Skip to content

Update MCP documentation to reflect unified MCP capabilities across all app types#6039

Open
ranuka-laksika wants to merge 1 commit intowso2:masterfrom
ranuka-laksika:unify_mcp
Open

Update MCP documentation to reflect unified MCP capabilities across all app types#6039
ranuka-laksika wants to merge 1 commit intowso2:masterfrom
ranuka-laksika:unify_mcp

Conversation

@ranuka-laksika
Copy link
Copy Markdown
Contributor

@ranuka-laksika ranuka-laksika commented Apr 7, 2026

Updates MCP-related documentation to reflect the unified MCP capabilities feature, which allows all application types (except Digital Wallet applications) to access MCP servers.

Related Issue:- https://github.com/wso2-enterprise/asgardeo-product/issues/35239
wso2/product-is#27383

Summary by CodeRabbit

  • Documentation
    • Clarified which application types support MCP server access (SPA, Traditional Web, Mobile, M2M).
    • Specified that Digital Wallet applications cannot access MCP servers.
    • Standardized terminology for application registration and authorization throughout MCP guides.
    • Added informational guidance on MCP Client Application template usage and compatibility options.

@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai bot commented Apr 7, 2026

📝 Walkthrough

Walkthrough

Documentation updates across multiple MCP guides and tutorials clarify application template naming, expand application-type compatibility information, and standardize terminology. Key changes include explicitly naming the "MCP Client Application" template, noting that most application types (excluding Digital Wallet) can access MCP servers, and replacing "clients" with "applications" in authorization contexts.

Changes

Cohort / File(s) Summary
Core MCP Guides
en/includes/guides/agentic-ai/mcp/index.md, en/includes/guides/applications/register-mcp-client-app.md, en/includes/guides/authorization/mcp-server-authorization.md
Updated MCP client and authorization descriptions to explicitly name the "MCP Client Application" template, clarify compatibility across OIDC application types, and note that Digital Wallet applications cannot access MCP servers.
Quick-Start Guides
en/includes/quick-starts/agent-auth-py.md, en/includes/quick-starts/agent-auth-ts.md, en/includes/quick-starts/mcp-auth-server-py.md, en/includes/quick-starts/mcp-auth-server.md
Added consistent clarification notes stating that while MCP Client Application template is used for optimal settings, other application types (SPA, Traditional Web, Mobile, M2M) can access MCP servers, excluding Digital Wallet applications.
Tutorial & Release Documentation
en/asgardeo/docs/tutorials/end-to-end-mcp-authorization-with-asgardeo.md, en/identity-server/next/docs/get-started/about-this-release.md
Refined MCP authorization documentation to broaden audience scope, standardize terminology from "clients" to "applications," adjust UI button references, and clarify that most application types can access MCP servers except Digital Wallet.

Estimated code review effort

🎯 2 (Simple) | ⏱️ ~12 minutes

Poem

🐰 Hoppy times with templates clear,
"MCP Client Applications" here!
Digital Wallets hop away—
But most app types can access today!

🚥 Pre-merge checks | ✅ 2 | ❌ 1

❌ Failed checks (1 warning)

Check name Status Explanation Resolution
Description check ⚠️ Warning The PR description lacks required sections from the template (Purpose with issue links, Related PRs, Test environment, and Security checks). Add missing template sections: expand Purpose with issue details, include Related PRs section, document Test environment details, and complete all Security checks with appropriate confirmations.
✅ Passed checks (2 passed)
Check name Status Explanation
Title check ✅ Passed The title clearly and specifically describes the main change: updating MCP documentation to reflect unified MCP capabilities across application types.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 3

🧹 Nitpick comments (3)
en/includes/quick-starts/mcp-auth-server.md (1)

318-318: Use one term format for application types.

Please keep naming consistent with other docs by using either all ... Application forms or all ... App forms in this list (currently mixed usage appears across the PR).

