From the course: Unboxing AI: Build a Remote MCP Server from Zero to Deployed with OAuth
Unlock this course with a free trial
Join today to access over 24,700 courses taught by industry experts.
Setting up MCP OAuth on Cloudflare - OAuth Tutorial
From the course: Unboxing AI: Build a Remote MCP Server from Zero to Deployed with OAuth
Setting up MCP OAuth on Cloudflare
- Now we need to take this application and put it onto the web. And this is where things change because you can't save the keys and IDs and everything in the project and then just push them. Instead, you have to create secrets that are stored on Cloudflare, that no one can ever see, that are used by Cloudflare to gain access to GitHub. So here's how that's done. First, crash out of the local running process. I'll just type in clear to clear everything. Next, you need to set up keys for this application on Cloudflare. You can do that in two ways: You can either start by creating the keys and sending them to Cloudflare, and then deploy the application afterwards. Or you can deploy the application without the keys, and then send in the keys afterwards. You end up with the same thing. However, in the template that Cloudflare provides, there's already a set of default keys set up in a file, and if you don't take those keys out, those keys will override any keys you set into the system…
Contents
-
-
-
-
-
-
-
(Locked)
Why remote MCP servers are so useful1m 11s
-
(Locked)
Deploying a rempote MCP server on Cloudflare Workers1m 21s
-
(Locked)
Testing a remote MCP server5m 5s
-
(Locked)
Adding tools and updating a remote MCP server3m 42s
-
(Locked)
Implementing GitHub OAuth 2.0 in a remote MCP server5m 3s
-
(Locked)
Testing MCP OAuth in local development4m 11s
-
(Locked)
Setting up MCP OAuth on Cloudflare4m 35s
-
(Locked)
Testing a remote MCP server with OAuth5m 39s
-
(Locked)
-