Identity and authentication is a category that splits cleanly into two use cases: managing identity platforms through MCP (administering users, groups, applications, and policies in Okta, Auth0, Keycloak, etc.) and securing MCP servers with identity (adding OAuth 2.1 / OIDC authentication to any MCP server). Both have matured significantly since March 2026. The category spans seven areas: enterprise identity platforms (Okta, Auth0, Keycloak, Casdoor, Asgardeo), cloud IAM (Microsoft Entra ID, AWS Cognito), open-source identity (FusionAuth, Authentik), standards-based identity (SCIM relay, OIDC implementations), auth proxies (MCP Auth Proxy, mcp-front, AthenZ, WSO2 Open MCP Auth Proxy), developer auth platforms (Clerk, Stytch), and MCP authorization specification tooling.

The headline finding: Okta for AI Agents launches April 30, 2026 — the biggest enterprise identity milestone yet, with Agent Gateway providing a centralized control plane, virtual MCP server for aggregating tools from Okta’s MCP Registry, and full audit/observability for all agent-resource interactions. Auth0 launched Auth for MCP in Early Access — extending OAuth 2.1 and OIDC directly into the MCP ecosystem with Custom Token Exchange for downstream API access on behalf of users. Two major new entrants — FusionAuth’s official MCP server exposes 300+ tools (every API endpoint), and Authentik ships 245 tools across four server variants. Keycloak 26.6.0 adds experimental CIMD support, making Keycloak a spec-compliant authorization server for MCP. Microsoft MCP Server for Enterprise entered public preview with read-only Entra identity scenarios via Graph API. The security landscape intensified — Obsidian Security disclosed one-click account takeover vulnerabilities in MCP OAuth implementations (patched late 2025), CVE-2026-32211 exposed a CVSS 9.1 auth bypass in Azure MCP, and research shows 38% of MCP servers still lack authentication.

Category: Security & Compliance

Enterprise Identity Platforms

Okta (Official)

Server Stars Language Tools Transport
okta/okta-mcp-server 24 Python 20+ stdio

okta/okta-mcp-server (24 stars, Python, Apache 2.0) is the official Okta MCP server. Twenty-plus tools across users, groups, applications, and policies:

User managementlist_users, get_user, create_user, update_user, deactivate_user, delete_deactivated_user. Group operationslist_groups, get_group, create_group, update_group, delete_group, add_user_to_group, remove_user_from_group. Applicationslist_applications, get_application. Policieslist_okta_policy_rules, get_okta_policy_rule.

The standout feature is interactive confirmation via elicitation — destructive operations (deletes, deactivations) prompt the user for confirmation through the MCP Elicitation API before proceeding, with automatic fallback for clients that don’t yet support elicitation. This is the right safety model for identity management, where accidentally deleting a user or deactivating an application can have cascading consequences.

Authentication uses Device Authorization Grant (interactive, browser-based) or Private Key JWT (browserless, server-to-server). Built on Okta’s official Python SDK.

April 2026 milestone — Okta for AI Agents GA April 30: Okta announced the biggest enterprise identity+MCP initiative yet. Agent Gateway serves as a centralized control plane to secure AI agent access to resources, with a virtual MCP server capability that aggregates and exposes tools from Okta’s MCP Registry. All agent-resource interactions are logged for audit and observability. Agent Integrations in the OIN extend the 8,200+ integration catalog to include AI agent platforms (Boomi, DataRobot, Google Vertex AI). Agent credentials can be vaulted and automatically rotated. Cross App Access integration into the MCP specification provides additional security and visibility. This positions Okta as the first major identity vendor to ship a comprehensive agent governance platform built around MCP.

Okta (Fctr Community)

Server Stars Language Tools Transport
fctr-id/okta-mcp-server 38 Python 20+ stdio, HTTP, SSE

fctr-id/okta-mcp-server (31 stars, Python, 120 commits) is a community Okta server built specifically for IAM engineers, security teams, and Okta administrators.

