Skip to content

Enterprise-ready MCP Gateway & Registry that centralizes AI development tools with secure OAuth authentication, dynamic tool discovery, and unified access for both autonomous AI agents and AI coding assistants. Transform scattered MCP server chaos into governed, auditable tool access with Keycloak/Cognito integration.

License

Notifications You must be signed in to change notification settings

agentic-community/mcp-gateway-registry

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

What is MCP Gateway & Registry?

The MCP Gateway & Registry is an enterprise-ready platform that centralizes access to AI development tools using the Model Context Protocol (MCP). Instead of managing hundreds of individual tool configurations across your development teams, provide secure, governed access to curated AI tools through a single platform.

Transform this chaos:

❌ AI agents require separate connections to each MCP server
❌ Each developer configures VS Code, Cursor, Claude Code individually
❌ Developers must install and manage MCP servers locally
❌ No standard authentication flow for enterprise tools
❌ Scattered API keys and credentials across tools  
❌ No visibility into what tools teams are using
❌ Security risks from unmanaged tool sprawl
❌ No dynamic tool discovery for autonomous agents
❌ No curated tool catalog for multi-tenant environments

Into this organized approach:

βœ… AI agents connect to one gateway, access multiple MCP servers
βœ… Single configuration point for VS Code, Cursor, Claude Code
βœ… Central IT manages cloud-hosted MCP infrastructure via streamable HTTP
βœ… Developers use standard OAuth 2LO/3LO flows for enterprise MCP servers
βœ… Centralized credential management with secure vault integration
βœ… Complete visibility and audit trail for all tool usage
βœ… Enterprise-grade security with governed tool access
βœ… Dynamic tool discovery and invocation for autonomous workflows
βœ… Registry provides discoverable, curated MCP servers for multi-tenant use
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”     β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚          BEFORE: Chaos              β”‚     β”‚       AFTER: MCP Gateway             β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€     β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                     β”‚     β”‚                                      β”‚
β”‚  Developer 1 ──┬──► MCP Server A    β”‚     β”‚  Developer 1 ──┐                     β”‚
β”‚                β”œβ”€β”€β–Ί MCP Server B    β”‚     β”‚                β”‚                     β”‚
β”‚                └──► MCP Server C    β”‚     β”‚  Developer 2 ──┼──► MCP Gateway      β”‚
β”‚                                     β”‚     β”‚                β”‚         β”‚           β”‚
β”‚  Developer 2 ──┬──► MCP Server A    β”‚ ──► β”‚  AI Agent 1 β”€β”€β”€β”˜         β”œβ”€β”€β–Ί MCP A  β”‚
β”‚                β”œβ”€β”€β–Ί MCP Server D    β”‚     β”‚                          β”œβ”€β”€β–Ί MCP B  β”‚
β”‚                └──► MCP Server E    β”‚     β”‚  AI Agent 2 β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”œβ”€β”€β–Ί MCP C  β”‚
β”‚                                     β”‚     β”‚                          β”œβ”€β”€β–Ί MCP D  β”‚
β”‚  AI Agent 1 ───┬──► MCP Server B    β”‚     β”‚  AI Agent 3 β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”œβ”€β”€β–Ί MCP E  β”‚
β”‚                β”œβ”€β”€β–Ί MCP Server C    β”‚     β”‚                          └──► MCP F  β”‚
β”‚                └──► MCP Server F    β”‚     β”‚                                      β”‚
β”‚                                     β”‚     β”‚          Single Connection           β”‚
β”‚  ❌ Multiple connections per user  β”‚      β”‚         βœ… One gateway for all      β”‚
β”‚  ❌ No centralized control         β”‚     β”‚          βœ… Dynamic discovery        β”‚
β”‚  ❌ Credential sprawl               β”‚     β”‚         βœ… Unified governance       β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜     β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

MCP Tools in Action

MCP Tools Demo

Experience dynamic tool discovery and intelligent MCP server integration in real-time


Core Use Cases

AI Agent & Coding Assistant Governance

Provide both autonomous AI agents and human developers with secure access to approved tools through AI coding assistants (VS Code, Cursor, Claude Code) while maintaining IT oversight and compliance.

