Skip to content

Commit a5bedfb

Browse files
committed
Updated MCP integration documentation
1 parent e0db004 commit a5bedfb

File tree

2 files changed

+20
-27
lines changed

2 files changed

+20
-27
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ For detailed deployment and testing instructions, see the [Deployment Guide](./d
180180
- [Knowledge Base](./docs/knowledge-base.md) - Document knowledge base query feature
181181
- [Monitoring](./docs/monitoring.md) - Monitoring and logging capabilities
182182
- [IDP Accelerator Help Chat Bot](./docs/code-intelligence.md) - Chat bot for asking question about the IDP code base and features
183-
- [MCP Integration](./docs/agentcore-integration.md) - Model Context Protocol integration for external applications like Amazon QuickSight
183+
- [MCP Integration](./docs/mcp-integration.md) - Model Context Protocol integration for external applications like Amazon Quick Suite
184184
- [Reporting Database](./docs/reporting-database.md) - Analytics database for evaluation metrics and metering data
185185
- [Troubleshooting](./docs/troubleshooting.md) - Troubleshooting and performance guides
186186

Lines changed: 19 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -147,62 +147,55 @@ External applications can obtain tokens using:
147147

148148
**Client Credentials Flow:**
149149
```bash
150-
curl -X POST <ExternalAppTokenURL> \
150+
curl -X POST <MCPTokenURL> \
151151
-H "Content-Type: application/x-www-form-urlencoded" \
152-
-d "grant_type=client_credentials&client_id=<ExternalAppClientId>&client_secret=<ExternalAppClientSecret>"
152+
-d "grant_type=client_credentials&client_id=<MCPClientId>&client_secret=<MCPClientSecret>"
153153
```
154154

155155
**User Authentication Flow:**
156156
```bash
157157
# Step 1: Get authorization code
158-
<ExternalAppAuthorizationURL>?
158+
<MCPAuthorizationURL>?
159159
response_type=code&
160-
client_id=<ExternalAppClientId>&
160+
client_id=<MCPClientId>&
161161
redirect_uri=CALLBACK_URL&
162162
scope=openid+email+profile
163163
164164
# Step 2: Exchange code for tokens
165-
curl -X POST <ExternalAppTokenURL> \
165+
curl -X POST <MCPTokenURL> \
166166
-H "Content-Type: application/x-www-form-urlencoded" \
167-
-d "grant_type=authorization_code&client_id=<ExternalAppClientId>&client_secret=<ExternalAppClientSecret>&code=AUTH_CODE&redirect_uri=CALLBACK_URL"
167+
-d "grant_type=authorization_code&client_id=<MCPClientId>&client_secret=<MCPClientSecret>&code=AUTH_CODE&redirect_uri=CALLBACK_URL"
168168
```
169169

170170
## Output Parameters
171171

172172
When MCP integration is enabled, the CloudFormation stack provides the following outputs required for external application integration:
173173

174-
### AgentCore Gateway Outputs
174+
### MCP Server Endpoint
175175

176-
- **`AgentCoreGatewayUrl`**: The HTTPS endpoint for the AgentCore Gateway
177-
- Format: `https://gateway-id.gateway.bedrock-agentcore.region.amazonaws.com/mcp`
178-
- Example: `https://analyticagentcoregateway-0kxp69ljko.gateway.bedrock-agentcore.us-east-1.amazonaws.com/mcp`
176+
- **`MCPServerEndpoint`**: The HTTPS endpoint for the MCP Server
177+
- The AgentCore Gateway URL for MCP protocol communication
179178
- Required for external applications to connect to the gateway via MCP protocol
180179

181-
- **`AgentCoreGatewayId`**: Unique identifier for the AgentCore Gateway
182-
- Used for management and monitoring operations
180+
### Authentication Outputs
183181

184-
- **`AgentCoreGatewayArn`**: Full ARN of the AgentCore Gateway resource
185-
- Used for IAM policies and cross-account access
186-
187-
### Cognito Outputs
188-
189-
- **`ExternalAppClientId`**: Cognito User Pool Client ID for external applications
182+
- **`MCPClientId`**: Cognito User Pool Client ID for MCP authentication
190183
- Required for OAuth authentication flows
191184
- Used in token requests and API calls
192185

193-
- **`ExternalAppClientSecret`**: Cognito User Pool Client Secret
186+
- **`MCPClientSecret`**: Cognito User Pool Client Secret for MCP authentication
194187
- Required for client authentication in OAuth flows
195188
- Should be securely stored and rotated regularly
196189

197-
- **`ExternalAppUserPoolId`**: Cognito User Pool ID for external application authentication
190+
- **`MCPUserPool`**: Cognito User Pool ID for MCP authentication
198191
- Required for token validation and user management
199192
- Used by external applications for authentication setup
200193

201-
- **`ExternalAppTokenURL`**: OAuth token endpoint URL
194+
- **`MCPTokenURL`**: OAuth token endpoint URL
202195
- Format: `https://domain-name.auth.region.amazoncognito.com/oauth2/token`
203196
- Used for obtaining access tokens via OAuth flows
204197

205-
- **`ExternalAppAuthorizationURL`**: OAuth authorization endpoint URL
198+
- **`MCPAuthorizationURL`**: OAuth authorization endpoint URL
206199
- Format: `https://domain-name.auth.region.amazoncognito.com/oauth2/authorize`
207200
- Used for initiating OAuth authorization code flows
208201

@@ -215,10 +208,10 @@ import requests
215208
import json
216209
217210
# Configuration from CloudFormation outputs
218-
GATEWAY_URL = "<AgentCoreGatewayUrl>" # From stack outputs
219-
CLIENT_ID = "<ExternalAppClientId>" # From stack outputs
220-
CLIENT_SECRET = "<ExternalAppClientSecret>" # From stack outputs
221-
TOKEN_URL = "<ExternalAppTokenURL>" # From stack outputs
211+
GATEWAY_URL = "<MCPServerEndpoint>" # From stack outputs
212+
CLIENT_ID = "<MCPClientId>" # From stack outputs
213+
CLIENT_SECRET = "<MCPClientSecret>" # From stack outputs
214+
TOKEN_URL = "<MCPTokenURL>" # From stack outputs
222215
223216
# Get access token
224217
token_response = requests.post(

0 commit comments

Comments
 (0)