1. Find the server URL
Server URL– base URL (append/ssefor SSE transport or/call_toolfor HTTP).- Authentication mode (Bearer token, unauthenticated, OAuth coming soon).
- Status, creation time, description.
2. Make sure clients have the right secrets
If you tagged any!user_secret entries, each consumer must configure the deployment before connecting:
--secrets-file) or capture the resulting file (--secrets-output-file) to share with your team.
3. Install into MCP clients
Use the top-level install command to update client-specific config files:- Validates your
MCP_API_KEY(or uses--api-key). - Fetches app metadata (name, unauthenticated status) for validation.
- Writes the appropriate JSON snippet to the client-specific config file.
- Masks secrets when printing to the terminal (use
--dry-runto preview).
Client config locations:
• Claude Desktop –~/Library/Application Support/Claude/claude_desktop_config.json(macOS)
• Cursor –~/.cursor/mcp.json
• VS Code –<workspace>/.vscode/mcp.json
• Claude Code –~/.claude.json
4. Manual configuration (if needed)
All MCP clients understand the same HTTP/SSE interface. A minimal configuration looks like:mcp-remote:
5. Automate calls from code
Python
-
Create or update a server entry in
mcp_agent.config.yaml: -
Use the shared server registry to open a client session:
HTTP / cURL
MCP Inspector
6. Provide usage instructions to end users
Consider sharing a short README with:- The server URL and description.
- Required user secrets (from
mcp-agent cloud configure --params). - Example calls (like the snippets above).
- Recommended MCP clients (Claude Desktop, Cursor, ChatGPT, etc.).
- Observability tips (
mcp-agent cloud logger tailfor debugging).
7. Rotate tokens and access
- Rotate API keys – run
mcp-agent loginagain or set a newMCP_API_KEY. - Revoke access – delete individual configurations (coming soon) or redeploy with
--authto disable unauthenticated access. - Publish publicly – ensure the deployment is unauthenticated and document explicit rate limits / expectations.
