This repository provides a complete MCP server implementation that
- demonstrates all MCP protocol features (tools, resources, prompts, sampling)
- implements OAuth 2.0 authentication using the recommended separate auth server architectural pattern
- serves as a learning resource and starting template for building your own MCP servers
The Model Context Protocol enables seamless integration between AI applications and external data sources, tools, and services.
To start exploring ASAP:
# Clone and install
git clone https://github.com/modelcontextprotocol/example-remote-server.git
cd example-remote-server
npm install
# Start the server with in-process auth and in-memory session management
npm run dev:internal
# In another terminal, run MCP Inspector
npx -y @modelcontextprotocol/inspector
# Inspector will open a browser window.
# Connect to http://localhost:3232/mcp to authenticate and explore server features
The server is now running a lightweight config with everything bundled in a single process:
- authentication is handled by an in-process module, rather than a separate server
- sessions are stored in memory, rather than in Redis
Other configurations are available: see Development Setup, below.
This server implements the complete MCP specification:
- Tools: 7 example tools including echo, add, long-running operations, and LLM sampling
- Resources: 100+ example resources with pagination and subscription support
- Prompts: Simple and complex prompts with argument support
- Sampling: LLM interaction capabilities
- Transports: Both Streamable HTTP (recommended) and SSE (legacy)
- Node.js >= 16
- npm or yarn
- TypeScript (installed automatically via npm install, required for building)
- Docker (optional, for Redis)
The codebase supports a number of configurations ranging from simple/exploratory to something closer to how a production deployment would look.
Development/Exploration | Productionesque | |
---|---|---|
Auto-restart | npm run dev:* • Auto-restarts on file changes • Verbose logging • Source maps enabled |
npm run start:* • Requires build step first • Optimized performance • No auto-restart |
Auth Mode | internal • OAuth in same process • Single port (3232) • Easier to debug |
external • Separate auth server • Multiple ports (3001 + 3232) • Can point to commercial auth provider instead |
Session Storage | In-memory • No dependencies • Sessions lost on restart • Single instance only |
Redis • Requires Docker/Redis • Sessions persist • Multi-instance ready |
Server configuration is determined by environment variables. To set up a non-default configuration, copy .env.example
to .env
and edit as desired, or pass non-defaults on the command line.
Some example commands for different configurations are listed below. See the Authentication Config and Session Management Config sections below for detailed instructions on changing those configurations.
# Development mode - watches for file changes and auto-restarts
npm run dev:internal # Internal auth
# or
npm run dev:external # External auth
# Production mode - optimized build, no auto-restart
npm run build # Build TypeScript to JavaScript first
# then
npm run start:internal # Internal auth
# or
npm run start:external # External auth
# Redis-backed sessions
docker compose up -d # Start Redis first
# configure REDIS_URL or pass on command line - see Session Management Config below - e.g.
REDIS_URL=redis://localhost:6379 npm run dev:internal
# Sessions will now persist across restarts
# Verify Redis is being used
npm run dev:internal 2>&1 | grep -i redis
# Should show: "Redis client connected successfully" or similar
This repo implements the separate auth server architecture pattern described in the MCP specification, in which the MCP server is the "resource server", and authorization functionality is hosted separately. (The architecture in which resource and authorization server functions are tightly integrated within the MCP server is deprecated, and is not demonstrated in this codebase.)
For convenience and simplicity during exploration, the server supports an internal auth mode, in which OAuth 2.0 endpoints are hosted in the same process as the MCP server. However, it remains architecturally separate from the MCP server itself: there is no entanglement of MCP and authorization functionality in the codebase. To run the server in this mode, use npm run dev:internal
.
External auth mode is the standard configuration in which the MCP server and authentication servers run as separate processes. A demonstration authorization server is provided in this repo, and you can also point to commercial providers like Auth0 or Okta by updating the relevant config options. To run the MCP server in external mode, use npm run dev:external
: this command will also start the separate demo auth server.
Note: choice of mode and OAuth server does not affect the MCP server's interaction with clients during authorization. It simply determines the authorization server endpoints returned in Protected Resource Metadata.
