Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 3 additions & 2 deletions docs/toolhive/contributing.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -70,8 +70,9 @@ actively being developed and tested.
### Registry server

The Registry Server is an API server that implements the official MCP Registry
API. It provides standardized access to MCP servers from multiple backends,
including file-based and other API-compliant registries.
API. It provides standardized access to MCP servers and skills from multiple
backends, including Git repositories, API endpoints, files, managed sources, and
Kubernetes clusters.

**Repository**:
[stacklok/toolhive-registry-server](https://github.com/stacklok/toolhive-registry-server)
Expand Down
2 changes: 1 addition & 1 deletion docs/toolhive/guides-k8s/remote-mcp-proxy.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -801,7 +801,7 @@ Learn how to customize MCP tools using
[filters and overrides](./customize-tools.mdx).

Discover your deployed MCP servers automatically using the
[Kubernetes registry](../guides-registry/configuration.mdx#kubernetes-registry)
[Kubernetes source](../guides-registry/configuration.mdx#kubernetes-source)
feature in the ToolHive Registry Server.

## Related information
Expand Down
23 changes: 17 additions & 6 deletions docs/toolhive/guides-registry/authentication.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,14 @@ OAuth mode to protect your registry. You can configure authentication to fit
different deployment scenarios, from development environments to production
deployments with enterprise identity providers.

:::tip[Looking for authorization?]

This page covers **authentication** (verifying caller identity). For
**authorization** (controlling what callers can do), including role-based access
control and claims-based scoping, see [Authorization](./authorization.mdx).

:::

## Authentication modes

The server supports two authentication modes configured via the required `auth`
Expand Down Expand Up @@ -349,6 +357,7 @@ regardless of the auth mode:
- `/health` - Health check endpoint
- `/readiness` - Readiness probe endpoint
- `/version` - Version information
- `/openapi.json` - OpenAPI specification
- `/.well-known/*` - OAuth discovery endpoints (RFC 9728)

You can configure additional public paths using the `publicPaths` field in your
Expand Down Expand Up @@ -499,6 +508,14 @@ providers:
caCertPath: /etc/ssl/certs/internal-ca.crt
```

## Next steps

- [Configure authorization](./authorization.mdx) to set up role-based access
control and claims-based scoping
- [Set up the database](./database.mdx) for production storage and migrations
- [Configure telemetry](./telemetry-metrics.mdx) for distributed tracing and
metrics collection

## Troubleshooting

### 401 Unauthorized errors
Expand Down Expand Up @@ -544,9 +561,3 @@ If tokens from some providers work but others don't:
4. Review server logs to identify which specific provider validation is failing
5. Test each provider's JWKS endpoint accessibility:
`curl ${issuerUrl}/.well-known/openid-configuration`

## Next steps

- [Set up the database](./database.mdx) for production storage and migrations
- [Configure telemetry](./telemetry-metrics.mdx) for distributed tracing and
metrics collection
Loading