Skip to content

Commit dac4c9e

Browse files
rdimitrovclaude
andcommitted
Update Registry Server docs for v1.0.0 and v1.0.1
Restructure configuration docs to reflect the new two-level config model (sources + registries), add a dedicated authorization guide covering RBAC roles and claims-based access control, and update all related pages for cross-document consistency. Key changes: - Rewrite configuration.mdx for sources/registries split - Add authorization.mdx (roles, claims, /v1/me endpoint) - Replace claimMapping with authz-claims annotation docs - Document skills sync from external sources - Document multiple Kubernetes sources support - Add DNS subdomain naming requirement for source names - Update cross-references across deployment, skills, and intro pages - Fix broken anchor in remote-mcp-proxy.mdx Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
1 parent c5df370 commit dac4c9e

File tree

12 files changed

+756
-155
lines changed

12 files changed

+756
-155
lines changed

docs/toolhive/contributing.mdx

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,9 @@ actively being developed and tested.
7070
### Registry server
7171

7272
The Registry Server is an API server that implements the official MCP Registry
73-
API. It provides standardized access to MCP servers from multiple backends,
74-
including file-based and other API-compliant registries.
73+
API. It provides standardized access to MCP servers and skills from multiple
74+
backends, including Git repositories, API endpoints, files, managed sources, and
75+
Kubernetes clusters.
7576

7677
**Repository**:
7778
[stacklok/toolhive-registry-server](https://github.com/stacklok/toolhive-registry-server)

docs/toolhive/guides-k8s/remote-mcp-proxy.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -801,7 +801,7 @@ Learn how to customize MCP tools using
801801
[filters and overrides](./customize-tools.mdx).
802802

803803
Discover your deployed MCP servers automatically using the
804-
[Kubernetes registry](../guides-registry/configuration.mdx#kubernetes-registry)
804+
[Kubernetes source](../guides-registry/configuration.mdx#kubernetes-source)
805805
feature in the ToolHive Registry Server.
806806

807807
## Related information

docs/toolhive/guides-registry/authentication.mdx

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,14 @@ OAuth mode to protect your registry. You can configure authentication to fit
1010
different deployment scenarios, from development environments to production
1111
deployments with enterprise identity providers.
1212

13+
:::tip[Looking for authorization?]
14+
15+
This page covers **authentication** (verifying caller identity). For
16+
**authorization** (controlling what callers can do), including role-based access
17+
control and claims-based scoping, see [Authorization](./authorization.mdx).
18+
19+
:::
20+
1321
## Authentication modes
1422

1523
The server supports two authentication modes configured via the required `auth`
@@ -349,6 +357,7 @@ regardless of the auth mode:
349357
- `/health` - Health check endpoint
350358
- `/readiness` - Readiness probe endpoint
351359
- `/version` - Version information
360+
- `/openapi.json` - OpenAPI specification
352361
- `/.well-known/*` - OAuth discovery endpoints (RFC 9728)
353362

354363
You can configure additional public paths using the `publicPaths` field in your
@@ -499,6 +508,14 @@ providers:
499508
caCertPath: /etc/ssl/certs/internal-ca.crt
500509
```
501510

511+
## Next steps
512+
513+
- [Configure authorization](./authorization.mdx) to set up role-based access
514+
control and claims-based scoping
515+
- [Set up the database](./database.mdx) for production storage and migrations
516+
- [Configure telemetry](./telemetry-metrics.mdx) for distributed tracing and
517+
metrics collection
518+
502519
## Troubleshooting
503520

504521
### 401 Unauthorized errors
@@ -544,9 +561,3 @@ If tokens from some providers work but others don't:
544561
4. Review server logs to identify which specific provider validation is failing
545562
5. Test each provider's JWKS endpoint accessibility:
546563
`curl ${issuerUrl}/.well-known/openid-configuration`
547-
548-
## Next steps
549-
550-
- [Set up the database](./database.mdx) for production storage and migrations
551-
- [Configure telemetry](./telemetry-metrics.mdx) for distributed tracing and
552-
metrics collection

0 commit comments

Comments
 (0)