Registering MCP Server with AI Applications

This topics describes various configuration settings required for MCP.

Registering MCP server with AI applications includes the following steps:
  • Obtain Authentication Headers
  • Configure TLS/SSL verification
  • Register MCP Server

Obtain Authentication Headers

Data Fabric MCP server supports both OAuth and Basic Authentication schemes. However, HPE recommends using only the OAuth scheme for production deployments. OAuth requires a JWT token for authentication.

To obtain JWT token from Keycloak configured in Data Fabric cluster, see About Access and Refresh Tokens. Use the generated JWT token for MCP Registration.

Obtain CA Certificates

By default, the MCP server uses self-signed certificates. To avoid connection failure, you must provide SSL CA certificates of the Data Fabric cluster to the AI application.

Copy /opt/mapr/conf/ssl_truststore.pem from a Data Fabric cluster node to the machine running the AI Application.

Register MCP Server

To register a Data Fabric MCP server with AI applications (such as Claude, Cusror and so on), do the steps that follow:
  1. Edit the MCP servers settings in your AI application.
  2. Add Data Fabric MCP server configuration, for example:
    {
      "mcpServers": {
        "<MCP_SEVER_NAME>": {
          "command": "npx",
          "args": [
            "-y",
            "mcp-remote",
            "https://<MCP_HOST>:5679/<MCP_ENDPOINT>",
            "--header",
            "Authorization: Bearer <JWT_token>"
          ],
          "env": {
            "NODE_EXTRA_CA_CERTS":"</path/to/ssl_truststore.pem>"
          }
        }
      }
    }
  3. Restart the AI application.