loading…
Search for a command to run...
loading…
A FastMCP server template with full MCP authentication via Descope, designed for easy deployment on Render. It provides a foundation for building secure, authen
A FastMCP server template with full MCP authentication via Descope, designed for easy deployment on Render. It provides a foundation for building secure, authenticated MCP servers with scope-based access control.
A simple FastMCP server template for Render, with full MCP authentication by Descope.
DescopeProvider and the descope-mcp SDKhello) that returns "Hello, world!" and enforces tool-level scope requirements (mcp:greet)render.yaml Blueprint for easy deploymentNote: This template deploys on Render's free plan by default. Free services spin down after 15 minutes of inactivity, causing cold starts of 30-60 seconds on the next request. MCP clients may time out during this delay. For reliable use, upgrade to a paid plan in the Render Dashboard — the Starter plan keeps your service running continuously.
Log in to the Descope Console.
Navigate to Agentic Identity Hub → MCP Servers.
Click + MCP Server to create a new MCP server and give it a name.
Under MCP Client Registration, enable Client ID Metadata Documents (CIMD) and Dynamic Client Registration (DCR). Optionally, you can restrict allowed domains for clients registering via CIMD (e.g. https://claude.ai) - feel free to leave this field blank.
Under MCP Server Scopes, add a scope named mcp:greet and a simple description like "Greet the user".
Click Create.
Expand the Connect your MCP server to Descope section on the confirmation page
Copy the Well-Known URL. It looks like this:
https://api.descope.com/v1/apps/agentic/.../.well-known/openid-configuration
This is your DESCOPE_CONFIG_URL.
Note: Descope issues tokens following Resource Indicators (RFC 8707), as required by the MCP spec. When you're deploying on Render or running locally, you'll need to update the MCP Server URLs section.
Ensure that you've completed the Descope Setup step prior to developing locally, as you'll need your
DESCOPE_CONFIG_URL.
Fork this repository to your GitHub account.
Click Deploy to Render (or fork this repo on GitHub and import it as a Blueprint in your Render account).
In your Specified Configurations, set the environment variable to the value obtained in the Descope Setup step:
| Key | Value |
|---|---|
DESCOPE_CONFIG_URL |
Your Well-Known URL from the Descope Console |
Click Deploy Blueprint.
Once live, copy your Render service URL (e.g. https://<your-project>.onrender.com), append /mcp, and add it to MCP Server URLs in the Descope Console.
You now have a remotely hosted MCP Server with the full auth spec supported!
Ensure that you've completed the Descope Setup step prior to developing locally, as you'll need your
DESCOPE_CONFIG_URL.
First, fork this repo to your GitHub account, then follow the instructions below to set up your environment.
# Install dependencies
uv sync
# Set required environment variables
export DESCOPE_CONFIG_URL="<your URL from Descope>"
export SERVER_URL="http://localhost:8000"
# Run the server
uv run server.py --transport http --port 8000
When you run this locally, your server will run at http://localhost:8000/mcp.
| Tool | Description | Required scope |
|---|---|---|
hello |
Returns "Hello, world!" |
mcp:greet |
Now that you're all set up, there's a few more steps we recommend if you're taking your MCP Server to production.
Replace or extend the hello tool in server.py with your own logic. For each new tool:
mcp:your-scope).@mcp.tool() decorator.require_scopes(token, ["mcp:your-scope"]) inside the tool body to enforce access control.@mcp.tool()
def my_tool() -> str:
token = validate_token()
require_scopes(token, ["mcp:your-scope"])
return "your result"
By default, your service is reachable at https://<your-project>.onrender.com. To use a custom domain:
https://mcp.yourdomain.com/mcp).RENDER_EXTERNAL_URL is set automatically by Render and will reflect the primary domain.The require_scopes() check is intentionally opt-in per tool so you can add unauthenticated tools if needed. For a production server, it is good practice to call require_scopes() in every tool. You can also centralize this by writing a helper that wraps validate_token() and require_scopes() and calling it at the top of each tool handler.
/.well-known/oauth-authorization-server when trying to connect to your MCP Server.DescopeProvider validates the JWT using Descope's JWKS endpoint before any tool is called.validate_token() parses the claims and require_scopes() checks that mcp:greet is present, returning an error to the client if not.Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"descope-auth-mcp-server-template": {
"command": "npx",
"args": []
}
}
}