diff --git a/src/content/docs/cloudflare-one/access-controls/ai-controls/secure-mcp-servers.mdx b/src/content/docs/cloudflare-one/access-controls/ai-controls/secure-mcp-servers.mdx index 78ed2086ddb4ee5..20de37a8164acb9 100644 --- a/src/content/docs/cloudflare-one/access-controls/ai-controls/secure-mcp-servers.mdx +++ b/src/content/docs/cloudflare-one/access-controls/ai-controls/secure-mcp-servers.mdx @@ -113,12 +113,13 @@ The Worker will be deployed to your `*.workers.dev` subdomain at `mcp-access-sel params={{ appType: "self-hosted" }} /> 7. Select **Create**. -8. On the application details page, go to **Additional settings** > **AUD tag** and copy the value. You will need this value to configure your MCP server. +8. On the application details page, go to **Additional settings** and turn on **Managed OAuth**. This allows non-browser MCP clients to authenticate using a standard OAuth 2.0 flow instead of receiving a browser redirect. For more information, refer to [Managed OAuth](/cloudflare-one/access-controls/applications/http-apps/managed-oauth/). +9. Copy the **AUD tag** value shown in **Additional settings**. You will need this value to configure your MCP server. -1. Make a `POST` request to the [Access applications](/api/resources/zero_trust/subresources/access/subresources/applications/methods/create/) endpoint: +1. Make a `POST` request to the [Access applications](/api/resources/zero_trust/subresources/access/subresources/applications/methods/create/) endpoint with `oauth_configuration.enabled` set to `true`: .workers.dev", policies: ["f174e90a-fafe-4643-bbbc-4a0ed4fc8415"], allowed_idps: [], + oauth_configuration: { + enabled: true, + }, }} />