RBAC ConfigurationΒΆ
Role-based access control (RBAC) defines which actions users or teams can perform in MCP Gateway. This document outlines the model, current capabilities, and the roadmap toward finer-grained controls.
ModelΒΆ
- Subjects: users authenticated via SSO or basic/JWT
- Grouping: subjects can belong to one or more gateway teams
- Roles: admin, maintainer, viewer (initial baseline); future: per-entity scoped roles
- Resources: servers, tools, prompts, resources, gateway settings
Current StateΒΆ
- Authentication and administrative endpoints are protected; production deployments should enable auth and use JWTs for API calls.
- Team mapping on SSO login allows grouping users into stable teams that can be referenced by policy.
- Visibility per server and composition via virtual servers provide pragmatic control of what tools are exposed to clients.
Planned EnhancementsΒΆ
- Fine-grained roles for create/update/delete vs. read-only per resource type.
- Policy definitions that bind roles to teams and/or individual users.
- UI flows for assigning roles to teams and auditing access.
Recommended PracticesΒΆ
- Start with three tiers of access:
- Admin: full management access
- Maintainer: manage servers, tools, prompts and configurations
- Viewer: read-only access and metrics
- Use SSO group-to-team mappings to automate membership and reduce manual changes.
- Keep virtual servers scoped per project/team so client-facing exposure is intentional.