Introducing the cssLayerName option for compatibility with Tailwind CSS v4, allowing Clerk styles to be wrapped in a dedicated CSS cascade layer.
To ensure compatibility with Tailwind CSS v4 and its use of native CSS layers, and to provide more granular control over CSS specificity, Clerk now accepts a new cssLayerName option. This new option allows Clerk's component styles to be integrated into the native CSS layering system. When you provide a layer name, Clerk will automatically wrap all of its styles within that CSS layer.
How to use
Add the cssLayerName prop to the appearance object of your ClerkProvider or Clerk options config, depending on your framework.
After specifying the cssLayerName option, you then need to specify the CSS layer order in your global stylesheet. This ensures that the layer you assigned to Clerk (e.g., "clerk") is correctly sequenced with Tailwind's layers and your custom styles:
This configuration ensures that Clerk styles are part of the cascade in a predictable way, playing nicely with Tailwind CSS v4's architecture and allowing you to utilize Tailwind's utility classes within Clerk's appearance object.
The OAuth authorization flow now includes a consent screen that displays the access that the user is granting and ensures that they are ok with it before completing the flow.
Implementing public clients (that must complete the token exchange in the browser) with Clerk's OAuth feature is now possible due to changes to our CORS handling.
Clerk's OAuth implementation is compatible with all the requirements needed to implement MCP services using Clerk as an authorization service.
We have been working hard for the last few months on these features and are beyond excited to finally get them into our customers and users' hands. Many thanks to everyone who helped us to test and refine them through our early access program!
What is OAuth?
If you're a web developer, you have no doubt heard the term “OAuth” and know it's in some way related to authentication, or maybe to single sign on, but for the vast majority of engineers, this is about as far as it goes. Truth be told, OAuth is quite a confusing topic, largely because the term “OAuth” is used to refer to three entirely different features, and there is no clear way to differentiate between them. We wrote a detailed post explaining OAuth in general, as well as these three distinctions that you can read here. The key takeaway: these new features enable OAuth scoped access - allowing third-party applications to access user data with explicit permission and limited scope.
Let's recap the three OAuth use cases:
OAuth Scoped Access - The features from this announcement enable this
OAuth User Management - We do user management, but not via OAuth
With this background out of the way, let's get into an example of how these new features work!
Implementing OAuth scoped access
If you'd like to take this feature for a spin, we have a guide on how to implement OAuth scoped access into a Clerk application right here. It just takes a few minutes to configure an OAuth client in Clerk's dashboard and start using it.
Verifying OAuth access tokens with Clerk
If you are building an application that uses Clerk and would like to incorporate OAuth, you will want to ensure that, after the client gets an OAuth access token, they can use it to make authenticated requests into your app (the resource service) using the token. Let's look at an example of how this could be done on an API route with Clerk's Next.js SDK:
// app/api/example/route.tsimport { auth } from'@clerk/nextjs'exportasyncfunctionGET() {const { userId,isAuthenticated } =awaitauth({ acceptsToken:'oauth_token', })if (!isAuthenticated) {returnResponse.json({ error:'Unauthorized' }, { status:401 }) }// pseudo-code: get user data from a databaseconstuserData=awaitgetUserDataFromDatabase({ clerkUserId: userId })returnResponse.json(userData)}
To learn more about verifying machine tokens with Clerk, check out our new OAuth documentation on the topic right here.
OAuth token verification through Clerk is currently available across most of our SDK ecosystem, making it easy to build resource servers that can authenticate requests from OAuth clients.
Want to help prioritize? Let us know on our roadmap which SDK you need most!
OAuth consent screen
The new OAuth consent screen ensures users understand exactly what permissions they're granting before completing the OAuth flow.
The consent screen displays:
The requesting application's name and logo
Specific scopes being requested in user-friendly language
Clear accept/deny options
In order to avoid breaking changes and security issues, we have implemented the following settings with respect to the consent screen
New OAuth applications: Consent screen enabled by default
Existing OAuth applications: Disabled by default (to avoid breaking changes), but we strongly recommend enabling it
OAuth applications with dynamic client registration enabled: Consent screen automatically enforced and cannot be disabled
You can toggle the consent screen in the settings for any individual OAuth application on the Clerk dashboard.
