remote-auth-mcp-apim-py

remote-auth-mcp-apim-py

3.4

If you are the rightful owner of remote-auth-mcp-apim-py and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

This document provides a guide on deploying an Entra ID-protected Model Context Protocol (MCP) server on Azure, utilizing various Azure services and tools.

The Authenticated Remote MCP Server is a sample project that demonstrates how to deploy a Model Context Protocol server protected by Entra ID on Azure. It employs an authorization pattern where the client first acquires a token for the MCP server and then uses the on-behalf-of flow to exchange it for a token usable with Microsoft Graph. This setup is entirely secretless, enhancing security by eliminating the need for storing sensitive information. The project leverages Azure Functions, Azure API Management, Bicep, Python, and the Azure Developer CLI to facilitate deployment and management. The Model Context Protocol Inspector is used to test the MCP server, as it supports authorization out-of-the-box.

Features

  • Entra ID Protection: Secure the MCP server with Entra ID, ensuring only authorized access.
  • On-Behalf-Of Flow: Utilize the on-behalf-of flow to exchange tokens for Microsoft Graph access.
  • Secretless Deployment: Enhance security by eliminating the need for storing sensitive information.
  • Azure Integration: Leverage Azure Functions, API Management, and Bicep for seamless deployment.
  • Model Context Protocol Inspector: Test the MCP server with a tool that supports authorization.