JUHE API Marketplace
enkryptai avatar
MCP Server

Enkrypt AI Secure MCP Gateway

A proxy server that sits between MCP clients and servers, providing authentication, tool discovery, caching, and guardrail enforcement to protect MCP servers from malicious inputs.

38
GitHub Stars
11/22/2025
Last Updated
No Configuration
Please check the documentation below.
  1. Home
  2. MCP Servers
  3. secure-mcp-gateway

README Documentation

Enkrypt AI Secure MCP Gateway

enkrypt-secure-mcp-gateway-hld

๐Ÿ“– Featured Blog Post: Learn how the Secure MCP Gateway prevents top attacks and vulnerabilities in our latest blog:

How Enkrypt's Secure MCP Gateway and MCP Scanner Prevent Top Attacks

Discover real-world attack scenarios, security best practices, and how our gateway protects your AI applications.

Overview

This Secure MCP Gateway is built with authentication, automatic tool discovery, caching, and guardrail enforcement.

It sits between your MCP client and MCP servers. So, by it's nature it itself also acts as an MCP server as well as an MCP client :)

When your MCP client connects to the Gateway, it acts as an MCP server. When the Gateway connects to the actual MCP server, it acts as an MCP client.

  • Pypi Package

  • Docker Image

  • Also see:

    • CLI-Commands-Reference.md for the list of commands and their usage
    • API-Reference.md for the list of API endpoints and their usage
    • MCP Gateway Setup Notebook for a complete walkthrough of all the essential commands

Table of Contents

  • 1. Features ๐Ÿš€

  • 2. High level steps of how the MCP Gateway works ๐Ÿชœ

  • 3. Prerequisites ๐Ÿงฉ

  • 4. Gateway Setup ๐Ÿ‘จโ€๐Ÿ’ป

  • 5. (Optional) OpenTelemetry Setup ๐Ÿ“Š

  • 6. Verify Installation and check the files generated โœ…

  • 7. Edit the Gateway config as needed โœ๏ธ

  • 8. (Optional) Add GitHub MCP Server to the Gateway ๐Ÿค–

  • 8.1 (Optional) Connect to MCP Servers with OAuth ๐Ÿ”

  • 9. (Optional) Protect GitHub MCP Server and Test Echo Server ๐Ÿ”’

  • 10. Recommendations for using Guardrails ๐Ÿ’ก

  • 11. Other tools available ๐Ÿ”ง

  • 12. Deployment Patterns ๐Ÿช‚

  • 13. Uninstall the Gateway ๐Ÿ—‘๏ธ

  • 14. Troubleshooting ๐Ÿ•ต

  • 15. Known Issues being worked on ๐Ÿ—๏ธ

  • 16. Known Limitations โš ๏ธ

  • 17. Contribute ๐Ÿค

  • 18. Testing ๐Ÿงช

  • 19. License

1. Features

enkrypt-secure-mcp-gateway-features

Below are the list of features Enkrypt AI Secure MCP Gateway provides:

  1. Authentication: We use Unique Key to authenticate with the Gateway. We also use Enkrypt API Key if you want to protect your MCPs with Enkrypt Guardrails. Additionally, a secure admin_apikey (256-character random string) is automatically generated for administrative REST API operations.

  2. Ease of use: You can configure all your MCP servers locally in the config file or better yet in Enkrypt (Coming soon) and use them in the Gateway by using their name

  3. Dynamic Tool Discovery: The Gateway discovers tools from the MCP servers dynamically and makes them available to the MCP client

  4. Restrict Tool Invocation: If you don't want all tools to be accessible of a an MCP server, you can restrict them by explicitly mentioning the tools in the Gateway config so that only the allowed tools are accessible to the MCP client

  5. Caching: We cache the user gateway config and tools discovered from various MCP servers locally or in an external cache server like KeyDB if configured to improve performance

  6. Guardrails: You can configure guardrails for each MCP server in Enkrypt both on input side (before sending the request to the MCP server) and output side (after receiving the response from the MCP server)

  7. Logging: We log every request and response from the Gateway locally in your MCP logs and also forward them to Enkrypt (Coming soon) for monitoring. This enables you to see all the calls made in your account, servers used, tools invoked, requests blocked, etc.

1.1 Guardrails

enkrypt-secure-mcp-gateway-guardrails

Input Protection: Topic detection, NSFW filtering, toxicity detection, injection attack prevention, keyword detection, policy violation detection, bias detection, and PII redaction (More coming soon like system prompt protection, copyright protection, etc.)

Output Protection: All input protections plus adherence checking and relevancy validation (More coming soon like hallucination detection, etc.) We also auto unredact the response if it was redacted on input.

1.2 Concepts

  • MCP Config is an array of MCP servers like mcp_server_1, mcp_server_2, mcp_server_3 etc.

    • Each config has a unique ID
  • User is a user of the gateway with unique email and ID

  • A project is a collection of users that share an MCP Config

    • Project has a name and unique ID
    • The MCP Config can be updated or can be pointed to a different config by the Admin
    • Users can be added to multiple projects
  • An API Key is created for a user and project combination

    • A user can have different API Keys for different projects
    • This API Key is used to authenticate the user and identify the right project and MCP Config
  • See 6.5 Example config file generated and 7. Edit the Gateway config as needed for schema reference

2. High level steps of how the MCP Gateway works

Local Gateway with Remote Guardrails Flow


๐Ÿชœ Steps
  1. Your MCP client connects to the Secure MCP Gateway server with API Key (handled by src/secure_mcp_gateway/gateway.py).

  2. Gateway server fetches gateway config from local enkrypt_mcp_config.json file or remote Enkrypt Auth server (Coming soon).

    • It caches the config locally or in an external cache server like KeyDB if configured to improve performance.
  3. If input guardrails are enabled, request is validated before the tool call (handled by src/secure_mcp_gateway/guardrail.py).

    • Request is blocked if it violates any of the configured guardrails and the specific detector is configured to block.
  4. Requests are forwarded to the Gateway Client (handled by src/secure_mcp_gateway/client.py).

  5. The Gateway client forwards the request to the appropriate MCP server (handled by src/secure_mcp_gateway/client.py).

  6. The MCP server processes the request and returns the response to the Gateway client.

  7. If it was a discover tools call, the Gateway client caches the tools locally or in an external cache server like KeyDB if configured. It then forwards the response to the Gateway server.

  8. The Gateway server receives the response from the Gateway client and if output guardrails are enabled, it validates the response against the configured guardrails (handled by src/secure_mcp_gateway/guardrail.py).

    • Response is blocked if it violates any of the configured guardrails and the specific detector is configured to block.
  9. The Gateway server forwards the response back to the MCP client if everything is fine.

3. Prerequisites

๐Ÿ”— Dependencies
  • Git 2.43 or higher

  • Python 3.11 or higher installed on your system and is accessible from the command line using either python or python3 command

  • pip 25.0.1 or higher is installed on your system and is accessible from the command line using either pip or python -m pip command

  • uv 0.7.9 or higher is installed on your system and is accessible from the command line using either uv or python -m uv command


๐Ÿ” Check versions
  • Check if Python, pip and uv are installed

  • If any of the below commands fail, please refer the respective documentation to install them properly


# ------------------

# Python

# ------------------

python --version

# Example output
Python 3.13.3

# If not, install python from their website and run the version check again

# ------------------

# pip

# ------------------
pip --version

# Example output
pip 25.0.1 from C:\Users\PC\AppData\Local\Packages\PythonSoftwareFoundation.Python.3.13_qbz5n2kfra8p0\LocalCache\local-packages\Python313\site-packages\pip (python 3.13)

# If not, try the following and run the version check again
python -m ensurepip

# ------------------

# uv

# ------------------

uv --version

# Or run with "python -m" if uv is not found directly

# If this works, use "python -m" before all uv commands from now on
python -m uv --version

# Example output
uv 0.7.9 (13a86a23b 2025-05-30)

# If not, try the following and run the version check again
python -m pip install uv

  • Install Claude Desktop as the MCP Client from their website if you haven't already and login to it

    • If you are using Linux and cannot run any unofficial version of Claude Desktop, you can use any supported MCP Client to test the Gateway. If it does not support mcp cli mcp install command, then go through the scripts code and run the commands supported manually.
  • Any other dependencies required for the MCP servers we want to proxy requests to

    • Follow the instructions of the respective MCP server to install its dependencies

    • Like Node.js, npx, docker, etc.

  • (Optional) A cache server like KeyDB installed and running (If you want to cache externally and not locally)


๐Ÿ”’ Optional Protection with Enkrypt Guardrails

If you want to protect your MCPs with Enkrypt Guardrails, you need to do the following:

  • Create a new account if you don't have one. It's free! ๐Ÿ†“ No credit card required ๐Ÿ’ณ๐Ÿšซ

  • An ENKRYPT_API_KEY which you can get from Enkrypt Dashboard Settings

  • To protect your MCPs with Guardrails, you can use the default sample Guardrail Sample Airline Guardrail to get started or you can create your own custom Guardrail

  • To configure custom Guardrails, you need to either login to Enkrypt AI App or use the APIs/SDK

    • Create Guardrails in Enkrypt AI App Dashboard โœ…

    • Create Guardrails using APIs

    • Create Guardrails using SDK

    • You can also use Enkrypt MCP Server ๐Ÿคฏ to create Guardrails and use them in the Gateway

4. Gateway Setup

4.1 Local Installation with pip

๐Ÿ“ฆ Pip Installation Steps

4.1.1 Download and Install the Package

  • Activate a virtual environment

    python -m venv .secure-mcp-gateway-venv
    
    # Activate the virtual environment
    # On Windows
    .secure-mcp-gateway-venv\Scripts\activate
    
    # On Linux/macOS
    source .secure-mcp-gateway-venv/bin/activate
    
    # Run the below to exit the virtual environment later if needed
    deactivate
    
  • Install the package. For more info see https://pypi.org/project/secure-mcp-gateway/

    pip install secure-mcp-gateway
    

4.1.2 Run the Generate Command

  • This generates the config file at ~/.enkrypt/enkrypt_mcp_config.json on macOS and %USERPROFILE%\.enkrypt\enkrypt_mcp_config.json on Windows

    secure-mcp-gateway generate-config
    
๐Ÿ–จ๏ธ Example output
Initializing Enkrypt Secure MCP Gateway
Initializing Enkrypt Secure MCP Gateway Common Utilities Module
Initializing Enkrypt Secure MCP Gateway Module
--------------------------------
SYSTEM INFO:
Using Python interpreter: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\.secure-mcp-gateway-venv\Scripts\python.exe
Python version: 3.13.3 (tags/v3.13.3:6280bb5, Apr  8 2025, 14:47:33) [MSC v.1943 64 bit (AMD64)]
Current working directory: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway
PYTHONPATH: Not set
--------------------------------
Installing dependencies...
All dependencies installed successfully.
Initializing Enkrypt Secure MCP Gateway Client Module
Initializing Enkrypt Secure MCP Gateway Guardrail Module
Error: Gateway key is required. Please update your mcp client config and try again.
Getting Enkrypt Common Configuration
config_path: C:\Users\PC\.enkrypt\enkrypt_mcp_config.json
example_config_path: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\.secure-mcp-gateway-venv\Lib\site-packages\secure_mcp_gateway\example_enkrypt_mcp_config.json
No enkrypt_mcp_config.json file found. Defaulting to example_enkrypt_mcp_config.json
--------------------------------
ENKRYPT_GATEWAY_KEY: ****NULL
enkrypt_log_level: info
is_debug_log_level: False
enkrypt_base_url: https://api.enkryptai.com
enkrypt_use_remote_mcp_config: False
enkrypt_api_key: ****_KEY
enkrypt_tool_cache_expiration: 4
enkrypt_gateway_cache_expiration: 24
enkrypt_mcp_use_external_cache: False
enkrypt_async_input_guardrails_enabled: False
--------------------------------
External Cache is not enabled. Using local cache only.
Initializing Enkrypt Secure MCP Gateway CLI Module
Generated default config at C:\Users\PC\.enkrypt\enkrypt_mcp_config.json

4.1.3 Example of the generated config file

๐ŸŽ Example file in macOS
  • This is an example of the default configuration file generated by the CLI on macOS:
{
  "common_mcp_gateway_config": {
    "enkrypt_log_level": "INFO",
    "enkrypt_base_url": "https://api.enkryptai.com",
    "enkrypt_api_key": "YOUR_ENKRYPT_API_KEY",
    "enkrypt_use_remote_mcp_config": false,
    "enkrypt_remote_mcp_gateway_name": "enkrypt-secure-mcp-gateway-1",
    "enkrypt_remote_mcp_gateway_version": "v1",
    "enkrypt_mcp_use_external_cache": false,
    "enkrypt_cache_host": "localhost",
    "enkrypt_cache_port": 6379,
    "enkrypt_cache_db": 0,
    "enkrypt_cache_password": null,
    "enkrypt_tool_cache_expiration": 4,
    "enkrypt_gateway_cache_expiration": 24,
    "enkrypt_async_input_guardrails_enabled": false,
    "enkrypt_async_output_guardrails_enabled": false,
    "enkrypt_telemetry": {
      "enabled": true,
      "insecure": true,
      "endpoint": "http://localhost:4317"
    }
  },
  "mcp_configs": {
    "fcbd4508-1432-4f13-abb9-c495c946f638": {
      "mcp_config_name": "default_config",
      "mcp_config": [
        {
          "server_name": "echo_server",
          "description": "Simple Echo Server",
          "config": {
            "command": "python",
            "args": [
              "/Users/user/enkryptai/secure-mcp-gateway/venv/lib/python3.13/site-packages/secure_mcp_gateway/bad_mcps/echo_mcp.py"
            ]
          },
          "tools": {},
          "input_guardrails_policy": {
            "enabled": false,
            "policy_name": "Sample Airline Guardrail",
            "additional_config": {
              "pii_redaction": false
            },
            "block": [
              "policy_violation"
            ]
          },
          "output_guardrails_policy": {
            "enabled": false,
            "policy_name": "Sample Airline Guardrail",
            "additional_config": {
              "relevancy": false,
              "hallucination": false,
              "adherence": false
            },
            "block": [
              "policy_violation"
            ]
          }
        }
      ]
    }
  },
  "projects": {
    "3c09f06c-1f0d-4153-9ac5-366397937641": {
      "project_name": "default_project",
      "mcp_config_id": "fcbd4508-1432-4f13-abb9-c495c946f638",
      "users": [
        "6469a670-1d64-4da5-b2b3-790de21ac726"
      ],
      "created_at": "2025-07-16T17:02:00.406877"
    }
  },
  "users": {
    "6469a670-1d64-4da5-b2b3-790de21ac726": {
      "email": "default@example.com",
      "created_at": "2025-07-16T17:02:00.406902"
    }
  },
  "apikeys": {
    "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat": {
      "project_id": "3c09f06c-1f0d-4153-9ac5-366397937641",
      "user_id": "6469a670-1d64-4da5-b2b3-790de21ac726",
      "created_at": "2025-07-16T17:02:00.406905"
    }
  }
}

