This guide covers how to connect PipesHub's remote MCP server to Cursor, Claude Code, Gemini CLI, Claude.ai (Web), and LibreChat using static OAuth credentials.
PipesHub exposes a remote MCP endpoint over Streamable HTTP at /mcp.MCP Clients connect to this endpoint directly -- no local npm packages or stdio processes needed.
- A running PipesHub instance (self-hosted or cloud)
- An OAuth app created in PipesHub (see Step 1)
- Log in to your PipesHub instance as an admin
- Navigate to Settings > Developer Settings > OAuth Apps
- Click Create OAuth App
- Fill in the app details:
-
Name: e.g.,
MCP Integration -
Redirect URIs: Add all the redirect URIs for the clients you plan to use:
Client Redirect URI Cursor cursor://anysphere.cursor-mcp/oauth/callbackClaude Code http://localhost:<PORT>/callback(e.g.,http://localhost:8080/callback)Claude.ai (Web) https://claude.ai/api/mcp/auth_callbackGemini CLI http://localhost:7777/oauth/callbackLibreChat http://localhost:3080/api/mcp/<server-identifier>/oauth/callback
-
Important: The scopes in
MCP_SCOPESmust match the scopes granted to your OAuth app — a mismatch will result in an authorization error.
- Save the app and copy the Client ID and Client Secret
By default, PipesHub exposes some default scopes in its /.well-known/oauth-protected-resource/mcp discovery endpoint. You can customize which scopes are exposed by setting the MCP_SCOPES environment variable on your PipesHub instance. This is useful for clients like Claude Code that automatically request all exposed scopes.
Replace these in all configurations below:
| Placeholder | Description | Example |
|---|---|---|
PIPESHUB_INSTANCE_URL |
Your PipesHub instance URL | https://app.pipeshub.com |
YOUR_CLIENT_ID |
OAuth app client ID | clid_abc123... |
YOUR_CLIENT_SECRET |
OAuth app client secret | clsec_xyz789... |
The remote MCP endpoint URL is: PIPESHUB_INSTANCE_URL/mcp
Cursor
Cursor supports static OAuth for remote MCP servers via the auth object in mcp.json.
Open Cursor Settings > Tools and Integrations > New MCP Server, or edit your project's .cursor/mcp.json:
{
"mcpServers": {
"pipeshub": {
"url": "PIPESHUB_INSTANCE_URL/mcp",
"auth": {
"CLIENT_ID": "YOUR_CLIENT_ID",
"CLIENT_SECRET": "YOUR_CLIENT_SECRET",
"scopes": [
"org:read", "org:write", "org:admin",
"user:read", "user:write", "user:invite", "user:delete",
"usergroup:read", "usergroup:write",
"team:read", "team:write",
"kb:read", "kb:write", "kb:delete", "kb:upload",
"semantic:read", "semantic:write", "semantic:delete",
"conversation:read", "conversation:write", "conversation:chat",
"agent:read", "agent:write", "agent:execute",
"connector:read", "connector:write", "connector:sync", "connector:delete",
"config:read", "config:write",
"document:read", "document:write", "document:delete",
"crawl:read", "crawl:write", "crawl:delete"
]
}
}
}
}Cursor will auto-discover the authorization and token endpoints via PipesHub's /.well-known/oauth-protected-resource/mcp metadata.
Note: If the
scopesfield is omitted, Cursor fetches/.well-known/oauth-protected-resource/mcpand requests allscopes_supportedlisted there. To limit access, explicitly list only the scopes you need. You can also control which scopes are exposed server-side — see Customizing Default Scopes.
Use Cursor's ${env:VAR} interpolation to keep secrets out of config files:
{
"mcpServers": {
"pipeshub": {
"url": "${env:PIPESHUB_INSTANCE_URL}/mcp",
"auth": {
"CLIENT_ID": "${env:PIPESHUB_CLIENT_ID}",
"CLIENT_SECRET": "${env:PIPESHUB_CLIENT_SECRET}",
"scopes": [
"kb:read", "kb:write",
"semantic:read", "semantic:write",
"conversation:read", "conversation:write", "conversation:chat",
"agent:read", "agent:write", "agent:execute",
"connector:read", "connector:write",
"config:read", "user:read"
]
}
}
}
}Cursor uses a fixed redirect URI for all MCP servers:
cursor://anysphere.cursor-mcp/oauth/callback
Register this as the allowed redirect URI when creating the OAuth app in PipesHub.
If Cursor's internal browser fails to load the OAuth login page, copy the authorization URL from the internal browser and paste it into your normal browser to complete the login flow.
