Blog
  • AI Gateway
  • AI Security
  • AIOps
  • API Security
  • API Gateway
|
    • API Management
    • API Development
    • API Design
    • Automation
    • Service Mesh
    • Insomnia
    • View All Blogs
  1. Home
  2. Blog
  3. Product Releases
  4. Introducing MCP Tool ACLs in Kong AI Gateway 3.13: Fine-Grained Authorization for AI Agent Tools
Product Releases
January 14, 2026
5 min read

Introducing MCP Tool ACLs in Kong AI Gateway 3.13: Fine-Grained Authorization for AI Agent Tools

Greg Peranich
Staff Product Manager, Kong
Michael Field
Principal, Technical Product Marketing Manager, Kong

Kong AI Gateway 3.13 introduces MCP Tool ACLs, a powerful feature that enables fine-grained authorization and granular security policies for individual AI agent tools, solving the 'all-or-nothing' access problem.


The evolution of AI agents and autonomous systems has created new challenges for enterprise organizations. While securing API endpoints is well-understood, controlling access to individual AI agent tools presents a unique authorization problem. Today, we're excited to announce a powerful solution to this challenge: MCP Tool ACLs in Kong AI Gateway 3.13.

The authorization gap in AI agent architectures

Modern AI agents interact with external systems through the Model Context Protocol (MCP), accessing various tools and capabilities to accomplish their tasks. However, until now, organizations faced a binary choice: either grant full access to all tools exposed by an MCP server or deny access entirely. This all-or-nothing approach created significant security and governance challenges.

Consider a flight booking system: you might want developers to query flight data and retrieve booking details, but restrict the ability to actually book or delete flights to specific teams or applications. Traditional API authentication couldn't solve this problem at the tool level — you needed true authorization capabilities.

What are MCP Tool ACLs?

MCP Tool ACLs (Access Control Lists) enable organizations to implement granular authorization policies that control which tools within an MCP server can be accessed by specific users, applications, or AI agents. This feature operates at the gateway layer, allowing you to:

  • Filter tools based on identity: Different consumers receive different subsets of available tools based on their authenticated identity
  • Implement default-deny policies: Start with zero access and explicitly grant permissions to specific tools
  • Leverage consumer groups: Organize authorization policies using Kong's existing consumer group functionality

Maintain RESTful upstream APIs: Continue using standard REST APIs while exposing MCP interfaces at the gateway.

How It Works: From OpenAPI to Secured MCP

One of the most powerful aspects of Kong AI Gateway is its ability to bootstrap an MCP interface from existing RESTful APIs. Here's how the complete workflow operates:

1. Start with Your Existing API

Let's say you have a flight service API with several operations:

  • GET flight data (all flights, by flight number, flight details)
  • POST book new flights
  • DELETE existing bookings

This API is defined in OpenAPI specification and works with standard REST clients.

2. Deploy the MCP Proxy Plugin

Kong AI Gateway's MCP Proxy Plugin transforms your RESTful API into an MCP-compatible interface. Incoming requests from AI agents, IDEs, or MCP inspectors use the MCP protocol, while Kong translates these to standard RESTful upstream requests.

3. Secure with OAuth2/OIDC

Integration with authorization servers with the MCP OAuth2 plugin provides robust authentication, identifying the developer, application, or agent attempting to access your MCP server. The MCP OAuth2 plugin acts as an extension to OpenID Connect (OIDC), allowing for seamless integration with compliant identity providers. In our implementation, we use Okta as the identity provider, generating OAuth2 tokens that authenticate each connection.

4. Apply Tool-Level ACLs

Here's where the magic happens. In your Kong configuration, you define a default ACL policy and then explicitly grant permissions:

This creates a default-deny policy where the dev-team consumer group is blocked from all tools by default. Then, for specific tools you want to expose:

This approach ensures that only explicitly permitted tools are accessible. Tools without an allow ACL—like booking and deletion operations—remain blocked by the default policy.

5. Dynamic Tool Filtering

When an MCP client connects and executes the tools/list RPC call, Kong intercepts the response from your upstream API and filters the tool list based on the authenticated user's permissions. Clients only see the tools they're authorized to use — they never even know about restricted tools.



Real-world use cases

Developer Environment Separation

Development teams can query production data and test integrations without risk of modifying critical records. QA teams receive read-write access to staging environments, while production write access remains restricted to specific service accounts.