๐ŸชŸ Example file in Windows
  • This is an example of the default configuration file generated by the CLI on Windows:
{
  "common_mcp_gateway_config": {
    "enkrypt_log_level": "INFO",
    "enkrypt_base_url": "https://api.enkryptai.com",
    "enkrypt_api_key": "YOUR_ENKRYPT_API_KEY",
    "enkrypt_use_remote_mcp_config": false,
    "enkrypt_remote_mcp_gateway_name": "enkrypt-secure-mcp-gateway-1",
    "enkrypt_remote_mcp_gateway_version": "v1",
    "enkrypt_mcp_use_external_cache": false,
    "enkrypt_cache_host": "localhost",
    "enkrypt_cache_port": 6379,
    "enkrypt_cache_db": 0,
    "enkrypt_cache_password": null,
    "enkrypt_tool_cache_expiration": 4,
    "enkrypt_gateway_cache_expiration": 24,
    "enkrypt_async_input_guardrails_enabled": false,
    "enkrypt_async_output_guardrails_enabled": false,
    "enkrypt_telemetry": {
      "enabled": true,
      "insecure": true,
      "endpoint": "http://localhost:4317"
    }
  },
  "mcp_configs": {
    "fcbd4508-1432-4f13-abb9-c495c946f638": {
      "mcp_config_name": "default_config",
      "mcp_config": [
        {
          "server_name": "echo_server",
          "description": "Simple Echo Server",
          "config": {
            "command": "python",
            "args": [
              "C:\\Users\\<User>\\Documents\\GitHub\\EnkryptAI\\secure-mcp-gateway\\.secure-mcp-gateway-venv\\Lib\\site-packages\\secure_mcp_gateway\\bad_mcps\\echo_mcp.py"
            ]
          },
          "tools": {},
          "input_guardrails_policy": {
            "enabled": false,
            "policy_name": "Sample Airline Guardrail",
            "additional_config": {
              "pii_redaction": false
            },
            "block": [
              "policy_violation"
            ]
          },
          "output_guardrails_policy": {
            "enabled": false,
            "policy_name": "Sample Airline Guardrail",
            "additional_config": {
              "relevancy": false,
              "hallucination": false,
              "adherence": false
            },
            "block": [
              "policy_violation"
            ]
          }
        }
      ]
    }
  },
  "projects": {
    "3c09f06c-1f0d-4153-9ac5-366397937641": {
      "project_name": "default_project",
      "mcp_config_id": "fcbd4508-1432-4f13-abb9-c495c946f638",
      "users": [
        "6469a670-1d64-4da5-b2b3-790de21ac726"
      ],
      "created_at": "2025-07-16T17:02:00.406877"
    }
  },
  "users": {
    "6469a670-1d64-4da5-b2b3-790de21ac726": {
      "email": "default@example.com",
      "created_at": "2025-07-16T17:02:00.406902"
    }
  },
  "apikeys": {
    "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat": {
      "project_id": "3c09f06c-1f0d-4153-9ac5-366397937641",
      "user_id": "6469a670-1d64-4da5-b2b3-790de21ac726",
      "created_at": "2025-07-16T17:02:00.406905"
    }
  }
}

4.1.4 Install the Gateway for Claude Desktop

  • Run the following command to install the gateway for Claude:

    secure-mcp-gateway install --client claude-desktop
    
  • This will register Enkrypt Secure MCP Gateway with Claude Desktop.

  • NOTE: Please restart Claude Desktop after installation

๐Ÿ–จ๏ธ Example output
Initializing Enkrypt Secure MCP Gateway
Initializing Enkrypt Secure MCP Gateway Common Utilities Module
Initializing Enkrypt Secure MCP Gateway Module
--------------------------------
SYSTEM INFO:
Using Python interpreter: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\.secure-mcp-gateway-venv\Scripts\python.exe
Python version: 3.13.3 (tags/v3.13.3:6280bb5, Apr  8 2025, 14:47:33) [MSC v.1943 64 bit (AMD64)]
Current working directory: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway
PYTHONPATH: Not set
--------------------------------
Installing dependencies...
All dependencies installed successfully.
Initializing Enkrypt Secure MCP Gateway Client Module
Initializing Enkrypt Secure MCP Gateway Guardrail Module
Error: Gateway key is required. Please update your mcp client config and try again.
Getting Enkrypt Common Configuration
config_path: C:\Users\PC\.enkrypt\enkrypt_mcp_config.json
example_config_path: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\.secure-mcp-gateway-venv\Lib\site-packages\secure_mcp_gateway\example_enkrypt_mcp_config.json
Loading enkrypt_mcp_config.json file...
--------------------------------
ENKRYPT_GATEWAY_KEY: ****NULL
enkrypt_log_level: info
is_debug_log_level: False
enkrypt_base_url: https://api.enkryptai.com
enkrypt_use_remote_mcp_config: False
enkrypt_api_key: ****_KEY
enkrypt_tool_cache_expiration: 4
enkrypt_gateway_cache_expiration: 24
enkrypt_mcp_use_external_cache: False
enkrypt_async_input_guardrails_enabled: False
--------------------------------
External Cache is not enabled. Using local cache only.
Initializing Enkrypt Secure MCP Gateway CLI Module
CONFIG_PATH:  C:\Users\PC\.enkrypt\enkrypt_mcp_config.json
GATEWAY_PY_PATH:  C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\.secure-mcp-gateway-venv\Lib\site-packages\secure_mcp_gateway\gateway.py
client name from args:  claude-desktop
Successfully installed gateway for claude-desktop
Path to gateway is incorrect. Modifying the path to gateway in claude_desktop_config.json file...
Path to gateway modified in claude_desktop_config.json file
Please restart Claude Desktop to use the gateway.

4.1.5 Example of the Claude Desktop Config after installation

๐ŸŽ Example file in macOS
  • ~/Library/Application Support/Claude/claude_desktop_config.json

    {
      "mcpServers": {
        "Enkrypt Secure MCP Gateway": {
          "command": "mcp",
          "args": [
            "run",
            "/Users/user/enkryptai/secure-mcp-gateway/venv/lib/python3.13/site-packages/secure_mcp_gateway/gateway.py"
          ],
          "env": {
            "ENKRYPT_GATEWAY_KEY": "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat",
            "ENKRYPT_PROJECT_ID": "3c09f06c-1f0d-4153-9ac5-366397937641",
            "ENKRYPT_USER_ID": "6469a670-1d64-4da5-b2b3-790de21ac726"
          }
        }
      }
    }
    
๐ŸชŸ Example file in Windows
  • %USERPROFILE%\AppData\Roaming\Claude\claude_desktop_config.json

    {
      "mcpServers": {
        "Enkrypt Secure MCP Gateway": {
          "command": "mcp",
          "args": [
            "run",
            "C:\\Users\\<User>\\Documents\\GitHub\\EnkryptAI\\secure-mcp-gateway\\.secure-mcp-gateway-venv\\Lib\\site-packages\\secure_mcp_gateway\\gateway.py"
          ],
          "env": {
            "ENKRYPT_GATEWAY_KEY": "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat",
            "ENKRYPT_PROJECT_ID": "3c09f06c-1f0d-4153-9ac5-366397937641",
            "ENKRYPT_USER_ID": "6469a670-1d64-4da5-b2b3-790de21ac726"
          }
        }
      }
    }
    

4.1.6 Install the Gateway for Cursor

  • Run the CLI Install Command for Cursor

    secure-mcp-gateway install --client cursor
    
  • This automatically updates your ~/.cursor/mcp.json (on Windows it is at: %USERPROFILE%.cursor\mcp.json) with the correct entry.

  • Although it is not usually required to restart, if you see it in loading state for a long time, please restart Cursor

๐ŸŽ Example file in macOS
  • ~/.cursor/mcp.json

    {
      "mcpServers": {
        "Enkrypt Secure MCP Gateway": {
          "command": "mcp",
          "args": [
            "run",
            "/Users/user/enkryptai/secure-mcp-gateway/venv/lib/python3.13/site-packages/secure_mcp_gateway/gateway.py"
          ],
          "env": {
            "ENKRYPT_GATEWAY_KEY": "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat",
            "ENKRYPT_PROJECT_ID": "3c09f06c-1f0d-4153-9ac5-366397937641",
            "ENKRYPT_USER_ID": "6469a670-1d64-4da5-b2b3-790de21ac726"
          }
        }
      }
    }
    
๐ŸชŸ Example file in Windows
  • %USERPROFILE%\.cursor\mcp.json

    {
      "mcpServers": {
        "Enkrypt Secure MCP Gateway": {
          "command": "uv",
          "args": [
            "run",
            "--with",
            "mcp[cli]",
            "mcp",
            "run",
            "C:\\Users\\<User>\\Documents\\GitHub\\EnkryptAI\\secure-mcp-gateway\\.secure-mcp-gateway-venv\\Lib\\site-packages\\secure_mcp_gateway\\gateway.py"
          ],
          "env": {
            "ENKRYPT_GATEWAY_KEY": "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat",
            "ENKRYPT_PROJECT_ID": "3c09f06c-1f0d-4153-9ac5-366397937641",
            "ENKRYPT_USER_ID": "6469a670-1d64-4da5-b2b3-790de21ac726"
          }
        }
      }
    }
    

4.2 Local Installation with git clone

๐Ÿ—‚๏ธ Git Clone Installation Steps

4.2.1 Clone the repo, setup virtual environment and install dependencies

  • Clone the repository:
git clone https://github.com/enkryptai/secure-mcp-gateway

cd secure-mcp-gateway


โšก Activate a virtual environment

# ------------------

# Create a virtual environment

# ------------------

uv venv

# Example output
Using CPython 3.13.3 interpreter at: C:\Users\PC\AppData\Local\Microsoft\WindowsApps\PythonSoftwareFoundation.Python.3.13_qbz5n2kfra8p0\python.exe
Creating virtual environment at: .venv
Activate with: .venv\Scripts\activate

# ------------------

# Activate the virtual environment

# ------------------

# For ๐ŸŽ Linux/macOS, run the following
source ./.venv/Scripts/activate

# For ๐ŸชŸ Windows, run the following
.\.venv\Scripts\activate

# After activating, you should see (enkrypt-secure-mcp-gateway) before the file path in the terminal

# Example:

# (enkrypt-secure-mcp-gateway) %USERPROFILE%\Documents\GitHub\EnkryptAI\secure-mcp-gateway>

# ------------------

# Install pip in the virtual environment

# ------------------

python -m ensurepip

# ------------------

# Install uv in the virtual environment

# ------------------

python -m pip install uv

  • Install Python dependencies:
uv pip install -r requirements.txt

  • Verify mcp cli got installed successfully:
mcp version

# Example output
MCP version 1.9.2

4.2.2 Run the setup script

  • This script creates the config file at ~/.enkrypt/enkrypt_mcp_config.json on macOS and %USERPROFILE%\.enkrypt\enkrypt_mcp_config.json on Windows based on src/secure_mcp_gateway/example_enkrypt_mcp_config.json file

  • It replaces UNIQUE_GATEWAY_KEY and other UUIDs with auto generated values and also replaces DUMMY_MCP_FILE_PATH with the actual path to the test MCP file bad_mcps/echo_mcp.py

  • It also installs the MCP client in Claude Desktop

  • NOTE: Please restart Claude Desktop after running the setup script to see the Gateway running in Claude Desktop


