Console terminology: In the Maverics Console, the combination of applications,
policies, headers, and connector bindings is managed through User Flows. In
YAML, these elements are configured directly within each app’s configuration block
under
apps[].policies[].How It Works
MCP Proxy is for when you already have MCP servers running but they lack identity awareness. Maybe you built MCP servers that expose tools for your AI agents, but those servers do not know who is calling them or whether the caller is authorized. MCP Proxy solves this by adding an identity-aware layer between your agents and your existing MCP servers — without modifying either side. The Model Context Protocol (MCP) is an open standard for AI agent-to-tool communication. When you have MCP servers already deployed, they speak MCP natively — agents connect, discover tools, and invoke them. The problem is that vanilla MCP does not include identity. Any agent that can reach your MCP server can invoke any tool. MCP Proxy fixes this gap. The Maverics Orchestrator acts as a transparent proxy between agents and your MCP servers. Agents connect to the Orchestrator (thinking it is the MCP server), and the Orchestrator forwards their requests to your actual MCP servers after applying identity and authorization. Here is the flow:- Agent connects — The AI agent connects to the Orchestrator’s MCP endpoint, treating it as a standard MCP server.
- Authentication — The AI Identity Gateway Orchestrator returns protected resource metadata (per RFC 9470) that tells the agent which authorization server(s) to authenticate against. The agent authenticates with the Auth Provider Orchestrator and obtains a token, which the gateway validates before allowing the connection to proceed.
- Identity injection — For every tool invocation, the Orchestrator injects identity context into the request before forwarding it to the upstream MCP server. This context includes the agent’s identity, the delegating user’s identity, and any relevant claims or attributes.
- Authorization — The Orchestrator evaluates authorization policies to determine whether this agent, acting on behalf of this user, is allowed to invoke this specific tool.
- Transparent forwarding — The Orchestrator exchanges the agent’s token for a short-lived, narrowly scoped token specific to the tool being invoked, then forwards the authorized request to the upstream MCP server with this fresh token and identity context attached. The MCP server receives the request as if the agent connected directly — but now with identity information it can use.
- Response passthrough — The MCP server’s response flows back through the Orchestrator to the agent, with audit logging capturing the complete interaction.
Prerequisites
- A running Maverics Orchestrator — If you have not installed the Orchestrator yet, follow the Quick Start guide first. The Orchestrator is a small, lightweight runtime that deploys almost anywhere.
- An identity provider configured as an identity connector — The Orchestrator needs an Identity Fabric to authenticate agents and resolve user context.
- One or more existing MCP servers — These are the upstream MCP servers that your AI agents will access through the proxy. They must be reachable from the Orchestrator over the network.
- An AI agent that supports the Model Context Protocol (MCP) — The agent connects to the Orchestrator’s MCP endpoint (not directly to your MCP servers).
Configure MCP Proxy
Configure the MCP Provider
The MCP Provider is the Orchestrator’s entry point for AI agent connections — the same component used by MCP Bridge. It handles MCP transport, agent authentication via OAuth, and routes tool calls to the correct MCP Proxy app.
- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Define the MCP Proxy app
Register your upstream MCP server as an MCP Proxy app. The Orchestrator proxies MCP protocol natively — it receives MCP requests from agents and forwards them to your upstream MCP server over the Streamable HTTP transport.
- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Configure authorization
Like MCP Bridge, every MCP Proxy app requires both inbound authorization (OPA policy) and outbound authorization (how the Orchestrator authenticates to the upstream MCP server on behalf of the agent). This is the same authorization pattern used across all MCP apps.
- Console UI
- Configuration
Console UI documentation is coming soon. This section will walk you
through configuring this component using the Maverics Console’s visual
interface, including step-by-step screenshots and field descriptions.
Verify proxied connections
Test the complete flow by connecting an AI agent to MCP Proxy and verifying that identity context is correctly injected into upstream requests.Connect your agent to the Orchestrator’s MCP endpoint and invoke a tool. Then check:
- Agent authentication — The Orchestrator logs show the agent was authenticated successfully
- Tool discovery — The agent sees tools from all registered upstream MCP servers
- Identity injection — The upstream MCP server received the request with identity context attached (check the MCP server’s logs or add a debug tool that echoes received metadata)
- Authorization enforcement — Try invoking a tool the agent should not have access to and confirm the request is denied
Success! Your existing MCP servers are now protected by the Orchestrator’s
identity layer. Agents authenticate before accessing tools, identity context
is injected into every request, and authorization policies control which
tools each agent can use.
Troubleshooting
Connection timeouts to upstream MCP servers
Connection timeouts to upstream MCP servers
If the Orchestrator cannot reach your upstream MCP servers, agents will see
connection timeout errors. Check the following:
- Verify that the upstream MCP server is running and listening on the configured endpoint.
- Test network connectivity from the Orchestrator to the MCP server. If the server is behind a firewall, ensure the Orchestrator’s IP is allowed.
- Check the transport protocol configuration — if the MCP server uses HTTP with Server-Sent Events but the Orchestrator is configured for stdio (or vice versa), the connection will fail.
- Look at the Orchestrator logs for specific timeout or connection error details.
Identity not propagating to upstream MCP server
Identity not propagating to upstream MCP server
If your MCP server is receiving requests but without identity context, the
outbound authorization configuration may be incorrect:
- Verify the outbound type is set to
tokenExchange(notunprotected) if you need identity context forwarded. - Check that the token exchange
idpreferences a valid connector and that theaudiencematches what the upstream server expects. - If using per-tool scopes, verify the tool names in the
toolsarray match the actual tool names from the upstream MCP server. - Enable debug logging in the Orchestrator to see the full token exchange flow and identify where identity context is lost.
Agent authentication failures
Agent authentication failures
Authentication failures for MCP Proxy follow the same patterns as MCP Bridge:
- Verify the agent’s OAuth credentials (client ID and secret) are correct.
- Confirm the identity provider is reachable from the Orchestrator.
- Check that the agent’s client registration has not expired or been revoked.
- Review the Orchestrator logs for the identity provider’s error response.