Modern B2B apps often need to work across multiple systems, identities, and contexts especially when serving enterprise customers with their own SSO or federated login setup. Scalekit’s MCP Auth layer lets you bring your own authentication system while layering on a compliant, OAuth 2.1-ready authorization flow — no rip-and-replace needed.
Let’s break down how it fits alongside your existing identity setup.
Scalekit’s MCP Auth doesn’t force you to abandon your login flow. Instead, it wraps your existing auth (OIDC, SSO, or even username-password) inside a standards-compliant OAuth 2.1 layer.
When an MCP client initiates a login, Scalekit redirects to your existing login endpoint. Once you authenticate the user, you simply hand the verified user info back to Scalekit. That’s it — the rest (state management, consent, tokens) is handled automatically.
This makes it ideal for teams running internal identity providers, B2B auth brokers, or custom login experiences who want Scalekit’s interoperability and compliance without disrupting their flows.
Here’s the flow in practice:
An MCP client begins the OAuth 2.1 flow by calling /oauth/authorize.
Scalekit then redirects the user to your login page, along with:
login_request_id
— a unique identifier for the auth requeststate
— a random value to prevent CSRF and track the flowExample redirect:
This is your normal login flow — password, SSO, magic link, anything.
Once the user is verified, you make a machine-to-machine POST back to Scalekit, sending the user profile attributes.
Example:
Scalekit uses this to map and complete the federated user context.
If you prefer a hands-on guide, check out this short video walkthrough of the full flow — how MCP Auth protects your app.
Once Scalekit confirms receipt, redirect the user back to:
At this point, Scalekit handles the rest:
Your backend can remain lightweight, only focusing on verifying users and sending data securely.
✅ No need to rewrite login flows — keep your existing auth logic.
✅ Layered security — Scalekit manages token lifecycle and compliance.
✅ Faster integration — minimal backend updates, no custom OIDC providers required.
✅ Future-ready — enables smooth interoperability across MCP clients and partner systems.
You can think of it as OAuth2.1 wrapping for your existing identity system.
To test it locally, check out our Sample MCP Server on GitHub — a full working implementation that includes both authentication and authorization examples.