Skip to main content

Documentation Index

Fetch the complete documentation index at: https://www.truefoundry.com/llms.txt

Use this file to discover all available pages before exploring further.

Auth Overrides let you replace an MCP server’s default outbound credentials with user-specific tokens. When an override exists for the caller, the Gateway uses that value instead of the server’s configured defaults for upstream requests.

Adding an Auth Override

1

Open the Auth Overrides tab

Navigate to the MCP server detail page and click the Auth Overrides tab.
2

Click Add Override

Click the + Add Override button in the top right corner.
3

Configure the override

  • Subject — only MCP Server Managers can change this. As a Manager, select the user or virtual account the override applies to. If you’re a non-manager user of the MCP server, the subject is fixed to you and cannot be changed.
  • Credential — what you enter depends on how the MCP server’s outbound auth is configured:
    • Templated header (per-user API key) — the MCP server is configured with a placeholder, e.g. Authorization: Bearer {{API_KEY}}. Enter only the value that goes inside {{...}} — the Gateway substitutes it into the template at request time.
    • Non-templated header — enter the complete header value exactly as the upstream service expects it in the Authorization header.
Example:
MCP server’s auth header configWhat you enterWhat the Gateway sends
Authorization: Bearer {{API_KEY}} (templated)sk-abc123Authorization: Bearer sk-abc123
Authorization (non-templated)Bearer sk-abc123Authorization: Bearer sk-abc123
Add Auth Override
4

Submit

Click Submit to save the override. The Gateway will now use this credential for all requests made by the selected subject.

Managing Auth Overrides

The Auth Overrides tab on the MCP server detail page lists all existing overrides: Auth Overrides Tab The table has the following columns:
ColumnDescription
EntityThe user or virtual account the override applies to
TypeWhether the entity is a user or virtual account
AuthThe authentication type being overridden
Updated byWho last modified this override
CredentialsThe masked credential value

Who can manage Auth Overrides

ActionMCP Server ManagerMCP Server User (non-manager)
Open the Auth Overrides tabYesYes
List overridesAll overridesOnly overrides they added
Add an overrideYes (for any subject)Only for API Key — Individual Credentials, for themselves
Edit an overrideAny overrideOnly their own
Delete an overrideAny overrideOnly their own

Which MCP servers support Auth Overrides

Auth Override availability depends on the MCP server’s outbound authentication mode. Use the table below to check whether your server supports overrides and who can add them.
Outbound auth (MCP server)Override supportWho can add the override
API Key — Individual CredentialsSupportedManagers (for any subject) and users (for themselves)
API Key — Shared CredentialsComing soon
OAuth2 — Authorization CodeSupportedManagers only
OAuth2 — Client CredentialsComing soon
Token PassthroughNot supported
No AuthNot applicable
For details on configuring API Key authentication with Shared or Individual Credentials, see the Getting Started guide.

Whose authentication can be overridden

When an override is supported, it can be applied to one of the following subjects on the MCP server:
SubjectOverride supportWho can add the override
TrueFoundry userSupportedManagers (any user) or the user themselves
Virtual accountSupportedManagers only
Identity Provider tokenComing soon

How Auth Overrides work at runtime

When a user makes a request through the Gateway to an MCP server with Auth Overrides configured:
  1. The Gateway authenticates the user (inbound authentication).
  2. The Gateway checks if an Auth Override exists for this user on this MCP server.
  3. If an override exists: The Gateway injects the user’s override credentials into the request (template substitution for Individual, or full Authorization value when applicable).
  4. If no override exists: The Gateway uses the server’s default credentials (for Shared Credentials) or returns an error (for Individual Credentials).
For MCP servers configured with Individual Credentials, users without an Auth Override will not be able to use the server until an override is created for them.

Effect of outbound auth changes on existing overrides

When an MCP Server Manager changes the server’s outbound auth configuration, existing overrides may be deleted, preserved, or invalidated depending on the kind of change.

Switching outbound auth mode

Before (current outbound auth)After (new outbound auth)Effect on existing overrides
API Key — IndividualAPI Key — SharedDeleted. Shared mode does not use per-user overrides.
API Key — SharedAPI Key — IndividualN/A — Shared mode had no overrides. Each user must add their own override before they can use the server.
API Key (any)OAuth2 (any)Deleted. API Key headers and OAuth2 tokens are incompatible storage formats.
OAuth2 (any)API Key (any)Deleted. Same reason — incompatible storage formats.
OAuth2 — Authorization CodeOAuth2 — Client CredentialsDeleted. Per-user OAuth tokens are not used in the Client Credentials flow.
OAuth2 — Client CredentialsOAuth2 — Authorization CodeN/A. Client Credentials does not store per-user overrides. Each user must complete OAuth consent before they can use the server.
Any modeToken Passthrough or No AuthDeleted. Neither destination mode uses per-user overrides.
Token Passthrough or No AuthAny modeN/A. No overrides existed.

Tweaking settings within the same mode

ChangeEffect on existing overrides
Renaming the {{...}} placeholder in an API Key — Individual template (e.g., {{API_KEY}}{{TOKEN}})Preserved. The override stores the raw value; it is substituted into the new placeholder name automatically.
Changing the client_id / client_secret for an OAuth2 serverPreserved but invalidated. Existing OAuth tokens were issued by the old OAuth app registration; users will hit McpAuthRequiredError on the next request and must re-complete OAuth consent.
After a change that deletes overrides, affected users (or the Manager on their behalf) need to add the override again before they can use the server.