Claude Code
Claude Code supports remote HTTP MCP servers with static OAuth credentials via --client-id, --client-secret, and --callback-port.
PipesHub exposes discovery at /.well-known/oauth-protected-resource/mcp, so Claude Code auto-discovers the authorization and token endpoints.
Important: Claude Code does not support configuring specific scopes. It fetches
/.well-known/oauth-protected-resource/mcp, reads thescopes_supportedlist, and requests all of them. Your OAuth app in PipesHub must have access to all scopes listed in the discovery endpoint, otherwise the authorization request will fail. To limit the exposed scopes, see Customizing Default Scopes.
claude mcp add --transport http \
--client-id YOUR_CLIENT_ID \
--client-secret \
--callback-port 8080 \
pipeshub PIPESHUB_INSTANCE_URL/mcp
--client-secretwithout a value prompts for masked input. To skip the prompt, set theMCP_CLIENT_SECRETenvironment variable:MCP_CLIENT_SECRET=YOUR_CLIENT_SECRET claude mcp add --transport http \ --client-id YOUR_CLIENT_ID \ --client-secret \ --callback-port 8080 \ pipeshub PIPESHUB_INSTANCE_URL/mcp
To make it available across all projects:
claude mcp add --transport http --scope user \
--client-id YOUR_CLIENT_ID \
--client-secret \
--callback-port 8080 \
pipeshub PIPESHUB_INSTANCE_URL/mcpclaude mcp add-json pipeshub '{
"type": "http",
"url": "PIPESHUB_INSTANCE_URL/mcp",
"oauth": {
"clientId": "YOUR_CLIENT_ID",
"callbackPort": 8080
}
}' --client-secretCreate a .mcp.json file in your project root. This can be committed to version control (secrets stay out via env vars):
{
"mcpServers": {
"pipeshub": {
"type": "http",
"url": "${PIPESHUB_INSTANCE_URL}/mcp",
"oauth": {
"clientId": "${PIPESHUB_CLIENT_ID}",
"callbackPort": 8080
}
}
}
}Set environment variables before launching Claude Code:
export PIPESHUB_INSTANCE_URL="https://app.pipeshub.com"
export PIPESHUB_CLIENT_ID="your-client-id"Note: The client secret is stored in the system keychain, not in config files. You'll be prompted to enter it when you first authenticate via
/mcp.
After adding the server, run /mcp inside Claude Code and follow the browser login flow. Tokens are stored securely and refreshed automatically.
claude mcp list
claude mcp get pipeshubGemini CLI
Gemini CLI supports remote MCP servers with OAuth via dynamic_discovery (the default), which auto-discovers authorization and token endpoints from PipesHub's /.well-known/oauth-protected-resource/mcp.
Edit ~/.gemini/settings.json:
{
"mcpServers": {
"pipeshub": {
"url": "PIPESHUB_INSTANCE_URL/mcp",
"oauth": {
"clientId": "YOUR_CLIENT_ID",
"clientSecret": "YOUR_CLIENT_SECRET",
"scopes": [
"org:read", "org:write", "org:admin",
"user:read", "user:write", "user:invite", "user:delete",
"usergroup:read", "usergroup:write",
"team:read", "team:write",
"kb:read", "kb:write", "kb:delete", "kb:upload",
"semantic:read", "semantic:write", "semantic:delete",
"conversation:read", "conversation:write", "conversation:chat",
"agent:read", "agent:write", "agent:execute",
"connector:read", "connector:write", "connector:sync", "connector:delete",
"config:read", "config:write",
"document:read", "document:write", "document:delete",
"crawl:read", "crawl:write", "crawl:delete"
]
}
}
}
}Note: Adjust the
scopeslist to match what your OAuth app was granted. If you only need a subset of tools, you can limit the scopes accordingly.
gemini mcp add --transport http pipeshub PIPESHUB_INSTANCE_URL/mcpThen edit ~/.gemini/settings.json to add the oauth block as shown above.
Inside Gemini CLI, use the /mcp auth commands:
# List servers and their auth status
/mcp auth
# Authenticate with PipesHub (opens browser for login)
/mcp auth pipeshub
# Re-authenticate if tokens expire
/mcp auth pipeshubOn first connection, Gemini will automatically detect the 401 response, discover the OAuth endpoints, and open a browser for login. Tokens are stored securely in ~/.gemini/mcp-oauth-tokens.json and refreshed automatically.