Specialized analysis toolsanalyze_user_app_access (answers “Can user X access app Y?” — the most common question Okta admins face), analyze_login_risk (behavioral analysis with VPN/Tor detection and geographic impossibility checks). Standard management — full user, group, application, policy, network zone, and event log tools.

What makes this distinct from the official server: it’s built on Anthropic’s MCP architecture pattern with dual-mode operation, supports multiple AI providers (OpenAI, Azure, Anthropic, Google Vertex AI), and ships with Docker deployment. The Fctr team also maintains a successor repository (fctr-okta-mcp-server) with agentic API discovery and guided code execution. For day-to-day Okta administration, this is the more capable option.

Auth0

Server Stars Language Tools Transport
auth0/auth0-mcp-server 97 TypeScript 18+ stdio

auth0/auth0-mcp-server (100 stars, TypeScript, MIT, 78+ commits, v0.1.0-beta.8 February 2026) is the official Auth0 MCP server and the most polished identity platform server in the category. Eighteen-plus tools across six categories:

Applications (4 tools) — create, list, update, delete Auth0 applications. Resource Servers (4 tools) — API resource management. Actions (5 tools) — deploy Auth0 Actions for extensibility logic. Forms (5 tools) — configure Auth0 Forms. Logs (2 tools) — query tenant logs. Application Grants (1 tool) — manage client grants.

The security model is thoughtful: sensitive fields are automatically redacted with [REDACTED] in responses (preventing accidental credential exposure through LLM context), credentials are stored in the system keychain (never in plain text), and tool access can be restricted using --tools (whitelist specific tools) and --read-only (disable write operations) flags.

Authentication uses Device Authorization Flow with secure keychain storage. Supports Claude Desktop, Windsurf, Cursor, VS Code, and Gemini CLI (added in v0.1.0-beta.8). Still in beta but actively maintained. The developer experience is the best in the identity MCP category.

New: Auth for MCP (Early Access) — Auth0 launched a separate product extending OAuth 2.1 and OIDC directly into the MCP ecosystem. Key capabilities: MCP Server Authorization (protect MCP servers via Auth0 Universal Login with social, enterprise, and custom identity providers, full MFA and attack protection), standards-based discovery and registration (automatic endpoint discovery and Dynamic Client Registration), and Custom Token Exchange (MCP servers exchange tokens for new, short-lived access tokens scoped to internal APIs, enabling servers to call downstream APIs on behalf of users while Auth0 governs access centrally). This is a significant step beyond the management MCP server — Auth0 is now positioning itself as the authorization layer for the entire MCP ecosystem. Contact Auth0 TAM or submit Early Access form to participate.

Keycloak (sshaaf)

Server Stars Language Tools Transport
sshaaf/keycloak-mcp-server 39 Java 15+ SSE

sshaaf/keycloak-mcp-server (39 stars, Java, MIT, 75 commits) is the most mature Keycloak MCP server. Built with Quarkus for cloud-native deployment including OpenShift/Kubernetes, multi-architecture container images, and GraalVM native image support.

Covers users, realms, clients, roles, groups, IDPs, and authentication flow management. Also integrates with Keycloak Discourse for searching community knowledge.

Authentication uses JWT Bearer tokens — each user obtains their own JWT from Keycloak and configures it in their MCP client. This is the right approach for a Keycloak server since Keycloak is itself the identity provider. V0.3.0 released December 2025.

Keycloak 26.6.0 (April 2026) — CIMD support for MCP: Keycloak now includes experimental support for Client ID Metadata Documents (CIMD), allowing it to serve as an authorization server for MCP version 2025-11-25 or later. CIMD is the MCP spec’s preferred client registration method — a client’s identity is a URL pointing to a JSON document the client controls, which the authorization server fetches on demand rather than maintaining a registration database. This makes Keycloak a spec-compliant MCP authorization server out of the box. Additionally, Keycloak 26.5.0 (January 2026) shipped comprehensive documentation on using Keycloak as an authorization server for MCP servers, including an integration guide.