Enterprise Security & Compliance

Centralized authentication, fine-grained permissions, and comprehensive audit trails for SOX/GDPR compliance pathways across both human and AI agent access patterns.

Dynamic Tool Discovery

AI agents can autonomously discover and execute specialized tools beyond their initial capabilities using intelligent semantic search, while developers get guided tool discovery through their coding assistants.

Unified Access Gateway

Single gateway supporting both autonomous AI agents (machine-to-machine) and AI coding assistants (human-guided) with consistent authentication and tool access patterns.


Architecture

The MCP Gateway & Registry provides a unified platform for both autonomous AI agents and AI coding assistants to access enterprise-curated tools through a centralized gateway with comprehensive authentication and governance.

flowchart TB
    subgraph Human_Users["Human Users"]
        User1["Human User 1"]
        User2["Human User 2"]
        UserN["Human User N"]
    end

    subgraph AI_Agents["AI Agents"]
        Agent1["AI Agent 1"]
        Agent2["AI Agent 2"]
        Agent3["AI Agent 3"]
        AgentN["AI Agent N"]
    end

    subgraph EC2_Gateway["<b>MCP Gateway & Registry</b> (Amazon EC2 Instance)"]
        subgraph NGINX["NGINX Reverse Proxy"]
            RP["Reverse Proxy Router"]
        end
        
        subgraph AuthRegistry["Authentication & Registry Services"]
            AuthServer["Auth Server<br/>(Dual Auth)"]
            Registry["Registry<br/>Web UI"]
            RegistryMCP["Registry<br/>MCP Server"]
        end
        
        subgraph LocalMCPServers["Local MCP Servers"]
            MCP_Local1["MCP Server 1"]
            MCP_Local2["MCP Server 2"]
        end
    end
    
    %% Identity Provider
    IdP[Identity Provider<br/>Keycloak/Cognito]
    
    subgraph EKS_Cluster["Amazon EKS/EC2 Cluster"]
        MCP_EKS1["MCP Server 3"]
        MCP_EKS2["MCP Server 4"]
    end
    
    subgraph APIGW_Lambda["Amazon API Gateway + AWS Lambda"]
        API_GW["Amazon API Gateway"]
        Lambda1["AWS Lambda Function 1"]
        Lambda2["AWS Lambda Function 2"]
    end
    
    subgraph External_Systems["External Data Sources & APIs"]
        DB1[(Database 1)]
        DB2[(Database 2)]
        API1["External API 1"]
        API2["External API 2"]
        API3["External API 3"]
    end
    
    %% Connections from Human Users
    User1 -->|Web Browser<br>Authentication| IdP
    User2 -->|Web Browser<br>Authentication| IdP
    UserN -->|Web Browser<br>Authentication| IdP
    User1 -->|Web Browser<br>HTTPS| Registry
    User2 -->|Web Browser<br>HTTPS| Registry
    UserN -->|Web Browser<br>HTTPS| Registry
    
    %% Connections from Agents to Gateway
    Agent1 -->|MCP Protocol<br>SSE with Auth| RP
    Agent2 -->|MCP Protocol<br>SSE with Auth| RP
    Agent3 -->|MCP Protocol<br>Streamable HTTP with Auth| RP
    AgentN -->|MCP Protocol<br>Streamable HTTP with Auth| RP
    
    %% Auth flow connections
    RP -->|Auth validation| AuthServer
    AuthServer -.->|Validate credentials| IdP
    Registry -.->|User authentication| IdP
    RP -->|Tool discovery| RegistryMCP
    RP -->|Web UI access| Registry
    
    %% Connections from Gateway to MCP Servers
    RP -->|SSE| MCP_Local1
    RP -->|SSE| MCP_Local2
    RP -->|SSE| MCP_EKS1
    RP -->|SSE| MCP_EKS2
    RP -->|Streamable HTTP| API_GW
    
    %% Connections within API GW + Lambda
    API_GW --> Lambda1
    API_GW --> Lambda2
    
