Updated 2026-04-17

Authentication & API Keys

Multiplist supports two authentication methods. Remote clients (Claude Desktop, ChatGPT) authenticate via OAuth 2.1 with PKCE — no keys to manage. Local and scripted use cases use MCP tokens.


# OAuth 2.1 with PKCE

The easiest option for Claude Desktop, ChatGPT, and any MCP client that speaks StreamableHTTP.

  1. Configure the client with https://multiplist.ai/mcp.
  2. On first use, the client opens the Multiplist login page in your browser.
  3. Approve the connection — the token is stored in the client, refreshed automatically.
  4. No API keys to copy or rotate.

# MCP tokens

For headless use — scripts, CI/CD, local stdio bridges. Generate in Settings → MCP Tokens inside the Multiplist app.

# Scopes

Tokens and OAuth sessions are scoped. Grant the minimum scope needed.

ScopeWhat it grants
seeds:readRead seeds across the vault
seeds:writeCreate, update, delete seeds
sources:readRead sources and their content
sources:writeCreate, update, delete sources
skills:readRead extraction skills
skills:writeCreate, update, delete skills
recall:searchRun vault searches and request research briefs
extract:runTrigger extraction jobs

A read-only monitoring script typically needs seeds:read, sources:read, skills:read. A full-write automation pipeline uses the write variants too.

# Header format

Whether you're calling the REST API or the MCP endpoint with a static token, the format is the same:

Authorization: Bearer mp_live_...

The @multiplist/mcp-server npm bridge reads the token from MULTIPLIST_API_KEY (or the legacy MCP_KEY) env var and forwards it as the x-mcp-key header on every request.