You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/mcp-server-overview.md
+10-15Lines changed: 10 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,7 +43,7 @@ The MCP architecture is built on [JSON-RPC 2.0 for messaging](https://modelconte
43
43
44
44
***Local MCP servers** MCP clients use standard input/output as a local transport method to connect to MCP servers on the same machine,.
45
45
46
-
Azure API Management supports the remote MCP server mode, using native features of API Management and [capabilities of the AI gateway](./genai-gateway-capabilities.md).
46
+
Azure API Management supports the remote MCP server mode, using native features of API Management and [capabilities of the AI gateway](./genai-gateway-capabilities.md) to manage MCP server endpoints.
47
47
48
48
> [!NOTE]
49
49
> MCP server support in API Management is in preview. In preview, API Management supports MCP server tools, but doesn't currently support MCP resources or prompts.
@@ -60,7 +60,8 @@ MCP provides the following transport types and typical endpoints for remote serv
60
60
61
61
## Expose MCP servers in API Management
62
62
63
-
API Management supports two ways to expose MCP servers:
63
+
API Management supports > [!NOTE]
64
+
> Information the user should notice even if skimmingtwo built-in ways to expose MCP servers:
@@ -86,20 +87,14 @@ You can secure both inbound access to the MCP server (from an MCP client to API
86
87
87
88
### Secure inbound access
88
89
89
-
One option to secure inbound access is to configure a policy to validate a JSON web token (JWT) in the incoming requests. This ensures that only authorized clients can access the MCP server. Use the [validate-jwt](validate-jwt-policy.md) or [validate-azure-ad-token](validate-azure-ad-token-policy.md) policy to validate the JWT token in the incoming requests. For example:
90
-
91
-
<!-- update to validate-azure-ad-token-policy.md if preferred -->
92
-
```xml
93
-
<validate-jwtheader-name="Authorization"failed-validation-httpcode="401"failed-validation-error-message="Unauthorized. Access token is missing or invalid.">
One option to secure inbound access is to configure a policy to validate a JSON web token (JWT) generated using an identity provider in the incoming requests. This ensures that only authorized clients can access the MCP server. Use the generic [validate-jwt](validate-jwt-policy.md) policy, or the [validate-azure-ad-token](validate-azure-ad-token-policy.md) policy when using Microsoft Entra ID, to validate the JWT token in the incoming requests. The following is a basic example of validating a Microsoft Entra ID token:
102
91
92
+
```xml
93
+
<validate-azure-ad-tokenheader-name="Authorization"failed-validation-httpcode="401"failed-validation-error-message="Unauthorized. Access token is missing or invalid.">
94
+
<client-application-ids>
95
+
<application-id>your-client-id</application-id>
96
+
</client-application-ids>
97
+
</validate-azure-ad-token>
103
98
```
104
99
105
100
For more inbound authorization options and samples, see:
0 commit comments