OmniCon's MCP server uses OAuth 2.0 with PKCE — the same pattern Claude uses for all hosted connectors.
The flow
- Your client registers dynamically with the server (no pre-shared secrets).
- The client opens
https://mcp.omnicon.cloud/connect/authorizein your browser. - You sign in with your normal OmniCon account.
- OmniCon redirects back to the client with an authorization code.
- The client exchanges the code for an access token. All subsequent tool calls carry it.
What the token can do
Tokens act as you. Every tool call runs against your user identity, so it can touch exactly the organizations, channels, and content your account can touch in the web editor — no more, no less.
If you lose access to a channel (removed from the org, role changed), the next call against that channel fails with a permission error without you needing to re-auth.
Revoking access
To disconnect a client, remove it from the connector list in your MCP client. To revoke all tokens system-wide, change your OmniCon password — existing tokens stop working.