Skip to main content
The MCP Registry is the central catalog of all MCP server integrations in your organization. Organization admins add servers here, configure authentication, and control which teams can access them.
MCP Registry showing connected servers
Developer note: Most developers won’t add servers here. After an org admin provisions a server, use it from the workspace MCP page to copy the connection URL and test tools.
The MCP Registry supports:
  • Adding MCP servers (from catalog or custom URL)
  • Configuring authentication for each server
  • Viewing connection status and health metrics
  • Controlling which teams access which servers
  • Managing capabilities (tools, resources, prompts) per server

Quickstart

New to MCP Gateway? Add your first server in 5 minutes.

Adding Servers

Click MCP Registry in the sidebar, then click Add MCP Server.
FieldDescription
NameDisplay name for the server
SlugURL-friendly identifier (e.g., linear, internal-api)
Server URLMCP endpoint (e.g., https://mcp.linear.app/mcp)
Server TypeHTTP for remote servers
Auth TypeAuthentication method (see below)
Portkey supports remote MCP servers over HTTP. Local STDIO servers need to be exposed as HTTP endpoints first.

Authentication

This section covers how Portkey authenticates to upstream MCP servers. For how your agents and MCP clients authenticate to Portkey, see Gateway Authentication.
When adding a server, choose the auth method based on what the MCP server supports:
Auth TypeWhen to Use
NonePublic servers with no authentication required
OAuth 2.1Servers with user-level OAuth. Each user gets their own tokens.
Client CredentialsServers using OAuth client credentials. Shared across users.
HeadersServers using API keys or static tokens.
Quick summary:

Access Control

Access control for MCP servers happens at two levels.

Organization-level (MCP Registry)

Requires Org Admin or Org Owner role.
Control which workspaces can access an MCP server:
  1. Click MCP Registry in the sidebar
  2. Click on an MCP server
  3. Open the Access Control tab
  4. Toggle workspaces on/off
Workspace access control
Enable Automatically provision this integration for new workspaces to include future workspaces by default.

Workspace-level (MCP Servers)

Requires Workspace Manager or Workspace Admin role.
Control which users in your workspace can access an MCP server:
  1. Go to MCP page in your workspace sidebar
  2. Click on an MCP server
  3. Use the User Access tab to toggle user access on/off
User access control

Tool Provisioning

The Capabilities tab lists all tools, resources, and prompts exposed by an MCP server. Toggle them on or off, or use Enable All / Disable All for bulk changes.
Capabilities tab
Tool provisioning can be done at two levels:
LocationWhoScope
MCP Registry → Server → CapabilitiesOrg Admins/OwnersOrganization-wide
MCP Servers → Server → CapabilitiesWorkspace Managers/AdminsWorkspace-only
Disabled capabilities are hidden and return errors if called directly. Use this to block dangerous operations, untested tools, or deprecated functionality.

Server Overview

Once added, each server has a detail page with four tabs: Overview, Capabilities, Setup & Code, and Access Control & Limits.
Server overview page
Overview tab shows:
  • Server Status: Health score, uptime, average response time, total requests
  • Security & Authentication: Auth type, grant type, transport protocol
  • Configuration: Server URL, version, connection details

Next Steps