# List all configured servers
gemini mcp list
# Remove the server
gemini mcp remove pipeshub
# Temporarily disable/enable
gemini mcp disable pipeshub
gemini mcp enable pipeshub| Property | Required | Description |
|---|---|---|
clientId |
Yes | OAuth 2.0 Client ID from PipesHub |
clientSecret |
No | OAuth 2.0 Client Secret (for confidential clients) |
scopes |
No | OAuth scopes to request |
authorizationUrl |
No | Override authorization endpoint (auto-discovered by default) |
tokenUrl |
No | Override token endpoint (auto-discovered by default) |
redirectUri |
No | Override redirect URI (defaults to http://localhost:7777/oauth/callback) |
Note: OAuth requires a local browser. It will not work in headless environments, remote SSH without X11 forwarding, or containers without browser access.
Claude.ai (Web)
Claude.ai supports custom connectors via remote MCP servers. This lets you use PipesHub tools directly in the Claude.ai web interface without any local setup.
Note: This feature is currently in beta. Free plan users are limited to one custom connector.
- Go to claude.ai and navigate to Settings > Connectors
- Click Add custom connector at the bottom of the Connectors section
- Enter the MCP server URL:
PIPESHUB_INSTANCE_URL/mcp - Click Advanced settings and enter your OAuth credentials:
- OAuth Client ID:
YOUR_CLIENT_ID - OAuth Client Secret:
YOUR_CLIENT_SECRET
- OAuth Client ID:
- Click Add
- You'll be redirected to PipesHub's login page to authenticate and grant permissions
- After authenticating, the connector will be active and PipesHub tools will be available in your Claude.ai conversations
Organization Owners must first add the connector:
- Navigate to Organization settings > Connectors
- Click Add custom connector
- Enter the MCP server URL:
PIPESHUB_INSTANCE_URL/mcp - Click Advanced settings and enter the OAuth Client ID and Client Secret
- Click Add
Team members can then connect:
- Go to Settings > Connectors
- Find the PipesHub connector (marked with a "Custom" label)
- Click Connect to authenticate via PipesHub's OAuth login
Claude.ai uses the following redirect URI for OAuth:
https://claude.ai/api/mcp/auth_callback
Register this as an allowed redirect URI in your PipesHub OAuth app.
- Only connect to trusted MCP servers
- Review the permissions requested during the OAuth authentication flow
- Claude.ai interacts with PipesHub on your behalf using the granted OAuth token — your password is never shared
LibreChat
LibreChat supports remote MCP servers with OAuth authentication via its custom connectors UI. This lets you connect PipesHub tools to any model available in your LibreChat instance.
- Log in to your LibreChat instance
- Navigate to MCP Servers settings panel
- Click Add to create a new custom MCP connector
- Fill in the connector details:
- Name:
Pipeshub(or any name you prefer) - MCP Server URL:
PIPESHUB_INSTANCE_URL/mcp - Transport: Select Streamable HTTPS
- Authentication: Select OAuth
- Name:
- Enter your OAuth credentials:
- Client ID:
YOUR_CLIENT_ID - Client Secret:
YOUR_CLIENT_SECRET - Authorization URL:
PIPESHUB_INSTANCE_URL/api/v1/oauth2/authorize - Token URL:
PIPESHUB_INSTANCE_URL/api/v1/oauth2/token - Scope:
openid email(or additional scopes as needed)
- Client ID:
- Check I trust this application
- Click Add to save the connector
- After adding, LibreChat will generate a Redirect URI displayed in the connector settings panel (next to the copy button). It follows this format:
http://localhost:3080/api/mcp/<server-identifier>/oauth/callback - Copy the Redirect URI and register it as an allowed redirect URI in your PipesHub OAuth app (see Step 1)
- Return to the LibreChat connector and click Update to initiate the OAuth flow — you'll be redirected to PipesHub's login page to authenticate and grant permissions
LibreChat generates the redirect URI after the connector is created. The URI follows this format:
http://localhost:3080/api/mcp/<server-identifier>/oauth/callback
Where <server-identifier> is the unique identifier assigned by LibreChat (visible at the top of the connector settings as "Unique Server Identifier"). You must copy this URI and add it to your PipesHub OAuth app's allowed redirect URIs before authenticating.
Note: If your LibreChat instance runs on a different host or port, the URI will reflect that (e.g.,
https://chat.example.com/api/mcp/pipeshub/oauth/callback).
LibreChat allows you to specify the OAuth scopes in the Scope field. Use a space-separated list:
openid email
To request PipesHub-specific scopes, add them to the scope field:
openid email org:read kb:read kb:write semantic:read conversation:read conversation:write conversation:chat agent:read agent:execute
Note: The scopes you request must match the scopes granted to your OAuth app in PipesHub. See Customizing Default Scopes for details.
