Skip to main content
Configure your identity provider to authenticate users accessing MCP servers through Golf Gateway. Golf Gateway supports Auth0, Microsoft Entra ID (Azure AD), and Descope.

Prerequisites

Create a Single Page Application in Auth0.You’ll need:
  • Domain (e.g., your-tenant.auth0.com)
  • Client ID
  • Client Secret (for group sync)

Configure Golf Gateway

  1. Go to Settings > Identity Provider
  2. Select Auth0 as provider type
  3. Enter your Auth0 domain (e.g., your-tenant.auth0.com)
  4. Enter API identifiers for audience validation
  5. (Optional) Add M2M credentials for group sync
  6. Click Save

Enable Group Sync

Group sync allows Golf Gateway to use your identity provider’s groups/roles for RBAC.
Create a Machine-to-Machine application with Management API access. See Create M2M Apps in Auth0 documentation.Required scopes: read:users, read:rolesAdd the M2M credentials to your Golf Gateway configuration.
Auth0 uses “roles” instead of “groups”. Golf Gateway maps Auth0 roles to RBAC groups automatically.

Next Steps