docs: update MCP authz server guide for Keycloak 26.6 CIMD support#1468
docs: update MCP authz server guide for Keycloak 26.6 CIMD support#1468Copilot wants to merge 14 commits intoISSUE-45284from
Conversation
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
|
@copilot could you add the warning showing that OAuth Client ID Metadata Document support is still experimental feature, so it might cause breaking change about that in the future version of keycloak {project_name}. |
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
Added in 4b59eb3. Changed the |
|
@copilot Could you change the section name |
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
Done in 9a063e1. Renamed both section headings:
|
|
@copilot Could you change the sentense to |
…tions Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
|
@copilot could you add explanation and the way of configuration about setting items CONFIG_MIN_CACHE_TIME, CONFIG_MAX_CACHE_TIME and CONFIG_UPPER_LIMIT_METADATA_BYTES defined in |
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
Added in e60051b. Added a new "System-wide settings for the Client ID Metadata Document executor" subsection documenting |
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
|
@copilot could you move the following sentence to the end of the section "Setting up the client policy for OAuth Client ID Metadata Document" ? |
|
@copilot to the end of the document, could you add how to configure keycloak to support MCP client of microsoft visual studio code that support OAuth Client ID Metadata Document ? |
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
Added in ae729d5. Added a new "Visual Studio Code integration" section at the end of the document with:
Warning Firewall rules blocked me from connecting to one or more addresses (expand for details)I tried to connect to the following addresses, but was blocked by firewall rules:
If you need me to access, download, or install something from one of these locations, you can either:
|
|
@copilot VS Code likely has both web-based redirects using HTTPS and potentially localhost callbacks for desktop usage. Could you only consider localhost callbacks for desktop usage and rewrite the section "Visual Studio Code integration |
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
Rewritten in 3d12ac9. The section is now titled "Visual Studio Code desktop integration" and focuses on localhost callbacks for desktop usage. Key changes:
|
|
@copilot could you omit |
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
Done in cc8efef. Removed all references to |
|
@copilot Could you replace |
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
|
@copilot In section "Setting up the client profile for VS Code desktop", step 5, could you add |
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
|
@copilot In section "Standards Compliance MCP requires" could you add the warning showing that OAuth Client ID Metadata Document support by {project_name} is still experimental feature? |
Co-authored-by: tnorimat <25092005+tnorimat@users.noreply.github.com>
Done in 167841e. Added a |
Keycloak 26.6 supports OAuth Client ID Metadata Document via PR keycloak#45285. Updates
mcp-authz-server.adocto reflect this.Description
WARNINGblock noting that this support is an experimental feature in {project_name} that may introduce breaking changes in future versionsclient_idis a URL matching the configured scheme/domain, followed by a summary of how the overall configuration works togethermin-cache-time,max-cache-time, andupper-limit-metadata-bytesSPI options that control caching and metadata size limits, configured via--spi-client-policy-executor--client-id-metadata-document<property>=<value>command-line options (not configurable through the Admin Console)WARNINGblock noting that the OAuth Client ID Metadata Document support is an experimental feature in {project_name} that may introduce breaking changes in future versions, and documenting thecimdfeature flag (--features=cimd) requirementcimdfeature flaghttp://127.0.0.1:<port>/callback) for the OAuth redirect, and why this requiresRestrict same domain: OFFvscode.devand127.0.0.1, withRestrict same domain: OFF(VS Code desktop uses localhost redirect URIs not on thevscode.devdomain) andOnly Allow Confidential Client: OFF(VS Code desktop is a public client)client-id-uricondition targetinghttpsURIs on thevscode.devdomain💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.