Centralize 10+ MCP servers behind one gateway
Quand l'utiliser : Different teams run different MCPs. You need one URL for clients, one audit log, one auth story.
Prérequis
- Docker/Kubernetes environment — Official images at ghcr.io; Helm chart available
- An auth provider (or use built-in JWT) — Existing SSO / OIDC / static JWT signer
Déroulement
-
Deploy the gatewayDeploy mcp-contextforge-gateway via Helm with Redis for federation state. Point it at our OIDC provider.✓ Copié→ Admin UI loads, auth works
-
Register backendsRegister 3 backend MCPs (github, postgres, our-custom) in the admin UI. Apply rate limits: github=100/min, postgres=30/min.✓ Copié→ Backends appear as healthy in registry
-
Repoint clientsUpdate teammate Claude Desktop configs to use a single
mcp-remote https://mcp-gw.company.com/mcpwith their JWT.✓ Copié→ All backend tools available through one connection
Résultat : One place to manage MCP access across the org — centralized like any other API gateway.
Pièges
- Rate limits applied globally but teams have different needs — Use per-user or per-JWT-claim rate limits via the policy engine — don't apply one limit to all
- Gateway becomes single point of failure — Run at least 2 replicas with Redis-backed session state; health-check the /health endpoint