Instead of connecting to PipesHub's remote MCP endpoint, you can run the MCP server locally as a stdio process using the @pipeshub-ai/mcp npm package. This is useful when you prefer a local setup or need to work in environments where direct HTTP connections to the remote MCP endpoint aren't practical.
- Node.js 18+ installed
- A PipesHub instance URL
- Authentication credentials: either a Bearer token (JWT) or OAuth Client ID + Secret
Replace these in all configurations below:
| Placeholder | Description | Example |
|---|---|---|
PIPESHUB_INSTANCE_URL |
Your PipesHub instance URL | https://app.pipeshub.com |
YOUR_BEARER_TOKEN |
JWT Bearer token for authentication | eyJhbGci... |
YOUR_CLIENT_ID |
OAuth app client ID | clid_abc123... |
YOUR_CLIENT_SECRET |
OAuth app client secret | clsec_xyz789... |
Claude Desktop
Configure in Claude Desktop settings (claude_desktop_config.json):
{
"mcpServers": {
"pipeshub": {
"command": "npx",
"args": [
"@pipeshub-ai/mcp",
"start",
"--server-url",
"PIPESHUB_INSTANCE_URL",
"--bearer-auth",
"YOUR_BEARER_TOKEN"
]
}
}
}With OAuth credentials:
{
"mcpServers": {
"pipeshub": {
"command": "npx",
"args": [
"@pipeshub-ai/mcp",
"start",
"--server-url",
"PIPESHUB_INSTANCE_URL",
"--client-id",
"YOUR_CLIENT_ID",
"--client-secret",
"YOUR_CLIENT_SECRET",
"--token-url",
"/api/v1/oauth2/token"
]
}
}
}Cursor (Local)
Open Cursor Settings > Tools and Integrations > New MCP Server, or edit your project's .cursor/mcp.json:
{
"mcpServers": {
"pipeshub": {
"command": "npx",
"args": [
"@pipeshub-ai/mcp",
"start",
"--server-url",
"PIPESHUB_INSTANCE_URL",
"--bearer-auth",
"YOUR_BEARER_TOKEN"
]
}
}
}With OAuth credentials:
{
"mcpServers": {
"pipeshub": {
"command": "npx",
"args": [
"@pipeshub-ai/mcp",
"start",
"--server-url",
"PIPESHUB_INSTANCE_URL",
"--client-id",
"YOUR_CLIENT_ID",
"--client-secret",
"YOUR_CLIENT_SECRET",
"--token-url",
"/api/v1/oauth2/token"
]
}
}
}Claude Code CLI (Local)
claude mcp add pipeshub -- npx -y @pipeshub-ai/mcp start \
--server-url PIPESHUB_INSTANCE_URL \
--bearer-auth YOUR_BEARER_TOKENWith OAuth credentials:
claude mcp add pipeshub -- npx -y @pipeshub-ai/mcp start \
--server-url PIPESHUB_INSTANCE_URL \
--client-id YOUR_CLIENT_ID \
--client-secret YOUR_CLIENT_SECRET \
--token-url /api/v1/oauth2/tokenGemini CLI (Local)
gemini mcp add pipeshub -- npx -y @pipeshub-ai/mcp start \
--server-url PIPESHUB_INSTANCE_URL \
--bearer-auth YOUR_BEARER_TOKENWith OAuth credentials:
gemini mcp add pipeshub -- npx -y @pipeshub-ai/mcp start \
--server-url PIPESHUB_INSTANCE_URL \
--client-id YOUR_CLIENT_ID \
--client-secret YOUR_CLIENT_SECRET \
--token-url /api/v1/oauth2/tokenVS Code
Open Command Palette > MCP: Open User Configuration, then add:
{
"mcpServers": {
"pipeshub": {
"command": "npx",
"args": [
"@pipeshub-ai/mcp",
"start",
"--server-url",
"PIPESHUB_INSTANCE_URL",
"--bearer-auth",
"YOUR_BEARER_TOKEN"
]
}
}
}Windsurf
Open Windsurf Settings > Cascade > Manage MCPs > View raw config, then add:
{
"mcpServers": {
"pipeshub": {
"command": "npx",
"args": [
"@pipeshub-ai/mcp",
"start",
"--server-url",
"PIPESHUB_INSTANCE_URL",
"--bearer-auth",
"YOUR_BEARER_TOKEN"
]
}
}
}Progressive Discovery (Dynamic Mode)
The local MCP server exposes 300+ tools. To avoid context window bloat, enable dynamic mode which exposes only 3 meta-tools (list_tools, describe_tool, execute_tool) for progressive discovery:
{
"mcpServers": {
"pipeshub": {
"command": "npx",
"args": [
"@pipeshub-ai/mcp",
"start",
"--mode",
"dynamic",
"--server-url",