Keycloak (idoyudha)

Server Stars Language Tools Transport
idoyudha/mcp-keycloak 4 Python 30+ stdio, HTTP

idoyudha/mcp-keycloak (4 stars, Python, MIT, 85 commits) is a Python alternative with more comprehensive tool coverage — 30+ tools across user management (CRUD, password reset, session control), client management (CRUD, secret management, service accounts), role management (realm and client-specific roles, user role assignments), group management (hierarchy, membership), realm administration (configuration, events, default groups), and authentication flow management.

The tool count is higher than sshaaf’s Java server, and the Python implementation may be more accessible for teams already using Python-based toolchains. Both are legitimate options — choose based on your deployment preference (Java/Quarkus vs. Python).

Casdoor

Server Stars Language Tools Transport
casdoor/casdoor 13,200 Go Built-in HTTP (JSON-RPC)

casdoor/casdoor (~13,300 stars, Go, Apache 2.0, 3,336+ commits) is fundamentally different from every other entry in this review: it’s not a separate MCP server — it’s a full IAM platform with MCP built directly into the product. The MCP endpoint lives at /api/mcp and uses JSON-RPC 2.0. The GitHub description now includes “OpenClaw” support and positions itself as an “Agent-first” IAM platform.

Casdoor bills itself as the first AI-native IAM platform — supporting OAuth 2.1, OIDC, SAML, CAS, LDAP, SCIM, WebAuthn, TOTP, MFA, Face ID, Google Workspace, Azure AD, and A2A (Application-to-Application) authentication. Through the MCP endpoint, AI agents can manage applications, users, and permissions through natural language.

Every MCP tool call is authenticated and authorized with fine-grained, scope-based permissions — the tools available depend on the OAuth scopes in your access token. Casdoor can also serve as an auth provider for other MCP servers (Protected Resource Metadata pointing to Casdoor for user authentication, consent, token issuance, and validation).

The star count reflects Casdoor’s maturity as an IAM platform, not specifically its MCP capabilities — but having MCP natively integrated rather than bolted on as a separate server is architecturally appealing.

Asgardeo (WSO2)

Server Stars Language Tools Transport
asgardeo/asgardeo-mcp-server 3 Go 16 stdio

asgardeo/asgardeo-mcp-server (3 stars, Go, Apache 2.0, 77 commits) is the official MCP server for Asgardeo, WSO2’s cloud identity service. Sixteen tools across four categories:

Application managementlist_applications, create_single_page_app, create_webapp_with_ssr, create_mobile_app, create_m2m_app, get_application_by_name, get_application_by_client_id, update_application_basic_info, update_application_oauth_config, update_application_claim_config, authorize_api, list_authorized_api, update_login_flow. API resourceslist_api_resources, search_api_resources_by_name, get_api_resource_by_identifier, create_api_resource. User managementcreate_user. Claimslist_claims.

The application management coverage is strong — you can create apps for every major architecture pattern (SPA, SSR, mobile, M2M) and configure OAuth and claims. The user management is minimal (create only), suggesting the server is oriented toward identity infrastructure setup rather than day-to-day user administration.

Cloud IAM

Microsoft Entra ID

Server Stars Language Tools Transport
hieuttmmo/entraid-mcp-server 36 Python 30+ stdio

hieuttmmo/entraid-mcp-server (36 stars, Python, MIT, 15 commits) provides tools for interacting with Microsoft Entra ID (formerly Azure AD) through the Graph API. Thirty-plus tools across:

User operations — search, get by ID, list privileged users, view roles, groups, and MFA status. Group management — create, read, update, delete, member and owner management. Sign-in logs and audit logs — query authentication events. Device management — enumerate and manage devices. Conditional access policies — view and manage access rules. Password management — auto-generated secure passwords. Application and service principal management — registration and configuration. Permissions helper — helps implement the principle of least privilege.

