Back to Infrastructure
infrastructureL2 GuidedMCP & Tool Integration

Basic tool authorization

Basic tool authorization is the first deliberate access control layer on MCP tool usage: decisions about which agents can call which tools, under what conditions.

  • ·1-3 MCP servers are configured (e.g., Git, Jira, documentation)
  • ·MCP setup is documented but configured manually per developer
  • ·Basic tool authorization is implemented (agents authenticate to MCP servers)
  • ·MCP server configurations are shared via repository (not local-only)
  • ·At least one MCP server provides internal documentation or codebase context

Evidence

  • ·MCP server configuration files (mcp.json or equivalent)
  • ·Setup documentation for MCP server installation per developer
  • ·MCP server authentication configuration

What It Is

Basic tool authorization is the first deliberate access control layer on MCP tool usage: decisions about which agents can call which tools, under what conditions. At L1 (Zero MCP), authorization is moot - there are no tools to authorize. At L2 with 1-3 MCP servers, basic authorization means establishing read-only versus read-write boundaries, scoping tool access to the relevant data (one Jira project, not all Jira projects), and requiring human approval for any tool call that can modify or delete data.

The most important basic authorization decision is read vs. write. Read-only MCP tools carry minimal risk: an agent that can read your git history, your Jira tickets, and your documentation cannot cause damage with those tools. Write-capable tools are categorically different: a tool that can create Jira tickets, push git commits, or send Slack messages can cause real problems if called incorrectly. Basic tool authorization separates these categories explicitly, usually by starting with read-only tools and adding write tools incrementally with explicit human approval steps.

Claude Code implements basic authorization through its permission model. When an agent wants to use a tool, Claude Code can be configured to require human confirmation for specific tool types - particularly any tool that modifies external state. This "human-in-the-loop for writes" pattern is the correct starting point for basic authorization: the agent can read freely, but every write requires a human to click "approve." As trust in the agent's judgment increases for specific operations, those operations can be moved to auto-approved.

Basic tool authorization also includes scoping: configuring each MCP server to expose only the data relevant to the current context. A Jira MCP server configured with a global admin token has access to every ticket in the organization. That's a much larger attack surface than a server configured with a read-only token scoped to a single project. Even at the basic level, applying the principle of least privilege to MCP tool configuration reduces risk significantly.

Why It Matters

  • Prevents the most common MCP accidents - write-capable tools called incorrectly can create junk tickets, push incomplete code, or trigger unwanted notifications; basic read/write separation prevents these accidents without blocking read access
  • Establishes the security posture before scaling - it's much easier to design authorization correctly for 3 servers than to retrofit it onto 30 servers; getting the pattern right at L2 pays compounding security dividends
  • Creates the trust ladder for agent autonomy - basic authorization with human approval for writes is the starting point; as the team observes agent behavior and builds confidence, specific write operations can be promoted to auto-approved incrementally
  • Satisfies initial compliance requirements - many organizations have data governance policies that require access controls on systems that handle sensitive data; basic MCP authorization is the minimum viable compliance posture
  • Makes tool behavior auditable - even basic authorization, when combined with logging, creates a record of what tools were called by which agents and when; this audit trail is the foundation for more sophisticated governance at L4

Getting Started

6 steps to get from here to the next level

Common Pitfalls

Mistakes teams actually make at this stage - and how to avoid them

How Different Roles See It

B
BobHead of Engineering

Bob's team has just deployed their first write-capable MCP tool: an agent can now create Jira comments to summarize its work. One developer accidentally approved a tool call that created 15 comments on 15 different tickets because the agent misinterpreted the task scope. The comments are harmless but embarrassing, and Bob wants to prevent similar incidents.

What Bob should do - role-specific action plan

S
SarahProductivity Lead

Sarah is trying to quantify the risk-benefit tradeoff for giving agents write access to developer tools. She knows write access dramatically expands what agents can do autonomously, but she's getting pushback from the security team who want evidence that the authorization model is sound.

What Sarah should do - role-specific action plan

V
VictorStaff Engineer - AI Champion

Victor wants to move to a more automated workflow where agents can push commits and create PRs without requiring his approval for every operation. He's confident in his ability to review agent output, but he knows the team's current basic authorization model requires approval for all writes.

What Victor should do - role-specific action plan