mcpgate
OfficialSpaces, pages, comments, CQL search
Files, components, comments, dev resources
Issues, pull requests, code search, releases
Issues, merge requests, pipelines, deployments, CI/CD
App listings, releases, reviews
Dashboards, logs, metrics
Office sensors, heating control
Builds, pipelines, jobs
Create/update issues, transitions, worklogs, comments
BI dashboards, SQL queries, schema exploration
Pages, databases, blocks, comments
Error tracking, issue queries
Search messages, read channels, post messages
Translation projects, strings, languages
Posts, pages, Yoast SEO metadata (multi-instance)
mcpgate
Self-hosted MCP gateway — connect any AI to your company tools with policy hooks.
Website · Docs · Demo · Docker Hub · Pricing

This repository contains the self-hosting distribution for mcpgate: Docker Compose, configuration templates, hooks, and operations docs. Published container images are released via the CI/CD pipeline connected to this repository.

A PM finishes a user interview and asks Claude to consolidate his notes in Notion. (Works the same with ChatGPT, Codex, or any MCP-compatible agent.) After reviewing them, he saves the key takeaways to the insights database and frames an opportunity for the next product meeting. What used to take the rest of the day is done in 15 minutes.
Weeks later, the product team decides to prioritize that opportunity. The PM gives the AI the full context, adds constraints, and starts prototyping. The AI pulls the codebase, scaffolds a working prototype, and the PM iterates on the actual problem — not on tooling. A few hours later, the prototype integrates with the existing app and the design system, because the AI had the context to do it right. Changes are saved to a Git branch automatically.
With all that context loaded, the AI drafts Jira tickets for the refinement. Hooks handle the boring parts — converting Markdown to Jira's ADF format, enforcing required fields, and blocking accidental overwrites. When the team meets, they walk through a working prototype, identify gaps, and make it actionable. Design, development, QA — everyone picks up where the last person left off, with full context.
mcpgate connects your tools to your AI — Notion, Jira, GitLab, Figma, and many more. 22 integrations are built in, and you can add your own through OpenAPI import. Company hooks enforce your policies, while user hooks let individuals fine-tune rules directly from their AI client — hot-reloaded in seconds. mcpgate works as an MCP gateway, but also as a gate: your rules, your data. Eliminate loops between teams, safely manage context across handoffs, and let your team focus on building.
AI transformation is happening. Your tools, your data, and your context need to be connected — mcpgate is how you do it on your terms.
Quick Start
docker compose up -d
open http://localhost:8642That's it. No .env file needed. The setup wizard walks you through login, branding, team, and connecting services. Secrets are auto-generated on first start.
New here? Clone the repo to get the pre-configured
docker-compose.yml:git clone https://gitlab.com/mcpgate/mcpgate.git && cd mcpgateOr copy the
docker-compose.ymlfrom mcpgate.de/docs/quickstart.
Already have an
.env? It still works — environment variables take priority over wizard config.
Connect your AI
After setup, connect your AI client from the dashboard:
Claude — Company-wide (recommended)
Configure once at claude.ai/admin-settings/connectors:
Name: mcpgate
URL: https://your-gateway-url/mcpClaude Code
claude mcp add mcpgate https://your-gateway-url/mcp -s user -t httpChatGPT
Settings → Apps → Add App → OAuth → enter your MCP URL.
Codex / Gemini CLI
codex mcp add mcpgate --url https://your-gateway-url/mcp
gemini mcp add --transport http mcpgate https://your-gateway-url/mcpArchitecture
flowchart TB
AI["Claude · ChatGPT · Codex · Gemini · Any MCP Agent"]
AI -- "MCP Protocol (tool calls)" --> Auth
subgraph GW["mcpgate"]
Auth["Authentication — OAuth / OIDC"]
Pre["Pre-Hooks — validate · inject · transform"]
Exec["Action Executor — YAML-defined, per-service"]
Post["Post-Hooks — instruct · notify"]
Auth --> Pre --> Exec --> Post
end
Post --> Services
Services["Slack · Jira · Confluence · GitLab · GitHub\nGoogle Workspace · Microsoft 365 · Notion · Figma\nGrafana · Sentry · Metabase · Amplitude\n+ 10 more"]How a request flows:
AI sends a tool call via MCP (e.g.
jira_write_actions→create_issue)mcpgate authenticates the user via OAuth/OIDC
Pre-hooks run: validate permissions, block destructive actions, transform data (e.g. Markdown → Jira ADF)
Action executes against the service API using per-user OAuth tokens
Post-hooks run: cap response size, add display hints — and optionally chain follow-up actions (e.g. post a Slack notification after a Jira issue is created)
Result returns to the AI client
Authentication
Method | Use case |
Broker login | Google/Microsoft sign-in, zero config (default) |
OIDC SSO | Your own identity provider (Google, Microsoft, Okta, Keycloak, Auth0). New users provisioned automatically — no separate user table to maintain. |
Magic Links | Email-based login for external collaborators |
SSO and service credentials are configured through the setup wizard or .env. See .env.example for the full reference.
