docs/en/documentation/configuration/authentication/generic.md
The Generic Auth Service allows you to integrate with any OpenID Connect (OIDC)
compliant identity provider (IDP). It discovers the JWKS (JSON Web Key Set) URL
either through the provider's /.well-known/openid-configuration endpoint or
directly via the provided authorizationServer.
To configure this auth service, you need to provide the audience (typically
your client ID or the intended audience for the token), the
authorizationServer of your identity provider, and optionally a list of
scopesRequired that must be present in the token's claims.
The Generic Auth Service supports two distinct modes of operation:
This mode is used for Toolbox's native authentication/authorization features. It
is active when you reference the auth service in a tool's configuration and
mcpEnabled is set to false.
<name>_token
(e.g., my-generic-auth_token).When a request is received in this mode, the service will:
<name>_token header.authorizationServer.exp) and audience (aud).scope claim.kind: authServices
name: my-generic-auth
type: generic
audience: ${YOUR_OIDC_AUDIENCE}
authorizationServer: https://your-idp.example.com
# mcpEnabled: false
scopesRequired:
- read
- write
To use this auth service for Authenticated Parameters or Authorized Invocations, reference it in your tool configuration:
kind: tool
name: secure_query
type: postgres-sql
source: my-pg-instance
statement: |
SELECT * FROM data WHERE user_id = $1
parameters:
- name: user_id
type: strings
description: Auto-populated from token
authServices:
- name: my-generic-auth
field: sub # Extract 'sub' claim from JWT
authRequired:
- my-generic-auth # Require valid token for invocation
This mode enforces global authentication for all MCP endpoints. It is active
when mcpEnabled is set to true in the auth service configuration.
Authorization: Bearer <token>
header.When a request is received in this mode, the service will:
Authorization header after Bearer prefix.authorizationServer.exp) and audience (aud).scope claim.authorizationServer's
OIDC configuration).active.exp) and audience (aud).scope field.kind: authServices
name: my-generic-auth
type: generic
audience: ${YOUR_TOKEN_AUDIENCE}
authorizationServer: https://your-idp.example.com
mcpEnabled: true
scopesRequired:
- read
- write
{{< notice tip >}} Use environment variable replacement with the format ${ENV_NAME} instead of hardcoding your secrets into the configuration file. {{< /notice >}}
| field | type | required | description |
|---|---|---|---|
| type | string | true | Must be "generic". |
| audience | string | true | The expected audience (aud claim) in the JWT token. This ensures the token was minted specifically for your application. |
| authorizationServer | string | true | The base URL of your OIDC provider. The service will append /.well-known/openid-configuration to discover the JWKS URI. HTTP is allowed but logs a warning. |
| mcpEnabled | bool | false | Indicates if MCP endpoint authentication should be applied. Defaults to false. |
| scopesRequired | []string | false | A list of required scopes that must be present in the token's scope claim to be considered valid. |