Navis Ops implements OAuth 2.1 with the authorization code + PKCE flow for AI clients that natively support MCP OAuth. With this method, you point your client at the Navis Ops MCP server URL, and it handles the entire authorization sequence — opening a browser, prompting you to sign in and approve access, and storing the resulting tokens. You never manually copy or paste a token. OAuth is the recommended authentication method for Claude Desktop and Cursor. If you’re using a client that doesn’t support the MCP OAuth flow, or you want a simpler setup, use an API key instead.Documentation Index
Fetch the complete documentation index at: https://docs.navisops.com/llms.txt
Use this file to discover all available pages before exploring further.
How the flow works
You do not need to implement this flow yourself — your MCP client does it automatically. This section describes what happens so you understand what each step means when your browser opens.Client discovers the authorization server
When you add Navis Ops as an MCP server by URL, your client fetches the discovery document at
/.well-known/oauth-authorization-server. This document tells the client where to send authorization requests and where to exchange tokens.The discovery URL is public and predictable by design. Security comes from the bearer token, not URL secrecy.
Client registers itself
The client registers with Navis Ops using dynamic client registration (RFC 7591). Navis Ops issues a
client_id for that client. This happens automatically and only once per client installation.Your browser opens the consent screen
The client generates a PKCE
code_verifier and code_challenge, then opens your browser to the Navis Ops authorization page. You sign in if needed, review the requested scopes, and click Approve or Deny.Tokens are issued
If you approve, Navis Ops issues an access token and a refresh token. Your client stores both and uses the access token on every API request. The access token expires after one hour; the client uses the refresh token to get a new one automatically.
Discovery endpoint
MCP clients use the following endpoint to auto-discover the Navis Ops authorization server:authorization_endpoint, token_endpoint, registration_endpoint, and revocation_endpoint. You do not need to configure these manually — a compliant MCP client reads them automatically.
Scopes
Navis Ops supports two OAuth scopes:| Scope | What it grants |
|---|---|
mcp:read | Read access to all workspace data (projects, tasks, notes, calendar, goals, and more) |
mcp:write | Read access plus the ability to create, update, and delete data |
mcp:write implies mcp:read. There is no per-tool scope — mcp:write grants every write operation across the entire workspace.
When your client prompts you to approve scopes, select mcp:read if you want the assistant to only read your data, or mcp:read mcp:write if you want it to create tasks, notes, events, and other records on your behalf.
Token details
- Access token lifetime: 1 hour. Your client refreshes it automatically using the refresh token.
- Refresh token lifetime: 30 days. After 30 days without use, you must reconnect.
- Token format: Opaque bearer credentials — not JWTs. There is no client-side introspection. Do not attempt to decode or parse the token value.
- Token prefix: OAuth access tokens use the
mcpa_prefix internally. API keys usenops_. You will see these in logs if you inspect network traffic.
Refresh token rotation
Every time your client uses a refresh token to get a new access token, Navis Ops issues a new refresh token and invalidates the old one. This is standard OAuth 2.1 refresh token rotation.Revoking access
To disconnect an OAuth client and revoke all its tokens:- Go to Settings → Connected Apps.
- Find the client you want to disconnect.
- Click Disconnect.
401 Unauthorized.
Clients can also revoke tokens programmatically by posting to the revocation endpoint listed in the discovery document (per RFC 7009).
Supported clients
OAuth authentication works with any MCP client that implements the MCP OAuth 2.1 authorization flow with PKCE. Verified clients include:- Claude Desktop
- Cursor
Authorization header instead.