MCP Registry
Highflame's MCP Gateway is the control-plane surface for registering, securing, and operating MCP servers. Highflame MCP registry is a security-first proxy that sits between MCP clients and downstream servers, and it is managed through Studio.
Instead of allowing clients to connect directly to every MCP server, the gateway creates a single control boundary where Highflame can authenticate the client, determine which server and tool are allowed, evaluate runtime guardrails, and capture the resulting telemetry.
What the MCP registry provides
Highflame MCP registry is more than an MCP reverse proxy. The current gateway supports:
registry-backed routing so each configured server is exposed through a stable gateway endpoint
MCP session management for standard MCP methods, such as tools, prompts, and resources
OAuth 2.1 + PKCE for clients that cannot send custom headers
token brokering for third-party MCP servers that require per-user downstream OAuth
Shield integration for tool-call guardrails and policy evaluation
multi-tenant enforcement so requests stay scoped to the right account and project
This lets developers standardize how agents access tools without forcing every client to implement its own auth, policy, and observability logic.
Registry Model
In Studio, the MCP registry acts as the source of truth for the servers your project is allowed to use. A registry entry typically defines:
the MCP server identity and description
the upstream connection details
how the server should authenticate
which tools are enabled for use
any policies or baseline controls attached to that server
Tool discovery and tool enablement are intentionally separate. A server can expose many tools, but only the subset you enable should be available to agents in production.
Authentication And Access Patterns
The gateway supports more than one way to authenticate MCP traffic:
API key flows for clients that can send project-scoped credentials directly
OAuth 2.1 + PKCE for clients such as Claude Desktop, Cursor, and Windsurf
token broker mode for third-party MCP servers where the registry fetches the user's downstream token and injects it server-side
That last mode is important for developer tooling. It means the MCP client authenticates once to Highflame, and the MCP registry handles downstream provider credentials on behalf of the user. The client never needs to manage provider tokens directly.
Runtime Enforcement
The MCP Gateway works with Shield to evaluate tool interactions before and after execution. Depending on the server, tool, and policy configuration, Highflame can:
inspect requests before they reach the downstream MCP server
inspect tool responses before they are returned to the client
apply Cedar policies using project and request context
record the tool call, policy outcome, and related signals for later investigation
This turns MCP access into a governed execution path instead of a direct network connection.
Operating MCP Servers In Studio
Teams manage the MCP Gateway from Studio. Common workflows include:
adding a new server to the registry
reviewing discovered tools and enabling only the ones that should be live
attaching policies to a server or project
checking connectivity and auth configuration
tracing how a tool was used in production
The next page covers the security model for MCP servers and tools in more detail.
Last updated