MCP Gateway
Connect Claude to all MSP tools through a single hosted gateway at
mcp.wyre.ai. No Docker, no config files — just add one URL and authenticate.
How It Works
- Add the unified gateway URL as an MCP server in Claude Code or Claude Desktop (see below)
- Claude initiates a single OAuth 2.1 + PKCE flow — a browser window opens
- Log in or sign up, then connect your vendor API credentials via the web UI
- The gateway validates your credentials, then encrypts and stores them (AES-256-GCM)
- All vendors are available through the single connection — tool names are prefixed with the vendor (e.g.,
autotask__list_tickets)
Supported Vendors
All vendors below are available through the unified endpoint at
https://mcp.wyre.ai/v1/mcp. You only need to connect the vendors
you use — the gateway automatically discovers which vendors you have credentials for.
| Vendor | Tool Prefix |
|---|---|
| Autotask PSA | autotask__ |
| Datto RMM | datto-rmm__ |
| IT Glue | itglue__ |
| Syncro MSP | syncro__ |
| Atera | atera__ |
| SuperOps.ai | superops__ |
| HaloPSA | halopsa__ |
| ConnectWise PSA | connectwise-psa__ |
| ConnectWise Automate | connectwise-automate__ |
| NinjaOne | ninjaone__ |
| Liongard | liongard__ |
| SalesBuildr | salesbuildr__ |
| Pax8 | pax8__ |
| SentinelOne | sentinelone__ |
| Huntress | huntress__ |
| RocketCyber | rocketcyber__ |
| Blumira | blumira__ |
| Microsoft 365 | m365__ |
Claude Code (CLI)
One command adds the gateway to Claude Code. Run this in your terminal — no config files to edit:
Add for all projects (recommended)
Use --scope user to make the gateway available in every Claude Code session on this machine:
claude mcp add --scope user --transport http msp-mcp-gateway https://mcp.wyre.ai/v1/mcp Add for the current project only
Omit --scope to scope the gateway to the current project (writes to .mcp.json in the project root):
claude mcp add --transport http msp-mcp-gateway https://mcp.wyre.ai/v1/mcp On first use, Claude Code will open a browser for OAuth authentication. After signing in, connect your vendor credentials at mcp.wyre.ai — all connected vendors are then available automatically.
Verify the install
claude mcp list
You should see msp-mcp-gateway in the list. To remove it later, run
claude mcp remove msp-mcp-gateway.
Manual .mcp.json alternative
If you prefer to manage config by hand, add this to .mcp.json in your project root:
// .mcp.json (in your project root) — manual alternative
{
"mcpServers": {
"msp-mcp-gateway": {
"type": "http",
"url": "https://mcp.wyre.ai/v1/mcp"
}
}
} Claude Desktop
Claude Desktop setup has two parts. Do both — each one is required.
- Install the plugin via the Cowork marketplace — provides skills, slash commands, and MSP domain knowledge
- Add the MCP gateway server — the live API connection that lets Claude read and write in your MSP tools
Part 1: Install the Plugin via the Cowork Marketplace
The plugin gives Claude Desktop the MSP skills and slash commands (e.g. /search-tickets,
/create-ticket). Add it from the Cowork marketplace UI:
- Click the Cowork icon in the bottom-left of Claude Desktop
- Click the + button
- Click Plugins
- Click Add Plugin
- Click Personal
- Click the + button
- Click Add marketplace from Github
- Enter the repo owner/URL:
wyre-technology/msp-claude-plugins - Click Sync — all plugin skills and commands are now installed
Part 2: Add the MCP Gateway Server
Pick one of the two options below — you only need to do this once.
Option A: Connectors UI (easiest — no CLI, no config files)
If you're on Claude Pro, Team, or Enterprise, add the gateway directly from Claude Desktop's built-in Connectors UI:
- Open Claude Desktop → Settings → Connectors
- Click Add Connector (or Add custom connector)
- Name it
MSP Gateway(or anything you like) - Remote MCP server URL:
https://mcp.wyre.ai/v1/mcp - Click Add, then complete the OAuth login in the browser that opens
After OAuth completes, connect your vendor credentials at mcp.wyre.ai. All connected vendors become available immediately.
Option B: Manual Configuration
Add a single entry to your claude_desktop_config.json that connects to all vendors at once.
Older Claude Desktop builds use stdio-based transports, so the remote gateway requires the
mcp-remote
bridge:
// claude_desktop_config.json
{
"mcpServers": {
"msp-mcp-gateway": {
"command": "npx",
"args": ["-y", "mcp-remote", "https://mcp.wyre.ai/v1/mcp"]
}
}
} That's it — one entry for all vendors. On first use, a browser will open for OAuth authentication. After that, add your vendor credentials via the gateway web UI at mcp.wyre.ai.
Config File Location
| Operating System | Path |
|---|---|
| macOS | ~/Library/Application Support/Claude/claude_desktop_config.json |
| Windows | %APPDATA%\Claude\claude_desktop_config.json |
| Linux | ~/.config/Claude/claude_desktop_config.json |
Requires Node.js 18+. The npx -y mcp-remote command downloads the bridge automatically on first run.
If the file doesn't exist yet, create it with the JSON content above. Restart Claude Desktop after editing.
Claude.ai (Web)
Claude Pro, Team, and Enterprise users can connect the gateway directly from claude.ai — no config files or CLI needed:
- Click Customize in the left sidebar
- Click Connectors
- Click the + button, then Add custom connector
- Enter a name (e.g.
MSP Gateway) - Enter the Remote MCP server URL:
https://mcp.wyre.ai/v1/mcp - Click Add, then complete the OAuth login flow when prompted
After setup, all your connected vendors are available immediately in any conversation.
Per-Vendor Endpoints (Legacy)
The per-vendor endpoints (/v1/{vendor}/mcp) are still available but deprecated.
They require a separate OAuth flow and config entry for each vendor, which can cause connection
timeouts when multiple flows run simultaneously. We recommend migrating to the unified endpoint above.
Show per-vendor configuration examples
Claude Code (per-vendor)
// .mcp.json — per-vendor (legacy)
{
"mcpServers": {
"autotask": { "url": "https://mcp.wyre.ai/v1/autotask/mcp" },
"datto-rmm": { "url": "https://mcp.wyre.ai/v1/datto-rmm/mcp" }
}
} Claude Desktop (per-vendor)
// claude_desktop_config.json — per-vendor (legacy)
{
"mcpServers": {
"autotask": {
"command": "npx",
"args": ["-y", "mcp-remote", "https://mcp.wyre.ai/v1/autotask/mcp"]
},
"datto-rmm": {
"command": "npx",
"args": ["-y", "mcp-remote", "https://mcp.wyre.ai/v1/datto-rmm/mcp"]
}
}
} Security
- OAuth 2.1 + PKCE — industry-standard authentication with mandatory code challenge
- AES-256-GCM encryption — credentials encrypted at rest with per-user key derivation (PBKDF2, 100k iterations, SHA-512)
- Refresh token rotation — old tokens revoked on every use
- No credential exposure — vendor API keys never leave the gateway; injected as HTTP headers on the internal network
Local Alternative
If you prefer to keep credentials on your own machine, you can run individual MCP servers locally instead of using the hosted gateway. See the deployment guide for Docker, npx, and MCPB bundle options.