New in version: 2.12.0
This guide shows you how to secure your FastMCP server using GitHub OAuth. Since GitHub doesn’t support Dynamic Client Registration, this integration uses the OAuth Proxy pattern to bridge GitHub’s traditional OAuth with MCP’s authentication requirements.
Configuration
Prerequisites
Before you begin, you will need:- A GitHub Account with access to create OAuth Apps
- Your FastMCP server’s URL (can be localhost for development, e.g.,
http://localhost:8000)
Step 1: Create a GitHub OAuth App
Create an OAuth App in your GitHub settings to get the credentials needed for authentication:1
Navigate to OAuth Apps
Go to Settings → Developer settings → OAuth Apps in your GitHub account, or visit github.com/settings/developers.Click “New OAuth App” to create a new application.
2
Configure Your OAuth App
Fill in the application details:
- Application name: Choose a name users will recognize (e.g., “My FastMCP Server”)
- Homepage URL: Your application’s homepage or documentation URL
- Authorization callback URL: Your server URL +
/auth/callback(e.g.,http://localhost:8000/auth/callback)
3
Save Your Credentials
After creating the app, you’ll see:
- Client ID: A public identifier like
Ov23liAbcDefGhiJkLmN - Client Secret: Click “Generate a new client secret” and save the value securely
Step 2: FastMCP Configuration
Create your FastMCP server using theGitHubProvider, which handles GitHub’s OAuth quirks automatically:
server.py
Testing
Running the Server
Start your FastMCP server with HTTP transport to enable OAuth flows:Testing with a Client
Create a test client that authenticates with your GitHub-protected server:test_client.py
- Your browser will open to GitHub’s authorization page
- After you authorize the app, you’ll be redirected back
- The client receives the token and can make authenticated requests
The client caches tokens locally, so you won’t need to re-authenticate for subsequent runs unless the token expires or you explicitly clear the cache.
Production Configuration
New in version: 2.13.0
For production deployments with persistent token management across server restarts, configure jwt_signing_key and client_storage:
server.py
Parameters (
jwt_signing_key and client_storage) work together to ensure tokens and client registrations survive server restarts. Wrap your storage in FernetEncryptionWrapper to encrypt sensitive OAuth tokens at rest - without it, tokens are stored in plaintext. Store secrets in environment variables and use a persistent storage backend like Redis for distributed deployments.For complete details on these parameters, see the OAuth Proxy documentation.Environment Variables
New in version: 2.12.1
For production deployments, use environment variables instead of hardcoding credentials.
Provider Selection
Setting this environment variable allows the GitHub provider to be used automatically without explicitly instantiating it in code.Set to
fastmcp.server.auth.providers.github.GitHubProvider to use GitHub authentication.GitHub-Specific Configuration
These environment variables provide default values for the GitHub provider, whether it’s instantiated manually or configured viaFASTMCP_SERVER_AUTH.
Your GitHub OAuth App Client ID (e.g.,
Ov23liAbcDefGhiJkLmN)Your GitHub OAuth App Client Secret
Public URL where OAuth endpoints will be accessible (includes any mount path)
Issuer URL for OAuth metadata (defaults to
BASE_URL). Set to root-level URL when mounting under a path prefix to avoid 404 logs. See HTTP Deployment guide for details.Redirect path configured in your GitHub OAuth App
Comma-, space-, or JSON-separated list of required GitHub scopes (e.g.,
user repo or ["user","repo"])HTTP request timeout for GitHub API calls
.env file:
server.py

