
MCP adoption has accelerated quickly over the past few months. What started as early experimentation across IDEs and agents is now showing up in production-grade workflows — from internal developer tools to SaaS platforms exposing MCP servers.
As MCP usage grows, client registration has become a real, practical problem.
MCP servers are no longer talking to a small, fixed set of known clients. Instead, they’re seeing connections from IDEs, desktop hosts, internal tools, and agent runtimes — many of which are installed locally or discovered dynamically. Traditional client registration models don’t always fit cleanly into this world.
To support this shift, the MCP authorization work has introduced Client ID Metadata Documents (CIMD) — a model where a client can identify itself using a metadata URL instead of relying on pre-registered credentials or Dynamic Client Registration (DCR).
Today, we’re announcing first-class CIMD support in Scalekit.
In classic OAuth setups, client registration is usually handled in one of two ways:
Both approaches work well in controlled environments. But MCP introduces new realities:
Without CIMD, MCP clients either reuse static OAuth clients (which is unsafe) or hand-roll dynamic registration flows that break across sessions and tools. CIMD standardizes how ephemeral clients declare intent and metadata, exactly what MCP clients need.
As a result, MCP server operators need a registration model that’s more flexible — without giving up safety or correctness.
Client ID Metadata Documents (CIMD) take a different approach.
Instead of issuing a static client ID or registering one dynamically, a CIMD-compatible client uses an HTTPS URL as its client identifier. That URL resolves to a metadata document describing the client (for example, its redirect URIs and name).
At authentication time, the authorization server fetches this metadata and uses it to drive the OAuth flow.
This model works particularly well for MCP environments where clients are diverse, distributed, and not always known in advance — while still preserving explicit metadata and validation during authentication.
.png)
Scalekit now supports registration via metadata URL (CIMD) for MCP clients.
When a CIMD-compatible MCP client initiates authentication against an MCP server secured by Scalekit:
From the MCP server’s perspective, this provides an additional registration mode alongside:
CIMD doesn’t replace existing models — it gives you another option that fits open or dynamic MCP environments better.
.png)
Implementing CIMD correctly involves more than just fetching a JSON file.
With Scalekit’s CIMD support, you don’t have to build or maintain:
CIMD becomes a supported, production-ready registration option rather than a custom implementation you need to harden yourself.
CIMD is a good fit when:
DCR and manual registration remain valid — and often preferable — in more controlled environments. Scalekit supports all three, so you can choose what fits your MCP deployment.
Enabling CIMD for an MCP server in Scalekit is intentionally simple:
There’s no additional setup required on the server side.
Learn more with CIMD docs.