As per coding guidelines, "Use one term per concept; do not switch terminology mid-document or randomly mix expanded and abbreviated forms."

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@en/includes/quick-starts/mcp-auth-server.md` at line 318, The sentence mixes
"Application" and "App" terms; pick one consistent term (e.g., use "Application"
or use "App") and update the sentence so all items use that term consistently —
adjust "MCP Client Application template", the list entries "Single Page App,
Traditional Web App, Mobile App, or M2M App", and "Digital Wallet applications"
to the chosen form (for example: "MCP Client Application template" and "Single
Page Application, Traditional Web Application, Mobile Application, or M2M
Application" or convert all to "... App") and ensure
pluralization/capitalization matches other docs.
en/identity-server/next/docs/get-started/about-this-release.md (2)

45-45: Consider improving clarity by using active voice and replacing ambiguous pronouns.

The sentence contains a passive construction ("can also be registered") and an ambiguous pronoun ("them" in "authorize applications to access them"). As per coding guidelines, prefer active voice and avoid ambiguous pronouns by replacing them with explicit nouns.

♻️ Suggested revision
-MCP servers can also be registered as protected resources, enabling granular access control over the servers and their associated tools. Organizations can define specific permissions for MCP tools and resources, authorize applications to access them, and grant user access through RBAC.
+You can also register MCP servers as protected resources, enabling granular access control over the servers and their associated tools. Organizations can define specific permissions for MCP tools and resources, authorize applications to access these resources, and grant user access through RBAC.
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@en/identity-server/next/docs/get-started/about-this-release.md` at line 45,
Rewrite the sentence in active voice and replace the ambiguous pronoun "them"
with explicit nouns: change "MCP servers can also be registered as protected
resources, enabling granular access control over the servers and their
associated tools. Organizations can define specific permissions for MCP tools
and resources, authorize applications to access them, and grant user access
through Role-Based Access Control (RBAC)." to an active construction that
explicitly names the targets (e.g., "Organizations can register MCP servers as
protected resources to enable granular access control over servers and their
tools; they can define permissions for MCP tools and resources, authorize
applications to access the MCP servers and associated tools, and grant user
access through Role-Based Access Control (RBAC)."). Ensure pronouns are removed
or replaced with "MCP servers and associated tools" and keep RBAC reference
intact.

43-43: Consider using active voice for directness.

The sentence contains passive constructions ("can be registered", "can be accessed by"). While acceptable in release notes, active voice would be more direct. As per coding guidelines, prefer active voice and reduce weak be-verbs.

♻️ Suggested revision
-WSO2 Identity Server now provides enhanced standards-based authorization within the Model Context Protocol (MCP). MCP clients can be registered as applications using a preconfigured template that follows the recommended MCP identity configurations. Additionally, MCP servers can be accessed by most application types (Single Page Applications, Traditional Web Applications, Mobile Applications, and M2M Applications), with the exception of Digital Wallet applications.
+WSO2 Identity Server now provides enhanced standards-based authorization within the Model Context Protocol (MCP). You can register MCP clients as applications using a preconfigured template that follows the recommended MCP identity configurations. Additionally, most application types (Single Page Applications, Traditional Web Applications, Mobile Applications, and M2M Applications) can access MCP servers, with the exception of Digital Wallet applications.
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@en/identity-server/next/docs/get-started/about-this-release.md` at line 43,
Rewrite the passive sentences in the paragraph starting "WSO2 Identity Server
now provides enhanced standards-based authorization..." to active voice for
directness; e.g., change "MCP clients can be registered as applications using a
preconfigured template..." to "Register MCP clients as applications using a
preconfigured template that follows the recommended MCP identity
configurations," and change "MCP servers can be accessed by most application
types..." to "Most application types (Single Page Applications, Traditional Web
Applications, Mobile Applications, and M2M Applications) can access MCP servers,
except Digital Wallet applications." Keep the same meaning and terminology but
replace weak "can be" phrasing with active verbs like "register" and "access."
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@en/asgardeo/docs/tutorials/end-to-end-mcp-authorization-with-asgardeo.md`:
- Line 134: The UI label in this document is inconsistent with the canonical
phrasing used elsewhere: find occurrences of "Authorize Resource" (e.g., the
Resource dropdown option referenced around the MCP authorization steps) and
change them to the standardized wording "Authorize a resource" so the label
matches the MCP authorization guide exactly.