Multi-Tenant SaaS Applications

Different customers or tenants can access different subsets of tools from the same MCP server. A basic tier might access read-only tools, while premium tiers unlock advanced capabilities—all managed through declarative ACL policies.

AI Agent Safety Rails

Deploy AI agents with confidence by limiting their tool access based on risk profiles. Customer-facing agents might only access retrieval tools, while internal agents receive broader permissions for automated workflows.

Compliance and Audit

Organizations in regulated industries can enforce strict segregation of duties by ensuring that users who can query sensitive data cannot also modify or delete it—a common compliance requirement.

Implementation example

Let's walk through a practical example using Kong's declarative configuration. We'll expose flight operations via MCP and give the development team read access while restricting booking and deletion operations.

Step 1: Configure the Service and Route

Step 2: Add MCP OAuth2

This configuration integrates with your OAuth2 identity provider (Okta in this example) and validates the presented JWT Token.

The MCP OAuth2 plugin also offers RFC 8707 compliance, exposing a resource metadata endpoint. This allows MCP clients to discover the authorization server and resource location automatically.

Step 3: Configure MCP Proxy with Tool-Level ACLs

Understanding the ACL Logic

The configuration above implements a default-deny approach:

  1. The default_acl blocks all tools for the dev-team consumer group

  2. Individual tools explicitly allow access by adding the dev-team to their allow list

  3. Tools without explicit allow ACLs (like booking and deletion) remain blocked

  4. This creates a secure-by-default posture where new tools are automatically restricted

Step 4: Connect and Verify

When developers authenticate via OAuth2 and connect their MCP client (such as the Insomnia MCP inspector), the tools/list call returns only the three GET operations. The POST and DELETE tools are completely filtered out—clients never see them in the available tools list.

Technical architecture

The MCP Tool ACL feature integrates seamlessly with Kong's existing capabilities:

  • Authentication layer: MCP OAuth2 plugin handles OAuth2 introspection and JWT validation
  • Identity resolution: Authenticated principals are mapped to Kong consumers and consumer groups
  • Authorization enforcement: MCP Proxy Plugin evaluates ACL policies against the consumer's group memberships
  • Response filtering: Tool lists are dynamically filtered before being returned to clients
  • Audit logging: All access attempts and tool invocations are logged for compliance

Getting started

MCP Tool ACLs are available now in Kong AI Gateway 3.13. To start using this feature:

  1. Update your Kong Gateway to version 3.13 or later
  2. Configure the MCP Proxy Plugin with your OpenAPI specification
  3. Define your ACL policies using declarative configuration
  4. Set up authentication using the OpenID Connect plugin
  5. Map users to consumer groups based on your organizational structure

For detailed documentation and configuration examples, visit the Kong AI Gateway 3.13 release notes and the MCP Proxy Plugin documentation.

Better together: Insomnia + Kong AI Gateway as MCP trust layer

Kong’s MCP support isn’t locked down to the AI Gateway. You can also use Kong Insomnia to inspect and test MCP workflows–and even test how certain AI Gateway policies work when used for MCP use cases.

Looking ahead

MCP Tool ACLs represent a significant step forward in securing and governing AI agent architectures. As organizations increasingly deploy autonomous agents and agentic workflows, fine-grained authorization becomes not just a nice-to-have but a critical requirement.

We're excited to see how enterprises leverage this capability to build safer, more compliant AI systems. The combination of Kong's battle-tested API gateway capabilities with cutting-edge AI agent protocols creates a powerful foundation for the next generation of intelligent applications.

Ready to add fine-grained tool authorization to your AI agent infrastructure? Explore Kong AI Gateway 3.13 today and discover how MCP Tool ACLs can transform your approach to AI governance.

For questions, feedback, or to share your implementation stories, connect with the Kong Community or reach out to our team. We're here to help you build secure, scalable AI agent systems.

Unleash the power of APIs with Kong Konnect

Learn MoreGet a Demo
AI GatewayMCPAgentic AIGovernanceAI Security

Table of Contents

  • The authorization gap in AI agent architectures
  • What are MCP Tool ACLs?
  • How It Works: From OpenAPI to Secured MCP
  • Real-world use cases
  • Implementation example
  • Technical architecture
  • Getting started

More on this topic

Videos

Agentic AI at Scale: AI Gateway + MCP Governance

eBooks

The AI Connectivity Playbook: How to Build, Govern & Scale AI

See Kong in action

Accelerate deployments, reduce vulnerabilities, and gain real-time visibility. 