    %% Connections to External Systems
    MCP_Local1 -->|Tool Connection| DB1
    MCP_Local2 -->|Tool Connection| DB2
    MCP_EKS1 -->|Tool Connection| API1
    MCP_EKS2 -->|Tool Connection| API2
    Lambda1 -->|Tool Connection| API3

    %% Style definitions
    classDef user fill:#fff9c4,stroke:#f57f17,stroke-width:2px
    classDef agent fill:#e1f5fe,stroke:#29b6f6,stroke-width:2px
    classDef gateway fill:#e8f5e9,stroke:#66bb6a,stroke-width:2px
    classDef nginx fill:#f3e5f5,stroke:#ab47bc,stroke-width:2px
    classDef mcpServer fill:#fff3e0,stroke:#ffa726,stroke-width:2px
    classDef eks fill:#ede7f6,stroke:#7e57c2,stroke-width:2px
    classDef apiGw fill:#fce4ec,stroke:#ec407a,stroke-width:2px
    classDef lambda fill:#ffebee,stroke:#ef5350,stroke-width:2px
    classDef dataSource fill:#e3f2fd,stroke:#2196f3,stroke-width:2px
    
    %% Apply styles
    class User1,User2,UserN user
    class Agent1,Agent2,Agent3,AgentN agent
    class EC2_Gateway,NGINX gateway
    class RP nginx
    class AuthServer,Registry,RegistryMCP gateway
    class IdP apiGw
    class MCP_Local1,MCP_Local2 mcpServer
    class EKS_Cluster,MCP_EKS1,MCP_EKS2 eks
    class API_GW apiGw
    class Lambda1,Lambda2 lambda
    class DB1,DB2,API1,API2,API3 dataSource
Loading

Key Architectural Benefits:

  • Unified Gateway: Single point of access for both AI agents and human developers through coding assistants
  • Dual Authentication: Supports both human user authentication and machine-to-machine agent authentication
  • Scalable Infrastructure: Nginx reverse proxy with horizontal scaling capabilities
  • Multiple Transports: SSE and Streamable HTTP support for different client requirements

Key Advantages

Enterprise-Grade Security

  • OAuth 2.0/3.0 compliance with IdP integration
  • Fine-grained access control at tool and method level
  • Zero-trust network architecture
  • Complete audit trails and comprehensive analytics for compliance

AI Agent & Developer Experience

  • Single configuration works across autonomous AI agents and AI coding assistants (VS Code, Cursor, Claude Code, Cline)
  • Dynamic tool discovery with natural language queries for both agents and humans
  • Instant onboarding for new team members and AI agent deployments
  • Unified governance for both AI agents and human developers

Production Ready

  • High availability with multi-AZ deployment
  • Container-native (Docker/Kubernetes)
  • Real-time health monitoring and alerting
  • Dual authentication supporting both human and machine authentication

Quick Start

Option A: Pre-built Images (Instant Setup)

Get running in under 2 minutes with pre-built containers:

Step 1: Clone and setup

git clone https://github.com/agentic-community/mcp-gateway-registry.git
cd mcp-gateway-registry
cp .env.example .env

Step 2: Configure environment Complete: Initial Environment Configuration - Configure domains, passwords, and authentication

export DOCKERHUB_ORG=mcpgateway

Step 3: Deploy with pre-built images

./build_and_run.sh --prebuilt

Step 4: Initialize Keycloak Complete: Initialize Keycloak Configuration - Set up identity provider and security policies

Step 5: Access the registry

open http://localhost:7860

Step 6: Create your first agent Complete: Create Your First AI Agent Account - Create agent credentials for testing

Step 7: Restart auth server to apply new credentials

docker-compose down auth-server && docker-compose rm -f auth-server && docker-compose up -d auth-server

Step 8: Test the setup Complete: Testing with mcp_client.py and agent.py - Validate your setup works correctly

Benefits: No build time β€’ No Node.js required β€’ No frontend compilation β€’ Consistent tested images

Option B: Build from Source

New to MCP Gateway? Start with our Complete Setup Guide for detailed step-by-step instructions from scratch on AWS EC2.

