loaditout.ai
SkillsPacksTrendingLeaderboardAPI DocsBlogSubmitRequestsCompareAgentsXPrivacyDisclaimer
{}loaditout.ai
Skills & MCPPacksBlog

mcp-entra-auth-proxy

MCP Tool

sergey-tihon/mcp-entra-auth-proxy

Stdio MCP proxy for connecting AI clients to Entra ID-protected MCP servers using Azure CLI tokens

Install

$ npx loaditout add sergey-tihon/mcp-entra-auth-proxy

Platform-specific configuration:

.claude/settings.json
{
  "mcpServers": {
    "mcp-entra-auth-proxy": {
      "command": "npx",
      "args": [
        "-y",
        "mcp-entra-auth-proxy"
      ]
    }
  }
}

Add the config above to .claude/settings.json under the mcpServers key.

About

mcp-entra-auth-proxy

[](https://www.npmjs.com/package/mcp-entra-auth-proxy) [](https://www.npmjs.com/package/mcp-entra-auth-proxy) [](./LICENSE)

> Workaround solution. This proxy exists because most MCP clients do not yet natively support Microsoft Entra ID authentication. If your MCP client supports Entra ID auth natively, prefer using its built-in authentication flow instead of this proxy.

Local stdio MCP proxy that forwards requests to a remote MCP server, authenticating via Microsoft Entra ID tokens from the az CLI.

Use it to connect any MCP-compatible AI client (VS Code Copilot, Claude Code, OpenCode, Cursor, etc.) to a remote Microsoft Entra ID-protected MCP server — without embedding credentials in the client config.

How it works
+--------------+          +----------------------+          +--------------+
|  AI Client   |  stdio   | mcp-entra-auth-proxy | HTTP(S)  | Remote MCP   |
| (VS Code,    |<-------->|       (local)        |<-------->| Server       |
|  Claude, ..) |          |                      | + Bearer | (Entra ID    |
|              |          |                      |   token  |  protected)  |
+--------------+          +----------------------+          +--------------+
  1. Your AI client spawns mcp-entra-auth-proxy as a local stdio MCP server
  2. The proxy acquires a Microsoft Entra ID token via az account get-access-token
  3. All MCP requests (tools, resources, prompts) are forwarded to the remote server with the Bearer token
  4. Tokens are refreshed proactively before they expire
Prerequisites
  • Node.js >= 18
  • Azure CLI (az) installed and logged in
az login
Azure CLI pre-approval requirement

The Azure CLI (`az

Tags

azureentra-idmcpoauth2

Reviews

Loading reviews...

Quality Signals

0
Installs
Last updated19 days ago
Security: AREADME

Safety

Risk Levelmedium
Data Access
read
Network Accessnone

Details

Sourcegithub-crawl
Last commit3/28/2026
View on GitHub→

Embed Badge

[![Loaditout](https://loaditout.ai/api/badge/sergey-tihon/mcp-entra-auth-proxy)](https://loaditout.ai/skills/sergey-tihon/mcp-entra-auth-proxy)