MCP ConfigsMay 12, 2026·2 min read

MCP Gateway & Registry — Team Tool Control

MCP Gateway & Registry centralizes MCP servers and agent tools with auth, search, and audit, so teams can manage integrations and scan servers before use.

Agent ready

This asset can be read and installed directly by agents

TokRepo exposes a universal CLI command, install contract, metadata JSON, adapter-aware plan, and raw content links so agents can judge fit, risk, and next actions.

Native · 94/100Policy: allow
Agent surface
Any MCP/CLI agent
Kind
Mcp
Install
Manual
Trust
Trust: Established
Entrypoint
./build_and_run.sh --prebuilt
Universal CLI install command
npx tokrepo install ba6cd744-1317-54e0-acfb-f7aac4b9f51a
Intro

MCP Gateway & Registry centralizes MCP servers and agent tools with auth, search, and audit, so teams can manage integrations and scan servers before use.

  • Best for: teams that want a governed registry for MCP servers with auth, scanning, and audit trails
  • Works with: Docker/Podman; registry UI + APIs; integrates with AI coding assistants and MCP clients (per README)
  • Setup time: 20–60 minutes

Practical Notes

  • Per README: semantic search endpoint POST /api/search/semantic returns relevance-scored matches across servers, tools, and agents.
  • Per README: supports telemetry with opt-out via MCP_TELEMETRY_DISABLED=1 (privacy-first, no PII per doc).
  • Use it as a policy point: enforce auth, rate limits, and security scans before agents can use a server.

Main

A pragmatic governance model:

  1. Inventory everything. Register MCP servers with owners, environments, and trust levels.
  2. Make “approved” explicit. Don’t let agents discover arbitrary remote servers; gate by policy.
  3. Scan + monitor. Run scheduled scans and health checks; disable servers that regress.
  4. Keep audit trails. When an incident happens, you need to know which agent used which tool, when, and with what auth.

If you already run Keycloak/SSO, align identities so human and machine auth are consistent across the registry and your internal services.

FAQ

Q: Do I need Kubernetes? A: No—README includes quick start with prebuilt images (Docker/Podman). Kubernetes is optional for production scaling.

Q: What should I store as metadata? A: Owner, environment, data sensitivity, allowed tools, and any compliance flags (HIPAA/PCI) you care about.

Q: How do I prevent tool sprawl? A: Centralize discovery in the registry, require ownership, and periodically prune unused or risky servers.

🙏

Source & Thanks

Source: https://github.com/agentic-community/mcp-gateway-registry > License: Apache-2.0 > GitHub stars: 644 · forks: 166

Discussion

Sign in to join the discussion.
No comments yet. Be the first to share your thoughts.

Related Assets