Hi everyone,
I'm trying to connect to the DocuSign hosted MCP server (mcp-d.docusign.com/mcp) from an MCP client that follows the standard OAuth discovery flow, and I'm seeing what looks like an RFC 8414 deviation that I'd like to confirm before assuming it's an issue.
The flow my client is doing is:
- Fetch https://mcp-d.docusign.com/.well-known/oauth-protected-resource. Returns 200 JSON, lists https://account-d.docusign.com as the authorization server.
- Per RFC 8414, fetch https://account-d.docusign.com/.well-known/oauth-authorization-server for the AS metadata. This is where I'd expect a JSON metadata document.
What I see at step 2:
$ curl -sSL -i https://account-d.docusign.com/.well-known/oauth-authorization-server
HTTP/2 200
content-type: text/html; charset=utf-8
<!DOCTYPE html> <html lang="en" class="account-server"> ... 200 OK with text/html
which the client then tries to parse as JSON and fails with:
Unexpected token '<', "<!DOCTYPE "... is not valid JSON
Same response on production (account.docusign.com).
I noticed https://account-d.docusign.com/.well-known/openid-configuration returns valid JSON with the same authorization_endpoint and token_endpoint values, but I wanted to ask:
- Is the HTML response at /.well-known/oauth-authorization-server intentional? Should clients be using /openid-configuration instead?
- If RFC 8414 metadata isn't supported, would a 404 there be possible? That would let clients fall back to OIDC discovery cleanly without misinterpreting the HTML as a successful response.
- I noticed claude.ai connects to the DocuSign MCP successfully. Does anyone know which discovery method that client uses?
- Is there documentation I missed that recommends one discovery endpoint over the other for MCP/OAuth clients connecting to DocuSign? Thanks for any pointers.
Back to Docusign.com

