workos-authed-mcp-server

publicandopen/workos-authed-mcp-server

3.2

If you are the rightful owner of workos-authed-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to dayong@mcphub.com.

This document provides a structured overview of deploying an authenticated Model Context Protocol (MCP) server using LiquidMetal Raindrop with WorkOS authentication.

Tools
1
Resources
0
Prompts
0

WorkOS Authenticated MCP Server Demo

A demonstration of deploying an authenticated MCP (Model Context Protocol) server using LiquidMetal Raindrop.

Features

This demo implements a protected MCP server with WorkOS authentication, exposing:

  • Addition Tool - Adds two numbers with notification support
  • Greeting Resource - Dynamic greeting generator using URI templates

Quick Start

  1. Clone the repository:

    git clone https://github.com/liquidmetal-ai/liquidmetal-demos.git
    
  2. Navigate to this directory:

    cd liquidmetal-demos/workos-authed-mcp-server
    
  3. Install dependencies:

    npm install
    
  4. Build and deploy:

    raindrop build deploy --start
    
  5. Get your deployment URL:

    raindrop build find
    
  6. Add https:// prefix and /mcp suffix to the URL from step 5

  7. Configure the URL in your MCP client

Authentication

The MCP server is configured with visibility = "protected" in raindrop.manifest, enabling OAuth authentication via WorkOS AuthKit. Users must authenticate before accessing the server's tools and resources.

mcp_service "mcp" {
    visibility = "protected"
    authorization_server = "https://authkit.liquidmetal.run"
}

Project Structure

  • src/mcp/index.ts - MCP server implementation with tools and resources
  • src/_app/auth.ts - JWT verification and authorization hooks
  • raindrop.manifest - Raindrop deployment configuration

Learn More