In this article
September 2, 2025
September 2, 2025

August Updates

New this month: Standalone OAuth for MCP, Feature Flags API, BYOK in Vault, disposable email blocking, & more

Standalone OAuth for MCP

Developers building MCP servers are caught between two difficult choices. They can either build a custom authentication system from scratch—spending weeks implementing OAuth flows, token management, and security best practices—or they can rely on basic authentication methods that aren't suitable for production use cases involving real user data.

WorkOS Connect offers a third path that eliminates this complexity entirely. Rather than forcing you to choose between building everything yourself or compromising on security, WorkOS Connect acts as an OAuth bridge that handles all the authentication complexity while letting you focus on what matters most: building your MCP server's core functionality.

Add enterprise auth to your MCP server →


Feature Flags API

Feature flags allow teams to control the rollout of features in real time. You can now list all enabled feature flags for an organization via the API. This let’s you use feature flags where you may not have the user JWT to reference.

Learn how to fetch feature flags via API →


Enterprises can bring their own key to WorkOS Vault

WorkOS Vault now supports bring your own key (BYOK) for key encryption. Enterprises IT admins can connect their AWS Key Management Service (KMS) instance and use their own customer-managed keys (CMK) to wrap Vault data keys. This enables auditing usage of keys and disabling access via key revocation. Setup is self-serve through the Admin Portal to ensure easy onboarding.

Get started with BYOK →


Disposable email blocking in WorkOS Radar

Radar can now block users from signing up with disposable email services. WorkOS Radar maintains an up to date list of disposable email domains that you can subscribe to. Any sign-ups matching those domains will be blocked preventing misuse of your product particularly for free trials and free tiers.

Learn more about disposable email blocking →


OIDC Attributes

You can now customize how identity provider claims map to both standard and custom user profile attributes. Standard fields like email, idp_id, first_name, and last_name are supported out of the box, with flexibility to define additional custom attributes as needed. This makes it easier to handle non-standard OIDC responses and enrich user profiles.

See how to configure custom attributes →


More featured content

This site uses cookies to improve your experience. Please accept the use of cookies on this site. You can review our cookie policy here and our privacy policy here. If you choose to refuse, functionality of this site will be limited.