mcp server support API auth through OAS3 security schemes || mcp server support API auth through OAS3 security schemes
#2241
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Ⅰ. Describe what this PR did
This PR introduces comprehensive API authentication capabilities to the Higress MCP Server plugin. These enhancements allow for secure and flexible integration with backend REST APIs that employ various authentication strategies, including HTTP Basic, HTTP Bearer, and API Key authentication. A key feature is the introduction of transparent credential passthrough.
Motivation/Background
As AI agents and MCP-enabled tools interact with an increasingly diverse set of external APIs, robust and flexible authentication mechanisms are crucial. This PR addresses the need to:
Key Changes
server.securitySchemes):securitySchemesallowing users to define reusable authentication methods.http(withscheme: basicorscheme: bearer)apiKey(within: headerorin: query)oauth2andopenIdConnect(OIDC) is planned.requestTemplate.security):securityblock within theirrequestTemplateto apply a definedsecuritySchemewhen the MCP Server calls the backend REST API.defaultCredentialfrom the scheme for specific tools.tools[].security):securityconfiguration block (tools[].security).tools[].security.id: Specifies the scheme the MCP client is expected to use. The MCP Server uses this to extract the client's credential.tools[].security.passthrough: true: Enables transparent credential passthrough. If true, the credential extracted from the client request is used for the backend API call, applied according to the scheme defined inrequestTemplate.security.Associated SDK changes:
017f47f
c8f491d
Ⅱ. Does this pull request fix one issue?
Ⅲ. Why don't you add test cases (unit test/integration test)?
Ⅳ. Describe how to verify it
Ⅴ. Special notes for reviews
Ⅰ. Describe what this PR did
This PR introduces comprehensive API authentication capabilities to the Higress MCP Server plugin. These enhancements allow for secure and flexible integration with backend REST APIs that employ various authentication strategies, including HTTP Basic, HTTP Bearer, and API Key authentication. A key feature is the introduction of transparent credential passthrough.
Motivation/Background
As AI agents and MCP-enabled tools interact with an increasingly diverse set of external APIs, robust and flexible authentication mechanisms are crucial. This PR addresses the need to:
Key Changes
server.securitySchemes):securitySchemesallowing users to define reusable authentication methods.http(withscheme: basicorscheme: bearer)apiKey(within: headerorin: query)oauth2andopenIdConnect(OIDC) is planned.requestTemplate.security):securityblock within theirrequestTemplateto apply a definedsecuritySchemewhen the MCP Server calls the backend REST API.defaultCredentialfrom the scheme for specific tools.tools[].security):securityconfiguration block (tools[].security).tools[].security.id: Specifies the scheme the MCP client is expected to use. The MCP Server uses this to extract the client's credential.tools[].security.passthrough: true: Enables transparent credential passthrough. If true, the credential extracted from the client request is used for the backend API call, applied according to the scheme defined inrequestTemplate.security.Associated SDK changes:
017f47f
c8f491d
Ⅱ. Does this pull request fix one issue?
Ⅲ. Why don't you add test cases (unit test/integration test)?
Ⅳ. Describe how to verify it
Ⅴ. Special notes for reviews