Authentication

MCP Gateway supports Microsoft Entra ID (Azure AD) and Auth0 for user authentication. Most MSPs use Microsoft — here's how to get set up.

Signing In

When you visit mcp.wyretechnology.com/settings, you'll be prompted to sign in. If both Microsoft and Auth0 are enabled, you'll see a chooser page. Otherwise you'll be redirected to your organization's identity provider automatically.

Microsoft Entra ID (Recommended for MSPs)

Most MSPs already use Microsoft 365. Signing in with your Microsoft work account is the fastest path — no separate credentials to manage.

For Individual Users

If your organization's Azure AD tenant has already been onboarded (see below), just:

  1. Go to mcp.wyretechnology.com
  2. Click Sign in with Microsoft
  3. Sign in with your work Microsoft account
  4. You're in — head to Connections to add your first vendor

Before users from your organization can sign in, an Azure AD administrator needs to grant a one-time admin consent. This authorizes the MCP Gateway app registration in your tenant so your users can authenticate.

What admin consent does

  • Allows users in your tenant to sign in to MCP Gateway with their Microsoft accounts
  • Grants openid, profile, and email scopes only — we read your name and email, nothing else
  • Does not grant access to your Microsoft 365 data, mailboxes, or files
  • Can be revoked at any time from your Entra ID portal under Enterprise Applications

Steps

  1. WYRE will send you an admin consent link (or you can use the direct URL below). The link looks like:
    https://mcp.wyretechnology.com/auth/admin-consent?customer_name=Your+Company
  2. Click the link — you'll be redirected to Microsoft's standard admin consent dialog.
  3. Review the requested permissions (openid, profile, email) and click Accept.
  4. You'll be redirected back to MCP Gateway with a confirmation. Your tenant is now onboarded.
  5. Share the gateway URL with your team — they can now sign in with their Microsoft accounts.

Note: Only a Global Administrator or Privileged Role Administrator in your Azure AD tenant can grant admin consent. If you're not an admin, forward the consent link to your IT team.

Revoking Access

To revoke MCP Gateway's access to your tenant:

  1. Sign in to the Microsoft Entra admin center
  2. Navigate to Enterprise Applications
  3. Find "MCP Gateway" in the list
  4. Click PropertiesDelete

Auth0

Auth0 is also supported as an identity provider. If your organization doesn't use Microsoft 365, you can sign in with Auth0 using email/password or social login (Google, GitHub, etc.).

No admin setup required — just sign in at mcp.wyretechnology.com and create your account.

MCP Client Authentication (OAuth 2.1)

The authentication described above is for the gateway web portal (managing connections, teams, and settings). MCP clients like Claude Desktop and Claude Code use a separate OAuth 2.1 + PKCE flow that happens automatically when you add the gateway URL as a connector.

You don't need to configure anything — when Claude connects to https://mcp.wyretechnology.com/v1/mcp, it will open a browser window for you to sign in and authorize the connection. See the Gateway Setup page for details.