Skip to main content
Add identity governance to your existing MCP servers — authenticate every agent, authorize every tool call, and audit every action, without modifying your MCP servers.
Console terminology: In the Maverics Console, the combination of applications, policies, headers, and connector bindings is managed through User Flows. In YAML, these elements are configured directly within each app’s configuration block under apps[].policies[].

How It Works

MCP Proxy is for when you already have MCP servers running but they lack identity awareness. Maybe you built MCP servers that expose tools for your AI agents, but those servers do not know who is calling them or whether the caller is authorized. MCP Proxy solves this by adding an identity-aware layer between your agents and your existing MCP servers — without modifying either side. The Model Context Protocol (MCP) is an open standard for AI agent-to-tool communication. When you have MCP servers already deployed, they speak MCP natively — agents connect, discover tools, and invoke them. The problem is that vanilla MCP does not include identity. Any agent that can reach your MCP server can invoke any tool. MCP Proxy fixes this gap. The Maverics Orchestrator acts as a transparent proxy between agents and your MCP servers. Agents connect to the Orchestrator (thinking it is the MCP server), and the Orchestrator forwards their requests to your actual MCP servers after applying identity and authorization. Here is the flow:
  1. Agent connects — The AI agent connects to the Orchestrator’s MCP endpoint, treating it as a standard MCP server.
  2. Authentication — The AI Identity Gateway Orchestrator returns protected resource metadata (per RFC 9470) that tells the agent which authorization server(s) to authenticate against. The agent authenticates with the Auth Provider Orchestrator and obtains a token, which the gateway validates before allowing the connection to proceed.
  3. Identity injection — For every tool invocation, the Orchestrator injects identity context into the request before forwarding it to the upstream MCP server. This context includes the agent’s identity, the delegating user’s identity, and any relevant claims or attributes.
  4. Authorization — The Orchestrator evaluates authorization policies to determine whether this agent, acting on behalf of this user, is allowed to invoke this specific tool.
  5. Transparent forwarding — The Orchestrator exchanges the agent’s token for a short-lived, narrowly scoped token specific to the tool being invoked, then forwards the authorized request to the upstream MCP server with this fresh token and identity context attached. The MCP server receives the request as if the agent connected directly — but now with identity information it can use.
  6. Response passthrough — The MCP server’s response flows back through the Orchestrator to the agent, with audit logging capturing the complete interaction.
MCP Proxy vs MCP Bridge: MCP Proxy proxies existing MCP server connections with identity injection — choose it when you already have MCP servers running. MCP Bridge translates REST APIs into MCP tools — choose it when you have REST APIs, not MCP servers.See the AI overview for a side-by-side comparison of both approaches.

Prerequisites

  • A running Maverics Orchestrator — If you have not installed the Orchestrator yet, follow the Quick Start guide first. The Orchestrator is a small, lightweight runtime that deploys almost anywhere.
  • An identity provider configured as an identity connector — The Orchestrator needs an Identity Fabric to authenticate agents and resolve user context.
  • One or more existing MCP servers — These are the upstream MCP servers that your AI agents will access through the proxy. They must be reachable from the Orchestrator over the network.
  • An AI agent that supports the Model Context Protocol (MCP) — The agent connects to the Orchestrator’s MCP endpoint (not directly to your MCP servers).

Configure MCP Proxy

1

Configure the MCP Provider

The MCP Provider is the Orchestrator’s entry point for AI agent connections — the same component used by MCP Bridge. It handles MCP transport, agent authentication via OAuth, and routes tool calls to the correct MCP Proxy app.
Console UI documentation is coming soon. This section will walk you through configuring this component using the Maverics Console’s visual interface, including step-by-step screenshots and field descriptions.
AI Identity Gateway mode selection screen in Maverics Console showing MCP Proxy option
2

Define the MCP Proxy app

Register your upstream MCP server as an MCP Proxy app. The Orchestrator proxies MCP protocol natively — it receives MCP requests from agents and forwards them to your upstream MCP server over the Streamable HTTP transport.
Console UI documentation is coming soon. This section will walk you through configuring this component using the Maverics Console’s visual interface, including step-by-step screenshots and field descriptions.
Upstream MCP server registration screen in Maverics Console showing server endpoint and transport settings
If your MCP servers are behind a firewall or VPN, make sure the Orchestrator has network access to them. The Orchestrator needs to reach each upstream server to discover its tools and forward requests.
3

Configure authorization

Like MCP Bridge, every MCP Proxy app requires both inbound authorization (OPA policy) and outbound authorization (how the Orchestrator authenticates to the upstream MCP server on behalf of the agent). This is the same authorization pattern used across all MCP apps.
Console UI documentation is coming soon. This section will walk you through configuring this component using the Maverics Console’s visual interface, including step-by-step screenshots and field descriptions.
Agent authentication and authorization configuration screen in Maverics Console for MCP Proxy
If your upstream MCP servers are also accessible directly (not just through the proxy), agents could bypass the identity layer by connecting to the MCP server directly. Restrict network access so that MCP servers only accept connections from the Orchestrator.
4

Verify proxied connections

Test the complete flow by connecting an AI agent to MCP Proxy and verifying that identity context is correctly injected into upstream requests.Connect your agent to the Orchestrator’s MCP endpoint and invoke a tool. Then check:
  1. Agent authentication — The Orchestrator logs show the agent was authenticated successfully
  2. Tool discovery — The agent sees tools from all registered upstream MCP servers
  3. Identity injection — The upstream MCP server received the request with identity context attached (check the MCP server’s logs or add a debug tool that echoes received metadata)
  4. Authorization enforcement — Try invoking a tool the agent should not have access to and confirm the request is denied
Success! Your existing MCP servers are now protected by the Orchestrator’s identity layer. Agents authenticate before accessing tools, identity context is injected into every request, and authorization policies control which tools each agent can use.

Troubleshooting

If the Orchestrator cannot reach your upstream MCP servers, agents will see connection timeout errors. Check the following:
  • Verify that the upstream MCP server is running and listening on the configured endpoint.
  • Test network connectivity from the Orchestrator to the MCP server. If the server is behind a firewall, ensure the Orchestrator’s IP is allowed.
  • Check the transport protocol configuration — if the MCP server uses HTTP with Server-Sent Events but the Orchestrator is configured for stdio (or vice versa), the connection will fail.
  • Look at the Orchestrator logs for specific timeout or connection error details.
If your MCP server is receiving requests but without identity context, the outbound authorization configuration may be incorrect:
  • Verify the outbound type is set to tokenExchange (not unprotected) if you need identity context forwarded.
  • Check that the token exchange idp references a valid connector and that the audience matches what the upstream server expects.
  • If using per-tool scopes, verify the tool names in the tools array match the actual tool names from the upstream MCP server.
  • Enable debug logging in the Orchestrator to see the full token exchange flow and identify where identity context is lost.
Authentication failures for MCP Proxy follow the same patterns as MCP Bridge:
  • Verify the agent’s OAuth credentials (client ID and secret) are correct.
  • Confirm the identity provider is reachable from the Orchestrator.
  • Check that the agent’s client registration has not expired or been revoked.
  • Review the Orchestrator logs for the identity provider’s error response.
See the AI Identity overview for more detail on agent credential management and common authentication issues.

What’s Next