Get a Demo
Topics
AI GatewayMCPAgentic AIGovernanceAI Security
Share on Social
Greg Peranich
Staff Product Manager, Kong
Michael Field
Principal, Technical Product Marketing Manager, Kong

Recommended posts

The AI Governance Wake-Up Call

Kong Logo
EnterpriseDecember 12, 2025

Companies are charging headfirst into AI, with research around agentic AI in the enterprise finding as many as 9 out of 10 organizations are actively working to adopt AI agents.  LLMs are being deployed, agentic workflows are getting created left

Taylor Hendricks

Move More Agentic Workloads to Production with AI Gateway 3.13

Kong Logo
Product ReleasesDecember 18, 2025

MCP ACLs, Claude Code Support, and New Guardrails New providers, smarter routing, stronger guardrails — because AI infrastructure should be as robust as APIs We know that successful AI connectivity programs often start with an intense focus on how

Greg Peranich

Make MCP Production-Ready: Introducing Kong’s Enterprise MCP Gateway

Kong Logo
Product ReleasesOctober 14, 2025

What does the solution space look like so far? The solution landscape is complicated by the fact that MCP is still finding its footing, and there are many various OSS projects and vendors that are rapidly shipping “MCP support” in an attempt to take

Alex Drag

New MCP Support Across the Entire Konnect Platform

Kong Logo
Product ReleasesOctober 14, 2025

Bridging the API (and API access) gap between AI coding tools, agents, and the APIs that they “eat” Data might be the fuel for AI. But APIs are the proper way to package that “fuel” as AI-ready “food” is through the API. AI coding tools can do a lot

Alex Drag

AI Guardrails: Ensure Safe, Responsible, Cost-Effective AI Integration

Kong Logo
EngineeringAugust 25, 2025

Why AI guardrails matter It's natural to consider the necessity of guardrails for your sophisticated AI implementations. The truth is, much like any powerful technology, AI requires a set of protective measures to ensure its reliability and integrit

Jason Matis

PII Sanitization Needed for LLMs and Agentic AI is Now Easier to Build

Kong Logo
EnterpriseApril 2, 2025

LLMs are powerful, but not inherently privacy-aware LLMs operate as highly capable, non-deterministic pattern matchers. But they come with two significant privacy challenges: They don’t automatically distinguish between sensitive and non-sensitive

Alex Drag

AI Agent with Strands SDK, Kong AI/MCP Gateway & Amazon Bedrock

Kong Logo
EngineeringJanuary 12, 2026

In one of our posts, Kong AI/MCP Gateway and Kong MCP Server technical breakdown, we described the new capabilities added to Kong AI Gateway to support MCP (Model Context Protocol). The post focused exclusively on consuming MCP server and MCP tool

Jason Matis

Ready to see Kong in action?

Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.

Get a Demo
Powering the API world

Increase developer productivity, security, and performance at scale with the unified platform for API management, AI gateways, service mesh, and ingress controller.

Sign up for Kong newsletter

    • Platform
    • Kong Konnect
    • Kong Gateway
    • Kong AI Gateway
    • Kong Insomnia
    • Developer Portal
    • Gateway Manager
    • Cloud Gateway
    • Get a Demo
    • Explore More
    • Open Banking API Solutions
    • API Governance Solutions
    • Istio API Gateway Integration
    • Kubernetes API Management
    • API Gateway: Build vs Buy
    • Kong vs Postman
    • Kong vs MuleSoft
    • Kong vs Apigee
    • Documentation
    • Kong Konnect Docs
    • Kong Gateway Docs
    • Kong Mesh Docs
    • Kong AI Gateway
    • Kong Insomnia Docs
    • Kong Plugin Hub
    • Open Source
    • Kong Gateway
    • Kuma
    • Insomnia
    • Kong Community
    • Company
    • About Kong
    • Customers
    • Careers
    • Press
    • Events
    • Contact
    • Pricing
  • Terms
  • Privacy
  • Trust and Compliance
  • © Kong Inc. 2026