Replies: 1 comment
-
|
This is covered in the scope of my SMCP RFC: https://github.com/orgs/modelcontextprotocol/discussions/689 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Pre-submission Checklist
Question Category
Your Question
We currently run an enterprise MCP server that exposes tools for multiple APIs (GitHub, Slack, Rally, New Relic, PagerDuty, etc.). Today, each user launches the MCP server locally via STDIO, supplying their user-specific API keys as environment variables at startup.
We’d like to transition to offering this MCP server as a remote service (following our standard deployment lifecycle), so users don’t need to maintain local versions to benefit from updates. The challenge:
Questions:
In my opinion, the spec could benefit from guidance on multi-user scenarios and how an MCP server should behave as a proxy in a way that preserves user context securely.
EDIT
I did a little more digging and landed at Proposal: Fine-Grained Resource Control for Multi-User Authorization which seemed somewhat related, but that lead me to PR 475, which then lead to open PR 887: SEP-1036: URL Mode Elicitation for secure out-of-band interactions. It looks like the solution is to essentially use elicitations to have the client open a browser that allows the user to enter a key into some, essentially doing the secure storage alternative I mentioned above. Is that accurate?
Beta Was this translation helpful? Give feedback.
All reactions