2.12.4
This guide shows you how to secure your FastMCP server using Auth0 OAuth. While Auth0 does have support for Dynamic Client Registration, it is not enabled by default so this integration uses the OIDC Proxy pattern to bridge Auth0’s dynamic OIDC configuration with MCP’s authentication requirements.
Configuration
Prerequisites
Before you begin, you will need:- An Auth0 Account with access to create Applications
- Your FastMCP server’s URL (can be localhost for development, e.g.,
http://localhost:8000)
Step 1: Create an Auth0 Application
Create an Application in your Auth0 settings to get the credentials needed for authentication:1
Navigate to Applications
Go to Applications → Applications in your Auth0 account.Click ”+ Create Application” to create a new application.
2
Create Your Application
- Name: Choose a name users will recognize (e.g., “My FastMCP Server”)
- Choose an application type: Choose “Single Page Web Applications”
- Click Create to create the application
3
Configure Your Application
Select the “Settings” tab for your application, then find the “Application URIs” section.
- Allowed Callback URLs: Your server URL +
/auth/callback(e.g.,http://localhost:8000/auth/callback) - Click Save to save your changes
4
Save Your Credentials
After creating the app, in the “Basic Information” section you’ll see:
- Client ID: A public identifier like
tv2ObNgaZAWWhhycr7Bz1LU2mxlnsmsB - Client Secret: A private hidden value that should always be stored securely
5
Select Your Audience
Go to Applications → APIs in your Auth0 account.
- Find the API that you want to use for your application
- API Audience: A URL that uniquely identifies the API
Step 2: FastMCP Configuration
Create your FastMCP server using theAuth0Provider.
server.py
Testing
Running the Server
Start your FastMCP server with HTTP transport to enable OAuth flows:Testing with a Client
Create a test client that authenticates with your Auth0-protected server:test_client.py
- Your browser will open to Auth0’s authorization page
- After you authorize the app, you’ll be redirected back
- The client receives the token and can make authenticated requests
Production Configuration
New in version2.13.0
For production deployments with persistent token management across server restarts, configure jwt_signing_key, and client_storage:
server.py
Parameters (
jwt_signing_key and client_storage) work together to ensure tokens and client registrations survive server restarts. Wrap your storage in FernetEncryptionWrapper to encrypt sensitive OAuth tokens at rest - without it, tokens are stored in plaintext. Store secrets in environment variables and use a persistent storage backend like Redis for distributed deployments.For complete details on these parameters, see the OAuth Proxy documentation.The client caches tokens locally, so you won’t need to re-authenticate for subsequent runs unless the token expires or you explicitly clear the cache.

