Authorization Layers
MCP Gateway provides authorization at multiple levels:| Level | What it controls | Status |
|---|---|---|
| Workspace | Which teams can access which MCP servers | Available |
| MCP Server | Access to specific servers based on claims | Available |
| Tool | Access to specific tools within a server | Coming soon |
Server-Level Claim-Based Authorization
Control access to MCP servers based on JWT claims. This is configured through JWT Validation usingrequiredClaims and claimValues.
Require Specific Claims
Ensure tokens include specific claims before allowing access:Validate Claim Values
Authorize based on claim values—group membership, roles, or other attributes:Match Types
| Type | Description | Example |
|---|---|---|
exact | Claim value must match exactly | iss must equal "https://your-idp.com" |
contains | Claim must include at least one value (OR) | User must be in engineering OR platform group |
containsAll | Claim must include all values (AND) | User must have both mcp:read AND mcp:write scopes |
regex | Match against a regular expression | Email must match @yourcompany\.com$ |
Example: Restrict to Engineering Team
Only allow users in the engineering group:Example: Require Admin Role
Only allow users with admin role:Example: Restrict by Email Domain
Only allow users from your company domain:Tool-Level Authorization
Tool-level claim-based authorization is coming in a future release.
- Allow read tools for all users, write tools for specific roles
- Restrict dangerous operations to admins
- Enable different tool sets for different teams
Webhooks for Authorization
Webhook-based authorization is coming in a future release.
- User identity and claims
- Target MCP server
- Tool being called
- Request parameters
allow or deny with an optional reason.
Enables:
- Dynamic authorization based on external systems
- Context-aware decisions (time of day, request patterns)
- Integration with existing authorization infrastructure
- Custom business logic for access control
Combining with Team Provisioning
Authorization works alongside Team Provisioning:- Team Provisioning controls which workspaces see which servers
- JWT Validation adds claim-based rules on top

