Skip to content

docs: add consent-skip allowlist section to gateway dashboard guide#982

Open
wdawson wants to merge 10 commits into
wils/gro-93-docs-configuring-user-sources-guidefrom
wils/gro-99-docs-client-id-reference-for-consent-skip-allowlist
Open

docs: add consent-skip allowlist section to gateway dashboard guide#982
wdawson wants to merge 10 commits into
wils/gro-93-docs-configuring-user-sources-guidefrom
wils/gro-99-docs-client-id-reference-for-consent-skip-allowlist

Conversation

@wdawson
Copy link
Copy Markdown
Contributor

@wdawson wdawson commented May 22, 2026

Summary

Adds an inline Skip consent for trusted MCP clients section to app/en/guides/mcp-gateways/create-via-dashboard/page.mdx, with a starter table of confirmed MCP client IDs and guidance on finding client IDs for unlisted clients. Cross-link added from the User Sources overview.

Closes GRO-99. Part of the GRO-75 umbrella.

Targeting

Targets wils/gro-93-docs-configuring-user-sources-guide (the GRO-75 integration branch), not main. The umbrella PR (#978) is the one that eventually merges to main.

Rescope vs. original GRO-99

Originally scoped as a standalone reference page. After investigating actual CIMD adoption across the documented MCP clients, the only stable, publicly verifiable client IDs are:

  • Claude (Claude Desktop + Claude.ai)https://claude.ai/oauth/mcp-oauth-client-metadata (also referenced in the dashboard form's tooltip)
  • Visual Studio Codehttps://vscode.dev/oauth/client-metadata.json

Cursor, GitHub Copilot, Codex, and Claude Code all currently rely on Dynamic Client Registration with ephemeral client IDs — no stable value to allowlist. A separate reference page would be too thin to justify. Inline keeps it adjacent to the form field, and the table is easy to extend when more clients adopt CIMD.

Decisions worth flagging

  • Section heading matches the form's label-style wording ("Skip consent for trusted MCP clients") for discoverability.
  • Field applicability documented as Arcade Auth or User Source (not Arcade Headers), matching the actual if (!byoaEnabled || authType === "arcade_header") return null; visibility check in consent-skip-client-ids-field.tsx.
  • Cross-linked CIMD and DCR RFC drafts for readers who want to dig in.
  • User Sources overview gets a one-line pointer rather than a re-explanation.

Test plan

  • pnpm build/en/guides/mcp-gateways/create-via-dashboard and /en/guides/user-sources render in route table
  • Vale clean on the User Sources page; the pre-existing <YOUR-GATEWAY-SLUG> MDX parser issue on create-via-dashboard/page.mdx blocks Vale but is out of scope for this PR
  • Reviewer to spot-check the section copy and the two CIMD URLs
  • Reviewer to confirm the field visibility statement (Arcade Auth or User Source, not Arcade Headers) matches the dashboard behavior

🤖 Generated with Claude Code


Note

Low Risk
Docs-only changes that add guidance for an OAuth consent-skip allowlist and adjust example URL formatting; no runtime behavior is modified.

Overview
Adds documentation for the “Skip consent for trusted MCP clients” gateway setting, explaining when it applies (Arcade Auth/User Source only), how client IDs are determined (CIMD vs Dynamic Client Registration), and providing a starter table of known client_id values.

Updates the dashboard creation guide to link to this new section and standardizes gateway URL examples to use {YOUR-GATEWAY-SLUG} formatting.

Reviewed by Cursor Bugbot for commit 5fab043. Bugbot is set up for automated code reviews on this repo. Configure here.

…GRO-99)

Inline section explaining the "Skip consent for trusted clients" field
on the gateway form, with a starter table of confirmed MCP client IDs
(Claude, Visual Studio Code) and guidance on finding client IDs for
unlisted clients. Cross-link from the User Sources overview.

Rescoped from a standalone reference page after investigation — the
CIMD ecosystem is too early (May 2026) to justify a separate page, but
the table can grow as more clients adopt CIMD.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@vercel
Copy link
Copy Markdown

vercel Bot commented May 22, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
docs Ready Ready Preview, Comment May 22, 2026 8:16pm

Request Review

Copy link
Copy Markdown
Contributor

@github-actions github-actions Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Style Review

Found 3 style suggestion(s).

Powered by Vale + Claude

Comment thread app/en/guides/mcp-gateways/create-via-dashboard/page.mdx Outdated
Comment thread app/en/guides/mcp-gateways/create-via-dashboard/page.mdx Outdated
Comment thread app/en/guides/mcp-gateways/create-via-dashboard/page.mdx Outdated
Claude Code publishes its own CIMD at
https://claude.ai/oauth/claude-code-client-metadata (verified, distinct
client_name 'Claude Code'), separate from the Claude Desktop / Claude.ai
metadata document.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
wdawson and others added 2 commits May 22, 2026 12:20
- Add Goose row (https://goose-docs.ai/oauth/client-metadata.json),
  verified against Arcade infrastructure-observed traffic
- Add one-liner above the table making it explicit the values are the
  literal client_id strings sent in OAuth authorize requests

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Arcade has observed only 2-3 token fetches with the Goose client_id in
the last 3 months — not enough signal to call it a client admins will
want to allowlist. Easy to add back if traffic picks up.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
- Move "Skip consent for trusted MCP clients" from
  create-via-dashboard/page.mdx to mcp-gateways/page.mdx where it lives
  as a core concept alongside the Authentication section
- Drop the "intentionally short / CIMD is early" paragraph after the
  table — CIMD has been recommended long enough that the framing was
  off
- Address style review on PR #982:
  - Drop em-dashes around clauses (Google.EmDash) in two spots
  - Replace "We expect" with direct phrasing (Google.We)
  - Reword "can be allowlisted" / "is generated" passive voice and
    drop the weasel "usually"
- Drop the YOUR-GATEWAY-SLUG placeholder that was causing Vale's MDX
  parser to abort on these files
- Update the User Sources overview cross-link to the new section anchor

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
wdawson and others added 2 commits May 22, 2026 12:49
Replace the long "The Skip consent for trusted clients (optional) field on
the gateway form lets you allowlist..." phrasing with "This feature lets
you allowlist..." since the section heading already establishes which
field this is about.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Reframe to describe what DCR-using clients lack (a stable client_id)
rather than make a distributional claim about MCP clients we can't back
up. Same fact, more honest framing.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
…yntax

your-gateway-slug -> {your-gateway-slug} in both the Connect to an MCP
Gateway example and the create-via-dashboard After Creating a Gateway
example. Standard URL-template / OpenAPI placeholder syntax — visually
distinct without re-introducing the <YOUR-GATEWAY-SLUG> Vale parser
crash.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
Uppercase plus curly braces — visually loud like the original
<YOUR-GATEWAY-SLUG> form, but braces protect from the MDX parser
crash that the angle-bracket form caused.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
The link wasn't pulling its weight — readers landing on the User
Sources page aren't reaching for consent-skip details. Keep that
material localized to the gateway page.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@wdawson wdawson marked this pull request as ready for review May 22, 2026 20:15
@wdawson wdawson requested a review from vfanelle May 22, 2026 20:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant