MCP Gateway

Connect Claude to all MSP tools through a single hosted gateway at mcp.wyre.ai. No Docker, no config files — just add one URL and authenticate.

How It Works

  1. Add the unified gateway URL as an MCP server in Claude Code or Claude Desktop (see below)
  2. Claude initiates a single OAuth 2.1 + PKCE flow — a browser window opens
  3. Log in or sign up, then connect your vendor API credentials via the web UI
  4. The gateway validates your credentials, then encrypts and stores them (AES-256-GCM)
  5. All vendors are available through the single connection — tool names are prefixed with the vendor (e.g., autotask__list_tickets)

Supported Vendors

All vendors below are available through the unified endpoint at https://mcp.wyre.ai/v1/mcp. You only need to connect the vendors you use — the gateway automatically discovers which vendors you have credentials for.

VendorTool Prefix
Autotask PSAautotask__
Datto RMMdatto-rmm__
IT Glueitglue__
Syncro MSPsyncro__
Ateraatera__
SuperOps.aisuperops__
HaloPSAhalopsa__
ConnectWise PSAconnectwise-psa__
ConnectWise Automateconnectwise-automate__
NinjaOneninjaone__
Liongardliongard__
SalesBuildrsalesbuildr__
Pax8pax8__
SentinelOnesentinelone__
Huntresshuntress__
RocketCyberrocketcyber__
Blumirablumira__
Microsoft 365m365__

Claude Code (CLI)

One command adds the gateway to Claude Code. Run this in your terminal — no config files to edit:

Add for all projects (recommended)

Use --scope user to make the gateway available in every Claude Code session on this machine:

claude mcp add --scope user --transport http msp-mcp-gateway https://mcp.wyre.ai/v1/mcp

Add for the current project only

Omit --scope to scope the gateway to the current project (writes to .mcp.json in the project root):

claude mcp add --transport http msp-mcp-gateway https://mcp.wyre.ai/v1/mcp

On first use, Claude Code will open a browser for OAuth authentication. After signing in, connect your vendor credentials at mcp.wyre.ai — all connected vendors are then available automatically.

Verify the install

claude mcp list

You should see msp-mcp-gateway in the list. To remove it later, run claude mcp remove msp-mcp-gateway.

Manual .mcp.json alternative

If you prefer to manage config by hand, add this to .mcp.json in your project root:

// .mcp.json (in your project root) — manual alternative
{
  "mcpServers": {
    "msp-mcp-gateway": {
      "type": "http",
      "url": "https://mcp.wyre.ai/v1/mcp"
    }
  }
}

Claude Desktop

Claude Desktop setup has two parts. Do both — each one is required.

  1. Install the plugin via the Cowork marketplace — provides skills, slash commands, and MSP domain knowledge
  2. Add the MCP gateway server — the live API connection that lets Claude read and write in your MSP tools

Part 1: Install the Plugin via the Cowork Marketplace

The plugin gives Claude Desktop the MSP skills and slash commands (e.g. /search-tickets, /create-ticket). Add it from the Cowork marketplace UI:

  1. Click the Cowork icon in the bottom-left of Claude Desktop
  2. Click the + button
  3. Click Plugins
  4. Click Add Plugin
  5. Click Personal
  6. Click the + button
  7. Click Add marketplace from Github
  8. Enter the repo owner/URL:
    wyre-technology/msp-claude-plugins
  9. Click Sync — all plugin skills and commands are now installed

Part 2: Add the MCP Gateway Server

Pick one of the two options below — you only need to do this once.

Option A: Connectors UI (easiest — no CLI, no config files)

If you're on Claude Pro, Team, or Enterprise, add the gateway directly from Claude Desktop's built-in Connectors UI:

  1. Open Claude Desktop → SettingsConnectors
  2. Click Add Connector (or Add custom connector)
  3. Name it MSP Gateway (or anything you like)
  4. Remote MCP server URL: https://mcp.wyre.ai/v1/mcp
  5. Click Add, then complete the OAuth login in the browser that opens

After OAuth completes, connect your vendor credentials at mcp.wyre.ai. All connected vendors become available immediately.

Option B: Manual Configuration

Add a single entry to your claude_desktop_config.json that connects to all vendors at once. Older Claude Desktop builds use stdio-based transports, so the remote gateway requires the mcp-remote bridge:

// claude_desktop_config.json
{
  "mcpServers": {
    "msp-mcp-gateway": {
      "command": "npx",
      "args": ["-y", "mcp-remote", "https://mcp.wyre.ai/v1/mcp"]
    }
  }
}

That's it — one entry for all vendors. On first use, a browser will open for OAuth authentication. After that, add your vendor credentials via the gateway web UI at mcp.wyre.ai.

Config File Location

Operating SystemPath
macOS~/Library/Application Support/Claude/claude_desktop_config.json
Windows%APPDATA%\Claude\claude_desktop_config.json
Linux~/.config/Claude/claude_desktop_config.json

Requires Node.js 18+. The npx -y mcp-remote command downloads the bridge automatically on first run. If the file doesn't exist yet, create it with the JSON content above. Restart Claude Desktop after editing.

Claude.ai (Web)

Claude Pro, Team, and Enterprise users can connect the gateway directly from claude.ai — no config files or CLI needed:

  1. Click Customize in the left sidebar
  2. Click Connectors
  3. Click the + button, then Add custom connector
  4. Enter a name (e.g. MSP Gateway)
  5. Enter the Remote MCP server URL: https://mcp.wyre.ai/v1/mcp
  6. Click Add, then complete the OAuth login flow when prompted

After setup, all your connected vendors are available immediately in any conversation.

Per-Vendor Endpoints (Legacy)

The per-vendor endpoints (/v1/{vendor}/mcp) are still available but deprecated. They require a separate OAuth flow and config entry for each vendor, which can cause connection timeouts when multiple flows run simultaneously. We recommend migrating to the unified endpoint above.

Show per-vendor configuration examples

Claude Code (per-vendor)

// .mcp.json — per-vendor (legacy)
{
  "mcpServers": {
    "autotask": { "url": "https://mcp.wyre.ai/v1/autotask/mcp" },
    "datto-rmm": { "url": "https://mcp.wyre.ai/v1/datto-rmm/mcp" }
  }
}

Claude Desktop (per-vendor)

// claude_desktop_config.json — per-vendor (legacy)
{
  "mcpServers": {
    "autotask": {
      "command": "npx",
      "args": ["-y", "mcp-remote", "https://mcp.wyre.ai/v1/autotask/mcp"]
    },
    "datto-rmm": {
      "command": "npx",
      "args": ["-y", "mcp-remote", "https://mcp.wyre.ai/v1/datto-rmm/mcp"]
    }
  }
}

Security

  • OAuth 2.1 + PKCE — industry-standard authentication with mandatory code challenge
  • AES-256-GCM encryption — credentials encrypted at rest with per-user key derivation (PBKDF2, 100k iterations, SHA-512)
  • Refresh token rotation — old tokens revoked on every use
  • No credential exposure — vendor API keys never leave the gateway; injected as HTTP headers on the internal network

Local Alternative

If you prefer to keep credentials on your own machine, you can run individual MCP servers locally instead of using the hosted gateway. See the deployment guide for Docker, npx, and MCPB bundle options.