# On ๐ŸŽ Linux/macOS run the below
cd scripts
chmod +x *.sh
./setup.sh

# On ๐ŸชŸ Windows run the below
cd scripts
setup.bat

# Now restart Claude Desktop to see the Gateway running


๐Ÿ–จ๏ธ Example output
-------------------------------
Setting up Enkrypt Secure MCP Gateway enkrypt_mcp_config.json config file
-------------------------------
        1 file(s) copied.
Generated unique gateway key: WTZOpoU1mXJz8b_ZJQ42DuSXlQCSCtWOn3FX0jG8sO_FKYNJetjYEgSluvhtBN8_
Generated unique uuid: 7920749a-228e-47fe-a6a9-cd2d64a2283b
DUMMY_MCP_FILE_PATH: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\src\secure_mcp_gateway\bad_mcps\echo_mcp.py
-------------------------------
Setup complete. Please check the enkrypt_mcp_config.json file in the ~\.enkrypt directory and update with your MCP server configs as needed.
-------------------------------
-------------------------------
Installing Enkrypt Secure MCP Gateway with gateway key and dependencies
-------------------------------
mcp is installed. Proceeding with installation...
ENKRYPT_GATEWAY_KEY: WTZOpoU1mXJz8b_ZJQ42DuSXlQCSCtWOn3FX0jG8sO_FKYNJetjYEgSluvhtBN8_
The system cannot find the path specified.
Package names only:
Dependencies string for the cli install command:
Running the cli install command: mcp install gateway.py --env-var ENKRYPT_GATEWAY_KEY=WTZOpoU1mXJz8b_ZJQ42DuSXlQCSCtWOn3FX0jG8sO_FKYNJetjYEgSluvhtBN8_
Initializing Enkrypt Secure MCP Gateway
Initializing Enkrypt Secure MCP Gateway Common Utilities Module
Initializing Enkrypt Secure MCP Gateway Module
--------------------------------
SYSTEM INFO:
Using Python interpreter: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\.secure-mcp-gateway-venv\Scripts\python.exe
Python version: 3.13.3 (tags/v3.13.3:6280bb5, Apr  8 2025, 14:47:33) [MSC v.1943 64 bit (AMD64)]
Current working directory: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\src\secure_mcp_gateway
PYTHONPATH: Not set
--------------------------------
Installing dependencies...
All dependencies installed successfully.
Initializing Enkrypt Secure MCP Gateway Client Module
Initializing Enkrypt Secure MCP Gateway Guardrail Module
Getting Enkrypt Common Configuration
config_path: C:\Users\PC\.enkrypt\enkrypt_mcp_config.json
example_config_path: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\.secure-mcp-gateway-venv\Lib\site-packages\secure_mcp_gateway\example_enkrypt_mcp_config.json
Loading enkrypt_mcp_config.json file...
--------------------------------
ENKRYPT_GATEWAY_KEY: ****BN8_
enkrypt_log_level: info
is_debug_log_level: False
enkrypt_base_url: https://api.enkryptai.com
enkrypt_use_remote_mcp_config: False
enkrypt_api_key: ****_KEY
enkrypt_tool_cache_expiration: 4
enkrypt_gateway_cache_expiration: 24
enkrypt_mcp_use_external_cache: False
enkrypt_async_input_guardrails_enabled: False
--------------------------------
External Cache is not enabled. Using local cache only.
Initializing Enkrypt Secure MCP Gateway Module
--------------------------------
SYSTEM INFO:
Using Python interpreter: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\.secure-mcp-gateway-venv\Scripts\python.exe
Python version: 3.13.3 (tags/v3.13.3:6280bb5, Apr  8 2025, 14:47:33) [MSC v.1943 64 bit (AMD64)]
Current working directory: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\src\secure_mcp_gateway
PYTHONPATH: Not set
--------------------------------
Installing dependencies...
All dependencies installed successfully.
Getting Enkrypt Common Configuration
config_path: C:\Users\PC\.enkrypt\enkrypt_mcp_config.json
example_config_path: C:\Users\PC\Documents\GitHub\EnkryptAI\secure-mcp-gateway\.secure-mcp-gateway-venv\Lib\site-packages\secure_mcp_gateway\example_enkrypt_mcp_config.json
Loading enkrypt_mcp_config.json file...
--------------------------------
ENKRYPT_GATEWAY_KEY: ****BN8_
enkrypt_log_level: info
is_debug_log_level: False
enkrypt_base_url: https://api.enkryptai.com
enkrypt_use_remote_mcp_config: False
enkrypt_api_key: ****_KEY
enkrypt_tool_cache_expiration: 4
enkrypt_gateway_cache_expiration: 24
enkrypt_mcp_use_external_cache: False
enkrypt_async_input_guardrails_enabled: False
--------------------------------
External Cache is not enabled. Using local cache only.
[06/15/25 13:14:10] INFO     Added server 'Enkrypt Secure MCP Gateway' to Claude config                                                                                                             claude.py:137
                    INFO     Successfully installed Enkrypt Secure MCP Gateway in Claude app                                                                                                           cli.py:486
-------------------------------
Installation complete. Check the claude_desktop_config.json file as per the readme instructions and restart Claude Desktop.
-------------------------------

4.2.3 Setup Other MCP Clients

โฌก Cursor
  • You can navigate to cursor's Global MCP file at ~/.cursor/mcp.json on Linux/macOS or %USERPROFILE%\.cursor\mcp.json on Windows

    • If you would like to use at a Project level place it inside your project. For details see Cursor's docs
  • You can also navigate to the file Via cursor's UI by clicking on settings gear icon on the top right

    cursor-settings-icon

  • Click on MCP and then click on Add new global MCP server which takes you to the mcp.json file

    cursor-settings-mcp

  • Example mcp.json file opened in the editor

    cursor-mcp-file

  • Once the file is opened at Global or Project level, you can copy paste the same config we used in Claude Desktop. For reference, you can refer to Installation - 5.2 Example MCP config file generated ๐Ÿ“„

    • Be sure to use your own file that was generated by the setup script in Installation - 4.2.2 Run the setup script ๐Ÿ“ฅ. Please do not copy paste the example config file in this repo.
  • See Verify Cursor section to verify the MCP server is running in Cursor

4.3 Docker Installation

๐Ÿณ Docker Installation Steps

4.3.1 Build the Docker Image

docker build -t secure-mcp-gateway .

๐Ÿ–จ๏ธ Example output
[+] Building 72.9s (20/20) FINISHED                                                                                                                                          docker:default
 => [internal] load build definition from Dockerfile                                                                                                                                   0.1s
 => => transferring dockerfile: 724B                                                                                                                                                   0.1s
 => [internal] load metadata for docker.io/library/python:3.11-alpine                                                                                                                  1.0s
 => [internal] load .dockerignore                                                                                                                                                      0.1s
 => => transferring context: 456B                                                                                                                                                      0.1s
 => [ 1/15] FROM docker.io/library/python:3.11-alpine@sha256:8068890a42d68ece5b62455ef327253249b5f094dcdee57f492635a40217f6a3                                                          0.0s
 => => resolve docker.io/library/python:3.11-alpine@sha256:8068890a42d68ece5b62455ef327253249b5f094dcdee57f492635a40217f6a3                                                            0.0s
 => [internal] load build context                                                                                                                                                      1.5s
 => => transferring context: 82.25kB                                                                                                                                                   1.4s
 => CACHED [ 2/15] WORKDIR /app                                                                                                                                                        0.0s
 => CACHED [ 3/15] COPY requirements.txt .                                                                                                                                             0.0s
 => [ 4/15] COPY requirements-dev.txt .                                                                                                                                                0.0s
 => [ 5/15] RUN pip install --upgrade pip && pip install -r requirements.txt && pip install -r requirements-dev.txt                                                                   38.7s
 => [ 6/15] COPY src src                                                                                                                                                               0.2s
 => [ 7/15] COPY setup.py setup.py                                                                                                                                                     0.1s
 => [ 8/15] COPY MANIFEST.in MANIFEST.in                                                                                                                                               0.1s
 => [ 9/15] COPY pyproject.toml pyproject.toml                                                                                                                                         0.1s
 => [10/15] COPY CHANGELOG.md CHANGELOG.md                                                                                                                                             0.1s
 => [11/15] COPY LICENSE.txt LICENSE.txt                                                                                                                                               0.1s
 => [12/15] COPY README.md README.md                                                                                                                                                   0.1s
 => [13/15] COPY README_PYPI.md README_PYPI.md                                                                                                                                         0.1s
 => [14/15] RUN python -m build                                                                                                                                                        8.5s
 => [15/15] RUN pip install .                                                                                                                                                          5.5s
 => exporting to image                                                                                                                                                                16.6s
 => => exporting layers                                                                                                                                                               11.8s
 => => exporting manifest sha256:47bd860c903fdefeda59364f577c487f96e1482b0e8eadef8292df86922641dc                                                                                      0.0s
 => => exporting config sha256:9d211386091dfc08fcfe80f1efb399d4a1ab80484f850476c328614ecaaefbae                                                                                        0.1s
 => => exporting attestation manifest sha256:bc85b5aaf4035e6f449d9b94567135a28a61c594fa2a507ca7fea889efbf2952                                                                          0.0s
 => => exporting manifest list sha256:7cd30cbf456ba3105d4bef7c28ea8402ec5476e4da3cd8c16b752f3214f8b3b1                                                                                 0.0s
 => => naming to docker.io/library/secure-mcp-gateway:latest                                                                                                                           0.0s
 => => unpacking to docker.io/library/secure-mcp-gateway:latest

4.3.2 Generate the config file

  • This creates a config file in the ~/.enkrypt/docker/enkrypt_mcp_config.json file on macOS/Linux and %USERPROFILE%\.enkrypt\docker\enkrypt_mcp_config.json file on Windows.

# On ๐ŸŽ Linux/macOS run the below
docker run --rm -e HOST_OS=macos -e HOST_ENKRYPT_HOME=~/.enkrypt -v ~/.enkrypt:/app/.enkrypt --entrypoint python secure-mcp-gateway -m secure_mcp_gateway.cli generate-config

# On ๐ŸชŸ Windows run the below
docker run --rm -e HOST_OS=windows -e HOST_ENKRYPT_HOME=%USERPROFILE%\.enkrypt -v %USERPROFILE%\.enkrypt:/app/.enkrypt --entrypoint python secure-mcp-gateway -m secure_mcp_gateway.cli generate-config

# If you are using ๐Ÿ“Ÿ Powershell, you can use the below command
docker run --rm -e HOST_OS=windows -e HOST_ENKRYPT_HOME=$env:USERPROFILE\.enkrypt -v ${env:USERPROFILE}\.enkrypt:/app/.enkrypt --entrypoint python secure-mcp-gateway -m secure_mcp_gateway.cli generate-config

๐Ÿณ Example Docker config file
{
  "common_mcp_gateway_config": {
    "enkrypt_log_level": "INFO",
    "enkrypt_base_url": "https://api.enkryptai.com",
    "enkrypt_api_key": "YOUR_ENKRYPT_API_KEY",
    "enkrypt_use_remote_mcp_config": false,
    "enkrypt_remote_mcp_gateway_name": "enkrypt-secure-mcp-gateway-1",
    "enkrypt_remote_mcp_gateway_version": "v1",
    "enkrypt_mcp_use_external_cache": false,
    "enkrypt_cache_host": "localhost",
    "enkrypt_cache_port": 6379,
    "enkrypt_cache_db": 0,
    "enkrypt_cache_password": null,
    "enkrypt_tool_cache_expiration": 4,
    "enkrypt_gateway_cache_expiration": 24,
    "enkrypt_async_input_guardrails_enabled": false,
    "enkrypt_async_output_guardrails_enabled": false,
    "enkrypt_telemetry": {
      "enabled": true,
      "insecure": true,
      "endpoint": "http://localhost:4317"
    }
  },
  "mcp_configs": {
    "fcbd4508-1432-4f13-abb9-c495c946f638": {
      "mcp_config_name": "default_config",
      "mcp_config": [
        {
          "server_name": "echo_server",
          "description": "Simple Echo Server",
          "config": {
            "command": "python",
            "args": [
              "/usr/local/lib/python3.11/site-packages/secure_mcp_gateway/bad_mcps/echo_mcp.py"
            ]
          },
          "tools": {},
          "input_guardrails_policy": {
            "enabled": false,
            "policy_name": "Sample Airline Guardrail",
            "additional_config": {
              "pii_redaction": false
            },
            "block": [
              "policy_violation"
            ]
          },
          "output_guardrails_policy": {
            "enabled": false,
            "policy_name": "Sample Airline Guardrail",
            "additional_config": {
              "relevancy": false,
              "hallucination": false,
              "adherence": false
            },
            "block": [
              "policy_violation"
            ]
          }
        }
      ]
    }
  },
  "projects": {
    "3c09f06c-1f0d-4153-9ac5-366397937641": {
      "project_name": "default_project",
      "mcp_config_id": "fcbd4508-1432-4f13-abb9-c495c946f638",
      "users": [
        "6469a670-1d64-4da5-b2b3-790de21ac726"
      ],
      "created_at": "2025-07-16T17:02:00.406877"
    }
  },
  "users": {
    "6469a670-1d64-4da5-b2b3-790de21ac726": {
      "email": "default@example.com",
      "created_at": "2025-07-16T17:02:00.406902"
    }
  },
  "apikeys": {
    "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat": {
      "project_id": "3c09f06c-1f0d-4153-9ac5-366397937641",
      "user_id": "6469a670-1d64-4da5-b2b3-790de21ac726",
      "created_at": "2025-07-16T17:02:00.406905"
    }
  }
}

4.3.3 Install the Gateway in Claude Desktop

  • You can find the Claude config location at the below locations in your system. For reference see Claude docs.
    • macOS: ~/Library/Application Support/Claude
    • Windows: %APPDATA%\Claude

# On ๐ŸŽ Linux/macOS run the below
docker run --rm -i -e HOST_OS=macos -e HOST_ENKRYPT_HOME=~/.enkrypt -v ~/.enkrypt:/app/.enkrypt -v ~/Library/Application\ Support/Claude:/app/.claude --entrypoint python secure-mcp-gateway -m secure_mcp_gateway.cli install --client claude-desktop

# On ๐ŸชŸ Windows run the below
docker run --rm -i -e HOST_OS=windows -e HOST_ENKRYPT_HOME=%USERPROFILE%\.enkrypt -v %USERPROFILE%\.enkrypt:/app/.enkrypt -v %APPDATA%\Claude:/app/.claude --entrypoint python secure-mcp-gateway -m secure_mcp_gateway.cli install --client claude-desktop

# If you are using ๐Ÿ“Ÿ Powershell, you can use the below command
docker run --rm -i -e HOST_OS=windows -e HOST_ENKRYPT_HOME=$env:USERPROFILE\.enkrypt -v ${env:USERPROFILE}\.enkrypt:/app/.enkrypt -v ${env:APPDATA}\Claude:/app/.claude --entrypoint python secure-mcp-gateway -m secure_mcp_gateway.cli install --client claude-desktop

4.3.4 Example Claude Desktop config file

๐ŸชŸ Example Windows claude_desktop_config.json
{
  "mcpServers": {
    "Enkrypt Secure MCP Gateway": {
      "command": "docker",
      "args": [
        "run",
        "--rm",
        "-i",
        "-v",
        "C:\\Users\\<user>\\.enkrypt:/app/.enkrypt",
        "secure-mcp-gateway"
      ],
      "env": {
        "ENKRYPT_GATEWAY_KEY": "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat",
        "ENKRYPT_PROJECT_ID": "3c09f06c-1f0d-4153-9ac5-366397937641",
        "ENKRYPT_USER_ID": "6469a670-1d64-4da5-b2b3-790de21ac726"
      }
    }
  }
}

