Use case

Secure your MCP servers
Context

Restrict access to your MCP servers with scoped tokens and identity-based authorization. Descope ensures that only trusted agents or users can send commands to your backend services.


How it works?
  1. Enforce access to MCP endpoints with JWT validation.
  2. Apply fine-grained access controls using roles and scopes.

Links