Convosphere MCP lets Cursor call your Convosphere tools directly from the IDE. The current setup uses OAuth, so you do not need to paste a secret API key into Cursor.Documentation Index
Fetch the complete documentation index at: https://docs.convosphere.site/llms.txt
Use this file to discover all available pages before exploring further.
Cursor connects with a URL-only MCP config, then Convosphere signs you in, maps your default MCP API key automatically, and returns an OAuth token to Cursor.
What changed
- Cursor setup now uses a real MCP install deep link instead of a generic settings link.
- The MCP server advertises OAuth protected-resource metadata for client discovery.
- Cursor registers as an OAuth client, opens the browser, and completes the PKCE authorization flow.
- If you are not logged in, Convosphere redirects to
/login?return_uri=...and returns you to the original MCP authorization flow after login. - If you are logged in, Convosphere automatically creates or reuses your default MCP API key with the
mcpscope. - Cursor stores the OAuth access token and sends it to the MCP server as a Bearer token.
- MCP-proxied tools forward your authenticated user context to application routes, so user-scoped tools work without browser cookies.
Prerequisites
- Cursor installed.
- A Convosphere account.
- Access to the Convosphere app.
- For local development, the frontend and MCP server must both be running.
- Local development
- Production
Use these default local URLs:
One-click Cursor setup
Install the MCP server
Click the setup button. Convosphere opens a
cursor:// install link that adds a URL-only MCP server config to Cursor.The config should look like this:Authorize in the browser
Cursor opens the browser for OAuth. If you are not signed in, Convosphere sends you to:After login, the authorization flow resumes automatically.
Authentication flow
Automatic API key mapping
During OAuth authorization, Convosphere checks your account for a valid default MCP API key. If a valid key exists:- It reuses the key.
- It ensures the key is not revoked or expired.
- It verifies the key has the
mcpor*scope.
- It creates a default key for MCP.
- It stores the key ID on your user profile.
- It binds the OAuth authorization code to that key ID.
Browser behavior
Direct browser access to the MCP endpoint is handled differently from API clients:- Browser navigation with
Accept: text/htmlredirects to the Convosphere login/settings flow. - Programmatic MCP calls without auth still receive a JSON-RPC auth error.
Test the connection
After connecting, ask Cursor to call a simple tool:Troubleshooting
Cursor keeps asking for auth
Cursor keeps asking for auth
Use Cursor’s MCP controls to log out of the
convosphereMcp server, then connect again. This clears stale OAuth state and forces Cursor to use the latest server metadata.The browser shows an Open Cursor prompt
The browser shows an Open Cursor prompt
Click Open Cursor. Browsers require confirmation before launching
cursor:// deep links.The browser shows Missing or malformed Authorization header
The browser shows Missing or malformed Authorization header
Cursor reports Unexpected content type text/html
Cursor reports Unexpected content type text/html
Cursor is pointing at the frontend app instead of the MCP server. Verify the MCP URL points to the MCP endpoint, for example
http://127.0.0.1:3090/mcp in local development.Token exchange succeeds but tools still require auth
Token exchange succeeds but tools still require auth
Check that the MCP server can validate tracked tokens against the database and that the frontend and MCP server share the same
MCP_JWT_SECRET.