Skip to content

Commit 87c6ee3

Browse files
committed
split content into two pages
1 parent 355d425 commit 87c6ee3

File tree

3 files changed

+65
-30
lines changed

3 files changed

+65
-30
lines changed
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
pcx_content_type: navigation
3+
title: MCP servers
4+
sidebar:
5+
order: 3
6+
group:
7+
hideIndex: true
8+
---
9+
10+
import { DirectoryListing } from "~/components";
11+
12+
<DirectoryListing />
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
pcx_content_type: how-to
3+
title: Authenticate MCP server to self-hosted apps
4+
sidebar:
5+
order: 2
6+
label: Enable MCP OAuth to self-hosted apps
7+
---
8+
9+
import { Render, GlossaryTooltip } from "~/components"
10+
11+
Cloudflare Access can delegate access from any [self-hosted application](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) to an [Access for SaaS MCP server](/cloudflare-one/applications/configure-apps/mcp-servers/saas-mcp/) via <GlossaryTooltip term="OAuth">OAuth</GlossaryTooltip>. The OAuth grant authorizes the MCP server to make requests to your self-hosted applications on behalf of the user, using the user's specific permissions and scopes.
12+
13+
For example, your organization may wish to deploy an MCP server that helps employees interact with internal Atlassian applications. You can configure [Access policies](/cloudflare-one/policies/access/#selectors) to ensure that only authorized users can access those applications, either directly or by using an <GlossaryTooltip term="MCP client">MCP client</GlossaryTooltip>.
14+
15+
```mermaid
16+
flowchart LR
17+
accTitle: Link MCP servers and self-hosted applications in Access
18+
subgraph SaaS["Access for SaaS <br> OIDC app"]
19+
mcp["MCP server <br> for Atlassian"]
20+
end
21+
22+
subgraph "Access self-hosted app"
23+
app1[Jira instance]
24+
end
25+
26+
subgraph "Access self-hosted app"
27+
app2[Confluence instance]
28+
end
29+
30+
User --> client["MCP client"]
31+
client --> mcp
32+
mcp -- Access token --> app1
33+
mcp -- Access token --> app2
34+
idp[Identity provider] <--> SaaS
35+
```
36+
37+
## Prerequisites
38+
39+
## 1. Create an Access policy
40+
41+
## 2. Update the self-hosted app
42+
43+
## 3. Configure the MCP server
44+
45+
## Known limitations
46+
Lines changed: 7 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,45 +1,20 @@
11
---
22
pcx_content_type: how-to
3-
title: Authenticate to MCP servers with Cloudflare Access
3+
title: Secure MCP servers with Access for SaaS
44
sidebar:
5-
order: 3
6-
label: MCP servers
5+
order: 1
6+
label: Secure MCP servers with Access for SaaS
77
---
88

99
import { Render, GlossaryTooltip } from "~/components"
1010

1111
You can secure <GlossaryTooltip term="MCP server">Model Context Protocol (MCP) servers</GlossaryTooltip> by using Cloudflare Access as the Single Sign-On (SSO) provider. When users connect to the remote MCP server using an <GlossaryTooltip term="MCP client">MCP client</GlossaryTooltip>, they will be prompted to log in to your [identity provider](/cloudflare-one/identity/idp-integration/) and are only granted access if they pass your [Access policies](/cloudflare-one/policies/access/#selectors).
1212

13-
Cloudflare Access can also delegate access from any [self-hosted application](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) to the MCP server via <GlossaryTooltip term="OAuth">OAuth</GlossaryTooltip>. The OAuth grant authorizes the MCP server to make requests to your self-hosted applications on behalf of the user, using the user's specific permissions and scopes. For example, your organization may wish to deploy an MCP server that helps employees interact with internal Atlassian applications. You can configure Access policies to ensure that only authorized users can access those applications, either directly or by using AI.
14-
15-
```mermaid
16-
flowchart LR
17-
accTitle: Link MCP servers and self-hosted applications in Access
18-
subgraph SaaS["Access for SaaS <br> OIDC app"]
19-
mcp["MCP server <br> for Atlassian"]
20-
end
21-
22-
subgraph "Access self-hosted app"
23-
app1[Jira instance]
24-
end
25-
26-
subgraph "Access self-hosted app"
27-
app2[Confluence instance]
28-
end
29-
30-
User --> client["MCP client"]
31-
client --> mcp
32-
mcp -- Access token --> app1
33-
mcp -- Access token --> app2
34-
idp[Identity provider] <--> SaaS
35-
```
36-
3713
## Prerequisites
3814

3915
- An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
4016

41-
42-
## 1. Add a SaaS application to Cloudflare Zero Trust
17+
## 1. Create an Access for SaaS app
4318

4419
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
4520
2. Select **SaaS**.
@@ -59,4 +34,6 @@ accTitle: Link MCP servers and self-hosted applications in Access
5934
11. (Optional) In **Experience settings**, configure [App Launcher settings](/cloudflare-one/applications/app-launcher/) by turning on **Enable App in App Launcher** and, in **App Launcher URL**, entering `https://<your-domain>.my.salesforce.com`.
6035
12. Save the application.
6136

62-
## 2.
37+
## 2. Configure your MCP server
38+
39+
## Deploy an example MCP server

0 commit comments

Comments
 (0)