docs/documentation/platform/agent-sentinel/mcp-endpoints.mdx
MCP Endpoints are the entry points that AI clients (like Claude, ChatGPT, or custom agents) use to access your configured MCP Servers. Instead of connecting AI clients directly to individual MCP servers, you connect them to an Infisical MCP Endpoint which acts as a secure gateway.
This architecture provides several benefits:
<CardGroup cols={2}> <Card title="Federation" icon="object-group"> Combine tools from multiple MCP servers behind a single endpoint. </Card> <Card title="Tool Selection" icon="list-check"> Control exactly which tools are available through each endpoint. </Card> <Card title="Access Control" icon="lock"> Manage who can use each endpoint. </Card> <Card title="Centralized Logging" icon="scroll"> All tool invocations are logged regardless of which MCP server they target. </Card> <Card title="PII Filtering" icon="user-shield"> Automatically redact sensitive data from requests and responses. </Card> <Card title="Auth Delegation" icon="key"> Handle OAuth and token-based authentication for connected servers. </Card> </CardGroup>graph LR
A[AI Client
Claude, ChatGPT, etc.] --> B[MCP Endpoint
Infisical]
B --> C[MCP Server 1
Notion]
B --> D[MCP Server 2
GitHub]
When you create an MCP endpoint, Infisical generates a unique URL that you can add to your AI client's MCP configuration. The AI client connects to this URL and can access all enabled tools from the connected MCP servers.
In the following steps, we explore how to create an MCP endpoint and connect it to an AI client.
<Tabs> <Tab title="Infisical UI"> <Steps> <Step title="Navigate to MCP Endpoints"> Head to your Agent Sentinel project and select **MCP Endpoints** from the sidebar, then click **Create Endpoint**. 
</Step>
<Step title="Configure endpoint details">
Enter the following details for your endpoint:
- **Name**: A friendly name to identify this endpoint (e.g., "Engineering Team Endpoint")
- **Description (Optional)**: A description of the endpoint's purpose
- **Connected Servers**: A selection of the MCP servers to make available through this endpoint

</Step>
<Step title="Configure tool selection">
After creating the endpoint, you'll be taken to the endpoint details page. Here you can configure which tools from each connected server are available through this endpoint.
For each connected MCP server, you'll see a list of available tools. Toggle tools on or off to control what AI clients can access.

<Note>
By default, no tools are enabled. You must explicitly enable the tools you want to make available.
</Note>
</Step>
<Step title="Copy the endpoint URL">
The endpoint details page displays the **Endpoint URL**. Copy this URL—you'll need it to configure your AI client.

</Step>
</Steps>
Once you have your endpoint URL, you can connect AI clients to it.
<Tabs> <Tab title="Claude"> Add the endpoint to your Claude MCP configuration:1. Open Claude settings
2. Navigate to the MCP section
3. Add a new server with your Infisical endpoint URL
4. Click **Connect**
When connecting for the first time, Claude will open an authorization page where you grant access to the endpoint. You can configure:
- **Access Duration**: How long the AI client can use the endpoint (e.g., 30 days)
After authorization, Claude can use all enabled tools from your endpoint.
The general process is:
1. Locate the MCP server configuration in your AI client
2. Add your Infisical endpoint URL as a new server
3. Complete the authorization flow when prompted
Refer to your AI client's documentation for specific configuration steps.
When an MCP endpoint includes servers configured with Personal Credentials mode, users must authenticate with each of those servers before they can connect to the endpoint.
When a user connects to an endpoint with servers requiring personal credentials:
Re-authentication: Users can update their credentials for servers they've already authenticated with by clicking the Re-authenticate button. This is useful when tokens expire or when users want to switch accounts.
Complete All Authentications: Users must authenticate with all servers requiring personal credentials before they can proceed. The connection will only be established once all required authentications are complete.
MCP endpoints support granular role-based access control through permission conditions. This allows you to restrict access to specific endpoints based on their name.
engineering-*prod-*) to senior team membersWhen creating or editing a project role, you can add conditions to MCP endpoint permissions:
equal, not equal, glob match, or in)| Operator | Description | Example |
|---|---|---|
equal | Exact match | engineering-tools |
not equal | Does not match | prod-endpoint |
glob match | Pattern matching | prod-*, *-internal |
in | Matches any in list | ["endpoint-1", "endpoint-2"] |
MCP Endpoints support automatic PII (Personally Identifiable Information) filtering to redact sensitive data from requests sent to MCP servers and responses returned to AI clients. This helps maintain compliance and prevent accidental exposure of sensitive information through AI tool interactions.
| Type | Description | Redacted As |
|---|---|---|
| Email addresses | [REDACTED_EMAIL] | |
| Phone | Phone numbers (US format) | [REDACTED_PHONE] |
| SSN | Social Security Numbers | [REDACTED_SSN] |
| Credit Card | Credit card numbers | [REDACTED_CREDIT_CARD] |
| IP Address | IPv4 and IPv6 addresses | [REDACTED_IP] |

</Step>
<Step title="Open Filter Configuration">
Click the edit icon to open the PII filter configuration modal.

</Step>
<Step title="Configure Filtering Options">
Configure the following options:
- **Filter Requests**: Enable to redact PII from requests sent to MCP servers
- **Filter Responses**: Enable to redact PII from responses returned to AI clients
- **PII Detection**: Select which types of PII to detect and redact
</Step>
<Step title="Save Configuration">
Click **Save** to apply your PII filter settings. Changes take effect immediately for new tool invocations.
</Step>
</Steps>
</Tab>
- **OAuth servers**: Users complete an OAuth authorization flow
- **Bearer Token servers**: Users enter their personal access token directly
This is a one-time process per server, and users can re-authenticate at any time if needed.