Esta página se muestra en inglés. Una traducción al español está en curso.
MCP ConfigsMay 12, 2026·2 min de lectura

MCP Gateway & Registry — Team Tool Control

MCP Gateway & Registry centralizes MCP servers and agent tools with auth, search, and audit, so teams can manage integrations and scan servers before use.

Listo para agents

Este activo puede ser leído e instalado directamente por agents

TokRepo expone un comando CLI universal, contrato de instalación, metadata JSON, plan según adaptador y contenido raw para que los agents evalúen compatibilidad, riesgo y próximos pasos.

Native · 94/100Política: permitir
Superficie agent
Cualquier agent MCP/CLI
Tipo
Mcp
Instalación
Manual
Confianza
Confianza: Established
Entrada
./build_and_run.sh --prebuilt
Comando CLI universal
npx tokrepo install ba6cd744-1317-54e0-acfb-f7aac4b9f51a
Introducción

MCP Gateway & Registry centralizes MCP servers and agent tools with auth, search, and audit, so teams can manage integrations and scan servers before use.

  • Best for: teams that want a governed registry for MCP servers with auth, scanning, and audit trails
  • Works with: Docker/Podman; registry UI + APIs; integrates with AI coding assistants and MCP clients (per README)
  • Setup time: 20–60 minutes

Practical Notes

  • Per README: semantic search endpoint POST /api/search/semantic returns relevance-scored matches across servers, tools, and agents.
  • Per README: supports telemetry with opt-out via MCP_TELEMETRY_DISABLED=1 (privacy-first, no PII per doc).
  • Use it as a policy point: enforce auth, rate limits, and security scans before agents can use a server.

Main

A pragmatic governance model:

  1. Inventory everything. Register MCP servers with owners, environments, and trust levels.
  2. Make “approved” explicit. Don’t let agents discover arbitrary remote servers; gate by policy.
  3. Scan + monitor. Run scheduled scans and health checks; disable servers that regress.
  4. Keep audit trails. When an incident happens, you need to know which agent used which tool, when, and with what auth.

If you already run Keycloak/SSO, align identities so human and machine auth are consistent across the registry and your internal services.

FAQ

Q: Do I need Kubernetes? A: No—README includes quick start with prebuilt images (Docker/Podman). Kubernetes is optional for production scaling.

Q: What should I store as metadata? A: Owner, environment, data sensitivity, allowed tools, and any compliance flags (HIPAA/PCI) you care about.

Q: How do I prevent tool sprawl? A: Centralize discovery in the registry, require ownership, and periodically prune unused or risky servers.

🙏

Fuente y agradecimientos

Source: https://github.com/agentic-community/mcp-gateway-registry > License: Apache-2.0 > GitHub stars: 644 · forks: 166

Discusión

Inicia sesión para unirte a la discusión.
Aún no hay comentarios. Sé el primero en compartir tus ideas.

Activos relacionados