MCP Gateway is a reverse proxy and management layer for Model Context Protocol (MCP) servers, enabling scalable, session-aware routing and lifecycle management of MCP servers in Kubernetes environments.
This project provides:
/adapters
scope. Designed to coexist with other resource types (e.g., /agents
) in a unified AI development platform.session_id
are consistently routed to the same MCP server instance.flowchart LR
subgraph Clients["Clients"]
DataClient["Agent/MCP Data<br>Client"]
MgmtClient["Server Management<br>Client"]
end
subgraph DataPlane["Data Plane"]
Routing["Distributed Routing"]
end
subgraph ControlPlane["Control Plane"]
DeploymentManagement["Deployment Management"]
MetadataManagement["Metadata Management"]
end
subgraph Gateway["MCP Gateway"]
Auth["AuthN - Bearer<br>AuthZ - RBAC/ACL"]
Auth2["AuthN - Bearer<br>AuthZ - RBAC/ACL"]
DataPlane
ControlPlane
end
subgraph Cluster["Kubernetes Cluster"]
PodA["Server Pod<br>mcp-a-0"]
PodA1["Server Pod<br>mcp-a-1"]
PodB["Server Pod<br>mcp-b-0"]
end
DataClient -- SSE/<br>Streamable HTTP --> Auth
MgmtClient -- "CRUD /adapters" --> Auth2 --> ControlPlane
Auth --> Routing
Routing -- Session Affinity Routing --> PodA
Routing --> PodA1 & PodB
MetadataManagement --> Metadata[("Server<br>Metadata")]
DeploymentManagement -- "Deployment/Status Check"--> Cluster
POST /adapters
— Deploy and register a new MCP server.GET /adapters
— List all MCP servers the user can access.GET /adapters/{name}
— Retrieve metadata for a specific adapter.GET /adapters/{name}/status
— Check the deployment status.GET /adapters/{name}/logs
— Access the server’s running logs.PUT /adapters/{name}
— Update the deployment.DELETE /adapters/{name}
— Remove the server.GET /adapters/{name}/sse
— Establish an initial SSE connection.POST /adapters/{name}/messages
— Send subsequent requests using session_id
.POST /adapters/{name}/mcp
— Establish a streamable HTTP connection. docker run -d -p 5000:5000 --name registry registry:2.7
Build and push the MCP server images to your local registry (localhost:5000
).
docker build -f mcp-example-server/Dockerfile mcp-example-server -t localhost:5000/mcp-example:1.0.0
docker push localhost:5000/mcp-example:1.0.0
(Optional) Open dotnet/Microsoft.McpGateway.sln
with Visual Studio.
Publish the MCP Gateway image by right-clicking Publish
on Microsoft.McpGateway.Service
in Visual Studio, or run:
dotnet publish dotnet/Microsoft.McpGateway.Service/src/Microsoft.McpGateway.Service.csproj -c Release /p:PublishProfile=localhost_5000.pubxml
Apply the deployment manifests:
kubectl apply -f deployment/k8s/local-deployment.yml
Forward the gateway service port:
kubectl port-forward -n adapter svc/mcpgateway-service 8000:8000
Import the OpenAPI definition from openapi/mcp-gateway.openapi.json
into tools like Postman, Bruno, or Swagger Editor.
Send a request to create a new adapter resource:
POST http://localhost:8000/adapters
Content-Type: application/json
{
"name": "mcp-example",
"imageName": "mcp-example",
"imageVersion": "1.0.0",
"description": "test"
}
Note: Ensure VSCode is up to date to access the latest MCP features.
mcp-example
server, use:
http://localhost:8000/adapters/mcp-example/mcp
(Streamable HTTP)Sample .vscode/mcp.json
that connects to the mcp-example
server
{
"servers": {
"mcp-example": {
"url": "http://localhost:8000/adapters/mcp-example/mcp",
}
}
}
http://localhost:8000/adapters/{name}/mcp
(Streamable HTTP)http://localhost:8000/adapters/{name}/sse
(SSE)To remove all deployed resources, delete the Kubernetes namespace:
kubectl delete namespace adapter
The cloud-deployed service requires bearer token authentication using Azure Entra ID. Follow these steps to configure an app registration.
mcp-gateway
api://<your-client-id>
access
Access MCP Gateway
To allow Azure CLI & VS Code to work as the client for token acquisition.
