Skip to main content
Glean can act as an OAuth 2.1 Authorization Server (issuing access tokens) and as the Resource Server (validating them), while delegating user authentication to your configured Single Sign-On (SSO) Identity Provider (IdP) using OpenID Connect (OIDC) or Security Assertion Markup Language (SAML). This is currently designed for MCP remote server authentication. While the underlying infrastructure supports Client API operations, full Client API support requires additional UI components that are planned for future releases. Glean does not replace your SSO. When you enable the Glean OAuth Authorization Server, Glean only acts as the authorization server that issues OAuth access tokens. User authentication continues to happen through your existing SSO Identity Provider (Google Workspace, Microsoft Entra ID, Okta, etc.) using the same OIDC or SAML configuration you already have. Glean reuses your existing SSO for authentication and adds OAuth token issuance on top.
The Indexing API uses a separate authentication model with Glean-issued tokens and does not accept OAuth.

Overview

When to choose this approach

  • You are connecting MCP host applications to Glean’s remote MCP server. This is the recommended authentication path for MCP and requires enabling the Glean OAuth Authorization Server.
  • You want faster setup without coordinating with your IdP team for new integrations.
  • You want Glean-defined, fine-grained scopes for future Client API integrations (note: full Client API support with UI is coming in a future release).

What Glean does and does not do

  • Does: Act as OAuth 2.1 Authorization Server (issue access tokens); define and enforce scopes; validate tokens at the Resource Server.
  • Does not: Replace or modify your SSO setup. User authentication continues via your existing SSO IdP (OIDC or SAML). Glean reuses your SSO, it doesn’t reinvent it.

Where it applies

  • MCP Remote Servers: Fully supported and recommended. This is the primary use case for the Glean OAuth Authorization Server. Note that host OAuth support may vary by MCP client application.
  • Client API: Technically supported for operations like search, chat, and agents, but full support requires additional UI components planned for future releases.

Setup and Configuration

Enabling the Glean OAuth Authorization Server

The Glean OAuth Authorization Server is disabled by default. To enable it, follow the steps below:
1

Navigate to OAuth Settings

Go to the Admin Console and navigate to Settings → Third‑party access (OAuth).
2

Enable Glean OAuth Authorization Server

Glean OAuth Authorization Server
Once the Glean OAuth Authorization Server is enabled, you can start using it immediately, without any additional configuration.

Using OAuth with MCP Remote Servers

Once enabled, MCP host applications can authenticate using the following flow:
  • The MCP host initiates the Authorization Code flow (opening a browser for IdP login and user consent)
  • The host obtains tokens through the Glean OAuth server
  • The host connects to Remote MCP endpoints using the OAuth token
  • Bearer token fallback: If an MCP host does not support OAuth, a user-scoped bearer token can be used as a fallback (less preferred than OAuth)

Technical Reference

Supported flows and endpoints

  • Authorization Code with Proof Key for Code Exchange (PKCE).
  • Endpoints: Authorization, Token, Introspection, and OIDC Discovery. These support standard client registration and token acquisition patterns without exposing non-public base URLs.

Scopes and permissions

Glean-defined scopes govern API capabilities. Request the minimum scopes needed for your integration. Examples include SEARCH, CHAT, AGENTS, MCP, DOCUMENTS, TOOLS, and ENTITIES. For MCP remote servers, the relevant scopes (particularly MCP and related resource scopes) are automatically managed during the OAuth flow. The Indexing API uses a separate authentication model and does not accept OAuth.

Troubleshooting and cautions

  • Ensure the Glean OAuth server is enabled; otherwise token acquisition or validation will fail.
  • Redirect URIs must match exactly; the PKCE verifier must match the original challenge.
  • Do not use OAuth for the Indexing API, which requires Glean-issued tokens.
  • MCP host client authentication failures or unknown client errors: Clear the host’s stored MCP credentials and re-authenticate.