Documentation Index
Fetch the complete documentation index at: https://docs.mcphub.app/llms.txt
Use this file to discover all available pages before exploring further.
Overview
MCPHub supports several stacked authentication paths. The same middleware (src/middlewares/auth.ts) evaluates them in order on every authenticated request:
- Bearer key — a static token created from the dashboard or
/api/auth/keys. - MCPHub OAuth access token — issued by MCPHub’s own authorization server (optional).
- Better Auth session cookie — issued by GitHub / Google login (optional).
- JWT — issued by
POST /api/auth/login, sent via thex-auth-tokenheader or?token=query. skipAuthguest — only whensystemConfig.routing.skipAuthistrue, the dashboard API treats unauthenticated calls as a synthetic adminguestuser.
{ username, password, isAdmin }. There are no manager or viewer roles; permissions are binary (admin or not). Social accounts that log in via Better Auth live in a separate mcphub_better_auth_* table but are mapped to the same username / isAdmin shape at request time.
Per-server visibility
Each server has avisibility column (private / public, with group reserved for a future user→group plumbing) that controls which non-admin users see the server in tools/list and the dashboard. Admins always see every server regardless of this setting; the field only affects the filter applied by dataService.filterData to non-admin requests.
'private'(default): only the server’sowner(and admins) can see it. Servers seeded frommcp_settings.jsonmigrate in with'private'to preserve the historical admin-only behaviour.'public': every authenticated user can see and call the server. Use this for servers you want to share across all users of the same MCPHub instance — including social-login users created by Better Auth.'group': reserved. Stored if set but treated as'private'by the filter until user→group membership ships.
'public' from the dashboard.
Login (JWT)
The dashboard and any script that does not present a bearer key uses the JWT flow:x-auth-token header:
JWT_SECRET. If JWT_SECRET is not set, MCPHub generates an ephemeral random secret at startup; this is fine for development but means every restart invalidates outstanding tokens. Set JWT_SECRET explicitly in production.
The first admin account is created at startup by initializeDefaultUser(). If no users exist, MCPHub creates admin and uses ADMIN_PASSWORD if set, otherwise it generates a random password and prints it to the server logs.
Bearer keys
Bearer keys are long-lived static tokens managed at/api/auth/keys (admin only). Each key has:
| Field | Description |
|---|---|
name | Human-readable label. |
token | The secret value sent in the Authorization: Bearer ... header. |
accessType | all (dashboard + MCP), or a scoped value enforced inside sseService.ts for MCP-only access. |
enabled | Disabled keys are ignored without being deleted. |
accessType === 'all' are accepted by the dashboard / management API middleware. Restricted keys are enforced at the MCP transport layer.
The header name can be customized via systemConfig.routing.bearerAuthHeaderName (default Authorization). The legacy systemConfig.routing.bearerAuthKey field is preserved only for one-time migration into the bearer key store.
To globally turn off bearer auth on MCP endpoints, set systemConfig.routing.enableBearerAuth to false.
MCPHub OAuth authorization server
WhensystemConfig.oauthServer.enabled is true, MCPHub exposes an OAuth 2.0 / OIDC-compatible server (@node-oauth/oauth2-server). Endpoints:
| Method & Path | Purpose |
|---|---|
GET /oauth/authorize, POST /oauth/authorize | Authorization endpoint (PKCE supported). |
POST /oauth/token | Token endpoint. |
GET /oauth/userinfo | OIDC-style userinfo (also validates an access token). |
GET /.well-known/oauth-authorization-server | RFC 8414 metadata. |
GET /.well-known/oauth-protected-resource | Protected resource metadata. |
POST /oauth/register, GET/PUT/DELETE /oauth/register/:clientId | RFC 7591 dynamic client registration. |
GET/POST/PUT/DELETE /api/oauth/clients[...] | Admin-only client CRUD. |
src/middlewares/auth.ts.
Better Auth (GitHub / Google / local OIDC)
Better Auth is optional and only loads when configured. Required environment variables (see.env.example):
BETTER_AUTH_URL— public base URL of MCPHub (used to build redirect URIs).GOOGLE_CLIENT_ID/GOOGLE_CLIENT_SECRET— for Google login.GITHUB_CLIENT_ID/GITHUB_CLIENT_SECRET— for GitHub login.OIDC_CLIENT_ID/OIDC_CLIENT_SECRET— for a local OIDC provider.
systemConfig.auth.betterAuth.providers.oidc to mcp_settings.json with:
enabledproviderIddiscoveryUrl- optional
scopes,pkce, andprompt
discoveryUrl should point at the provider’s /.well-known/openid-configuration endpoint. The login page shows a generic Continue with OIDC button when this provider is enabled.
If the dashboard runs behind a different public origin, set systemConfig.auth.betterAuth.trustedOrigins to allow that origin to start the login flow. If trustedOrigins is omitted, MCPHub automatically trusts systemConfig.install.baseUrl when it is set.
Better Auth in MCPHub currently requires PostgreSQL-backed storage (
DB_URL). File-only mode does not support Better Auth sessions, including local OIDC login.${BASE_PATH}${betterAuthConfig.basePath} (default /api/auth/better). A valid Better Auth session cookie counts as authentication for the dashboard API. The mapped MCPHub user is admin only if a local user with the same username exists and is marked admin.
Local OIDC login follows the same mapping rule as GitHub / Google login: MCPHub resolves a local username from the Better Auth session (email ?? name ?? id). If that username does not exist yet, MCPHub auto-creates a non-admin local user. OIDC login never auto-promotes a user to admin.
Read-only mode
SetREADONLY=true to prevent any mutating request from succeeding. The middleware permits:
- All
GETrequests. - All paths starting with
${basePath}/tools/(so OpenAPI tool execution still works).
403.
Skip-auth mode (local development only)
The flag exists purely to make local iteration painless: you can hit the dashboard API fromcurl or a frontend dev server without pasting a JWT. If you need API access from automated tooling instead, prefer a scoped bearer key (/api/auth/keys) over skipAuth.
Password policy
Local user passwords are validated bysrc/utils/passwordValidation.ts (length and character-class rules). Failed validations on POST /api/users or PUT /api/users/:username return 400 with the failed checks under errors.
See also
- Users API — local user CRUD.
- OAuth API — OAuth client management endpoints.
- MCP Settings — where
routing,oauth, andauth.betterAuthconfiguration lives.