Is it possible to limit accessible orgs? #122
-
Is there a way to configure this MCP server so that it would be difficult/impossible for it to connect to a production org? We are interested in testing out this MCP server but we'd like to be 100% sure it couldn't grant an AI agent access to our production org. I reviewed the documentation around configuring orgs. Consider this scenario:
What options are there to prevent this scenario from happening?
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
There's no settings in org UI for these kinds of local servers so this is unlikely to happen.
You could create a connected app for CLI auth and not give it the "API request" scope but it would also block CLI operations.
When you authenticate to an org using the CLI we can tell the kind of org (scratch, sandbox, devhub, etc), we could make the MCP server throw if Would this work for your use cases? I agree that MCP servers should have tighter access control and scratch/sandoxes only by default could work as a safety measure. |
Beta Was this translation helpful? Give feedback.
There's no settings in org UI for these kinds of local servers so this is unlikely to happen.
You could create a connected app for CLI auth and not give it the "API request" scope but it would also block CLI operations.
Not sure how we could use permsets to block this scenario, on the org side these are usually "API per…