Note: CIMD is currently an IETF Internet-Draft. Specifications may change before final adoption.

Client ID Metadata Documents (CIMD) let OAuth clients identify themselves using a URL. No preregistration necessary.

CIMD reduces friction, supports dynamic ecosystems like MCP, and eliminates interoperability headaches.

How CIMD Works

1

Client hosts metadata at URL

The client creates a JSON document with their metadata and hosts it at an HTTPS URL.

2

Client uses URL as client_id

Instead of a pre-registered client ID, the client passes the metadata URL directly.

3

Server fetches and validates metadata

The authorization server fetches the JSON from the client_id URL and validates it.

• Validates JSON structure and required fields
• Ensures client_id matches the source URL
• Checks redirect URIs and other parameters

Server shows client info in consent screen

The server displays the client_name and client_uri to help users make informed consent decisions.

CIMD provides built-in protection against client impersonation because the authorization server can verify that the client_uri has the same origin as the CIMD URL.

Example: If the CIMD is hosted at https://dmic.dev/oauth/metadata.json but claims client_uri: "https://client.dev", the server can detect this mismatch and show appropriate warnings.

Use Cases

Model Context Protocol

Connect AI tools and servers without the registration bottleneck. Every MCP client can authenticate dynamically.

Developer Tools

CLI tools, desktop apps, and developer utilities that need OAuth without complex setup flows.

Enterprise Platforms

SaaS platforms with hundreds of integrations that don't want to manage thousands of client registrations.