MCP authentication
Keepit MCP uses token-based authentication with Keepit API credentials. The server supports role-based access control (RBAC) at both the user and connector level, giving you granular control over who can access what.
To get started, create a secondary token in the PMC Web App (User Info > Security > Secondary Tokens) with read-only permissions. This is the only authentication method built into Partner MCP.
For organizations that require additional authentication layers such as gateway authentication, SSO, or identity provider integration, these can be implemented on top of Keepit MCP within your hosting infrastructure. See the Enterprise Deployment Guide for suggested patterns using Azure API Management, Entra ID, and role-based gateway policies.
Deployment options
Choose a deployment pattern based on your team size and infrastructure requirements.