In `@en/identity-server/next/docs/get-started/about-this-release.md`:
- Line 45: The sentence reintroduces the acronym "Role-Based Access Control
(RBAC)" redundantly; update the phrase "grant user access through Role-Based
Access Control (RBAC)" to use the already-defined acronym only — e.g., change it
to "grant user access through RBAC" — leaving the rest of the sentence about MCP
servers, protected resources, permissions, and authorizing applications
unchanged.

In `@en/includes/guides/authorization/mcp-server-authorization.md`:
- Line 61: Update the template name capitalization: replace the phrase "MCP
client Application" with the correct official name "MCP Client Application" in
the sentence that references the [MCP client Application] link (i.e., the link
text/anchor for the register-mcp-client-app guide) so the docs use the exact
product name consistently.

---

Nitpick comments:
In `@en/identity-server/next/docs/get-started/about-this-release.md`:
- Line 45: Rewrite the sentence in active voice and replace the ambiguous
pronoun "them" with explicit nouns: change "MCP servers can also be registered
as protected resources, enabling granular access control over the servers and
their associated tools. Organizations can define specific permissions for MCP
tools and resources, authorize applications to access them, and grant user
access through Role-Based Access Control (RBAC)." to an active construction that
explicitly names the targets (e.g., "Organizations can register MCP servers as
protected resources to enable granular access control over servers and their
tools; they can define permissions for MCP tools and resources, authorize
applications to access the MCP servers and associated tools, and grant user
access through Role-Based Access Control (RBAC)."). Ensure pronouns are removed
or replaced with "MCP servers and associated tools" and keep RBAC reference
intact.
- Line 43: Rewrite the passive sentences in the paragraph starting "WSO2
Identity Server now provides enhanced standards-based authorization..." to
active voice for directness; e.g., change "MCP clients can be registered as
applications using a preconfigured template..." to "Register MCP clients as
applications using a preconfigured template that follows the recommended MCP
identity configurations," and change "MCP servers can be accessed by most
application types..." to "Most application types (Single Page Applications,
Traditional Web Applications, Mobile Applications, and M2M Applications) can
access MCP servers, except Digital Wallet applications." Keep the same meaning
and terminology but replace weak "can be" phrasing with active verbs like
"register" and "access."

In `@en/includes/quick-starts/mcp-auth-server.md`:
- Line 318: The sentence mixes "Application" and "App" terms; pick one
consistent term (e.g., use "Application" or use "App") and update the sentence
so all items use that term consistently — adjust "MCP Client Application
template", the list entries "Single Page App, Traditional Web App, Mobile App,
or M2M App", and "Digital Wallet applications" to the chosen form (for example:
"MCP Client Application template" and "Single Page Application, Traditional Web
Application, Mobile Application, or M2M Application" or convert all to "...
App") and ensure pluralization/capitalization matches other docs.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 35432f55-a009-4c84-84a7-1c21b18be41e

📥 Commits

Reviewing files that changed from the base of the PR and between ba7f137 and 53d2c0f.

