Authentication
MCP Gateway supports Microsoft Entra ID (Azure AD) and Auth0 for user authentication. Most MSPs use Microsoft — here's how to get set up.
Signing In
When you visit mcp.wyretechnology.com/settings, you'll be prompted to sign in. If both Microsoft and Auth0 are enabled, you'll see a chooser page. Otherwise you'll be redirected to your organization's identity provider automatically.
Microsoft Entra ID (Recommended for MSPs)
Most MSPs already use Microsoft 365. Signing in with your Microsoft work account is the fastest path — no separate credentials to manage.
For Individual Users
If your organization's Azure AD tenant has already been onboarded (see below), just:
- Go to mcp.wyretechnology.com
- Click Sign in with Microsoft
- Sign in with your work Microsoft account
- You're in — head to Connections to add your first vendor
For Azure AD Admins (Tenant Onboarding)
Before users from your organization can sign in, an Azure AD administrator needs to grant a one-time admin consent. This authorizes the MCP Gateway app registration in your tenant so your users can authenticate.
What admin consent does
- Allows users in your tenant to sign in to MCP Gateway with their Microsoft accounts
- Grants
openid,profile, andemailscopes only — we read your name and email, nothing else - Does not grant access to your Microsoft 365 data, mailboxes, or files
- Can be revoked at any time from your Entra ID portal under Enterprise Applications
Steps
-
WYRE will send you an admin consent link (or you can use the direct URL below).
The link looks like:
https://mcp.wyretechnology.com/auth/admin-consent?customer_name=Your+Company - Click the link — you'll be redirected to Microsoft's standard admin consent dialog.
-
Review the requested permissions (
openid,profile,email) and click Accept. - You'll be redirected back to MCP Gateway with a confirmation. Your tenant is now onboarded.
- Share the gateway URL with your team — they can now sign in with their Microsoft accounts.
Note: Only a Global Administrator or Privileged Role Administrator in your Azure AD tenant can grant admin consent. If you're not an admin, forward the consent link to your IT team.
Revoking Access
To revoke MCP Gateway's access to your tenant:
- Sign in to the Microsoft Entra admin center
- Navigate to Enterprise Applications
- Find "MCP Gateway" in the list
- Click Properties → Delete
Auth0
Auth0 is also supported as an identity provider. If your organization doesn't use Microsoft 365, you can sign in with Auth0 using email/password or social login (Google, GitHub, etc.).
No admin setup required — just sign in at mcp.wyretechnology.com and create your account.
MCP Client Authentication (OAuth 2.1)
The authentication described above is for the gateway web portal (managing connections, teams, and settings). MCP clients like Claude Desktop and Claude Code use a separate OAuth 2.1 + PKCE flow that happens automatically when you add the gateway URL as a connector.
You don't need to configure anything — when Claude connects to
https://mcp.wyretechnology.com/v1/mcp, it will open a browser window for you
to sign in and authorize the connection. See the
Gateway Setup page for details.