4.3.5 Install the Gateway in Cursor

  • You can find the Cursor config location at the below locations. For reference see Cursor docs.
    • macOS: ~/.cursor
    • Windows: %USERPROFILE%\.cursor

# On ๐ŸŽ Linux/macOS run the below
docker run --rm -i -e HOST_OS=macos -e HOST_ENKRYPT_HOME=~/.enkrypt -v ~/.enkrypt:/app/.enkrypt -v ~/Library/Application\ Support/Cursor:/app/.cursor --entrypoint python secure-mcp-gateway -m secure_mcp_gateway.cli install --client cursor

# On ๐ŸชŸ Windows run the below
docker run --rm -i -e HOST_OS=windows -e HOST_ENKRYPT_HOME=%USERPROFILE%\.enkrypt -v %USERPROFILE%\.enkrypt:/app/.enkrypt -v %USERPROFILE%\.cursor:/app/.cursor --entrypoint python secure-mcp-gateway -m secure_mcp_gateway.cli install --client cursor

# If you are using ๐Ÿ“Ÿ Powershell, you can use the below command
docker run --rm -i -e HOST_OS=windows -e HOST_ENKRYPT_HOME=$env:USERPROFILE\.enkrypt -v ${env:USERPROFILE}\.enkrypt:/app/.enkrypt -v ${env:USERPROFILE}\.cursor:/app/.cursor --entrypoint python secure-mcp-gateway -m secure_mcp_gateway.cli install --client cursor

4.3.6 Running Gateway with Docker Run (Advanced)

For advanced Docker deployments, you can run the gateway container directly with custom configurations:

# Basic Docker run command
docker run -d \
  --name enkrypt-gateway \
  -p 8000:8000 \
  -v ~/.enkrypt:/app/.enkrypt/docker \
  -e ENKRYPT_GATEWAY_KEY="your-gateway-key" \
  -e ENKRYPT_PROJECT_ID="your-project-id" \
  -e ENKRYPT_USER_ID="your-user-id" \
  secure-mcp-gateway:latest

Windows PowerShell:

docker run -d `
  --name enkrypt-gateway `
  -p 8000:8000 `
  -v ${env:USERPROFILE}\.enkrypt:/app/.enkrypt/docker `
  -e ENKRYPT_GATEWAY_KEY="your-gateway-key" `
  -e ENKRYPT_PROJECT_ID="your-project-id" `
  -e ENKRYPT_USER_ID="your-user-id" `
  secure-mcp-gateway:latest
Environment Variables
VariableDescriptionDefaultRequired
ENKRYPT_GATEWAY_KEYAPI key for authentication-Yes
ENKRYPT_PROJECT_IDProject ID from config-Yes
ENKRYPT_USER_IDUser ID from config-Yes
SKIP_DEPENDENCY_INSTALLSkip runtime dependency installationfalseNo
HOSTGateway bind address0.0.0.0No
FASTAPI_HOSTFastAPI server bind address0.0.0.0No
SKIP_DEPENDENCY_INSTALL

The SKIP_DEPENDENCY_INSTALL environment variable controls whether the gateway reinstalls Python dependencies at runtime.

When to use SKIP_DEPENDENCY_INSTALL=true:

  • โœ… Production deployments where dependencies are pre-installed in the Docker image
  • โœ… When using pre-built Docker images from Docker Hub
  • โœ… To reduce container startup time (faster cold starts)
  • โœ… In orchestrated environments (Kubernetes, Docker Swarm, ECS)

When to omit (default behavior):

  • Development environments where you're testing new dependencies
  • When mounting source code volumes for live development
  • If you're unsure whether all dependencies are properly installed

Example with docker-compose integration:

# Connect to observability stack network
docker run -d \
  --name enkrypt-gateway \
  --network secure-mcp-gateway-infra_default \
  -p 8000:8000 \
  -p 8080:8080 \
  -v ~/.enkrypt:/app/.enkrypt/docker \
  -e SKIP_DEPENDENCY_INSTALL=true \
  -e ENKRYPT_GATEWAY_KEY="your-gateway-key" \
  -e ENKRYPT_PROJECT_ID="your-project-id" \
  -e ENKRYPT_USER_ID="your-user-id" \
  secure-mcp-gateway:latest

Windows PowerShell:

docker run -d `
  --name enkrypt-gateway `
  --network secure-mcp-gateway-infra_default `
  -p 8000:8000 `
  -p 8080:8080 `
  -v ${env:USERPROFILE}\.enkrypt:/app/.enkrypt/docker `
  -e SKIP_DEPENDENCY_INSTALL=true `
  -e ENKRYPT_GATEWAY_KEY="your-gateway-key" `
  -e ENKRYPT_PROJECT_ID="your-project-id" `
  -e ENKRYPT_USER_ID="your-user-id" `
  secure-mcp-gateway:latest

Note: The --network flag connects the gateway to the observability stack (Grafana, Prometheus, Loki, Jaeger) if you're running the monitoring services from section 5.

Port Mapping
  • 8000: Gateway MCP server (required)
  • 8080: OAuth callback server (optional, only needed for Authorization Code flow)
  • 8001: REST API server (optional, if you want to expose the management API)
Volume Mounts
  • ~/.enkrypt:/app/.enkrypt/docker - Config file location (required)
  • Additional mounts may be needed if your MCP servers require access to local files

โš ๏ธ Important: Configuring MCP Servers When Gateway Runs in Docker

When running the Enkrypt Gateway in Docker, DO NOT configure your MCP servers to also run in Docker mode. This causes Docker-in-Docker issues, networking problems, and volume mount complications.

โŒ Avoid (Docker-based MCP servers):

{
  "server_name": "github_server",
  "config": {
    "command": "docker",
    "args": [
      "run",
      "-i",
      "--rm",
      "-e",
      "GITHUB_PERSONAL_ACCESS_TOKEN",
      "ghcr.io/github/github-mcp-server"
    ],
    "env": {
      "GITHUB_PERSONAL_ACCESS_TOKEN": "your-token"
    }
  }
}

โœ… Use instead (npx/npm/Python-based servers):

{
  "server_name": "github_server",
  "config": {
    "command": "npx",
    "args": [
      "-y",
      "@modelcontextprotocol/server-github"
    ],
    "env": {
      "GITHUB_PERSONAL_ACCESS_TOKEN": "your-token"
    }
  }
}

Why?

  • Docker-in-Docker requires privileged mode and special socket mounting
  • Network isolation prevents containers from communicating properly
  • Volume mounts don't work as expected across container boundaries
  • Performance overhead and security concerns
  • Increased complexity and debugging difficulty

Recommended MCP Server Formats When Gateway is in Docker:

  • โœ… npx-based servers: npx -y @modelcontextprotocol/server-*
  • โœ… npm-based servers: npm exec -y server-name
  • โœ… Python-based servers: python /path/to/server.py or uv run server.py
  • โœ… Node.js-based servers: node /path/to/server.js
  • โœ… Remote MCP servers: npx mcp-remote https://api.example.com/mcp/

Exception:

If you absolutely must use Docker-based MCP servers, consider:

  1. Running the gateway outside of Docker (local installation), OR
  2. Setting up proper Docker networking with --network host or custom bridge networks, OR
  3. Using Docker-in-Docker with proper configuration (requires --privileged flag and /var/run/docker.sock mount - not recommended for production)

4.4 Remote Installation

๐ŸŒ Remote Installation Steps

4.4.1 Run the Gateway in a remote server

python gateway.py

  • Or run in k8s using our docker image enkryptai/secure-mcp-gateway:vx.x.x

  • Example: enkryptai/secure-mcp-gateway:v2.1.2

  • Use the latest version from Docker Hub: https://hub.docker.com/r/enkryptai/secure-mcp-gateway/tags

  • You can either mount the config file locally or download the json file from a remote place like S3 using an initContainer and mount the volume

  • See docs/secure-mcp-gateway-manifest-example.yaml for the complete manifest file reference

4.4.2 Modify your MCP Client config to use the Gateway

  • You can find the Claude config location at the below locations in your system. For reference see Claude docs.

    • macOS: ~/Library/Application Support/Claude
    • Windows: %APPDATA%\Claude
  • You can find the Cursor config location at the below locations. For reference see Cursor docs.

    • macOS: ~/.cursor
    • Windows: %USERPROFILE%\.cursor
  • Replace the ENKRYPT_GATEWAY_KEY with the key you got from the enkrypt_mcp_config.json file

  • Replace the http://0.0.0.0:8000/mcp/ with the http(s)://<remote_server_ip>:<port>/mcp/

  • If you are running this locally, you can use http://0.0.0.0:8000/mcp/

  • You can setup ingress to route the traffic to the MCP Gateway over https

  • Example: https://mcp.enkryptai.com/mcp/

  • NOTE: Please make sure node and npm are installed on the client machine

    • To verify, run node -v and npm -v
  • NOTE: Make sure to use the trailing slash / in the MCP URL like /mcp/

{
  "mcpServers": {
    "Enkrypt Secure MCP Gateway": {
      "command": "npx",
      "args": [
        "mcp-remote",
        "http://0.0.0.0:8000/mcp/",
        "--allow-http",
        "--header",
        "apikey:${ENKRYPT_GATEWAY_KEY}",
        "--header",
        "project_id:${ENKRYPT_PROJECT_ID}",
        "--header",
        "user_id:${ENKRYPT_USER_ID}"
      ],
      "env": {
        "ENKRYPT_GATEWAY_KEY": "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat",
        "ENKRYPT_PROJECT_ID": "3c09f06c-1f0d-4153-9ac5-366397937641",
        "ENKRYPT_USER_ID": "6469a670-1d64-4da5-b2b3-790de21ac726"
      }
    }
  }
}

5. (Optional) OpenTelemetry Setup

๐Ÿ“Š OpenTelemetry Setup and Usage

This section explains how to set up and use OpenTelemetry (OTEL) with the Enkrypt Secure MCP Gateway for observability.

5.1 Architecture

The observability stack includes:

  • OpenTelemetry Collector: Collects telemetry data (traces, metrics, logs)

  • Jaeger: Distributed tracing visualization

  • Loki: Log aggregation and querying

  • Prometheus: Metrics aggregation

  • Grafana: Unified visualization for metrics and logs

    • Traces are not visible in Grafana for some reason. Please use Jaeger for traces.

5.2 Prerequisites

  • Docker and Docker Compose installed

  • Gateway installed and running (follow section 4)

5.3 Setup Steps

  1. Start the Observability Stack

    cd infra
    
    docker-compose up -d
    
  2. To stop the Observability Stack

    # When we want to stop the Observability Stack, run the below command
    docker-compose down
    

5.4 Configuration

  • Edit the enkrypt_mcp_config.json file to enable telemetry

    {
      "common_mcp_gateway_config": {
        ...
        "enkrypt_telemetry": {
          "enabled": true,
          "insecure": true,
          "endpoint": "http://localhost:4317"
        }
      },
      ...
    }
    

5.5 Verification Steps

  1. Verify Services are Running

    # On Windows
    docker ps | findstr "loki grafana jaeger otel prometheus"
    
    # On Linux/macOS
    docker ps | grep -E "loki|grafana|jaeger|otel|prometheus"
    
  2. Access Service UIs

    • Grafana: http://localhost:3000 (default credentials: admin/admin)

    • Jaeger: http://localhost:16686

    • Prometheus: http://localhost:9090

    • Loki: Access through Grafana

      1. Open Grafana (http://localhost:3000)
      2. Go to Explore (left sidebar)
      3. Select "Loki" from the data source dropdown
  3. Verify Gateway Telemetry

    • Make test requests through the Gateway like List all servers and tools and echo test

    • Check traces in Jaeger:

      • Add optional tags like enkrypt_email=default@example.com or enkrypt_project_name=default_project or enkrypt_mcp_config_id=fcbd4508-1432-4f13-abb9-c495c946f638 to see the traces for a specific user, project or MCP config etc.

