auth0.com) - JWKS endpoint URL (e.g.,
https://your-tenant.auth0.com/.well-known/jwks.json)
- Machine-to-Machine Application
- Client ID and Client Secret for the M2M app
When Capability Discovery Credentials Are Needed
Capability discovery credentials (M2M tokens) enable the gateway to fetch MCP server capabilities autonomously. These are optional but required in specific scenarios:Scheduled capability refresh
Scheduled capability refresh
When you enable automatic capability refresh for an MCP server, the gateway periodically connects to discover tools, prompts, and resources. Since no user is present during these background jobs, M2M credentials authenticate the gateway as a service account.
Capability versioning with approval workflow
Capability versioning with approval workflow
When
capability_versioning_enabled is set on a server, the gateway tracks changes to capabilities over time. New or modified tools are flagged for approval before becoming available. M2M credentials enable the gateway to discover these changes automatically.Fine-grained capability RBAC
Fine-grained capability RBAC
For advanced RBAC that uses tool annotations (read-only, destructive, etc.), the gateway needs capability schemas to enforce policies. M2M credentials allow the gateway to fetch and cache these schemas for runtime access control decisions.
- You only use manual, user-initiated capability discovery
- You use simple server-level RBAC without capability granularity
- You don’t need scheduled refresh
Configure via Control Plane
- Auth0
- Microsoft Entra ID
- Descope
- Navigate to Connections in the sidebar
- In the Identity Providers section, click Add identity provider
- Select Auth0
- Configure the following sections:
| Field | Description | Example |
|---|---|---|
| Display name | Friendly name for this IdP | Production Auth0 |
| JWKS endpoint | Auth0 JWKS URL for token validation | https://your-tenant.auth0.com/.well-known/jwks.json |
| Field | Description | Example |
|---|---|---|
| API identifiers | List of valid audience values | https://api.example.com |
API identifiers must match the
aud claim in your JWT tokens. Add multiple identifiers if your tokens may have different audiences.| Field | Description | Example |
|---|---|---|
| Client ID | M2M application Client ID | abc123... |
| Client secret | M2M application Client Secret | *** |
| Scopes | OAuth scopes | openid (default) |
- Click Save
Configure via YAML (Distributed Mode)
- Auth0
- Microsoft Entra ID
- Descope
Authentication Flows
Golf Gateway supports two authentication scenarios depending on the MCP server type:In-House Servers (Direct IdP Validation)
For MCP servers you own and control, users authenticate with your IdP:- User authenticates with your IdP (Auth0, Entra ID, Descope)
- MCP client receives JWT token
- Client presents token to Golf Gateway
- Gateway validates token using IdP’s JWKS endpoint (configured in Connections)
- Gateway extracts user identity and applies RBAC policies
- Request is forwarded to the in-house MCP server
Third-Party Servers (Gateway Authorization Server)
For third-party MCP servers with their own OAuth requirements, Golf Gateway acts as an OAuth 2.0 Authorization Server that proxies authentication between MCP clients and upstream servers:- MCP client discovers OAuth endpoints via the gateway
- Gateway redirects user to authenticate with your platform SSO
- After authentication, user separately authorizes with the third-party MCP server
- Gateway stores the user’s OAuth token for that server
- On subsequent requests, gateway injects the stored token when proxying to the upstream server
Linking IdP to MCP Servers
After configuring an IdP, link it to your in-house MCP servers:- Go to Connections > MCP Servers
- Create or edit an MCP server
- Set Server type to In-house
- Select your IdP from the Identity provider dropdown
- Save
Troubleshooting
Token validation fails
- Verify JWKS endpoint is accessible from your gateway
- Check that API identifiers match the
audclaim in your tokens - Ensure the token hasn’t expired
User identity not extracted
- Verify the JWT contains expected claims (sub, email, name)
- Check gateway logs for token validation errors
RBAC not working as expected
- Verify group names in RBAC policies match JWT claims exactly (case-sensitive)
- Check the 3-layer policy hierarchy (org → gateway → server)
- Use audit logs to see which user identity was extracted
Next Steps
- Set Up Server RBAC - Control server access based on user identity
- Set Up Capability RBAC - Fine-grained tool permissions