Skip to main content
With the concept of Auth Configs in place, let’s walk through the actual flow — creating a new Auth Config, managing it over time, and connecting user accounts (Connections) against it.

Where to find Auth Configs

Navigate to the Auth Configs section from the left sidebar of your workspace. If none have been created yet, you’ll see an empty-state screen inviting you to “Create Your First Auth Configuration.” Click ”+ Create Auth Config” (top right) to start.

Creating an Auth Config

Step 1 — Select the server.

Pick the MCP server you want to configure — Gmail, HubSpot, Slack, GitHub, Notion, and so on. The server list is searchable, and each row shows the authentication method(s) it supports (OAuth2, API Key, etc.).
Select Server On Auth Config Creation 1

Step 2 — Configure the Auth Config.

Once you select a server (e.g., Gmail), a configuration panel opens with the server’s logo at the top. Fill in:
  • Auth Config Name (required) — a clear identifier like “Gmail — Sales Read+Send” or “HubSpot — Support Team”
  • Authentication Method (required) — OAuth2, API Key, or No Auth, depending on what the server supports. The fields that follow will depend on the method you pick.
  • Manage Scopes — for OAuth-based methods, add the scopes you want users to grant (e.g., https://www.googleapis.com/auth/gmail.send). Add one at a time and remove any with the delete icon. A “What do these scopes mean?” link gives scope-level context.
Click “Create [Server] Auth Config” at the bottom to save. You’ll get an “Auth Config has been created” confirmation and land on the detail page.
Configure The Auth Config

The Auth Config detail page

Once created, every Auth Config has its own detail page with three tabs:
  • Connected Accounts — the list of Connections (live authenticated accounts) created from this Auth Config
  • Tools — the tools this server exposes, scoped to what the configured permissions allow
  • Manage Auth Config — edit metadata, scopes, and settings
A metadata panel on the right shows the Authentication Method, Auth Config ID, Server Slug, and Created At timestamp. The Auth Config ID is the unique handle you’ll use when programmatically creating Connections against this config, and can be copied with one click.

Connecting user accounts

A Connection is an authenticated user account bound to a specific Auth Config. From the Connected Accounts tab:
  1. Click ”+ Connect Account” (top right).
  2. Provide a Connection Name — a clear label so you can recognise this account later (e.g., “Alice — Sales Gmail” or “Support Team Shared Inbox”).
  3. Set Visibility:
    • Organisation — the Connection is shared across your organization; any gateway in the org can use it for runtime tool calls.
    • Private — the Connection is only available to you; other team members can’t see or use it.
  4. Complete the OAuth handshake (or provide an API key, depending on the auth method). The user grants exactly the scopes defined in the Auth Config — nothing more.
  5. The new Connection appears in the Connected Accounts list with its name, account ID, status, and creation date.
Connect A New Account
You can also click “Copy Auth Config ID” from the empty-state screen and use it in your own onboarding flow — so end users connect their accounts directly from inside your product rather than in the Synqed dashboard.

Managing Connections

From the Connected Accounts list you can:
  • Search by Account ID or name
  • Filter by Status (active, expired, revoked)
  • Sort by creation date (latest to earliest, or the reverse)
  • Open any Connection to view its details, re-authenticate, and revoke it when access is no longer needed
Connected Accounts
Revoking a Connection invalidates the stored tokens immediately — any gateway running a tool call against that Connection will fail securely until the user re-connects.

Managing the Auth Config itself

The Manage Auth Config tab is where you change the blueprint over time:
  • Rename the config
  • Add or remove scopes
  • Delete the Auth Config (which also revokes every Connection created from it — use with care)
Tightening scopes on an existing config does not retroactively shrink tokens already issued — existing Connections keep their original grants until they’re re-authenticated. Loosening scopes only applies to new Connections.

Best practices

  • Name Auth Configs by server + intent, not just server — e.g., “Slack — Support Posting” and “Slack — Analytics Read” rather than two configs both named “Slack.”
  • Keep a separate Auth Config per scope profile. Don’t over-scope a shared config just to avoid duplication.
  • Use Organisation visibility for shared service accounts (a single Slack bot for the whole team) and Private visibility for per-user accounts.
  • Use the Auth Config ID to let end users connect their own accounts from inside your product — the cleanest pattern for multi-tenant SaaS.
  • Revoke stale Connections periodically. Orphaned tokens are a liability.