Registering MCP Server with AI Applications
This topics describes various configuration settings required for MCP.
- Obtain Authentication Headers
- Configure TLS/SSL verification
- Register MCP Server
Obtain Authentication Headers
Data Fabric MCP server supports both OAuth and Basic Authentication schemes. However, HPE recommends using only the OAuth scheme for production deployments. OAuth requires a JWT token for authentication.
To obtain JWT token from Keycloak configured in Data Fabric cluster, see About Access and Refresh Tokens. Use the generated JWT token for MCP Registration.
Obtain CA Certificates
By default, the MCP server uses self-signed certificates. To avoid connection failure, you must provide SSL CA certificates of the Data Fabric cluster to the AI application.
Copy /opt/mapr/conf/ssl_truststore.pem from a Data Fabric cluster node to the machine running the AI
Application.
Register MCP Server
- Edit the MCP servers settings in your AI application.
- Add Data Fabric MCP server configuration, for example:
{ "mcpServers": { "<MCP_SEVER_NAME>": { "command": "npx", "args": [ "-y", "mcp-remote", "https://<MCP_HOST>:5679/<MCP_ENDPOINT>", "--header", "Authorization: Bearer <JWT_token>" ], "env": { "NODE_EXTRA_CA_CERTS":"</path/to/ssl_truststore.pem>" } } } } - Restart the AI application.