      • We can also combine tags by separating them with spaces like enkrypt_email=default@example.com enkrypt_project_name=default_project

      • Look for enkrypt_discover_all_tools spans

      • Examine child spans for cache, tool discovery, etc.

        jaeger-1

    • Check metrics in Grafana:

      • Navigate to Drilldown -> metrics

      • We can filter on various labels like email, user_id, mcp_config_id, project_id, project_name etc.

        grafana-metrics-1

    • Check logs in Grafana

      • Navigate to Drilldown -> Logs

      • Select label as service_name=secure-mcp-gateway and click Show logs

      • Now we can filter by various labels like attributes_project_name, attributes_project_id, attributes_email, attributes_user_id, attributes_mcp_config_id, attributes_tool_name etc.

        grafana-logs-1

    • Check Dashboards in Grafana by navigating to Dashboards -> OpenTelemetry Gateway Metrics

      • Due to issues in Grafana, you may need to edit each tile and click Run queries to see the data

5.6 Available Telemetry (Not exhaustive)

  1. Traces

    • Request processing pipeline
    • Tool invocations with duration tracking
    • Cache operations (hits/misses)
    • Guardrail checks
    • Error tracking and status monitoring
    • Detailed attributes for debugging
  2. Metrics

    • enkrypt_list_all_servers_calls: API endpoint usage
    • mcp_cache_misses_total: Cache efficiency tracking
    • enkrypt_servers_discovered: Server discovery monitoring
    • mcp_tool_calls_total: Tool invocation tracking
    • mcp_tool_call_duration_seconds: Performance monitoring (histogram)
  3. Logs

    • Structured JSON format for better querying
    • Gateway operations with context
    • Error conditions with stack traces
    • Security events and guardrail checks
    • Performance data with timing information

6. Verify Installation and check the files generated

โœ… Verification steps and files generated

6.1 Verify Claude Desktop

  • To verify Claude installation, navigate to claude_desktop_config.json file by following these instructions

    • macOS: ~/Library/Application Support/Claude/claude_desktop_config.json

    • Windows: %APPDATA%\Claude\claude_desktop_config.json

6.2 Example MCP config file generated

๐ŸŽ Example file in macOS
  • ~/Library/Application Support/Claude/claude_desktop_config.json

    {
      "mcpServers": {
        "Enkrypt Secure MCP Gateway": {
          "command": "mcp",
          "args": [
            "run",
            "/Users/user/enkryptai/secure-mcp-gateway/src/secure_mcp_gateway/gateway.py"
          ],
          "env": {
            "ENKRYPT_GATEWAY_KEY": "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat",
            "ENKRYPT_PROJECT_ID": "3c09f06c-1f0d-4153-9ac5-366397937641",
            "ENKRYPT_USER_ID": "6469a670-1d64-4da5-b2b3-790de21ac726"
          }
        }
      }
    }
    
๐ŸชŸ Example file in Windows
  • %USERPROFILE%\AppData\Roaming\Claude\claude_desktop_config.json

    {
      "mcpServers": {
        "Enkrypt Secure MCP Gateway": {
          "command": "mcp",
          "args": [
            "run",
            "C:\\Users\\<User>\\Documents\\GitHub\\EnkryptAI\\secure-mcp-gateway\\src\\secure_mcp_gateway\\gateway.py"
          ],
          "env": {
            "ENKRYPT_GATEWAY_KEY": "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat",
            "ENKRYPT_PROJECT_ID": "3c09f06c-1f0d-4153-9ac5-366397937641",
            "ENKRYPT_USER_ID": "6469a670-1d64-4da5-b2b3-790de21ac726"
          }
        }
      }
    }
    

6.3 Restart Claude Desktop to run the Gateway

  • After restarting, navigate to Claude Desktop Settings

    Claude Desktop Settings

  • Click on Developer -> Enkrypt Secure MCP Gateway

    Claude Desktop MCP Gateway Running


๐Ÿงฐ Check tools and logs
  • You can also click on the settings icon below the search bar to see the Gateway in available

    Claude Desktop Gateway in Search

  • Click on Enkrypt Secure MCP Gateway to see the list of tools available

    Claude Desktop MCP Gateway Tools

  • You can check Claude logs while asking Claude to do something to see the Gateway in action

    • Example ๐ŸŽ Linux/macOS log path: ~/Library/Application Support/Claude/logs/mcp-server-Enkrypt Secure MCP Gateway.log

    • Example ๐ŸชŸ Windows log path: %USERPROFILE%\AppData\Roaming\Claude\logs\mcp-server-Enkrypt Secure MCP Gateway.log

6.4 Example prompts

  • list all servers, get all tools available and echo test
    • This uses a test MCP server echo_server which is in bad_mcps/echo_mcp.py

claude-mcp-chat-1


๐Ÿ’ก Other examples
  • We can also combine multiple prompts into one that trigger multiple tool calls at once

  • Example: echo test and also echo best

claude-mcp-chat-multiple

  • Example: echo "hello; ls -la; whoami"

  • This could be a malicious prompt but because no guardrails are enabled, it will not be blocked

claude-mcp-chat-echo-not-blocked

6.5 Example config file generated

  • Example enkrypt_mcp_config.json generated by the setup script in ~/.enkrypt/enkrypt_mcp_config.json on macOS and %USERPROFILE%\.enkrypt\enkrypt_mcp_config.json on Windows

  • If you ran docker command to install the Gateway, the config file will be in ~/.enkrypt/docker/enkrypt_mcp_config.json on macOS and %USERPROFILE%\.enkrypt\docker\enkrypt_mcp_config.json on Windows

    {
      "admin_apikey": "AUTO_GENERATED_256_CHAR_ADMIN_API_KEY_FOR_ADMINISTRATIVE_OPERATIONS",
      "common_mcp_gateway_config": {
        "enkrypt_log_level": "INFO",
        "enkrypt_base_url": "https://api.enkryptai.com",
        "enkrypt_api_key": "YOUR_ENKRYPT_API_KEY",
        "enkrypt_use_remote_mcp_config": false,
        "enkrypt_remote_mcp_gateway_name": "enkrypt-secure-mcp-gateway-1",
        "enkrypt_remote_mcp_gateway_version": "v1",
        "enkrypt_mcp_use_external_cache": false,
        "enkrypt_cache_host": "localhost",
        "enkrypt_cache_port": 6379,
        "enkrypt_cache_db": 0,
        "enkrypt_cache_password": null,
        "enkrypt_tool_cache_expiration": 4,
        "enkrypt_gateway_cache_expiration": 24,
        "enkrypt_async_input_guardrails_enabled": false,
        "enkrypt_async_output_guardrails_enabled": false,
        "enkrypt_telemetry": {
          "enabled": true,
          "insecure": true,
          "endpoint": "http://localhost:4317"
        }
      },
      "mcp_configs": {
        "fcbd4508-1432-4f13-abb9-c495c946f638": {
          "mcp_config_name": "default_config",
          "mcp_config": [
            {
              "server_name": "echo_server",
              "description": "Simple Echo Server",
              "config": {
                "command": "python",
                "args": [
                  "C:\\Users\\<User>\\Documents\\GitHub\\EnkryptAI\\secure-mcp-gateway\\src\\secure_mcp_gateway\\bad_mcps\\echo_mcp.py"
                ]
              },
              "tools": {},
              "input_guardrails_policy": {
                "enabled": false,
                "policy_name": "Sample Airline Guardrail",
                "additional_config": {
                  "pii_redaction": false
                },
                "block": [
                  "policy_violation"
                ]
              },
              "output_guardrails_policy": {
                "enabled": false,
                "policy_name": "Sample Airline Guardrail",
                "additional_config": {
                  "relevancy": false,
                  "hallucination": false,
                  "adherence": false
                },
                "block": [
                  "policy_violation"
                ]
              }
            }
          ]
        }
      },
      "projects": {
        "3c09f06c-1f0d-4153-9ac5-366397937641": {
          "project_name": "default_project",
          "mcp_config_id": "fcbd4508-1432-4f13-abb9-c495c946f638",
          "users": [
            "6469a670-1d64-4da5-b2b3-790de21ac726"
          ],
          "created_at": "2025-07-16T17:02:00.406877"
        }
      },
      "users": {
        "6469a670-1d64-4da5-b2b3-790de21ac726": {
          "email": "default@example.com",
          "created_at": "2025-07-16T17:02:00.406902"
        }
      },
      "apikeys": {
        "2W8UupCkazk4SsOcSu_1hAbiOgPdv0g-nN9NtfZyg-rvYGat": {
          "project_id": "3c09f06c-1f0d-4153-9ac5-366397937641",
          "user_id": "6469a670-1d64-4da5-b2b3-790de21ac726",
          "created_at": "2025-07-16T17:02:00.406905"
        }
      }
    }
    

6.6 Verify Cursor

  • You can see the MCP server in the list of MCP servers in Cursor by navigating to ~/.cursor/mcp.json and also by clicking on the settings icon on the top right and then clicking on Tools & Integrations or on the MCP tab

  • Generally restarting is not needed but if it is in loading state for a long time, please restart Cursor

    cursor-mcp-running

  • Now you can chat with the MCP server.

    • Example prompts:

      • (Click Run Tool when Cursor asks you to)

      • list all servers, get all tools available and echo test

        • This uses a test MCP server echo_server which is in bad_mcps/echo_mcp.py

      cursor-mcp-chat

7. Edit the Gateway config as needed

โœ‚๏ธ Edit Gateway Config
  • Important:

    • We need to restart Claude Desktop after editing the config file
    • To make all new tools accessible, please use prompt "list all servers, get all tools available" for the MCP Client to discover all new tools. After this the MCP Client should be able to use all tools of the servers configured in the Gateway config file
  • You can add many MCP servers inside the mcp_config array of this gateway config

    • You can look here for example servers

    • You can also try the Enkrypt MCP Server

    • Example:

      {
        "common_mcp_gateway_config": {...},
        "mcp_configs": {
          "UNIQUE_MCP_CONFIG_ID": {
            "mcp_config_name": "default_config",
            "mcp_config": [
              {
                "server_name": "MCP_SERVER_NAME_1",
                "description": "MCP_SERVER_DESCRIPTION_1",
                "config": {
                  "command": "python/npx/etc.",
                  "args": [
                    "arg1", "arg2", ...
                  ],
                  "env": { "key": "value" }
                },
                // Set explicit tools to restrict access to only the allowed tools
                // Example: "tools": { "tool_name": "tool_description" }
                // Example: "tools": { "echo": "Echo a message" }
                // Or leave the tools empty {} to discover all tools dynamically
                "tools": {},
                "enable_server_info_validation": false,
                "enable_tool_guardrails": false,
                "input_guardrails_policy": {...},
                "output_guardrails_policy": {...}
              },
              {
                "server_name": "MCP_SERVER_NAME_2",
                "description": "MCP_SERVER_DESCRIPTION_2",
                "config": {...},
                "tools": {},
                "enable_server_info_validation": false,
                "enable_tool_guardrails": false,
                "input_guardrails_policy": {...},
                "output_guardrails_policy": {...}
              }
            ]
          },
          "UNIQUE_MCP_CONFIG_ID_2": {...}
        },
        "projects": {
          "UNIQUE_PROJECT_ID": {
            "project_name": "default_project",
            "mcp_config_id": "UNIQUE_MCP_CONFIG_ID",
            "users": [
              "UNIQUE_USER_ID"
            ],
            "created_at": "2025-01-01T00:00:00.000000"
          },
          "UNIQUE_PROJECT_ID_2": {...}
        },
        "users": {
          "UNIQUE_USER_ID": {
            "email": "default@example.com",
            "created_at": "2025-01-01T00:00:00.000000"
          },
          "UNIQUE_USER_ID_2": {...}
        },
        "apikeys": {
          "UNIQUE_GATEWAY_KEY": {
            "project_id": "UNIQUE_PROJECT_ID",
            "user_id": "UNIQUE_USER_ID",
            "created_at": "2025-01-01T00:00:00.000000"
          },
          "UNIQUE_GATEWAY_KEY_2": {...}
        }
      }
      

โ›ฉ๏ธ Gateway Config Schema
  • admin_apikey (root level): A 256-character random string used for authenticating REST API administrative operations (user management, project management, configuration management, API key management). This is automatically generated when you run secure-mcp-gateway generate-config.

    • Important: Keep this key secure! It provides full administrative access to the gateway.
    • Used with Authorization: Bearer <admin_apikey> header for REST API calls.
    • Different from regular API keys used by MCP clients to connect to the gateway.
    • See Section 11: REST API for Administrative Operations for details.
  • If you want a different set of MCP servers for a separate client/user, you can add a new mcp_config section to the config file. Also, you can run cli commands. See CLI-Commands-Reference.md section 2. CONFIGURATION MANAGEMENT for details

  • Set enkrypt_log_level to DEBUG to get more detailed logs inside common_mcp_gateway_config part of the config file

    • This defaults to INFO
  • Now, inside mcp_configs array, for each individual MCP config, you can set the following:

    • server_name: A name of the MCP server which we connect to

    • description (optional): A description of the MCP server

    • config: The config for the MCP server as instructed by the MCP server's documentation

      • Generally you have the below keys in the config:

        • command: The command to run the MCP server

        • args: The arguments to pass to the command

        • env: The environment variables to set for the command

    • tools: The tools exposed by the MCP server

      • Either set explicit tools to restrict access to only the allowed tools or leave it empty tools": {} for the Gateway to discover all tools dynamically

      • Tools need to be given a name and a description like "tools": { "dummy_echo": "Echo a message" }

๐Ÿ”’ Optional Guardrails Schema
  • Get your enkrypt_api_key from Enkrypt Dashboard and add it to common_mcp_gateway_config section of the config file

  • enkrypt_use_remote_mcp_config is used to fetch MCP server config from Enkrypt server remotely (Coming soon)

    • Please use false for now

    • This enables you to configure and manage MCP gateway config in Enkrypt Dashboard in a centralized place (Coming soon)

  • If you have any external cache server like KeyDB running, you can set enkrypt_mcp_use_external_cache to true in your common_mcp_gateway_config

    • Set other relevant keys related to cache in your common_mcp_gateway_config
  • enkrypt_tool_cache_expiration (in hours) decides how long the tools discovered from the MCP servers are cached locally or in the external cache server

  • enkrypt_gateway_cache_expiration (in hours) decides how long the gateway config is cached locally or in the external cache server. This is useful when we integrate this with Enkrypt Auth server (Coming soon)

  • enkrypt_async_input_guardrails_enabled

    • false by default

    • Async mode is not recommended for tools that perform actions which cannot be undone

    • Because the tool call is made parallel to guardrails call, it can't be blocked if input guardrails violations are detected

    • Useful for servers that return just info without performing actions i.e., only read operations

  • enkrypt_async_output_guardrails_enabled (Coming soon)

    • This makes output side guardrails calls asynchronously to save time

    • i.e., Guardrails detect call, relevancy check, adherence check, PII unredaction, etc. are made in parallel after getting the response from the MCP server

  • Inside each MCP server config, you can set the following:

    • input_guardrails_policy: Use this if we plan to use Enkrypt Guardrails on input side

    • policy_name: Name of the guardrails policy that you have created in the Enkrypt App or using the API/SDK

    • enabled: Whether to enable guardrails on the input side or not. This is false in the example config file

    • additional_config: Additional config for the guardrails policy

      • pii_redaction: Whether to redact PII in the request sent to the MCP server or not

        • If true, this also auto unredacts the PII in the response from the MCP server
    • block: List of guardrails to block

      • Possible values in the array are:

        • topic_detector, nsfw, toxicity, pii, injection_attack, keyword_detector, policy_violation, bias, sponge_attack

        • system_prompt_protection, copyright_protection (Coming soon)

        • This is similar to our AI Proxy deployments config. Refer to our docs

  • output_guardrails_policy: Use this if we plan to use Enkrypt Guardrails on output side

    • policy_name: Name of the guardrails policy that you have created in the Enkrypt App or using the API/SDK

    • enabled: Whether to enable guardrails on the output side or not. This is false in the example config file

    • additional_config: Additional config for the guardrails policy

      • relevancy: Whether to check for relevancy of the response from the MCP server

      • adherence: Whether to check for adherence of the response from the MCP server

      • hallucination: Whether to check for hallucination in the response from the MCP server (Coming soon)

    • block: List of guardrails to block

      • Possible values in the array are:

        • All possible values in input block array plus adherence, relevancy

        • system_prompt_protection, copyright_protection, hallucination (Coming soon)

        • This is similar to our AI Proxy deployments config. Refer to our docs

8. (Optional) Add GitHub MCP Server to the Gateway

๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Configure GitHub

โš ๏ธ Important Note for Docker Users:

If you're running the Enkrypt Gateway in Docker, use the npx version of the GitHub MCP server instead of the Docker version shown below. See the npx-based configuration example at the end of this section.

