Configure OAuth 2.0 Support for MCP Inbound Tools
- Updated: 2026/04/17
This topic guides you through setting up OAuth 2.0 authentication for Model Context Protocol (MCP) inbound tools within Automation Anywhere.
Implementing OAuth provides a more secure and robust method for third-party AI assistants to interact with your Automation Anywhere automations, maintaining user identity and enforcing role-based access control (RBAC) without requiring users to manually enter credentials. Follow these steps to configure OAuth 2.0 support for MCP inbound tools. The process involves configuration in both the Control Room and your third-party AI assistant (e.g., Microsoft Copilot Studio).
Prerequisites
Before configuring OAuth 2.0 support, ensure the following requirements are met:
- User License: The user configuring and accessing the MCP tools must have an Attended Bot Runner license assigned.
- Device Connection: The Attended Bot Runner user must be connected to a registered local device in the Control Room. Verify that the bot configuration is correct and can run successfully from the Control Room.
Required permissions:
- AI permissions:
- View Agent Connections: To see inbound and outbound tools and connections.
- Manage Agent Connections: To configure and manage inbound and outbound tools and connections.
- API permission: Generate API Key.
- Bot permissions:
- View my bots and Run my bots.
- Ensure that the required bots are assigned to the user's role through RBAC. For more information, see RBAC in Control Room.
Procedure
- If authentication headers are missing or incorrect, the MCP client attempts OAuth authentication automatically.
- If authentication fails, the MCP client displays an error message similar
to:
{"error": "Unauthorized", "message": "Missing or invalid headers: API_KEY, USER_NAME, Authorization or X-AUTH"} - Depending on the MCP client implementation (for example, Microsoft Copilot or other MCP-compatible clients), additional error messages might appear indicating that OAuth authentication failed.
- The MCP client automatically manages access token refresh when the token expires.
- You are not required to manually refresh tokens during normal operation.
MCP inbound supports OAuth-based authentication using standard identity providers, including:
- OIDC (OpenID Connect)
- SAML-based authentication
The authentication experience (for example, login prompts or consent screens) depends on the configured identity provider.
