When to use Auth Overrides
Auth Overrides are useful when:- The upstream MCP server requires user-specific API keys (e.g., each developer has their own key for a third-party service)
- You need to attribute API usage to individual users at the downstream service
- The upstream service enforces per-user rate limits or permissions
Managing Auth Overrides
Navigate to the MCP server detail page and click on the Auth Overrides tab to view all existing overrides.
| Column | Description |
|---|---|
| Entity | The user or virtual account the override applies to |
| Type | Whether the entity is a user or virtual account |
| Auth | The authentication type being overridden |
| Updated by | Who last modified this override |
| Credentials | The masked credential value |
Adding an Auth Override
Open the Auth Overrides tab
Navigate to the MCP server detail page and click the Auth Overrides tab.
Configure the override
- Subject (managers only): Select the user or virtual account that will use this override
-
Credential: The API key, secret, or full header value as required by the server’s auth mode (for non-template configs, provide the complete value used for
Authorizationheader)
Editing or Deleting an Auth Override
Update - click the edit icon next to the override in the Auth Overrides table. Delete - click the delete icon, the user will revert to the server’s default credentials (if any).Changing outbound auth (type, Shared vs Individual, or related settings) can delete overrides on some transitions.
Permissions
MCP Server Manager
- Open the Auth Overrides tab on supported servers.
- List all overrides. The table columns are Entity, Type, Auth, Updated by, and Credentials (masked values).
- Delete any override.
User (non-manager)
- Add overrides only for API Key with Individual Credentials
- View overrides they added.
- Delete only their override.
Override support
By outbound auth
| Outbound auth | Who can add overrides |
|---|---|
| API Key (Individual Credentials) | MCP Server Managers and MCP Server Users |
| API Key (Shared Credentials) | Not supported - coming soon |
| OAuth2 (Authorization Code) | MCP Server Managers only |
| OAuth2 (Client Credentials) | Not supported - coming soon |
| Token Passthrough | Not supported |
By Subject
| Subject | Who can add overrides |
|---|---|
| User | MCP Server Managers and MCP Server Users |
| Virtual Account | MCP Server Managers |
| External Identity | Not supported - coming soon |
By Auth override type
| Auth override | Who can add overrides |
|---|---|
| Header | MCP Server Managers and MCP Server Users (where applicable) |
| Client Credentials | Not supported - coming soon |
How Auth Overrides work at runtime
When a user makes a request through the Gateway to an MCP server with Auth Overrides configured:- The Gateway authenticates the user (inbound authentication).
- The Gateway checks if an Auth Override exists for this user on this MCP server.
- If an override exists: The Gateway injects the user’s override credentials into the request (template substitution for Individual, or full
Authorizationvalue when applicable). - If no override exists: The Gateway uses the server’s default credentials (for Shared Credentials) or returns an error (for Individual Credentials).
For MCP servers configured with Individual Credentials, users without an Auth Override will not be able to use the server until an override is created for them.