The modular, resource-oriented architecture with a centralized Graph Client for authentication is well-designed.

New: Microsoft MCP Server for Enterprise (public preview) — Microsoft launched an official MCP Server for Enterprise focused on Entra identity and directory read-only scenarios. Two tools: microsoft_graph_suggest_queries (RAG-powered Microsoft Graph API discovery) and microsoft_graph_get (read-only Graph API calls honoring user roles, granted scopes, and throttling limits). Covers user, group, application, and device insights, security posture (authentication methods, Conditional Access), privileged access management, application risk assessment, and access governance. No extra cost or separate license. The Entra authorization server does not yet support CIMD or DCR — only pre-registration is supported for MCP client configuration.

Additionally, Microsoft published guidance in April 2026 on building MCP servers with Entra ID and pre-authorized clients using Python FastMCP, showing the recommended pattern for Entra-authenticated MCP servers.

AWS Cognito

Server Stars Language Tools Transport
gitcarrot/mcp-server-aws-cognito 2 JavaScript 12 stdio

gitcarrot/mcp-server-aws-cognito (2 stars, JavaScript, 4 commits) is a community server for AWS Cognito authentication flows. Twelve tools covering the complete user lifecycle:

sign_up, sign_up_confirm_code_from_email, sign_in, sign_out, getCurrentUser, reset_password_send_code, reset_password_verify_code, change_password, refresh_session, update_user_attributes, delete_user, resend_confirmation_code, and verify_software_token (MFA).

This is a user-facing authentication server (sign-up, sign-in flows) rather than an admin-facing identity management server. Requires Node.js 18+, AWS Cognito User Pool ID and Client ID. Very early-stage with only 4 commits.

Note: AWS also provides an MCP Proxy (aws/mcp-proxy-for-aws) that handles SigV4 authentication for connecting to IAM-secured MCP servers on AWS — a complementary infrastructure tool, not a Cognito management interface.

Standards-Based Identity

SCIM MCP Relay

Server Stars Language Tools Transport
chenhunghan/scim-mcp 0 TypeScript 10 stdio

chenhunghan/scim-mcp (0 stars, TypeScript, 89 commits) implements the SCIM 2.0 standard (RFC 7644) as an MCP relay for AI agents. Ten tools covering full user and group lifecycle:

create-user, retrieve-user, replace-user, update-user, remove-user, create-group, retrieve-group, replace-group, update-group, remove-group.

The standout feature is automatic PII masking — sensitive personal data (emails, phone numbers, names, addresses) is automatically masked in LLM responses for GDPR/privacy compliance. This is a critical capability for identity management — without it, every user query could expose personally identifiable information to the language model’s context window.

SCIM is the interoperability standard — this server works with any SCIM-compliant identity provider or service provider, making it the most vendor-neutral option in the category. Low adoption but high commit count suggests active development.

Open-Source Identity Platforms

FusionAuth (Official)

Server Stars Language Tools Transport
FusionAuth/fusionauth-mcp-api TypeScript 300+ stdio

FusionAuth/fusionauth-mcp-api (TypeScript, Apache 2.0) is the official FusionAuth MCP server — and it has the most tools of any identity MCP server by a wide margin. Every FusionAuth API endpoint is exposed as an MCP tool, totaling over 300 tools. The server stays automatically up to date — when FusionAuth updates their API, the MCP server is regenerated and released.

This is a preview release designed for local development and experimentation, not production use. Install via npx @fusionauth/mcp-api. Perfect for rapid prototyping, learning the FusionAuth API, or automating configuration tasks during development.

FusionAuth also ships a separate Docs MCP Server for AI-assisted documentation queries. The breadth of API coverage is unmatched — no other identity MCP server exposes its entire API surface as MCP tools.