Services
22 integrations. Enable a service by entering credentials in the setup wizard or .env. Only configured services activate.
Service | What the AI can do |
Google Workspace | Gmail, Calendar, Drive, Docs, Sheets, Slides |
Microsoft 365 | Outlook, Teams, OneDrive, SharePoint, Calendar |
Slack | Search messages, read channels, post messages |
Jira | Create/update issues, transitions, worklogs, comments |
Confluence | Spaces, pages, comments, CQL search |
GitLab | Issues, merge requests, pipelines, deployments, CI/CD |
GitHub | Issues, pull requests, code search, releases |
Notion | Pages, databases, blocks, comments |
Figma | Files, components, comments, dev resources |
Grafana | Dashboards, logs, metrics |
Sentry | Error tracking, issue queries |
Metabase | BI dashboards, SQL queries, schema exploration |
Amplitude | Charts, active users, real-time analytics |
BigQuery | Datasets, tables, query execution |
Jenkins | Builds, pipelines, jobs |
Transifex | Translation projects, strings, languages |
AppStore Connect | App metadata, builds, reviews |
Google Play | App listings, releases, reviews |
Supernova | Design tokens, components |
WordPress | Posts, pages, Yoast SEO metadata (multi-instance) |
Home Assistant | Office sensors, heating control |
Joan | Desk & meeting room booking |
Plus self-management tools (gateway config, issue reporting) and OpenAPI import for anything else.
Compliance & Safety
Built-in safeguards that don't need configuration:
PII Sanitization with Pseudonym Rehydration — sensitive data (emails, names, phone numbers) is replaced with stable pseudonyms before it reaches the LLM, then rehydrated when the agent calls a tool. Mapping stays on-prem, encrypted at rest, and expires after 24h. Preserves write-flows that simple redaction would break.
Write-Safety Defaults — destructive actions (delete, archive, dashboard PUTs) require explicit
confirmed=trueorforce=true. Response size caps prevent accidental mass operations.Stores nothing in transit — mcpgate is a pass-through. Tool actions are auditable in your own tools (Jira, GitLab, Slack) where they happen. The only data we hold is the encrypted pseudonym mapping for PII rehydration, with a 24-hour TTL.
Highly available — runs as multiple replicas behind your load balancer. Config changes propagate to all replicas in seconds.
Hooks
Policy and enrichment hooks in config/tool_hooks.yaml:
Policy (validation): destructive action confirmation, API endpoint guards, transition checks
Enrichment (mutation): Markdown → ADF conversion, text normalization, auto-linking, templates
Post-processing (observability): response capping, cross-service automation, auth error handling
Hooks handle deterministic guarantees — format conversion, write-safety, audit, PII handling. For preference- and workflow-shaped instructions (team templates, individual style), the MCP standard's emerging Skills mechanism (SKILL.md format) is the right place. Hooks enforce; skills personalize.
Heads-up: the MCP Interceptors Working Group (SEP-1763, charter 2026-04-21) is standardizing exactly what mcpgate calls hooks today. The three Interceptor types — validation, mutation, observability — map 1:1 to our Policy / Enrichment / Post-Hooks. Once the SEP stabilizes we'll expose
interceptor/listand friends as a thin adapter on top of the existing hook system.
Hot-reload without restart:
curl -X POST http://localhost:8642/admin/reloadSee OPERATIONS.md for details.
Customization
Branding, access control, and hooks are configurable through the setup wizard or config files. White-label the dashboard with your company name, logo, and colors.
Updates
docker compose pull
docker compose up -dConfiguration Reference
For advanced configuration, create a .env file from the template:
cp .env.example .envSee .env.example for all available options including OIDC, service credentials, AI features, and error reporting.
Operations
See OPERATIONS.md for health checks, metrics, hot-reload, extensions, and troubleshooting.
Support
Contact hello@mcpgate.de
License
Business Source License 1.1. See LICENSE.
Personal and internal business use permitted, including production. Offering mcpgate as a hosted service requires a commercial license. See COMMERCIAL.md.
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/Mcpgate-de/mcpgate'
If you have feedback or need assistance with the MCP directory API, please join our Discord server