Authentication Environment Variables:
-
AUTH_MODE
- Sets the authentication mode:internal
(default) - Auth endpoints run in-process with the MCP serverexternal
- Auth endpoints run on a separate server
-
AUTH_SERVER_URL
- URL of the external auth server (required whenAUTH_MODE=external
, ignored whenAUTH_MODE=internal
)- Example for local demo:
http://localhost:3001
- Example for Auth0:
https://your-tenant.auth0.com
- Example for Okta:
https://your-domain.okta.com
- Example for local demo:
By default, the server uses in-memory session storage for development and local single-session testing. This simplifies getting the server up and running for exploration, but confines sessions to a single server instance and destroys them on server restarts.
For multi-instance testing and persistent sessions, the server also supports Redis-managed session storage.
Setting up Redis:
-
Install Docker (if not already installed):
- macOS: Docker Desktop for Mac
- Windows: Docker Desktop for Windows
- Linux: Docker Engine
-
Start Redis using Docker Compose:
docker compose up -d # Starts Redis in the background
To stop Redis later:
docker compose down
-
Configure the server to use Redis by setting environment variables:
Session Storage Environment Variables:
-
REDIS_URL
- Redis connection URL (optional)- When set: Sessions are stored in Redis (persistent across restarts)
- When not set: Sessions use in-memory storage (lost on restart)
- Default: Not set (in-memory storage)
- Example:
redis://localhost:6379
(Redis default port)
-
REDIS_TLS
- Enable TLS for Redis connection- Set to
1
ortrue
to enable TLS - Default:
0
(disabled)
- Set to
-
REDIS_PASSWORD
- Redis password for authentication (if required) -
NODE_ENV
- Controls Redis connection failure behavior:development
(default) - Server continues with warning if Redis failsproduction
- Server exits if Redis connection fails
Note: Docker container config can be found in
.devcontainer/docker-compose.yml
. -
As noted above, MCP Inspector is the recommended way to explore the server's capabilities:
# With server running
npx -y @modelcontextprotocol/inspector
# 1. Connect to http://localhost:3232/mcp (adjust port to match current config is needed)
# 2. Go through authorization steps
# 3. Explore OAuth authentication in the Auth tab
# 4. Test tools, resources, and prompts interactively
The examples/
directory contains scripts that interact with MCP endpoints directly, without use of SDK functionality. These can help build intuition for how the protocol works under the hood:
client.js
- Node.js client demonstrating OAuth and MCP operationscurl-examples.sh
- Shell script showing raw HTTP usage
npm run lint # Code linting
npm run typecheck # Type checking
npm test # Unit tests
npm run test:e2e # End-to-end tests
.
├── src/ # Source code
│ ├── index.ts # Server entry point
│ ├── config.ts # Configuration management
│ ├── interfaces/
│ │ └── auth-validator.ts # Clean auth/MCP boundary
│ ├── modules/
│ │ ├── auth/ # Demo OAuth 2.0 implementation
│ │ │ ├── auth/ # Core auth logic and providers
│ │ │ ├── handlers/ # Mock upstream IdP handler
│ │ │ ├── services/ # Auth and Redis-backed session services
│ │ │ ├── static/ # OAuth frontend assets
│ │ │ ├── index.ts # Auth module router
│ │ │ └── types.ts # Auth type definitions
│ │ ├── mcp/ # MCP protocol implementation
│ │ │ ├── handlers/ # Streamable HTTP and SSE handlers
│ │ │ ├── services/ # MCP core and Redis transport
│ │ │ ├── index.ts # MCP module router
│ │ │ └── types.ts # MCP type definitions
│ │ └── shared/ # Shared utilities
│ │ ├── logger.ts # Logging configuration
│ │ └── redis.ts # Redis client with mock fallback
│ └── static/ # Static web assets
├── examples/ # Example client implementations
│ ├── client.js # Node.js client with OAuth flow
│ └── curl-examples.sh # Shell script with curl examples
├── docs/ # Additional Documentation
├── tests/ # Test files
├── .env.example # Environment variable template
├── docker-compose.yml # Docker setup for Redis
├── package.json # Node.js dependencies
└── tsconfig.json # TypeScript configuration
Additional documentation can be found in the docs/
directory:
- OAuth Implementation - Complete OAuth 2.0 + PKCE guide with architecture, flows, and commercial provider integration
- Session Ownership - Multi-user session isolation and Redis-backed ownership tracking
We welcome contributions! Please see CONTRIBUTING.md for guidelines.
MIT License - see LICENSE file for details.