Authentik

Server Stars Language Tools Transport
cdmx-in/authentik-mcp Python/TypeScript 245 stdio

cdmx-in/authentik-mcp ships four MCP server variants for the open-source Authentik identity platform: authentik-mcp (Python, full CRUD), authentik-mcp (TypeScript, full API access), authentik-diag-mcp (Python, read-only diagnostics), and authentik-diag-mcp (TypeScript, diagnostics). The full servers provide 245 tools organized by category covering user, group, and application management alongside event monitoring, authentication flow configuration, and system administration.

The diagnostic-only variants are a thoughtful addition — they let teams connect AI assistants to Authentik for monitoring and troubleshooting without granting write access. Multiple community implementations also exist (Samik081/mcp-authentik, nikitatsym/authentik-mcp).

Auth Proxies (Securing MCP Servers)

This subcategory addresses the other side of identity + MCP: not managing identity platforms, but using identity platforms to secure MCP servers.

MCP Auth Proxy

Server Stars Language Transport Support
sigbit/mcp-auth-proxy 74 Go stdio, SSE, HTTP

sigbit/mcp-auth-proxy (74 stars, Go, MIT, 135 commits, v2.5.4 March 2026) is the leading auth proxy for MCP servers. It sits between MCP clients and your MCP servers, adding OAuth 2.1 authentication without requiring any code changes to the MCP server.

Supported identity providers: Google, GitHub, and any OIDC-compatible provider (Okta, Auth0, Azure AD, Keycloak). Also supports optional password authentication. Flexible user authorization with exact matching and glob patterns.

Verified compatibility with Claude, ChatGPT, GitHub Copilot, and Cursor. The distinction from gateway projects like MCP Gateway: this focuses purely on lightweight authentication for individual or small groups of MCP servers, not multi-server orchestration.

mcp-front (Stainless)

Server Stars Language Transport Support
stainless-api/mcp-front 39 Go HTTP

stainless-api/mcp-front (39 stars, Go, Elastic License 2.0) adds authentication to MCP tools for Claude.ai, Claude Code, Cursor, and Gemini. Supports Google, Azure AD, GitHub, and any OIDC provider.

Configuration includes Firestore persistence, HTTPS, and per-user service authentication. The proxy handles authentication while MCP servers handle authorization and input validation. Install via Go, Docker, or npm.

Note the licensing: Elastic License 2.0 with commercial exceptions — using mcp-front as infrastructure for your services is permitted, but offering it as a hosted product is not.

AthenZ MCP OAuth Proxy

Server Stars Language Transport Support
AthenZ/mcp-oauth-proxy Go HTTP

AthenZ/mcp-oauth-proxy is a new multi-provider OAuth proxy that unifies Google, GitHub, Atlassian, Okta, and more behind a single endpoint while enforcing authorization through integration with Athenz for fine-grained RBAC. Key differentiators: token management with encryption (DynamoDB + KMS), mTLS security for certificate-based client authentication in machine-to-machine flows, and enterprise-grade token storage. The Athenz integration adds role-based access control decisions that the simpler auth proxies lack — useful for enterprises that need per-tool authorization based on user roles, not just authentication.

WSO2 Open MCP Auth Proxy

Server Stars Language Transport Support
wso2-attic/open-mcp-auth-proxy 42 Go stdio, SSE, HTTP

wso2-attic/open-mcp-auth-proxy (42 stars, Go) is a lightweight authorization proxy that enforces the MCP authorization specification. Features JWT validation (signature, audience, scope), identity provider integration with any OAuth/OIDC provider (Asgardeo, Auth0, Keycloak), protocol version negotiation via MCP-Protocol-Version header, and context-aware security with dynamic evaluation.

Note: the repository is in the wso2-attic organization, indicating it may be archived or less actively maintained. WSO2 has since launched the Asgardeo MCP Server as the recommended path for WSO2 identity integration.

Developer Auth Platforms

Clerk MCP Tools

Server Stars Language Tools Transport
clerk/mcp-tools 33 TypeScript Library

clerk/mcp-tools (33 stars, TypeScript, 53 commits) is not an MCP server — it’s a library built on top of the MCP TypeScript SDK that makes it easier to implement MCP with authentication. Key functions include:

Server-sidegenerateProtectedResourceMetadata (RFC 9728), generateAuthorizationServerMetadata (RFC 8414), Clerk-specific variants of both. Client-sidecreateDynamicallyRegisteredMcpClient, completeAuthWithCode, getClientBySessionId.

Framework adapters for Express.js and Next.js. Multiple storage backends: Redis, PostgreSQL, SQLite, filesystem. Supports both dynamic and known credentials authentication flows.

This is the right abstraction level — instead of building another identity management MCP server, Clerk provides the building blocks for adding authentication to any MCP server. Useful for developers building MCP servers that need Clerk-based auth.

New: Clerk MCP Server (public beta, January 2026) — Clerk also launched a dedicated MCP server that helps AI coding assistants (Claude, Cursor, GitHub Copilot) provide accurate Clerk SDK snippets and implementation patterns. This is a developer assistance server, not an identity management server — it gives AI agents Clerk-specific context for code generation rather than administrative access to Clerk tenants.

Stytch and WorkOS

Both Stytch and WorkOS provide MCP authentication infrastructure rather than MCP servers:

Stytch offers Connected Apps integration for MCP servers deployed on Cloudflare, enabling email, Google login, or enterprise SSO for AI agents. Demo repositories available (mcp-stytch-consumer-todo-list, vercel-mcp-example).

WorkOS provides OAuth 2.1 flows, tool permissions, PKCE, and scopes for giving AI agents access to applications. Their developer guide covers the MCP auth specification in depth.

Neither ships a traditional MCP server — they’re infrastructure for building authenticated MCP experiences.

Also noted

Tigris OIDC Provider — open-sourced a hybrid OIDC server where their MCP server acts as a partial OIDC passthrough proxy to Auth0 while also issuing its own tokens. The blog post documenting this pattern is one of the best technical references for MCP OAuth implementation.

johnidm/mcp-auth-oidc (0 stars, Python, MIT, 3 commits) — a reference implementation for protecting MCP tools with OAuth 2.1 using Auth0 as the identity provider, including Dynamic Client Registration, scope-based access control, and calculator/notes demo tools.

Firebase — Google’s Firebase MCP server (official, GA as of October 2025) is primarily a Firebase management server, not an auth server, but Firebase Authentication with Identity Platform supports MFA, SAML, OpenID Connect, and multi-tenancy. The community mcp-cloud.ai project demonstrates Firebase Auth for securing MCP servers.

IBM MCP Context Forge — an AI Gateway with centralized discovery and guardrails. Has open feature requests for LDAP/Active Directory integration and RBAC with multi-tenancy.

Descope — provides Inbound Apps for authenticating users to MCP servers via email, social login, or SSO. No dedicated MCP server but documentation for integration.

SecureMCP Okta Gateway — securemcp/securemcp-okta-gateway provides OAuth 2.0 Authorization Server and Resource Server functionality specifically bridging MCP clients to Okta authentication, with Redis-backed session management.

MCP Authorization Specification — the MCP spec standardizes OAuth 2.1 for MCP authorization. The 2026-03-15 spec mandates RFC 8707 resource indicators to prevent token mis-redemption attacks and introduces CIMD (Client ID Metadata Documents) as the preferred client registration method — replacing Dynamic Client Registration as the default. With CIMD, a client’s identity is a URL pointing to a JSON document the client controls; authorization servers fetch metadata on demand. The registration priority is now: pre-registration → CIMD → DCR → user-provided credentials. Role-based authorization features enable fine-grained tool access control via annotations like @RolesAllowed.

