Cette page est affichée en anglais. Une traduction française est en cours.
MCP ConfigsMay 12, 2026·2 min de lecture

MCP Gateway & Registry — Team Tool Control

MCP Gateway & Registry centralizes MCP servers and agent tools with auth, search, and audit, so teams can manage integrations and scan servers before use.

MCP Hub
MCP Hub · Community
Prêt pour agents

Cet actif peut être lu et installé directement par les agents

TokRepo expose une commande CLI universelle, un contrat d'installation, le metadata JSON, un plan selon l'adaptateur et le contenu raw pour aider les agents à juger l'adaptation, le risque et les prochaines actions.

Native · 94/100Policy : autoriser
Surface agent
Tout agent MCP/CLI
Type
Mcp
Installation
Manual
Confiance
Confiance : Established
Point d'entrée
./build_and_run.sh --prebuilt
Commande CLI universelle
npx tokrepo install ba6cd744-1317-54e0-acfb-f7aac4b9f51a
Introduction

MCP Gateway & Registry centralizes MCP servers and agent tools with auth, search, and audit, so teams can manage integrations and scan servers before use.

  • Best for: teams that want a governed registry for MCP servers with auth, scanning, and audit trails
  • Works with: Docker/Podman; registry UI + APIs; integrates with AI coding assistants and MCP clients (per README)
  • Setup time: 20–60 minutes

Practical Notes

  • Per README: semantic search endpoint POST /api/search/semantic returns relevance-scored matches across servers, tools, and agents.
  • Per README: supports telemetry with opt-out via MCP_TELEMETRY_DISABLED=1 (privacy-first, no PII per doc).
  • Use it as a policy point: enforce auth, rate limits, and security scans before agents can use a server.

Main

A pragmatic governance model:

  1. Inventory everything. Register MCP servers with owners, environments, and trust levels.
  2. Make “approved” explicit. Don’t let agents discover arbitrary remote servers; gate by policy.
  3. Scan + monitor. Run scheduled scans and health checks; disable servers that regress.
  4. Keep audit trails. When an incident happens, you need to know which agent used which tool, when, and with what auth.

If you already run Keycloak/SSO, align identities so human and machine auth are consistent across the registry and your internal services.

FAQ

Q: Do I need Kubernetes? A: No—README includes quick start with prebuilt images (Docker/Podman). Kubernetes is optional for production scaling.

Q: What should I store as metadata? A: Owner, environment, data sensitivity, allowed tools, and any compliance flags (HIPAA/PCI) you care about.

Q: How do I prevent tool sprawl? A: Centralize discovery in the registry, require ownership, and periodically prune unused or risky servers.

🙏

Source et remerciements

Source: https://github.com/agentic-community/mcp-gateway-registry > License: Apache-2.0 > GitHub stars: 644 · forks: 166

Fil de discussion

Connectez-vous pour rejoindre la discussion.
Aucun commentaire pour l'instant. Soyez le premier à partager votre avis.

Actifs similaires