For details on why, see Section 4.3.6: Configuring MCP Servers When Gateway Runs in Docker.

  • GitHub MCP Server can be run with docker or npx. The Docker version requires Docker to be installed and running on your machine.

    • You can download docker desktop from here. Install and run it if you don't have it already
  • Create a personal access token from GitHub

    • Create a token that has access to only public repos and set expiry very low initially for testing

    • Add the below GitHub server block to enkrypt_mcp_config.json inside "mcp_config": [] array. It should already have the echo server config.

    • NOTE: Don't forget to add comma , after the echo server block

    • Replace REPLACE_WITH_YOUR_PERSONAL_ACCESS_TOKEN with the personal access token you created

    • You can also add via the cli. See CLI-Commands-Reference.md section 2. CONFIGURATION MANAGEMENT for details

    • Example:

        "mcp_config": [
          {
            "server_name": "echo_server",
            "description": "Simple Echo Server",
            "config": {...},
            "tools": {},
            "input_guardrails_policy": {...},
            "output_guardrails_policy": {...}
          },
          {
            "server_name": "github_server",
            "description": "GitHub Server",
            "config": {
              "command": "docker",
              "args": [
                "run",
                "-i",
                "--rm",
                "-e",
                "GITHUB_PERSONAL_ACCESS_TOKEN",
                "ghcr.io/github/github-mcp-server"
              ],
              "env": {
                "GITHUB_PERSONAL_ACCESS_TOKEN": "REPLACE_WITH_YOUR_PERSONAL_ACCESS_TOKEN"
              }
            },
            "tools": {},
            "enable_server_info_validation": false,
            "enable_tool_guardrails": false,
            "input_guardrails_policy": {
              "enabled": false,
              "policy_name": "Sample Airline Guardrail",
              "additional_config": {
                "pii_redaction": false
              },
              "block": [
                "policy_violation"
              ]
            },
            "output_guardrails_policy": {
              "enabled": false,
              "policy_name": "Sample Airline Guardrail",
              "additional_config": {
                "relevancy": false,
                "hallucination": false,
                "adherence": false
              },
              "block": [
                "policy_violation"
              ]
            }
          }
        ]
    
  • Now restart Claude Desktop for it to detect the new server

  • Then run the prompt list all servers, get all tools available for it to discover github server and all it's tools available

    claude-mcp-chat-github-tools-1

  • Now run List all files from https://github.com/enkryptai/enkryptai-mcp-server

    claude-mcp-chat-github-tools-2

  • Great! ๐ŸŽ‰ We have successfully added a GitHub MCP Server to the Gateway. However, it is completely unprotected and is open to all kinds of abuse and attacks.

  • Now, let's say a prompt like this is run Ask github for the repo "hello; ls -la; whoami"

    claude-mcp-chat-github-tools-3

  • This may not have caused actual damage but imagine a more complicated prompt that may have caused actual damage to the system.

  • To protect the MCP server, we can use Enkrypt Guardrails as shown in the next section.

GitHub Server Configuration (npx version)

โœ… Recommended for Docker Gateway Deployments

If you're running the Enkrypt Gateway in Docker or prefer not to use Docker-in-Docker, use the npx-based GitHub MCP server instead:

{
  "server_name": "github_server",
  "description": "GitHub Server (npx version)",
  "config": {
    "command": "npx",
    "args": [
      "-y",
      "@modelcontextprotocol/server-github"
    ],
    "env": {
      "GITHUB_PERSONAL_ACCESS_TOKEN": "REPLACE_WITH_YOUR_PERSONAL_ACCESS_TOKEN"
    }
  },
  "tools": {},
  "enable_server_info_validation": false,
  "enable_tool_guardrails": false,
  "input_guardrails_policy": {
    "enabled": false,
    "policy_name": "Sample Airline Guardrail",
    "additional_config": {
      "pii_redaction": false
    },
    "block": [
      "policy_violation"
    ]
  },
  "output_guardrails_policy": {
    "enabled": false,
    "policy_name": "Sample Airline Guardrail",
    "additional_config": {
      "relevancy": false,
      "hallucination": false,
      "adherence": false
    },
    "block": [
      "policy_violation"
    ]
  }
}

Benefits of npx version:

  • โœ… No Docker-in-Docker complications
  • โœ… Faster startup time
  • โœ… Works seamlessly with Dockerized gateway
  • โœ… Simpler networking and volume management
  • โœ… Lower resource overhead

Prerequisites:

  • Node.js and npm must be installed in the gateway container or on the host machine
  • The default Dockerfile already includes Node.js 22.x LTS

8.1 (Optional) Connect to MCP Servers with OAuth

๐Ÿ” Configure OAuth for Remote MCP Servers

Many MCP servers require OAuth authentication to access protected resources. The Secure MCP Gateway supports OAuth 2.0/2.1 with both Client Credentials and Authorization Code + PKCE flows for seamless integration with OAuth-enabled servers.

Overview

The Gateway handles OAuth token acquisition, caching, and automatic refresh so you don't have to manage tokens manually. Tokens are automatically injected into requests when connecting to remote MCP servers.

Supported Grant Types:

  • Client Credentials - For server-to-server authentication (machine-to-machine)
  • Authorization Code + PKCE - For user authorization flows with enhanced security

Key Features:

  • Automatic browser authorization for Authorization Code flow
  • Local and remote callback URL support
  • Automatic token refresh before expiration
  • Secure token caching
  • PKCE (S256) for enhanced security
  • State parameter for CSRF protection

OAuth Configuration Examples

Client Credentials Flow (Server-to-Server)

For machine-to-machine authentication, use the Client Credentials flow:

{
  "server_name": "oauth-enabled-server",
  "description": "Remote MCP Server with OAuth",
  "config": {
    "command": "npx",
    "args": ["-y", "mcp-remote", "https://api.example.com/mcp", "--allow-http"]
  },
  "oauth_config": {
    "enabled": true,
    "is_remote": true,
    "OAUTH_VERSION": "2.1",
    "OAUTH_GRANT_TYPE": "client_credentials",
    "OAUTH_CLIENT_ID": "your-client-id",
    "OAUTH_CLIENT_SECRET": "your-client-secret",
    "OAUTH_TOKEN_URL": "https://auth.example.com/oauth/token",
    "OAUTH_AUDIENCE": "https://api.example.com"
  },
  "tools": {},
  "enable_server_info_validation": false,
  "enable_tool_guardrails": false,
  "input_guardrails_policy": {
    "enabled": false
  },
  "output_guardrails_policy": {
    "enabled": false
  }
}

Key OAuth Fields

Core Configuration

FieldRequiredDefaultDescription
enabledYesfalseEnable OAuth for this server
is_remoteRecommendedAuto-detectedSet to true for remote servers, false for local servers
OAUTH_VERSIONNo"2.1"OAuth version: "2.0" or "2.1"
OAUTH_GRANT_TYPENo"client_credentials"Grant type: "client_credentials" or "authorization_code"
OAUTH_CLIENT_IDYes-Your OAuth client ID
OAUTH_CLIENT_SECRETYes-Your OAuth client secret
OAUTH_TOKEN_URLYes-Token endpoint URL (must be HTTPS for OAuth 2.1)
OAUTH_AUTHORIZATION_URLConditional-Authorization endpoint (required for authorization_code grant)
OAUTH_REDIRECT_URIConditional-Callback URL (required for authorization_code grant)

Optional OAuth Parameters

FieldRequiredDefaultDescription
OAUTH_AUDIENCENonullIntended audience for the token (aud claim)
OAUTH_ORGANIZATIONNonullOrganization ID (for multi-tenant OAuth providers)
OAUTH_SCOPENonullSpace-separated scopes (e.g., "read write")
OAUTH_RESOURCENonullResource indicator (RFC 8707)
OAUTH_TOKEN_EXPIRY_BUFFERNo300Seconds before token expiry to trigger refresh (default: 5 minutes)
OAUTH_USE_PKCENofalseEnable PKCE for Authorization Code flow (recommended)
OAUTH_CODE_CHALLENGE_METHODNo"S256"PKCE challenge method: "S256" (recommended) or "plain"
OAUTH_ADDITIONAL_PARAMSNo{}Additional parameters to include in token requests (JSON object)
OAUTH_CUSTOM_HEADERSNo{}Custom HTTP headers for token requests (JSON object)

Security & Authentication Settings

FieldRequiredDefaultDescription
OAUTH_USE_BASIC_AUTHNotrueUse HTTP Basic Auth for client credentials (RFC 6749 ยง2.3.1)
OAUTH_ENFORCE_HTTPSNotrueEnforce HTTPS for OAuth 2.1 compliance (set false only for local testing)
OAUTH_TOKEN_IN_HEADER_ONLYNotrueSend token only in Authorization header (recommended)
OAUTH_VALIDATE_SCOPESNotrueVerify returned token contains requested scopes

Mutual TLS (mTLS) Configuration

FieldRequiredDefaultDescription
OAUTH_USE_MTLSNofalseEnable mutual TLS (RFC 8705) for enhanced security
OAUTH_CLIENT_CERT_PATHConditionalnullPath to client certificate file (required if mTLS enabled)
OAUTH_CLIENT_KEY_PATHConditionalnullPath to client private key file (required if mTLS enabled)
OAUTH_CA_BUNDLE_PATHNonullPath to CA bundle for server certificate verification

Token Revocation

FieldRequiredDefaultDescription
OAUTH_REVOCATION_URLNonullToken revocation endpoint URL (RFC 7009)

Authorization Code + PKCE Flow

For user authorization with enhanced security, use the Authorization Code flow with PKCE:

{
  "server_name": "user-auth-server",
  "description": "MCP Server requiring user authorization",
  "config": {
    "command": "npx",
    "args": ["-y", "mcp-remote", "https://api.example.com/mcp"]
  },
  "oauth_config": {
    "enabled": true,
    "is_remote": true,
    "OAUTH_VERSION": "2.1",
    "OAUTH_GRANT_TYPE": "authorization_code",
    "OAUTH_CLIENT_ID": "your-client-id",
    "OAUTH_CLIENT_SECRET": "your-client-secret",
    "OAUTH_AUTHORIZATION_URL": "https://auth.example.com/authorize",
    "OAUTH_TOKEN_URL": "https://auth.example.com/oauth/token",
    "OAUTH_REDIRECT_URI": "http://localhost:8080/callback",
    "OAUTH_SCOPE": "openid profile email",
    "OAUTH_USE_PKCE": true,
    "OAUTH_CODE_CHALLENGE_METHOD": "S256"
  },
  "tools": {},
  "enable_server_info_validation": false,
  "enable_tool_guardrails": true
}

Automatic Browser Authorization

When using Authorization Code flow, the gateway automatically:

  1. Opens your browser to the authorization URL
  2. Handles the callback (localhost or remote)
  3. Exchanges the authorization code for tokens
  4. Caches tokens for future use

Flow Options:

Localhost Callback (Automatic):

"OAUTH_REDIRECT_URI": "http://localhost:8080/callback"
  • Gateway starts local server on port 8080
  • Automatically captures authorization code
  • No manual intervention needed

Remote Callback (Manual Code Entry):

"OAUTH_REDIRECT_URI": "https://oauth.yourdomain.com/callback"
  • Gateway opens browser for authorization
  • User completes authorization on remote page
  • User copies code from callback page
  • User pastes code into terminal
  • Gateway exchanges code for token

Setting Up Remote Callback

If you want to use a remote callback URL (professional, branded experience):

  1. Host the callback page:

    # Quick start with Python
    python host_oauth_callback.py
    
    # Or with Docker
    docker-compose -f docker-compose.oauth-callback.yml up -d
    
    # Or deploy oauth_callback.html to any static hosting
    # (GitHub Pages, Vercel, Netlify, AWS S3, etc.)
    
  2. Update your config:

    "OAUTH_REDIRECT_URI": "https://your-domain.com/callback"
    
  3. Register with OAuth provider:

    • Add callback URL to your OAuth app settings
    • Auth0: "Allowed Callback URLs"
    • Okta: "Sign-in redirect URIs"
    • Azure AD: "Redirect URIs"
    • Google: "Authorized redirect URIs"

Testing with Echo OAuth Server

The Gateway includes a test echo server that demonstrates OAuth header injection. You can use it to verify OAuth is working correctly.

Step 1: Start the Echo OAuth Server

The echo OAuth server needs to run in HTTP mode to accept remote connections:

macOS/Linux:

# Export the environment variable
export MCP_HTTP_MODE=true

# Start the server
python src/secure_mcp_gateway/bad_mcps/echo_oauth_mcp.py

Windows (PowerShell):

# Set the environment variable
$env:MCP_HTTP_MODE = "true"

# Start the server
python src/secure_mcp_gateway/bad_mcps/echo_oauth_mcp.py

Windows (Command Prompt):

# Set the environment variable
set MCP_HTTP_MODE=true

# Start the server
python src/secure_mcp_gateway/bad_mcps/echo_oauth_mcp.py

The server will start on http://localhost:8001/mcp/ and print OAuth-related headers whenever tools are called.

