Aaron Parecki
banner
aaronpk.com
Aaron Parecki
@aaronpk.com
#OAuth #IndieWeb
Oh crap I just realized the "it" he was referring to was probably the food, not his critical thinking.
January 13, 2026 at 5:08 AM
Not that this is a 1:1 replacement, but it is one of the reasons I built Meetable.org, so communities can create their own calendars on their own domains.
GitHub - aaronpk/Meetable: an event listing website
an event listing website. Contribute to aaronpk/Meetable development by creating an account on GitHub.
Meetable.org
December 3, 2025 at 1:05 AM
🔐 Enterprise-Managed Authorization extension (aka Cross App Access) - eliminate the OAuth redirect and get tokens for an MCP server by requesting them from the enterprise IdP

Read more about what these mean for you in my full post
👉 aaronparecki.com/2025/11/25/1...
Client Registration and Enterprise Management in the November 2025 MCP Authorization Spec
The new MCP authorization spec is here! Today marks the one-year anniversary of the Model Context Protocol, and with it, the launch of the new 2025-11-25 specification. I’ve been helping out with the ...
aaronparecki.com
November 25, 2025 at 11:14 PM
I don't know anything about the protocol but if they support the same OAuth spec as ATProto and same user ID discovery it would work
October 15, 2025 at 6:36 PM
even with all the emoji? lol
October 12, 2025 at 10:47 PM
👍👍
October 11, 2025 at 11:08 PM
The dots that Solid OIDC connected were to specifically use the RFC7591 vocabulary in a JSON doc at the client ID URL, whereas IndieAuth originally parsed the metadata from HTML, and OpenID Federation nests the metadata inside an "Entity Statement" JSON wrapper.
October 11, 2025 at 10:59 PM
I mean it was a big mix of things really. Most recently the JSON document idea came from there, but "client IDs as URLs" has been part of IndieAuth since 2015 web.archive.org/web/20150315... and OpenID Federation since 2016 openid.net/specs/openid...
October 11, 2025 at 10:55 PM
Yeah I definitely went hard mode by writing everything from scratch (except the JWT signing). Partly because I wanted to see what it actually takes to implement a library, partly because I can't stand the current state of most language's package management 😅
October 11, 2025 at 9:05 PM
The folks at Stytch put together a really nice explainer website about it too! cimd.dev
CIMD - OAuth Client ID Metadata Documents
Learn about Client ID Metadata Documents (CIMD) - a new OAuth approach that lets clients identify themselves using URLs instead of preregistration. Presented by Stytch.
cimd.dev
October 11, 2025 at 4:27 PM
This could replace Dynamic Client Registration in MCP, dramatically simplifying management of clients, as well as enabling servers to limit access to specific clients if they want.
October 11, 2025 at 4:27 PM
The recent surge in interest in MCP has further demonstrated the need for this to be a standardized mechanism, and was the main driver in the latest round of discussion for the document!
October 11, 2025 at 4:27 PM
The mechanism of clients identifying themselves as a URL has been in use in IndieAuth for over a decade, and more recently has been adopted by BlueSky for their OAuth API.
October 11, 2025 at 4:27 PM
Clients identify themselves with their own URL, and host their metadata (name, logo, redirect URL) in a JSON document at that URL. They then use that URL as the client_id to introduce themselves to an authorization server for the first time.
October 11, 2025 at 4:27 PM
Yes, I helped them with it. They also use the client-id-url technique that came from IndieAuth
October 2, 2025 at 2:14 PM
Thanks to everyone for your contributions and feedback so far!

And thanks to my co-authors Karl McGuinness and Brian Campbell!
September 20, 2025 at 2:20 PM
While it will still be a while before it is an RFC, this is an important step in the standards process, as this is the first time the document is "official"! This signifies that the working group agrees that the problem is worth solving, and agrees on the general direction of the spec.
September 20, 2025 at 2:20 PM