Skip to content

Commit 3525a59

Browse files
feat(Asgardeo): update
1 parent 9a2247b commit 3525a59

File tree

2 files changed

+44
-13
lines changed

2 files changed

+44
-13
lines changed

docs/tutorials/todo-manager/README.mdx

Lines changed: 42 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -280,13 +280,6 @@ Keycloak will include the granted scopes in the access token's `scope` claim.
280280
- Create the resource
281281

282282
3. Create roles:
283-
- Navigate to **Application > MCP Inspector Application > Roles tab**
284-
- Select **Application Role** as the audience type, then click **New Role**
285-
- Create an `Admin` role and attach all three scopes
286-
- Create a `User` role and attach only the `create:todos` scope
287-
288-
OR
289-
290283
- Use the **User Management > Roles** to create roles and assign scopes directly.
291284
- Click **New Role** role
292285
- Provide the role name (e.g., `Admin` or `User`) in **Basic Details** section
@@ -295,6 +288,12 @@ Keycloak will include the granted scopes in the access token's `scope` claim.
295288
- Select the scopes you want to assign to this role (e.g., `create:todos`, `read:todos`, `delete:todos`)
296289
- Click **Finish** to create the role
297290

291+
If you have created the application in prior
292+
- Navigate to **Application > MCP Inspector Application > Roles tab**
293+
- Select **Application Role** as the audience type, then click **New Role**
294+
- Create an `Admin` role and attach all three scopes
295+
- Create a `User` role and attach only the `create:todos` scope
296+
298297
4. Assign roles to users:
299298
- Go to **User Management > Roles**
300299
- Select the role you created (e.g., `Admin` or `User`) and move to **Users** tab
@@ -680,6 +679,42 @@ Since Logto does not support Dynamic Client Registration yet, you will need to m
680679
7. Go back to the MCP inspector and paste the "App ID" value in the "OAuth Configuration" section under "Client ID".
681680
8. Enter the value `{"scope": "create:todos read:todos delete:todos", "resource": "https://todo.mcp-server.app"}` in the "Auth Params" field. This will ensure that the access token returned by Logto contains the necessary scopes to access the todo manager.
682681

682+
</TabItem>
683+
<TabItem value="asgardeo" label="Asgardeo">
684+
685+
[Asgardeo](https://wso2.com/asgardeo) is a cloud-native identity as a service (IDaaS) platform that supports OAuth 2.0 and OpenID Connect (OIDC), enabling secure identity and access management for your applications.
686+
687+
While Asgardeo supports dynamic client registration via a standard API, the endpoint is protected and requires an access token with the necessary permissions. In this tutorial, we’ll register the client manually through the Asgardeo Console.
688+
689+
:::note
690+
If you don’t have an Asgardeo account, you can [sign up for free](https://asgardeo.io).
691+
:::
692+
693+
Follow these steps to configure Asgardeo for MCP Inspector:
694+
695+
1. Log in to the [Asgardeo Console](https://console.asgardeo.io) and select your organization.
696+
697+
2. Create a new application:
698+
- Go to **Applications****New Application**
699+
- Choose **Single-Page Application**
700+
- Enter an application name like `MCP Inspector`
701+
- In the **Authorized Redirect URLs** field, paste the **Redirect URL** copied from MCP Inspector client application(e.g:`http://localhost:6274/oauth/callback`)
702+
- Click **Create**
703+
704+
3. Configure the protocol settings:
705+
- Under the **Protocol** tab:
706+
- Copy the **Client ID** that was auto generated.
707+
- Ensure switching to `JWT` for the `Token Type` in **Access Token** section
708+
- Click **Update**
709+
710+
4. In MCP Inspector client application:
711+
- Open the **OAuth Configuration** section
712+
- Paste the copied **Client ID**
713+
- Enter the following in the **Auth Params** field to request the necessary scopes:
714+
715+
```json
716+
{ "scope": "openid profile email" }
717+
```
683718
</TabItem>
684719
<TabItem value="oauth-oidc" label="OAuth 2.0 / OIDC">
685720

docs/tutorials/whoami/README.mdx

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -432,18 +432,14 @@ Follow these steps to configure Asgardeo for MCP Inspector:
432432

433433
2. Create a new application:
434434
- Go to **Applications****New Application**
435-
- Choose **Standard-Based Application**
436-
- In the **Protocol** section, select **OpenID Connect (OIDC)**
435+
- Choose **Single-Page Application**
437436
- Enter an application name like `MCP Inspector`
437+
- In the **Authorized Redirect URLs** field, paste the **Redirect URL** copied from MCP Inspector client application(e.g:`http://localhost:6274/oauth/callback`)
438438
- Click **Create**
439439

440440
3. Configure the protocol settings:
441441
- Under the **Protocol** tab:
442442
- Copy the **Client ID** that was auto generated.
443-
- Ensure **Authorization Code** grant is enabled
444-
- In the **Authorized Redirect URLs** field, paste the **Redirect URL** copied from MCP Inspector (e.g:`http://localhost:6274/oauth/callback`)
445-
- In the **Allowed Origins** field, add the base URL of MCP Inspector (e.g:`http://localhost:6274`) to allow browser-based requests
446-
- Ensure enabling `Public client` in **Client Authentication** section
447443
- Ensure switching to `JWT` for the `Token Type` in **Access Token** section
448444
- Click **Update**
449445

0 commit comments

Comments
 (0)