We strongly recommend enabling the consent screen for all OAuth applications. Without a consent screen, any logged-in user who visits an OAuth authorization URL automatically grants access to any requested scopes. The consent screen acts as a critical security checkpoint, preventing malicious applications from silently gaining access to user accounts.
What is dynamic client registration? If you're unfamiliar with this OAuth extension, we cover it in detail (including real-world use cases and security considerations) in our comprehensive OAuth guide, and our documentation.
Building an MCP service using Clerk's OAuth server
We've heard loud and clear from our users about the interest in leveraging OAuth to support MCP integrations. With this set of improvements to our OAuth capabilities, building MCP services that use Clerk as their authorization server becomes possible.
MCP services often need to access user data from various sources on behalf of AI applications. This requires robust OAuth flows with proper consent management, token verification, and security controls - exactly what Clerk's enhanced OAuth features provide. The combination of dynamic client registration (for registering MCP servers programmatically), the consent screen (for secure user authorization), and comprehensive SDK support makes Clerk an ideal authorization server for MCP implementations.
Imagine the following example of a real-world use case. Say you've built a project management tool using Clerk for authentication. With Clerk's OAuth server, you can easily expose an MCP endpoint that allows AI applications like Cursor, ChatGPT, Claude, or Windsurf to securely access your users' project data. Your users can authorize these AI tools through Clerk's consent screen, and the AI applications can then help with tasks like generating project summaries, suggesting optimizations, or automating workflows - all while maintaining secure, user-controlled access to your application's data.
We will have another post coming soon that goes into detailed implementation of building MCP services using Clerk's OAuth server. In the meantime, if you'd like to peek behind the curtains, we have a reference implementation of an MCP service using next.js and Clerk right here.
Custom scopes: coming soon
We don't yet have support for adding custom OAuth scopes, we wanted to get these new OAuth features into our users' hands as quickly as they were usable and stable, which we feel like they are now. Next on our list is implementing a way that custom scopes can be added, accepted, and checked through our SDKs. We'll have another update coming your way soon when this feature is available!
If you're interested in getting involved with early access for custom OAuth scopes, please add a vote and/or feedback to the item on our roadmap here and we'll be in touch soon!
The OAuth access token returned was not accepted by any of Clerk's SDKs and did not have a method for verifying its authenticity, making it not very useful as an access token.
There was no OAuth consent page implemented, meaning that users going through the OAuth flow would not get the chance to review and accept scopes being requested by the third party. As long as the user was signed in, and visited an authorize link, the access request would be automatically accepted. There are some cases when only limited scopes are available and the flow is only being used for SSO where this can make sense (which was the case with the previous implementation), but outside of that it's a substantial security risk.
While PKCE was previously implemented in order to support public clients, Clerk's API would reject any requests to the token endpoint made from a browser due to incomplete CORS configuration, making the public client flow for most use cases non-functional.
The OAuth applications page in Clerk's dashboard had no pagination, so any more than 10 applications were not displayed and unable to be accessed at all.
There was no support for dynamic client registration, an OAuth protocol extension that is a frequent requirement for use with MCP services.
There was no way to create custom scopes and add them to OAuth requests
With the current release, all of these points (outside of the custom scopes, but that's coming very soon) are now resolved, and we feel confident that this is a feature-complete release of a built-in OAuth server for OAuth scoped access.
We've improved the invoice format to make things easier to read.
Before, all line items showed up with the same label, even if they referred to different features of the same product. That made it hard to tell what each charge was for.
Now, items are grouped by their feature name. It's a much clearer view of what you're paying for.
This is already live. No action needed. Next invoice should look a lot nicer.
View all subscription payment attempts directly from the Dashboard.
We've added a new Payments tab to both user and organization detail pages in the Dashboard. This feature gives you complete visibility into all subscription payment attempts, making it easier to track billing activity and troubleshoot payment issues.
A new report on the dashboard shows the all time sign-ups for your application.
For all you up-and-to-the-right folks, you can now view the total number of users who have ever signed up for your application directly from the dashboard, in this new handy chart. This new chart makes it easy to track your all time user growth at a glance and bask in that sweet-sweet hockey stick inflection.