📒 Files selected for processing (9)
  • en/asgardeo/docs/tutorials/end-to-end-mcp-authorization-with-asgardeo.md
  • en/identity-server/next/docs/get-started/about-this-release.md
  • en/includes/guides/agentic-ai/mcp/index.md
  • en/includes/guides/applications/register-mcp-client-app.md
  • en/includes/guides/authorization/mcp-server-authorization.md
  • en/includes/quick-starts/agent-auth-py.md
  • en/includes/quick-starts/agent-auth-ts.md
  • en/includes/quick-starts/mcp-auth-server-py.md
  • en/includes/quick-starts/mcp-auth-server.md

WSO2 Identity Server now provides enhanced standards-based authorization within the Model Context Protocol (MCP). MCP clients can be registered as applications using a preconfigured template that follows the recommended MCP identity configurations. Additionally, MCP servers can be accessed by most application types (Single Page Applications, Traditional Web Applications, Mobile Applications, and M2M Applications), with the exception of Digital Wallet applications.

MCP servers can also be registered as protected resources, enabling granular access control over the servers and their associated tools. Organizations can define specific permissions for MCP tools and resources, authorize MCP client applications to access them, and grant user access through Role-Based Access Control (RBAC).
MCP servers can also be registered as protected resources, enabling granular access control over the servers and their associated tools. Organizations can define specific permissions for MCP tools and resources, authorize applications to access them, and grant user access through Role-Based Access Control (RBAC).
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟡 Minor

Remove redundant acronym definition.

RBAC is already defined earlier in the document (Line 37 as "role-based access control (RBAC)"). Redefining it here as "Role-Based Access Control (RBAC)" violates the guideline to define acronyms once and use them consistently thereafter. As per coding guidelines, define acronyms on first use and then use the acronym consistently without redefining.

📝 Suggested fix
-MCP servers can also be registered as protected resources, enabling granular access control over the servers and their associated tools. Organizations can define specific permissions for MCP tools and resources, authorize applications to access them, and grant user access through Role-Based Access Control (RBAC).
+MCP servers can also be registered as protected resources, enabling granular access control over the servers and their associated tools. Organizations can define specific permissions for MCP tools and resources, authorize applications to access them, and grant user access through RBAC.
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
MCP servers can also be registered as protected resources, enabling granular access control over the servers and their associated tools. Organizations can define specific permissions for MCP tools and resources, authorize applications to access them, and grant user access through Role-Based Access Control (RBAC).
MCP servers can also be registered as protected resources, enabling granular access control over the servers and their associated tools. Organizations can define specific permissions for MCP tools and resources, authorize applications to access them, and grant user access through RBAC.
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@en/identity-server/next/docs/get-started/about-this-release.md` at line 45,
The sentence reintroduces the acronym "Role-Based Access Control (RBAC)"
redundantly; update the phrase "grant user access through Role-Based Access
Control (RBAC)" to use the already-defined acronym only — e.g., change it to
"grant user access through RBAC" — leaving the rest of the sentence about MCP
servers, protected resources, permissions, and authorizing applications
unchanged.


!!! note
Currently MCP servers can only be authorized to applications that are created from the [MCP client Application]({{base_path}}/guides/applications/register-mcp-client-app/) template.
MCP servers can be authorized to all OIDC application types including Custom OIDC applications, Traditional Web applications, Single-Page applications (SPA), Mobile applications, and Machine-to-Machine (M2M) applications. The [MCP client Application]({{base_path}}/guides/applications/register-mcp-client-app/) template provides a pre-configured option for MCP-specific use cases. Digital Wallet applications can only access Verifiable Credential resources and cannot authorize MCP servers.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟡 Minor

Fix template name capitalization for consistency.

Please change MCP client Application to MCP Client Application to match the official template name used across the docs.

As per coding guidelines, "Use official product and feature names exactly as defined; do not invent shorthand names, change capitalization, or alternate between long and short forms unless formally introduced."

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@en/includes/guides/authorization/mcp-server-authorization.md` at line 61,
Update the template name capitalization: replace the phrase "MCP client
Application" with the correct official name "MCP Client Application" in the
sentence that references the [MCP client Application] link (i.e., the link
text/anchor for the register-mcp-client-app guide) so the docs use the exact
product name consistently.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants