Skip to content

Commit 4b6798a

Browse files
committed
feat: introduce unique TypeORM connection name for OAuth store to avoid clashes
refactor: use table name prefix for OAuth entities to prevent collisions
1 parent a6b0a7f commit 4b6798a

16 files changed

+316
-105
lines changed

docs/built-in-authorization-server.md

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,25 @@ The `McpAuthModule` provides a complete OAuth 2.1 compliant Identity Provider (I
1414

1515
## Quick Start
1616

17-
### Basic Setup
17+
The fastest way to try out Remote MCP servers with built-in authentication is by deploying on Railway with the template below:
18+
19+
[![Deploy on Railway](https://railway.com/button.svg)](https://railway.com/deploy/G6BLGK?referralCode=XAdIhJ)
20+
21+
For the deployment you need the following:
22+
23+
1. Create a [New GitHub App](https://github.com/settings/applications/new), required for user authentication
24+
* For the "Authorization callback URL" add the placeholder `http://localhost:3000/auth/callback` and create the app, you will update it at step 4.
25+
2. Add the GitHub Client ID and Client Secret in the Deploy panel on Railway, and click "Deploy"
26+
3. After the app is deployed, the Custom Domain is available in the railway deployment settings page.
27+
4. Update the "Authorization callback URL" of the GitHub app to the custom domain with the postfix as shown here: `https://<custom-domain>.up.railway.app/auth/callback`.
28+
29+
**And you are ready to roll!**
30+
31+
Open MCP Inspector at `https://<custom-domain>.up.railway.app/mcp` to see the available resources and tools.
32+
33+
The code of the deployed project is in this GitHub repository: [rekog-labs/mcp-nest-auth-starter](https://github.com/rekog-labs/mcp-nest-auth-starter).
34+
35+
## Setting up a new project
1836

1937
Complete working example from the playground:
2038

0 commit comments

Comments
 (0)