publicandopen/workos-authed-mcp-server
If you are the rightful owner of workos-authed-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.
This document provides a structured overview of deploying an authenticated Model Context Protocol (MCP) server using LiquidMetal Raindrop with WorkOS authentication.
WorkOS Authenticated MCP Server Demo
A demonstration of deploying an authenticated MCP (Model Context Protocol) server using LiquidMetal Raindrop.
Features
This demo implements a protected MCP server with WorkOS authentication, exposing:
- Addition Tool - Adds two numbers with notification support
- Greeting Resource - Dynamic greeting generator using URI templates
Quick Start
-
Clone the repository:
git clone https://github.com/liquidmetal-ai/liquidmetal-demos.git -
Navigate to this directory:
cd liquidmetal-demos/workos-authed-mcp-server -
Install dependencies:
npm install -
Build and deploy:
raindrop build deploy --start -
Get your deployment URL:
raindrop build find -
Add
https://prefix and/mcpsuffix to the URL from step 5 -
Configure the URL in your MCP client
Authentication
The MCP server is configured with visibility = "protected" in raindrop.manifest, enabling OAuth authentication via WorkOS AuthKit. Users must authenticate before accessing the server's tools and resources.
mcp_service "mcp" {
visibility = "protected"
authorization_server = "https://authkit.liquidmetal.run"
}
Project Structure
src/mcp/index.ts- MCP server implementation with tools and resourcessrc/_app/auth.ts- JWT verification and authorization hooksraindrop.manifest- Raindrop deployment configuration