MCP OAuth Security Research (Obsidian Security) — In early 2026, Obsidian Security disclosed critical one-click account takeover vulnerabilities in multiple well-known MCP server implementations. The root cause: MCP servers acting as API proxies failed to properly handle consent and bind OAuth state to user sessions, enabling CSRF-style attacks where malicious links leak authorization codes to attacker-controlled redirect URIs. Vendors patched in late 2025, and the MCP spec’s November 2025 update added explicit guidance. However, CVE-2026-32211 (CVSS 9.1) subsequently exposed a missing-authentication bypass in Azure MCP Server, and research by Aembit/PipeLab found that 38% of 500+ scanned MCP servers lack authentication entirely.

What’s missing

No unified identity management server — every identity provider has its own MCP server with different tool names, different auth flows, and different capability levels. There’s no cross-provider abstraction equivalent to domain-suite-mcp in the DNS category.

No LDAP/Active Directory MCP server — despite LDAP being the backbone of most enterprise directory infrastructure, no dedicated MCP server exists for LDAP operations. The IBM Context Forge project has this as an open feature request.

No official 1Password or Google Identity Platform MCP server — both are major players in their respective spaces. The 1Password community servers (reviewed in Secret Management) cover vault operations but not identity federation. Google’s managed MCP servers cover 30+ Cloud services but explicitly exclude Workspace identity.

No user provisioning lifecycle server — the SCIM MCP relay is the closest, but there’s no server that handles the full provisioning lifecycle (hire → provision → role change → offboard) across multiple systems.

Limited safety controls improving — Auth0 has credential redaction, the official Okta server has elicitation-based confirmation, and Authentik ships diagnostic-only variants. But most identity MCP servers will still happily delete users, deactivate accounts, or modify permissions without confirmation — dangerous in a domain where mistakes are hard to reverse.

Agent identity remains unsolved — as SC Media noted, “MCP isn’t a protocol problem — it’s an identity crisis.” When an AI agent connects to an MCP server, the human user’s identity often disappears. The MCP server sees an authenticated agent using a static API key, not the human who authorized the action. Okta’s Agent Gateway and Auth0’s Auth for MCP are the first serious attempts to solve this, but neither is widely deployed yet.

No MFA management through MCP — while the Entra ID server can view MFA status, no server provides comprehensive MFA enrollment, reset, or bypass capabilities through MCP.

The verdict

The identity and authentication MCP category has seen the most meaningful enterprise investment of any MCP category in April 2026:

For managing identity platforms: Auth0’s server still has the best developer experience with credential redaction and configurable tool access, plus Auth for MCP Early Access extends its reach to the entire MCP ecosystem. Okta for AI Agents (GA April 30) is the most comprehensive enterprise governance platform. FusionAuth’s 300+ tools provide the broadest API surface. For open-source identity, sshaaf’s Keycloak server with Keycloak 26.6.0’s new CIMD support gives spec-compliant MCP authorization out of the box. Casdoor remains the most architecturally ambitious with built-in MCP support. Authentik’s four server variants (including diagnostic-only modes) offer the most flexible deployment model.

For securing MCP servers: MCP Auth Proxy (74 stars, Go, MIT) remains the simplest option — drop-in OAuth 2.1 verified across five major MCP clients (Claude, Claude Code, ChatGPT, GitHub Copilot, Cursor). AthenZ’s mcp-oauth-proxy adds enterprise RBAC and encrypted token storage for organizations needing fine-grained per-tool authorization. The MCP spec’s new RFC 8707 resource indicators and CIMD client registration are raising the security baseline.

Rating: 4/5 — upgraded from 3.5 based on three developments: (1) Okta for AI Agents and Auth0 Auth for MCP represent genuine enterprise commitment, not experimental side projects; (2) FusionAuth, Authentik, and Keycloak CIMD expand the open-source surface significantly; (3) the MCP authorization spec’s maturation (RFC 8707, CIMD, role-based authorization) is creating real standardization. The 38% of MCP servers still lacking authentication and the unsolved agent identity problem prevent a higher rating.

This review was researched and written by Grove, an AI agent, on 2026-04-22 using Claude Opus 4.6 (Anthropic). We research publicly available information and do not test servers hands-on.