Friday, May 1, 2026

MCP Server Access Methods

https://www.youtube.com/watch?v=DfWHX7kszQI

https://code.claude.com/docs/en/mcp#installing-mcp-servers 

MCP servers can be accessed in 3 different ways depending on your needs

Option-1 : add a remote http server

HTTP servers are the recommended option for connecting to remote MCP servers. This is the most widely supported transport for cloud-based services.

Option-2 : add a remote sse server

The SSE (Server-Sent Events) transport is deprecated. Use HTTP servers instead, where available.

Option-3 : add a local stdio server

Stdio servers run as local processes on your machine. They’re ideal for tools that need direct system access or custom scripts.

Thursday, April 30, 2026

MCP & Readme.io

https://www.youtube.com/watch?v=kUpAHjufTHw

Gives ability to execute action to chatbot etc

  1. If writing code then read functionality
  2. if writing agent then comes the execute part










Above option can be seen / enabled by end customers ? it is not an admin only option. Admin enables for customers







It is enabled for all end users , not specific to a client

MCP














give URL













query it








Can add custom tools like "generate executive report"


How to authenticate to execute the APIs ?

Only supports header based authentication , here. If token expires keep updating it.





















Custom Knowledge Base , limited to 10k chars









Analytics 25:28




Friday, April 24, 2026

Single Sign On : Scope & Claim

In the world of Single Sign-On (SSO) and Identity protocols (like OpenID Connect and OAuth 2.0), Scopes and Claims are two sides of the same coin. They define what an application is allowed to do and what it knows about the user.


1. Scope Name

A Scope is a high-level identifier used to request specific permissions or groups of information. Think of a scope as a bucket of permissions.

When an application redirects a user to an Identity Provider (IdP) like Okta, Google, or Azure AD, it asks for specific scopes. The user then sees a consent screen asking, "Do you allow this app to access your profile and email?"

  • Purpose: To limit the amount of access an application has (Principle of Least Privilege).

  • Examples: openid, profile, email, address, phone.

  • Analogy: A scope is like a keycard that says you have access to the "Executive Suite."


2. Claim Name

A Claim is a specific piece of information (an assertion) about the user, usually found inside a JSON Web Token (JWT). If the scope is the bucket, the claims are the items inside the bucket.

Once the IdP authenticates the user, it packages these claims into an ID Token or Access Token. Each claim has a "Claim Name" (the key) and a "Claim Value."

  • Purpose: To provide the application with the actual identity data it needs to function.

  • Examples: sub (subject/user ID), given_name, family_name, email_verified, locale.

  • Analogy: A claim is like the text printed on your ID card, such as your "Date of Birth" or "Home Address."


The Relationship: Mapping Scopes to Claims

In OpenID Connect (OIDC), requesting a single Scope Name usually grants the application multiple Claim Names.

Scope NameCommon Claims Returned (Claim Names)
openidsub, iss, aud, exp, iat
profilename, family_name, given_name, preferred_username, picture
emailemail, email_verified
addressaddress (formatted string or object)
phonephone_number, phone_number_verified
FeatureScopeClaim
LocationIn the Authorization Request (URL)In the Identity/Access Token (JWT)
User ExperienceWhat the user consents toWhat the app reads about the user
GranularityBroad (Coarse-grained)Specific (Fine-grained)
FormatSpace-separated stringsKey-value pairs in JSON

Pro-Tip: If you are configuring an SSO integration and the app isn't seeing the user's last name, you usually need to check two things:

More

In OAuth 2.0 and OpenID Connect (OIDC), scopes and claims are both used to communicate information about what a user can do or who they are, but they function at different stages of the authorization process.

1. Scopes: The "Permission" Request

Scopes are used during the Authorization Request. They define the extent of access that an application (the client) is requesting from the user. Think of a scope as a "bucket" of permissions.

  • When they are used: At the very beginning of the handshake. When the application redirects you to a login page, it sends a list of scopes.

  • What they do: They tell the Authorization Server which resources the application wants to touch.

  • Examples:

    • read:contacts: The app wants to see your contact list.

    • openid: A special OIDC scope that tells the server to return an Identity Token.

    • offline_access: The app wants a refresh token to stay logged in.


2. Claims: The "Identity" Data

Claims are used inside the Tokens (specifically ID Tokens and sometimes Access Tokens). A claim is a specific piece of information—an assertion made by the server about the user or the session.

  • When they are used: After the user authenticates. The server issues a JWT (JSON Web Token) containing these claims.

  • What they do: They provide the actual data needed to identify the user or make fine-grained access control decisions.

  • Examples:

    • sub (Subject): The unique ID for the user.

    • email: The user's email address.

    • exp: The expiration time of the token.

    • role: (Custom claim) The user’s job title or group

  1. Is the profile scope included in the request?

  2. Is the family_name claim correctly mapped in your Identity Provider's token configuration?