"PIPESHUB_INSTANCE_URL",
"--bearer-auth",
"YOUR_BEARER_TOKEN"
]
}
}
}Running from Source (Development)
To run the local MCP server from a cloned repository instead of the npm package:
git clone https://github.com/pipeshub-ai/pipeshub-ai.git
cd pipeshub-ai
npm install
npm run build
node ./bin/mcp-server.js start --server-url PIPESHUB_INSTANCE_URL --bearer-auth YOUR_BEARER_TOKENFor MCP client configuration, replace npx @pipeshub-ai/mcp with node ./bin/mcp-server.js:
{
"mcpServers": {
"pipeshub": {
"command": "node",
"args": [
"./bin/mcp-server.js",
"start",
"--server-url",
"PIPESHUB_INSTANCE_URL",
"--bearer-auth",
"YOUR_BEARER_TOKEN"
]
}
}
}To debug with MCP Inspector:
npx @modelcontextprotocol/inspector node ./bin/mcp-server.js start --server-url PIPESHUB_INSTANCE_URL --bearer-auth YOUR_BEARER_TOKENFor a full list of server arguments:
npx @pipeshub-ai/mcp --helpAI Client (Cursor / Claude Code / Gemini CLI / Claude.ai / LibreChat)
│
│ HTTP POST (JSON-RPC)
│ Authorization: Bearer <token>
▼
PIPESHUB_INSTANCE_URL/mcp
│
│ StreamableHTTP Transport
│ (stateless, per-request MCP server)
▼
PipesHub API (300+ tools via progressive discovery)
PipesHub exposes OAuth protected resource discovery at:
PIPESHUB_INSTANCE_URL/.well-known/oauth-protected-resource/mcp
This returns all OAuth endpoints automatically:
- Authorization:
PIPESHUB_INSTANCE_URL/api/v1/oauth2/authorize - Token:
PIPESHUB_INSTANCE_URL/api/v1/oauth2/token - Revocation:
PIPESHUB_INSTANCE_URL/api/v1/oauth2/revoke - JWKS:
PIPESHUB_INSTANCE_URL/.well-known/jwks.json
This means the client is trying dynamic registration instead of using your pre-configured credentials. Make sure you passed --client-id and --client-secret (Claude Code) or the auth object (Cursor) correctly.
- Ensure the Redirect URI in your OAuth app matches exactly what the client uses:
- Cursor:
cursor://anysphere.cursor-mcp/oauth/callback - Claude Code:
http://localhost:<callbackPort>/callback - Claude.ai:
https://claude.ai/api/mcp/auth_callback - Gemini CLI:
http://localhost:7777/oauth/callback - LibreChat:
http://localhost:3080/api/mcp/<server-identifier>/oauth/callback
- Cursor:
- Make sure the OAuth app is active (not suspended) in PipesHub
- Verify the endpoint is accessible:
curl -X POST PIPESHUB_INSTANCE_URL/mcp(should return 401, not connection error) - Check that your PipesHub instance has MCP enabled
The remote MCP server runs in dynamic mode (progressive discovery) by default, exposing only 3 meta-tools (list_tools, describe_tool, execute_tool). This keeps context usage minimal across all clients.
npx @modelcontextprotocol/inspectorThen connect to PIPESHUB_INSTANCE_URL/mcp with a Bearer token to test the endpoint directly.
How do I update the scopes for my MCP integration?
- Update the
MCP_SCOPESenvironment variable on your PipesHub instance to include the new scopes you want exposed via the discovery endpoint. - Update the OAuth app scopes in PipesHub: go to Settings > Developer Settings > OAuth Apps, select your OAuth app, and add or remove scopes as needed.
- Re-authenticate the client — existing tokens carry the old scopes, so you need to re-authenticate to get a new token with the updated scopes. For example:
- Cursor: Remove and re-add the MCP server, or clear the cached OAuth token and reconnect.
- Claude Code: Run
/mcpand complete the browser login flow again. - Gemini CLI: Run
/mcp auth pipeshubto re-authenticate. - Claude.ai: Disconnect and reconnect the connector in Settings > Connectors.


