Application passwords are WordPress’s built-in credential mechanism for REST API access. They’re the right choice for scripted clients, automation pipelines, and other situations where opening a browser for an OAuth consent flow is not practical. If you upgraded to Maxi AI Core v3.6 from an earlier version, any existing application password connections keep working without any changes.Documentation Index
Fetch the complete documentation index at: https://docs.maxicore.ai/llms.txt
Use this file to discover all available pages before exploring further.
When to use application passwords
Use application passwords when:- You’re building an automation script or CI pipeline that calls the MCP endpoint programmatically
- Your client doesn’t support OAuth browser flows
- You prefer to manage credentials explicitly rather than through the OAuth consent flow
Creating an application password
Open your WordPress user profile
Go to WordPress Admin → Users → Profile. If you’re setting up a dedicated agent user, navigate to that user’s profile instead.
Find Application Passwords
Scroll down to the Application Passwords section near the bottom of the profile page.
Name your application password
Enter a descriptive name in the New Application Password Name field — for example,
Claude Desktop Agent or CI Pipeline. The name helps you identify and revoke specific credentials later.Authenticating requests
Pass the application password as HTTP Basic authentication. Encode the username and password separated by a colon (username:app-password) in base64:
curl:
WordPress application passwords include spaces in the displayed format (e.g.,
xxxx xxxx xxxx xxxx xxxx xxxx). Include them as-is when encoding — WordPress accepts both the spaced and unspaced forms.MCP endpoint
The MCP endpoint URL is the same regardless of authentication method:yoursite.com with your domain. You can copy this URL from Settings → AI Connections → Settings.
Session identity with Mcp-Session-Id
For scripted clients that make multiple calls in a single logical working unit, send a consistentMcp-Session-Id header throughout the session:
Using a dedicated WordPress user
Create a separate WordPress user for each AI agent or automation script, and assign only the capabilities that agent actually needs. This limits what a compromised or misbehaving agent can do. Common capability sets:| Agent type | Suggested capabilities |
|---|---|
| Read-only agent | read, edit_posts |
| Content agent | read, edit_posts, publish_posts, upload_files, manage_categories |
| Store agent | edit_products, manage_woocommerce |
| Admin agent | manage_options — only when the agent needs system-level abilities |