I’ve built an MCP server that’s secured using an Azure AD App and expects application (client credentials) tokens. The server validates the token and role claims. There is no user/delegated context in this flow.
When the Agent calls the MCP tool via the Custom Connector, Copilot Studio is always generating/sending a delegated (user) token. I need it to send an application token (client credentials flow) to match the server’s expected auth model. I can’t find any documentation on configuring the Custom Connector so that the MCP tool call uses application-based tokens.
Questions
- Is there a supported way to configure a Custom Connector (used by an MCP tool in Copilot Studio) to use OAuth 2.0 Client Credentials (application token) instead of a delegated token?
- If yes, which security settings (Authorization URL/Token URL/Scope placement/Client ID+Secret) and connection settings should be used so that Copilot Studio acquires and forwards an app token?
- Are there limitations specific to Copilot Studio MCP tools that force delegated tokens even if the Custom Connector is set up for client credentials?
Connector security configuration (summary)
- Authentication type: OAuth 2.0
- Grant type needed: Client Credentials (desired)
- Current behavior: Appears to run delegated auth at runtime when invoked as an MCP tool

Report
All responses (
Answers (