DeployGet started

Connect Deploy MCP to Your Identity Provider

Deploy MCP relies on your existing enterprise identity platform—Okta, Azure AD, Ping, Google Workspace, or any other OIDC-compliant IdP. There is no embedded identity stack to maintain; instead, you supply the client credentials and issuer metadata so authentication stays under your control.

Creating an OIDC secret

Store the credentials from your IdP in a Kubernetes secret:

apiVersion: v1
kind: Secret
metadata:
  name: oidc-credentials
type: Opaque
data:
  client_id: <base64_encoded_client_id>
  client_secret: <base64_encoded_client_secret>
  issuer_url: <base64_encoded_issuer_url>

Integrating Single Sign On

Reference the secret from the Deploy MCP custom resource so the operator wires the configuration into every MCP service:

apiVersion: deploy-mcp.com/v1
kind: Deploy MCP
metadata:
  name: deploy-mcp
  namespace: deploy-mcp 
spec:

  ...
  
  # Single Sign ON
  sso-secret: oidc-credentials

  ...