Centralize 10+ MCP servers behind one gateway
Quando usar: Different teams run different MCPs. You need one URL for clients, one audit log, one auth story.
Pré-requisitos
- Docker/Kubernetes environment — Official images at ghcr.io; Helm chart available
- An auth provider (or use built-in JWT) — Existing SSO / OIDC / static JWT signer
Fluxo
-
Deploy the gatewayDeploy mcp-contextforge-gateway via Helm with Redis for federation state. Point it at our OIDC provider.✓ Copiado→ Admin UI loads, auth works
-
Register backendsRegister 3 backend MCPs (github, postgres, our-custom) in the admin UI. Apply rate limits: github=100/min, postgres=30/min.✓ Copiado→ Backends appear as healthy in registry
-
Repoint clientsUpdate teammate Claude Desktop configs to use a single
mcp-remote https://mcp-gw.company.com/mcpwith their JWT.✓ Copiado→ All backend tools available through one connection
Resultado: One place to manage MCP access across the org — centralized like any other API gateway.
Armadilhas
- Rate limits applied globally but teams have different needs — Use per-user or per-JWT-claim rate limits via the policy engine — don't apply one limit to all
- Gateway becomes single point of failure — Run at least 2 replicas with Redis-backed session state; health-check the /health endpoint