Step 2: Add Echo OAuth Server to Gateway Config

Add this configuration to your enkrypt_mcp_config.json in the mcp_config array:

{
  "server_name": "echo_oauth_server",
  "description": "Echo Server with OAuth Testing",
  "config": {
    "command": "npx",
    "args": [
      "-y",
      "mcp-remote",
      "http://localhost:8001/mcp/",
      "--allow-http"
    ]
  },
  "oauth_config": {
    "enabled": true,
    "is_remote": true,
    "OAUTH_VERSION": "2.0",
    "OAUTH_GRANT_TYPE": "client_credentials",
    "OAUTH_CLIENT_ID": "test-client-id",
    "OAUTH_CLIENT_SECRET": "test-client-secret",
    "OAUTH_TOKEN_URL": "https://auth.example.com/oauth/token",
    "OAUTH_ENFORCE_HTTPS": false
  },
  "tools": {},
  "enable_server_info_validation": false,
  "enable_tool_guardrails": false,
  "input_guardrails_policy": {
    "enabled": false
  },
  "output_guardrails_policy": {
    "enabled": false
  }
}

Note: OAUTH_ENFORCE_HTTPS: false is set only for local testing. Always use HTTPS in production!

Step 3: Test OAuth Token Injection

  1. Restart Claude Desktop (or your MCP client) to pick up the new server configuration

  2. Use the prompt: list all servers and discover tools from echo_oauth_server

  3. Call the echo tool: call the echo tool from echo_oauth_server with message "test oauth"

  4. Check the echo server terminal output - you should see OAuth headers being printed:

================================================================================
๐Ÿ” OAuth HTTP Headers Check (Remote Mode)
================================================================================
  โœ… AUTHORIZATION: Bearer <token>...
  โŒ X-OAUTH-TOKEN: Not set
  โŒ X-ACCESS-TOKEN: Not set

๐Ÿ“‹ All Request Headers:
  authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...
  content-type: application/json
  user-agent: python-requests/2.31.0
================================================================================

This confirms the OAuth token is being automatically acquired and injected into the Authorization header.

OAuth Token Flows

Client Credentials Flow

  1. First Request: Gateway acquires token from OAuth provider
  2. Caching: Token is cached with expiration tracking
  3. Token Injection:
    • Remote servers: Token added as Authorization: Bearer <token> header
    • Local servers: Token available in environment variables
  4. Auto-refresh: Token refreshed 5 minutes before expiry (configurable)

Authorization Code + PKCE Flow

  1. Initial Setup: Gateway generates PKCE code verifier and challenge
  2. Browser Authorization:
    • Gateway opens browser to authorization URL
    • User logs in and authorizes the application
  3. Callback Handling:
    • Localhost: Gateway automatically captures code from callback
    • Remote: User copies code and pastes into terminal
  4. Token Exchange: Gateway exchanges authorization code for tokens
  5. Caching & Refresh: Tokens cached and automatically refreshed before expiry

Advanced Features

  • Authorization Code + PKCE: User authorization with enhanced security (S256)
  • Automatic Browser Flow: Opens browser and handles callback automatically
  • Remote Callback Support: Host callback page on your domain
  • Mutual TLS (mTLS): Enhanced security with client certificates (RFC 8705)
  • Token Revocation: Programmatically revoke tokens (RFC 7009)
  • Scope Validation: Verify returned token has requested scopes
  • Custom Headers: Add custom HTTP headers to token requests
  • State Parameter: CSRF protection for Authorization Code flow
  • Metrics: Track token acquisition success/failure, cache hit ratio

Troubleshooting

OAuth token request failed:

  • Verify CLIENT_ID and CLIENT_SECRET are correct
  • Check TOKEN_URL is reachable
  • Ensure HTTPS is used (or set OAUTH_ENFORCE_HTTPS: false for testing)

Token not appearing in requests:

  • Confirm is_remote: true for remote servers
  • Check server logs for OAuth acquisition messages
  • Enable debug logging: "enkrypt_log_level": "DEBUG"

Authorization Code flow issues:

  • Verify AUTHORIZATION_URL and REDIRECT_URI are correct
  • Ensure callback URL is registered with OAuth provider
  • Check that browser opens automatically (or use manual URL)
  • For remote callbacks, verify callback page is accessible

Callback not working:

  • Localhost: Gateway automatically tries next available port if 8080 is in use (up to 10 ports)
  • Remote: Verify callback URL is accessible and matches OAuth provider settings
  • Check for firewall blocking the callback

Echo server not receiving headers:

  • Ensure MCP_HTTP_MODE=true environment variable is set
  • Verify server is running on http://localhost:8001/mcp/

9. (Optional) Protect GitHub MCP Server and Test Echo Server

๐ŸŽ Protect with Enkrypt Guardrails for FREE
8.1 ๐ŸŒ Create a Guardrail in Enkrypt App
  • You can use a prompt to generate rules or generate a PDF file while you can then paste or upload while creating a policy in the App

8.1.1 ๐Ÿ” Rules to copy

1. MCP-Specific Security Policies
Scan all tool descriptions for hidden instructions/malicious patterns.

Authenticate MCP servers with cryptographic verification.

Lock and pin tool versions to prevent rug-pull attacks.

Enforce isolation between MCP servers to avoid interference.

Restrict GitHub MCP access to specific repositories and users.

2. Code Filtering and Prohibited Patterns
Block known malicious code patterns (e.g., buffer overflows, SQL injection).

Detect malware signatures (e.g., keylogger, trojan).

Prevent crypto mining code.

Identify network attack patterns (e.g., DDoS, botnet).

Block privilege escalation code (e.g., root exploits).

3. Repository Access Control
Enforce role-based read access for private repositories.

Enable strict content filtering for all access types.

Mandate audit logging for private repositories.

Quarantine access to sensitive repositories.

4. AI-Specific Guardrails
Detect tool poisoning via hidden tags and file access commands.

Monitor behavior for file access and network activity.

Require explicit UI approval for suspicious tools.

Protect against prompt injection in GitHub issues.

Block PRs that expose private repo data.

Quarantine suspicious GitHub issues.

5. RADE (Retrieval-Agent Deception) Mitigation
Scan retrieved content for embedded commands.

Validate document integrity and modification timestamps.

Sandbox retrieved content to prevent auto-execution.

6. Input Validation
Limit prompt length (max 4096 tokens).

Block forbidden keywords (e.g., "ignore previous instructions").

Detect encoded/injection patterns (base64, hex, unicode).

7. Model Behavior Constraints
Limit code generation by complexity and size.

Restrict certain languages (e.g., shell scripts, assembly).

Monitor API/system calls and network activity.

Enforce strict context boundaries across repositories.


9.1.2 ๐Ÿ’ก Prompt used to generate the rules
  • Give numbered list of security rules in plain text for configuring AI guardrails for a GitHub server on the rules and policies it needs to follow to prevent malicious use of the GitHub services

  • Then say Research latest GitHub MCP hacks and abuses people are trying and update the rules to prevent those. Keep research to the most severe topics

  • Then say Only keep essential security rules to reduce size. Remove unwanted sections like post incident, compliance, audit, etc which cannot be used while prevention

  • Then you can copy paste the rules while creating the policy


  • Go to Enkrypt App and login with either OTP or Google or Microsoft account

  • Click on Policies

    enkrypt-github-guardrail-1

  • Click on Add new policy

    enkrypt-github-guardrail-2

  • Name it GitHub Safe Policy and paste the policy rules and click Save

    enkrypt-github-guardrail-3

  • This is how a saved policy looks like with the rules applied for Policy violation Guardrails

    enkrypt-github-guardrail-4

  • Now navigate back to home or hover over left sidebar and click Guardrails

  • Click on Add New Guardrail button on the top right

    enkrypt-app-add-guardrail-button

  • Name it GitHub Guardrail, toggle Injection Attack OFF

    enkrypt-app-add-guardrail-add-1

  • Scroll down on Configure Guardrails side panel and toggle Policy Violation ON, select the newly created policy and tick Need Explanation if needed

    enkrypt-app-add-guardrail-add-2

  • Now, click on Save button on the bottom right to save the guardrail

    enkrypt-app-add-guardrail-add-3

  • We can see the newly added guardrail in the list of guardrails

    enkrypt-app-add-guardrail-add-4

9.2 ๐Ÿ”‘ Get Enkrypt API Key
  • Now, we need get out FREE API Key from Enkrypt App. Hover over the left sidebar for it to expand and click on Settings

    • You can also directly navigate to https://app.enkryptai.com/settings

    enkrypt-app-settings-1

  • Now click on the Copy icon next to your obfuscated API Key to copy the key to your clipboard as highlighted in the screenshot below

    enkrypt-app-settings-2

9.3 ๐Ÿ”‘ Add API Key and the Guardrail to Config File
  • Now we have everything we need from the App. Let's add the API Key to the enkrypt_mcp_config.json file

  • Open the enkrypt_mcp_config.json file from ~/.enkrypt/enkrypt_mcp_config.json on macOS or %USERPROFILE%\.enkrypt\enkrypt_mcp_config.json on Windows

    • If you ran docker command to install the Gateway, the config file will be in ~/.enkrypt/docker/enkrypt_mcp_config.json on macOS and %USERPROFILE%\.enkrypt\docker\enkrypt_mcp_config.json on Windows
  • Add the API Key to the common_mcp_gateway_config section by replacing YOUR_ENKRYPT_API_KEY with the API Key you copied from the App

  • Inside the GitHub server block we added in the previous section,

    • Add the newly created Guardrail GitHub Guardrail to the input_guardrails_policy and output_guardrails_policy sections

    • By replacing "policy_name": "Sample Airline Guardrail" with "policy_name": "GitHub Guardrail"

    • Now change enabled to true for input_guardrails_policy from previous false

      • We will leave output_guardrails_policy as false for now
    • We already should have policy_violation in the block array for both policies

    • So the final config should look something like this:

    {
      "common_mcp_gateway_config": {
        ...
        "enkrypt_api_key": "xxxxxxxxxxxxxxxxxxxxxxxxxxxx",
        ...
      },
      "mcp_configs": {
        "fcbd4508-1432-4f13-abb9-c495c946f638": {
          "mcp_config_name": "default_config",
          "mcp_config": [
            {
              "server_name": "echo_server",
              ...
            },
            {
              "server_name": "github_server",
              "description": "GitHub Server",
              "config": {
                "command": "docker",
                "args": [
                  "run",
                  "-i",
                  "--rm",
                  "-e",
                  "GITHUB_PERSONAL_ACCESS_TOKEN",
                  "ghcr.io/github/github-mcp-server"
                ],
                "env": {
                  "GITHUB_PERSONAL_ACCESS_TOKEN": "github_pat_xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx"
                }
              },
              "tools": {},
              "enable_server_info_validation": false,
              "enable_tool_guardrails": false,
              "input_guardrails_policy": {
                "enabled": true,
                "policy_name": "GitHub Guardrail",
                "additional_config": {
                  "pii_redaction": false
                },
                "block": ["policy_violation"]
              },
              "output_guardrails_policy": {
                "enabled": false,
                "policy_name": "GitHub Guardrail",
                "additional_config": {
                  "relevancy": false,
                  "hallucination": false,
                  "adherence": false
                },
                "block": ["policy_violation"]
              }
            }
          ]
        }
      },
      "projects": {
        ...
      },
      "users": {
        ...
      },
      "apikeys": {
        ...
      }
    }
    
9.4 ๐Ÿงช Test Guardrails
  • Save the file and restart Claude Desktop for it to detect the changes

  • GitHub MCP Server needs docker to be installed. So, please install and have docker running on your machine before proceeding with the steps below

    • You can download docker desktop from here. Install and run it if you don't have it already
  • Now run the prompt list all services, tools for it to discover github, echo servers and all their tools available

  • After this, let's rerun the previously successful malicious prompt Ask github for the repo "hello; ls -la; whoami"

    • We can see that the prompt is blocked as Input Guardrails blocked the request

      claude-mcp-chat-github-guardrails-1

  • We can configure the test echo server with Guardrails of our choice and see the detections by running echo "hello; ls -la; whoami".

    • The below prompt which worked before but is blocked with Guardrails

    • Experiment and try the echo server with various guardrails to see how it behaves. You can also try our Playground for better testing.

    claude-mcp-chat-echo-guardrails-2

8.5 ๐Ÿ”ง Fine tune Guardrails
  • The safe prompt List all files from https://github.com/enkryptai/enkryptai-mcp-server may also be blocked if you use Injection Attack Detector or Policy Violation on Output side. So, there is some fine tuning required for the guardrails to find the best combination of enabled detectors and blocks for your servers. See the next section for recommendations.

10. Recommendations for using Guardrails

โญ Recommendations
  • We have found that the best way to use Enkrypt Guardrails in MCP Gateway is to have a separate guardrail for each server. This way we can have a fine tuned guardrail for each server.

  • Because each MCP Server is very different from the other, it is not possible to have a single guardrail that works for all servers.

  • Some may need Toxicity Detector, some NSFW Detector, some Injection Attack Detector, some Keyword Detector, some Policy Violation, some may need Relevancy detector, some may need Adherence detector, etc.

  • Some may need a combination of these detectors to work together to block malicious requests.

  • Some may need Guardrails on the input side, some on the output and some may need both to be applied.

  • See our docs for details on various detectors available.

  • Hence, have separate guardrails for each server and experiment with the best combination of detectors and blocks for each server that blocks malicious requests but allows legitimate requests to pass through.

  • Try our Policy Violation detector with your own custom policy which details what is allowed and what is not. This may be the best way for your use case.

๐Ÿšจ Try Policy Violation
  • You can navigate to the Enkrypt App Homepage, login and Click on Policies to create your own custom policy.