04b07795-8ddb-461a-bbee-02f9e1bf7b46
(Azure CLI)aebc6443-996d-45c2-90f0-388ff96faa56
(VS Code)access
Parameters
| Name | Description |
|——————-|——————————————————————————————————————|
| resourceGroup
| The name of the resource group. Must contain only lowercase letters and numbers (alphanumeric). |
| clientId
| The Entra ID (Azure AD) client ID from your app registration. |
| location
| (Optional) The Azure region where resources will be deployed.
Defaults to the resource group’s location. |
| resourceLabel
| (Optional) A lowercase alphanumeric string used as a suffix for naming resources and as the DNS label.
If not provided, it will be the resourceGroup name.
Recommendation: Set this value as the default the same with resource group name and make sure resouce group name contains only lower alphanumeric. |
The deployment will:
Deploy Azure infrastructure via Bicep templates
Resource Name | Resource Type |
---|---|
mgreg<resourceLabel> | Container Registry |
mg-storage-<resourceLabel> | Azure Cosmos DB Account |
mg-aag-<resourceLabel> | Application Gateway |
mg-ai-<resourceLabel> | Application Insights |
mg-aks-<resourceLabel> | Kubernetes Service (AKS) |
mg-identity-<resourceLabel> | Managed Identity |
mg-pip-<resourceLabel> | Public IP Address |
mg-vnet-<resourceLabel> | Virtual Network |
Deploy Kubernetes resources (including mcp-gateway
) to the provisioned AKS cluster
Note: It’s recommended to use Managed Identity for credential-less authentication. This deployment follows that design.
The gateway service pulls the MCP server image from the newly provisioned Azure Container Registry (ACR) during deployment.
Build the MCP server image in ACR:
az acr build -r "mgreg$resourceLabel" -f mcp-example-server/Dockerfile mcp-example-server -t "mgreg$resourceLabel.azurecr.io/mcp-example:1.0.0"
Import the OpenAPI spec from openapi/mcp-gateway.openapi.json
into Postman, Bruno, or Swagger Editor
az account get-access-token --resource $clientId
POST http://<resourceLabel>.<location>.cloudapp.azure.com/adapters
Authorization: Bearer <token>
Content-Type: application/json
{
"name": "mcp-example",
"imageName": "mcp-example",
"imageVersion": "1.0.0",
"description": "test"
}
Note: Ensure VSCode is up to date to access the latest MCP features.
mcp-example
server, use:
http://<resourceLabel>.<location>.cloudapp.azure.com/adapters/mcp-example/mcp
(Streamable HTTP)Sample .vscode/mcp.json
that connects to the mcp-example
server
{
"servers": {
"mcp-example": {
"url": "http://<resourceLabel>.<location>.cloudapp.azure.com/adapters/mcp-example/mcp",
}
}
}
Note: Authentication is still required to access the MCP server, VS Code will help handle the authentication process.
http://<resourceLabel>.<location>.cloudapp.azure.com/adapters/{name}/mcp
(Streamable HTTP)http://<resourceLabel>.<location>.cloudapp.azure.com/adapters/{name}/sse
(SSE)To remove all deployed resources, delete the resource group from Azure portal or run:
az group delete --name <resourceGroupName> --yes
TLS Configuration
Set up HTTPS on Azure Application Gateway (AAG) listener using valid TLS certificates.
Network Security
Restrict incoming traffic within the virtual network and configure Private Endpoints for enhanced network security.
Telemetry
Enable advanced telemetry, detailed metrics, and alerts to support monitoring and troubleshooting in production.
Scaling
Adjust scaling for mcp-gateway
services and MCP servers based on expected load.
Authentication & Authorization
Set up OAuth 2.0 with Azure Entra ID (AAD) for authentication.
Implement fine-grained access control using RBAC or custom ACLs for adapter
level permissions.
This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.opensource.microsoft.com.
When you submit a pull request, a CLA bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., status check, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.
This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.
This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft’s Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party’s policies.
The software may collect information about you and your use of the software and send it to Microsoft. Microsoft may use this information to provide services and improve our products and services. You may turn off the telemetry as described in the repository. There are also some features in the software that may enable you and Microsoft to collect data from users of your applications. If you use these features, you must comply with applicable law, including providing appropriate notices to users of your applications together with a copy of Microsoft’s privacy statement. Our privacy statement is located at https://go.microsoft.com/fwlink/?LinkID=824704. You can learn more about data collection and use in the help documentation and our privacy statement. Your use of the software operates as your consent to these practices.