Testing & Integration Options

Python Scripts:

  • ./mcp_client.py - Core MCP operations (ping, list tools, call tools)
  • ./tests/mcp_cmds.sh - Shell-based MCP testing operations

Python Agent:

  • agents/agent.py - Full-featured Python agent with advanced AI capabilities

Next Steps: Testing Guide | Complete Installation Guide | Authentication Setup | AI Assistant Integration


Enterprise Features

AI Agents & Coding Assistants Integration

Transform how both autonomous AI agents and development teams access enterprise tools with centralized governance:

Roo Code MCP Configuration

Enterprise-curated MCP servers accessible through unified gateway

Roo Code Agent in Action

AI assistants executing approved enterprise tools with governance

Authentication & Authorization

Multiple Identity Modes:

  • Machine-to-Machine (M2M) - For autonomous AI agents and automated systems
  • Three-Legged OAuth (3LO) - For external service integration (Atlassian, Google, GitHub)
  • Session-Based - For human developers using AI coding assistants and web interface

Supported Identity Providers:

  • Keycloak - Enterprise-grade open-source identity and access management with individual agent audit trails
  • Amazon Cognito - Amazon managed identity service
  • Any OAuth 2.0 compatible provider

Fine-Grained Permissions:

  • Tool-level access control
  • Method-level restrictions
  • Team-based permissions
  • Temporary access grants

Production Deployment

Cloud Platforms:

  • Amazon EC2 - Single instance or auto-scaling groups
  • Amazon EKS - Kubernetes-native microservices deployment

High Availability:

  • Multi-AZ deployment with automatic failover
  • Health monitoring and alerting
  • Rolling updates with zero downtime
  • Backup and disaster recovery

What's New

  • Tag-Based Tool Filtering - Enhanced intelligent_tool_finder now supports filtering tools by server tags for precise categorical discovery alongside semantic search
  • πŸ” Keycloak Identity Provider Integration - Enterprise-grade authentication with individual AI agent audit trails, group-based authorization, and production-ready service account management. Learn more
  • Amazon Bedrock AgentCore Integration - Direct access to AWS services through managed MCP endpoints
  • Three-Legged OAuth (3LO) Support - External service integration (Atlassian, Google, GitHub)
  • JWT Token Vending Service - Self-service token generation for automation
  • Automated Token Refresh Service - Background token refresh to maintain continuous authentication
  • Modern React Frontend - Complete UI overhaul with TypeScript and real-time updates
  • Dynamic Tool Discovery - AI agents autonomously find and execute specialized tools
  • Fine-Grained Access Control - Granular permissions for servers, methods, and individual tools

Documentation

Getting Started Enterprise Setup Developer & Operations
Complete Setup Guide
NEW! Step-by-step from scratch on AWS EC2
Authentication Guide
OAuth and identity provider integration
AI Coding Assistants Setup
VS Code, Cursor, Claude Code integration
Installation Guide
Complete setup instructions for EC2 and EKS
Keycloak Integration
Enterprise identity with agent audit trails
API Reference
Programmatic registry management
Quick Start Tutorial
Get running in 5 minutes
Amazon Cognito Setup
Step-by-step IdP configuration
Token Refresh Service
Automated token refresh and lifecycle management
Configuration Reference
Environment variables and settings
Fine-Grained Access Control
Permission management and security
Dynamic Tool Discovery
Autonomous agent capabilities
Production Deployment
Complete setup for production environments
Troubleshooting Guide
Common issues and solutions

Community

Get Involved

Join the Discussion

Resources

Contributing

Roadmap

The following GitHub issues represent our current development roadmap and planned features:

Major Features

Authentication & Identity

For the complete list of open issues, feature requests, and bug reports, visit our GitHub Issues page.


License

This project is licensed under the Apache-2.0 License - see the LICENSE file for details.


⭐ Star this repository if it helps your organization!

Get Started | Documentation | Contribute

About

Enterprise-ready MCP Gateway & Registry that centralizes AI development tools with secure OAuth authentication, dynamic tool discovery, and unified access for both autonomous AI agents and AI coding assistants. Transform scattered MCP server chaos into governed, auditable tool access with Keycloak/Cognito integration.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published