    • This accepts text as well as PDF file as input so create a file with all the rules you want to apply to your MCP server and upload it

    • Once created, you can use it while configuring the Guardrail like we say with GitHub Guardrail in the previous section

    enkrypt-app-homepage-policies

10.1 Per-Server Guardrail Configuration

You can control guardrail behavior for each server individually using per-server flags in your configuration.

Note: While both fields default to false, it's recommended to explicitly include them in your server configurations for clarity and maintainability.

enable_server_info_validation (boolean, default: false)

Controls whether server descriptions are validated during discovery/registration for harmful content (injection attacks, policy violations, etc.).

When to disable:

  • Testing/development environments with known safe servers
  • Internal servers where content is fully trusted
  • When server metadata contains technical terms that trigger false positives

Example:

{
  "server_name": "test_server",
  "description": "Development test server",
  "config": {
    "command": "python",
    "args": ["test_server.py"]
  },
  "enable_server_info_validation": false,
  "enable_tool_guardrails": false,
  "input_guardrails_policy": {
    "enabled": false
  },
  "output_guardrails_policy": {
    "enabled": false
  }
}

enable_tool_guardrails (boolean, default: false)

Controls whether individual tool descriptions and schemas are validated during discovery.

Guardrail Levels:

The gateway has three distinct levels of guardrails:

  1. Server Registration Validation (enable_server_info_validation)

    • When: During server discovery, before any tools are loaded
    • What: Validates server names and descriptions for harmful content
    • Blocks: Servers with malicious metadata
  2. Tool Registration Validation (enable_tool_guardrails)

    • When: During tool discovery
    • What: Validates tool descriptions and schemas
    • Blocks: Individual tools with harmful content
  3. Runtime Guardrails (input_guardrails_policy / output_guardrails_policy)

    • When: During tool execution (input before, output after)
    • What: Validates tool arguments and responses
    • Blocks: Requests/responses violating policies

Note: All three levels are independent and can be configured separately per server.

11. Other Tools Available

๐Ÿ”ง REST API for Administrative Operations

The Gateway provides a REST API server for administrative operations like managing users, projects, configurations, and API keys.

Starting the REST API Server

secure-mcp-gateway system start-api --host 0.0.0.0 --port 8001
  • API Documentation: Available at http://localhost:8001/docs (Swagger UI)
  • Health Check: http://localhost:8001/health
  • OpenAPI Schema: Loaded from openapi.json in the project root

Admin API Key Authentication

Important: Administrative operations require a special admin_apikey that is separate from regular user API keys. This provides enhanced security for admin operations.

Getting Your Admin API Key

The admin_apikey is automatically generated when you run secure-mcp-gateway generate-config. Find it in your configuration file:

  • Windows: %USERPROFILE%\.enkrypt\enkrypt_mcp_config.json
  • macOS/Linux: ~/.enkrypt/enkrypt_mcp_config.json
{
  "admin_apikey": "a1b2c3d4e5f6g7h8i9j0k1l2m3n4o5p6q7r8s9t0u1v2w3x4y5z6...",
  "apikeys": {
    "regular_user_key_1": { ... },
    "regular_user_key_2": { ... }
  },
  ...
}

Key Differences

  • admin_apikey (root level): Used for all administrative operations (user management, project management, etc.)

    • 256-character random string for maximum security
    • Generated during secure-mcp-gateway generate-config
    • Required for REST API endpoints
  • apikeys (in the apikeys section): Used for gateway access by users

    • Used by MCP clients to connect to the gateway
    • Associated with specific users and projects
    • Not used for administrative operations

Using the Admin API Key

Include the admin_apikey in the Authorization header for all administrative API calls:

curl -X GET "http://localhost:8001/api/v1/users" \
  -H "Authorization: Bearer YOUR_ADMIN_API_KEY_HERE"

Security Note:

  • Keep your admin API key secure and never commit it to version control
  • Only share the admin API key with authorized administrators
  • Regular users should never have access to the admin API key

Available Administrative Operations

The REST API provides endpoints for:

  1. User Management: Create, list, update, and delete users
  2. Project Management: Create projects, assign configurations, manage users
  3. API Key Management: Generate, rotate, disable/enable, and delete API keys
  4. Configuration Management: Create, update, and manage MCP configurations and servers

For complete API documentation and examples, see:

  • API-Reference.md
  • Interactive API docs at http://localhost:8001/docs
๐Ÿ’พ Cache Management

10.1 ๐Ÿ“Š Get Cache Status
  • The Gateway can give the summary of it's cache status by looking at the local/external cache server

  • This is useful to debug issues if for example a tool was updated remotely by a server but the Gateway is not aware of it yet

    claude-mcp-chat-get-cache-status

10.2 ๐Ÿงน Clear Cache
  • The Gateway can clear it's cache from local/external cache server

  • This is useful to clear the cache if for example a tool was updated remotely by a server but the Gateway is not aware of it yet

  • You can either clear all cache or specific cache by providing the server_name

    • Example: clear cache for echo_server
  • You can also clear all cache or just the gateway cache or just the server cache

    • Example: clear all cache, clear just gateway cache, clear server cache for echo_server, Clear all server cache

    claude-mcp-chat-clear-cache

12. Deployment patterns

  1. Local Gateway, Local Guardrails and Local MCP Server

  2. Local Gateway, Local MCP Server with Remote Guardrails

  3. Local Gateway with Remote MCP Server and Remote Guardrails

  4. Remote Gateway, Remote MCP Server and Remote Guardrails

12.1 Local Gateway, Local Guardrails and Local MCP Server

Local Gateway with Local Guardrails Flow

12.2 Local Gateway, Local MCP Server with Remote Guardrails

Local Gateway with Remote Guardrails Flow

12.3 Local Gateway with Remote MCP Server and Remote Guardrails

Local Gateway with Remote Guardrails and Remote MCP Server Flow

12.4 Remote Gateway, Remote MCP Server and Remote Guardrails

Remote Gateway with Remote Guardrails and Remote MCP Server Flow

13. Uninstall the Gateway

๐Ÿ—‘๏ธ Uninstall the Gateway
  • To remove the Gateway from any MCP client, just remove the MCP server block "Enkrypt Secure MCP Gateway": {...} from the client's config file.

    • Restart the MCP client to apply the changes for some clients like Claude Desktop. Cursor does not require a restart.
  • To uninstall the pip package, run the following command:

    pip uninstall secure-mcp-gateway
    

14. Troubleshooting

๐Ÿ•ต Troubleshooting
  • If any calls fail in the client, please look at the mcp logs of the respective client

    • See this for Claude logs location

      • Example ๐ŸŽ Linux/macOS log path: ~/Library/Logs/Claude/mcp-server-Enkrypt Secure MCP Gateway.log
      • Example ๐ŸชŸ Windows log path: %USERPROFILE%\AppData\Roaming\Claude\logs\mcp-server-Enkrypt Secure MCP Gateway.log
    • See this discussion for Cursor logs

  • If you see errors like Exception: unhandled errors in a TaskGroup (1 sub-exception) then maybe the MCP server the gateway is trying to use is not running.

    • So, please make sure the file it is trying to access is available
    • Any pre-requisites for the MCP server to run are met like docker running, etc.
  • If we need more detailed logs, please set the enkrypt_log_level to debug in the enkrypt_mcp_config.json file and restart the MCP client.

14.1 OpenTelemetry Troubleshooting

  1. SSL Handshake Errors

    If you see SSL errors like:

    SSL_ERROR_SSL: error:100000f7:SSL routines:OPENSSL_internal:WRONG_VERSION_NUMBER
    

    Solution: Add insecure=True to the OTLP exporter configuration in telemetry.py

  2. No Logs in Loki

    • Verify OTLP collector is running:

      docker logs secure-mcp-gateway-otel-collector-1
      
    • Check collector config in otel_collector/otel-collector-config.yaml

    • Verify Loki is receiving data:

      curl -G -s "http://localhost:3100/loki/api/v1/query" --data-urlencode 'query={job="enkrypt"}'
      
  3. Missing Metrics

    • Check OTLP collector metrics pipeline:

      curl http://localhost:8888/metrics
      
    • Verify metrics in collector logs:

      docker logs secure-mcp-gateway-otel-collector-1 | grep "metrics"
      
  4. Docker Issues

    # Restart the stack
    docker-compose down
    docker-compose up -d
    
    # Check individual service logs
    docker logs <service-name>
    

15. Known Issues being worked on

  • Output guardrails are not being applied to non-text tool results. Support for other media types like images, audio, etc. is coming soon.

16. Known Limitations

  • The Gateway does not support a scenario where the Gateway is deployed remotely but the MCP server is deployed locally (without being exposed to the internet). This is because the Gateway needs to know the MCP server's address to forward requests to it.

17. Contribute

  • Look at the TODO file for the current work in progress and yet to be implemented features

  • Install the gateway locally to test your changes

    • by following the Git clone steps
    • or build it using python -m build, activate the venv and install using pip install .
  • Report or fix any bugs you encounter ๐Ÿ˜Š

18. Testing

๐Ÿงช Running Tests

The gateway includes a comprehensive test suite that validates all core functionality including server discovery, tool execution, guardrails, caching, telemetry, and more.

Prerequisites

  • Gateway installed locally (follow Local Installation)
  • Virtual environment activated
  • Echo OAuth MCP server running (for testing remote server scenarios)

Running the Test Suite

Step 1: Set Environment Variable

Windows PowerShell:

$env:MCP_HTTP_MODE="true"

Windows Command Prompt:

set MCP_HTTP_MODE=true

macOS/Linux:

export MCP_HTTP_MODE="true"

This environment variable enables the echo OAuth server to run in HTTP mode for testing.

Step 2: Start the Echo OAuth Server

Navigate to the echo server directory and start it:

Windows PowerShell:

cd src\secure_mcp_gateway\bad_mcps
python .\echo_oauth_mcp.py

macOS/Linux:

cd src/secure_mcp_gateway/bad_mcps
python echo_oauth_mcp.py

The server will start on http://localhost:8001/mcp/ and remain running. Keep this terminal open.

Step 3: Run the Test Suite

Open a new terminal, activate your virtual environment, and run the tests:

Windows PowerShell:

# Activate virtual environment
.\.venv\Scripts\activate

# Navigate to tests directory
cd tests

# Run tests
python .\test_gateway.py

macOS/Linux:

# Activate virtual environment
source ./.venv/bin/activate

# Navigate to tests directory
cd tests

# Run tests
python test_gateway.py

Test Coverage

The test suite includes:

  • Server Discovery Tests: List servers, get server info, discover tools
  • Tool Execution Tests: Call tools, multiple tool calls, error handling
  • Cache Tests: Cache status, cache clearing, cache expiration
  • Guardrails Tests: Input/output guardrails, async guardrails, PII redaction
  • Telemetry Tests: OpenTelemetry integration, metrics, traces, logs
  • Configuration Tests: Timeout settings, log levels, external cache
  • Integration Tests: Full workflows, error recovery, performance

Expected Output

The test runner will display:

  • Progress for each test
  • Success/failure status
  • Execution duration
  • Final summary with pass/fail counts

Example output:

=== Gateway Tools Test Runner ===

Setting up test environment...
Setup complete.

Running Tests...
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”

โœ… test_list_all_servers_basic (0.45s)
โœ… test_discover_all_tools_all_servers (1.23s)
โœ… test_secure_call_tools_basic (0.89s)
...

=== Test Summary ===
Total Tests: 45
Passed: 45
Failed: 0
Success Rate: 100.0%
Total Duration: 45.67s

Troubleshooting Tests

Echo server connection errors:

  • Verify the echo OAuth server is running on port 8001
  • Check that MCP_HTTP_MODE environment variable is set
  • Ensure no other service is using port 8001

Gateway configuration errors:

  • Verify enkrypt_mcp_config.json exists in ~/.enkrypt/ directory
  • Check that the config file has valid gateway keys and server configurations
  • Ensure virtual environment has all dependencies installed

Test failures:

  • Enable debug logging by setting enkrypt_log_level: "DEBUG" in config
  • Check MCP client logs for detailed error messages
  • Verify all prerequisites are installed (Python 3.11+, pip, uv)

19. License

19.1 Enkrypt AI MCP Gateway Core

This project's core functionality is licensed under the MIT License.

For the full license text, see the LICENSE.txt file in this repository.

19.2 Enkrypt AI Guardrails, Logo, and Branding

ยฉ 2025 Enkrypt AI. All rights reserved.

Enkrypt AI software is provided under a proprietary license. Unauthorized use, reproduction, or distribution of this software or any portion of it is strictly prohibited.

Terms of Use: https://www.enkryptai.com/terms-and-conditions

Privacy Policy: https://app.enkryptai.com/privacy-policy

Enkrypt AI and the Enkrypt AI logo are trademarks of Enkrypt AI, Inc.

Go to top

Quick Actions

View on GitHubView All Servers

Key Features

Model Context Protocol
Secure Communication
Real-time Updates
Open Source

Boost your projects with Wisdom Gate LLM API

Supporting GPT-5, Claude-4, DeepSeek v3, Gemini and more.

Enjoy a free trial and save 20%+ compared to official pricing.

Learn More
JUHE API Marketplace

Accelerate development, innovate faster, and transform your business with our comprehensive API ecosystem.

JUHE API VS

  • vs. RapidAPI
  • vs. API Layer
  • API Platforms 2025
  • API Marketplaces 2025
  • Best Alternatives to RapidAPI

For Developers

  • Console
  • Collections
  • Documentation
  • MCP Servers
  • Free APIs
  • Temp Mail Demo

Product

  • Browse APIs
  • Suggest an API
  • Wisdom Gate LLM
  • Global SMS Messaging
  • Temp Mail API

Company

  • What's New
  • Welcome
  • About Us
  • Contact Support
  • Terms of Service
  • Privacy Policy
Featured on Startup FameFeatured on Twelve ToolsFazier badgeJuheAPI Marketplace - Connect smarter, beyond APIs | Product Huntai tools code.marketDang.ai
Copyright ยฉ 2025 - All rights reserved