You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
docs: improve documentation structure and add AI development setup (#53)
- Reorganize README to prioritize documentation link and simplify overview
- Move detailed configuration and usage examples to external documentation
- Add AI development environment setup instructions to CONTRIBUTING.md
- Consolidate duplicate AI setup instructions across files
Copy file name to clipboardExpand all lines: CONTRIBUTING.md
+16Lines changed: 16 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,3 +41,19 @@ feat!: change authentication API to support multiple providers
41
41
## Pull Request Template
42
42
43
43
This project uses a pull request template to ensure consistency and completeness. Please follow the guidelines in [./.github/pull_request_template.md](./.github/pull_request_template.md) when creating pull requests.
44
+
45
+
## AI Development Environment Setup
46
+
47
+
You can link this file to your preferred AI development environment for better integration:
Copy file name to clipboardExpand all lines: README.md
+7-96Lines changed: 7 additions & 96 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,10 @@
11
11
-**Publish local MCP servers safely**: Supports all stdio, SSE, and HTTP transports. For stdio, traffic is converted to `/mcp`. For SSE/HTTP, it’s proxied as-is. Of course, with authentication.
12
12
-**Verified across major MCP clients**: Claude, Claude Code, ChatGPT, GitHub Copilot, Cursor, etc. — the proxy smooths client-specific quirks for consistent auth.
13
13
14
+
---
15
+
16
+
📖 **For detailed usage, configuration, and examples, see the [Documentation](https://sigbit.github.io/mcp-auth-proxy/)**
17
+
14
18
## Quickstart
15
19
16
20
> Domain binding & 80/443 must be accessible from outside.
3. Set redirect URI: `{EXTERNAL_URL}/.auth/oidc/callback`
117
-
4. Note the configuration URL (usually issuer URL + /.well-known/openid-configuration), client ID, and client secret
118
-
5. Configure the userinfo endpoint to return user identification field (default: email)
119
-
120
53
## Note
121
54
122
55
For a simpler approach to publish local MCP servers over OAuth, consider [MCP Warp](https://github.com/sigbit/mcp-warp), which provides an OAuth Proxy + ngrok-like service. We highly recommend considering this option as well.
123
-
124
-
## 🤝 Contributing
125
-
126
-
For developer guidelines, contribution instructions, and commit message conventions, please see [CONTRIBUTING.md](./CONTRIBUTING.md).
127
-
128
-
### AI Development Environment Setup
129
-
130
-
You can link CONTRIBUTING.md to your preferred AI development environment for better integration:
0 commit comments