You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Select **Application Role** as the audience type, then click **New Role**
294
+
- Create an `Admin` role and attach all three scopes
295
+
- Create a `User` role and attach only the `create:todos` scope
296
+
298
297
4. Assign roles to users:
299
298
- Go to **User Management > Roles**
300
299
- Select the role you created (e.g., `Admin` or `User`) and move to **Users** tab
@@ -680,6 +679,42 @@ Since Logto does not support Dynamic Client Registration yet, you will need to m
680
679
7. Go back to the MCP inspector and paste the "App ID" value in the "OAuth Configuration" section under "Client ID".
681
680
8. Enter the value `{"scope": "create:todos read:todos delete:todos", "resource": "https://todo.mcp-server.app"}` in the "Auth Params" field. This will ensure that the access token returned by Logto contains the necessary scopes to access the todo manager.
682
681
682
+
</TabItem>
683
+
<TabItemvalue="asgardeo"label="Asgardeo">
684
+
685
+
[Asgardeo](https://wso2.com/asgardeo) is a cloud-native identity as a service (IDaaS) platform that supports OAuth 2.0 and OpenID Connect (OIDC), enabling secure identity and access management for your applications.
686
+
687
+
While Asgardeo supports dynamic client registration via a standard API, the endpoint is protected and requires an access token with the necessary permissions. In this tutorial, we’ll register the client manually through the Asgardeo Console.
688
+
689
+
:::note
690
+
If you don’t have an Asgardeo account, you can [sign up for free](https://asgardeo.io).
691
+
:::
692
+
693
+
Follow these steps to configure Asgardeo for MCP Inspector:
694
+
695
+
1. Log in to the [Asgardeo Console](https://console.asgardeo.io) and select your organization.
696
+
697
+
2. Create a new application:
698
+
- Go to **Applications** → **New Application**
699
+
- Choose **Single-Page Application**
700
+
- Enter an application name like `MCP Inspector`
701
+
- In the **Authorized Redirect URLs** field, paste the **Redirect URL** copied from MCP Inspector client application(e.g:`http://localhost:6274/oauth/callback`)
702
+
- Click **Create**
703
+
704
+
3. Configure the protocol settings:
705
+
- Under the **Protocol** tab:
706
+
- Copy the **Client ID** that was auto generated.
707
+
- Ensure switching to `JWT` for the `Token Type` in **Access Token** section
708
+
- Click **Update**
709
+
710
+
4. In MCP Inspector client application:
711
+
- Open the **OAuth Configuration** section
712
+
- Paste the copied **Client ID**
713
+
- Enter the following in the **Auth Params** field to request the necessary scopes:
Copy file name to clipboardExpand all lines: docs/tutorials/whoami/README.mdx
+2-6Lines changed: 2 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -432,18 +432,14 @@ Follow these steps to configure Asgardeo for MCP Inspector:
432
432
433
433
2. Create a new application:
434
434
- Go to **Applications** → **New Application**
435
-
- Choose **Standard-Based Application**
436
-
- In the **Protocol** section, select **OpenID Connect (OIDC)**
435
+
- Choose **Single-Page Application**
437
436
- Enter an application name like `MCP Inspector`
437
+
- In the **Authorized Redirect URLs** field, paste the **Redirect URL** copied from MCP Inspector client application(e.g:`http://localhost:6274/oauth/callback`)
438
438
- Click **Create**
439
439
440
440
3. Configure the protocol settings:
441
441
- Under the **Protocol** tab:
442
442
- Copy the **Client ID** that was auto generated.
443
-
- Ensure **Authorization Code** grant is enabled
444
-
- In the **Authorized Redirect URLs** field, paste the **Redirect URL** copied from MCP Inspector (e.g:`http://localhost:6274/oauth/callback`)
445
-
- In the **Allowed Origins** field, add the base URL of MCP Inspector (e.g:`http://localhost:6274`) to allow browser-based requests
446
-
- Ensure enabling `Public client` in **Client Authentication** section
447
443
- Ensure switching to `JWT` for the `Token Type` in **Access Token** section
0 commit comments