You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cloudflare Access can delegate access from any [self-hosted application](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) to an [Access for SaaS MCP server](/cloudflare-one/applications/configure-apps/mcp-servers/saas-mcp/) via <GlossaryTooltipterm="OAuth">OAuth</GlossaryTooltip>. The OAuth grant authorizes the MCP server to make requests to your self-hosted applications on behalf of the user, using the user's specific permissions and scopes.
12
+
13
+
For example, your organization may wish to deploy an MCP server that helps employees interact with internal Atlassian applications. You can configure [Access policies](/cloudflare-one/policies/access/#selectors) to ensure that only authorized users can access those applications, either directly or by using an <GlossaryTooltipterm="MCP client">MCP client</GlossaryTooltip>.
14
+
15
+
```mermaid
16
+
flowchart LR
17
+
accTitle: Link MCP servers and self-hosted applications in Access
You can secure <GlossaryTooltipterm="MCP server">Model Context Protocol (MCP) servers</GlossaryTooltip> by using Cloudflare Access as the Single Sign-On (SSO) provider. When users connect to the remote MCP server using an <GlossaryTooltipterm="MCP client">MCP client</GlossaryTooltip>, they will be prompted to log in to your [identity provider](/cloudflare-one/identity/idp-integration/) and are only granted access if they pass your [Access policies](/cloudflare-one/policies/access/#selectors).
12
12
13
-
Cloudflare Access can also delegate access from any [self-hosted application](/cloudflare-one/applications/configure-apps/self-hosted-public-app/) to the MCP server via <GlossaryTooltipterm="OAuth">OAuth</GlossaryTooltip>. The OAuth grant authorizes the MCP server to make requests to your self-hosted applications on behalf of the user, using the user's specific permissions and scopes. For example, your organization may wish to deploy an MCP server that helps employees interact with internal Atlassian applications. You can configure Access policies to ensure that only authorized users can access those applications, either directly or by using AI.
14
-
15
-
```mermaid
16
-
flowchart LR
17
-
accTitle: Link MCP servers and self-hosted applications in Access
18
-
subgraph SaaS["Access for SaaS <br> OIDC app"]
19
-
mcp["MCP server <br> for Atlassian"]
20
-
end
21
-
22
-
subgraph "Access self-hosted app"
23
-
app1[Jira instance]
24
-
end
25
-
26
-
subgraph "Access self-hosted app"
27
-
app2[Confluence instance]
28
-
end
29
-
30
-
User --> client["MCP client"]
31
-
client --> mcp
32
-
mcp -- Access token --> app1
33
-
mcp -- Access token --> app2
34
-
idp[Identity provider] <--> SaaS
35
-
```
36
-
37
13
## Prerequisites
38
14
39
15
- An [identity provider](/cloudflare-one/identity/idp-integration/) configured in Cloudflare Zero Trust
40
16
41
-
42
-
## 1. Add a SaaS application to Cloudflare Zero Trust
17
+
## 1. Create an Access for SaaS app
43
18
44
19
1. In [Zero Trust](https://one.dash.cloudflare.com), go to **Access** > **Applications**.
45
20
2. Select **SaaS**.
@@ -59,4 +34,6 @@ accTitle: Link MCP servers and self-hosted applications in Access
59
34
11. (Optional) In **Experience settings**, configure [App Launcher settings](/cloudflare-one/applications/app-launcher/) by turning on **Enable App in App Launcher** and, in **App Launcher URL**, entering `https://<your-domain>.my.salesforce.com`.
0 commit comments