Overview

The Connections page is your hub for all MCP server connections. From here you can add new servers, edit existing ones, group them logically, and connect or disconnect at any time.

Connections list showing MCP servers with health indicators, transport type, and connect toggles

The Connections page lists all saved MCP servers with live health indicators, transport type, and connection toggles. Use the toolbar to add, import, or export connections.


Creating a Connection

  1. Click New Connection in the top-right corner
  2. Fill in the connection form:
New connection form with fields for name, URL, transport type, and optional headers

The connection form uses Streamable HTTP transport, with optional custom headers and OAuth/Azure credentials.

FieldRequiredDescription
NameA friendly display name
Endpoint URLThe MCP server URL
TransportStreamable HTTP (the only supported transport)
GroupAssign to a named group for organisation
DescriptionFree-text notes
HeadersCustom HTTP headers (e.g. Authorization: Bearer ...)
  1. Click Save — the connection appears in the list immediately.

Connecting & Disconnecting

Click the toggle next to any connection to connect or disconnect. The sidebar shows an active connections badge with a live count.


Editing a Connection

Click the pencil icon on any connection row to edit all fields including the name, URL, transport, and headers.


Deleting a Connection

Click the trash icon and confirm the deletion dialog. This is permanent.


Grouping Connections

Assign connections to named groups to keep your list organised. Groups appear as filter tabs above the connections list. Useful when working with many servers across different projects.

Click the + icon next to the group tabs to create a new group — give it a name and optionally pick a colour:

New Group dialog with name and colour picker

The New Group dialog. Enter a name and pick an accent colour, then click Create. You can then assign connections to the group via the Group field in the connection form.


Import & Export

You can export all your connections to an encrypted JSON file and import them on another machine or share with a team.

  • Export: Click Export Connections in the top toolbar → enter an encryption passphrase → download the .json file
  • Import: Click Import Connections → select the file → enter the passphrase → connections are merged

info: The export file is AES-256 encrypted. Without the passphrase it cannot be read.


Connection Health

Each connection row shows a live health indicator:

  • 🟢 Connected — server is live and responding
  • 🔴 Disconnected — not connected
  • 🟡 Error — connection attempt failed (hover for the error message)

Authentication Modes

MCP Explorer supports three authentication modes when connecting to protected MCP servers.

Custom Headers

Add any HTTP headers to every request — useful for static bearer tokens, API keys, or proprietary auth schemes.

HeaderExample Value
AuthorizationBearer eyJ...
X-Api-Keysk-...

Azure Client Credentials

Authenticate using an Entra ID (Azure AD) app registration. MCP Explorer obtains an OAuth 2.0 client-credentials token and attaches it to every request.

Edit Connection dialog showing Azure Client Credentials auth mode with the Azure Context Banner, Tenant ID (auto-detected), Client ID, Key Vault secret reference, and auto-filled Scope fields
FieldDescription
Tenant IDYour Entra tenant. Auto-populated from az account show when Azure is connected. Changes automatically when you switch subscription.
Client IDThe app registration’s Application (client) ID. Use the Browse App Registrations button to pick it from a searchable list.
Client SecretThe app secret. Type it manually, or use the Key Vault picker to reference a secret stored in Azure Key Vault.
ScopeThe OAuth scope — e.g. api://<resource-id>/.default. Auto-filled when you pick an App Registration.
Authority HostOptional. Defaults to https://login.microsoftonline.com. Override for sovereign clouds (e.g. Azure China, US Gov).

Azure Context Banner

When Azure Client Credentials mode is selected, a banner appears at the top of the form showing your signed-in account and a subscription dropdown. This dropdown:

  • Lists all Azure subscriptions your credential has access to
  • Scopes the Key Vault picker to the selected subscription
  • Updates the Tenant ID field automatically when you switch subscription
  • Persists — the selected subscription is saved with the connection and automatically restored when you edit it again

tip: In Docker, set HOST_AZURE_CONFIG_DIR=~/.azure in your .env file to mount your local az login session into the container. See Environment Variables for details.

Browse App Registrations

Click the Browse App Registrations… button next to the Client ID field to open a searchable picker showing all Entra app registrations visible to your credential:

  • Search by display name or App ID
  • When editing an existing connection, the picker pre-selects and scrolls to the matching app registration
  • Selecting an app automatically fills Client ID and derives the Scope as api://<firstApiResourceId>/.default

Key Vault Secret Picker

Click Pick from Key Vault… next to the Client Secret field to browse your Key Vault secrets without ever seeing the secret value:

Step 1 — Select a Key Vault

A searchable list of all Key Vaults in the selected subscription is shown. The vault is filtered by the subscription selected in the Azure Context Banner.

Step 2 — Select a secret

All secret names in the chosen vault are listed (names only — values are never retrieved or stored).

The connection stores a KeyVaultSecretReference (vaultName + secretName). At runtime, the API resolves the actual secret value via DefaultAzureCredential — the plaintext secret is never persisted to disk.

When editing a connection that already has a KV reference, the picker pre-selects the vault and secret automatically.


OAuth

Use OAuth 2.0 PKCE or client-credentials flow for connections that require interactive or automated OAuth authentication.

FieldDescription
Client IDYour OAuth client ID. Use the Browse App Registrations button to pick from Entra.
Client SecretOptional client secret. Use the Key Vault picker to avoid storing it in plain text.
Redirect URIThe OAuth callback URL registered with your identity provider.
ScopesSpace-separated list of OAuth scopes to request.
Client Metadata Document URIOptional. URL of the OAuth client metadata document (RFC 7591).

The Azure Context Banner and Key Vault / App Registration pickers are also available in the OAuth section — the same subscription selection and auto-population behaviour applies.