# Introducing MCP Tool ACLs in Kong AI Gateway 3.13: Fine-Grained Authorization for AI Agent Tools
Greg Peranich
Staff Product Manager, Kong
Michael Field
Principal, Technical Product Marketing Manager, Kong
Kong AI Gateway 3.13 introduces **MCP Tool ACLs**, a powerful feature that enables fine-grained authorization and granular security policies for individual AI agent tools, solving the 'all-or-nothing' access problem.
The evolution of AI agents and autonomous systems has created new challenges for enterprise organizations. While securing API endpoints is well-understood, controlling access to individual AI agent tools presents a unique authorization problem. Today, we're excited to announce a powerful solution to this challenge: **MCP Tool ACLs** in Kong AI Gateway 3.13.
## The authorization gap in AI agent architectures
Modern AI agents interact with external systems through the Model Context Protocol (MCP), accessing various tools and capabilities to accomplish their tasks. However, until now, organizations faced a binary choice: either grant full access to all tools exposed by an MCP server or deny access entirely. This all-or-nothing approach created significant security and governance challenges.
Consider a flight booking system: you might want developers to query flight data and retrieve booking details, but restrict the ability to actually book or delete flights to specific teams or applications. Traditional API authentication couldn't solve this problem at the tool level — you needed true authorization capabilities.
## What are MCP Tool ACLs?
MCP Tool ACLs (Access Control Lists) enable organizations to implement granular authorization policies that control which tools within an MCP server can be accessed by specific users, applications, or AI agents. This feature operates at the gateway layer, allowing you to:
- **Filter tools based on identity**: Different consumers receive different subsets of available tools based on their authenticated identity
- **Implement default-deny policies**: Start with zero access and explicitly grant permissions to specific tools
- **Leverage consumer groups**: Organize authorization policies using Kong's existing consumer group functionality
Maintain RESTful upstream APIs: Continue using standard REST APIs while exposing MCP interfaces at the gateway.
## How It Works: From OpenAPI to Secured MCP
One of the most powerful aspects of Kong AI Gateway is its ability to bootstrap an MCP interface from existing RESTful APIs. Here's how the complete workflow operates:
### **1. Start with Your Existing API**
Let's say you have a flight service API with several operations:
- GET flight data (all flights, by flight number, flight details)
- POST book new flights
- DELETE existing bookings
This API is defined in OpenAPI specification and works with standard REST clients.
### **2. Deploy the MCP Proxy Plugin**
Kong AI Gateway's MCP Proxy Plugin transforms your RESTful API into an MCP-compatible interface. Incoming requests from AI agents, IDEs, or MCP inspectors use the MCP protocol, while Kong translates these to standard RESTful upstream requests.
### **3. Secure with OAuth2/OIDC**
Integration with authorization servers with the MCP OAuth2 plugin provides robust authentication, identifying the developer, application, or agent attempting to access your MCP server. The MCP OAuth2 plugin acts as an extension to OpenID Connect (OIDC), allowing for seamless integration with compliant identity providers. In our implementation, we use Okta as the identity provider, generating OAuth2 tokens that authenticate each connection.
### **4. Apply Tool-Level ACLs**
Here's where the magic happens. In your Kong configuration, you define a default ACL policy and then explicitly grant permissions:
This creates a default-deny policy where the `dev-team` consumer group is blocked from all tools by default. Then, for specific tools you want to expose:
tools: - description: Get KongAir planned flights
method: GET
path: /flights
acl: allow: - dev-team # Explicitly allow this tool
This approach ensures that only explicitly permitted tools are accessible. Tools without an allow ACL—like booking and deletion operations—remain blocked by the default policy.
### **5. Dynamic Tool Filtering**
When an MCP client connects and executes the tools/list RPC call, Kong intercepts the response from your upstream API and filters the tool list based on the authenticated user's permissions. Clients only see the tools they're authorized to use — they never even know about restricted tools.
## Real-world use cases
### **Developer Environment Separation**
Development teams can query production data and test integrations without risk of modifying critical records. QA teams receive read-write access to staging environments, while production write access remains restricted to specific service accounts.
### **Multi-Tenant SaaS Applications**
Different customers or tenants can access different subsets of tools from the same MCP server. A basic tier might access read-only tools, while premium tiers unlock advanced capabilities—all managed through declarative ACL policies.
### **AI Agent Safety Rails**
Deploy AI agents with confidence by limiting their tool access based on risk profiles. Customer-facing agents might only access retrieval tools, while internal agents receive broader permissions for automated workflows.
### **Compliance and Audit**
Organizations in regulated industries can enforce strict segregation of duties by ensuring that users who can query sensitive data cannot also modify or delete it—a common compliance requirement.
## Implementation example
Let's walk through a practical example using Kong's declarative configuration. We'll expose flight operations via MCP and give the development team read access while restricting booking and deletion operations.
This configuration integrates with your OAuth2 identity provider (Okta in this example) and validates the presented JWT Token.
The MCP OAuth2 plugin also offers RFC 8707 compliance, exposing a resource metadata endpoint. This allows MCP clients to discover the authorization server and resource location automatically.
**Step 3: Configure MCP Proxy with Tool-Level ACLs**
plugins:- name: ai-mcp-proxy
config: mode: conversion-listener
consumer_identifier: username
include_consumer_groups:true
# Default deny policy for all tools
default_acl: - allow:null deny: - dev-team
scope: tools
# Define tools with specific ACLs
tools: # Allow read operations for dev-team
- description: Get KongAir planned flights
method: GET
path: /flights
acl: allow: - dev-team
- description: Get a specific flight by flight number
method: GET
path: /flights/{flightNumber} acl: allow: - dev-team
- description: Fetch more details about a flight
method: GET
path: /flights/{flightNumber}/details
acl: allow: - dev-team
# No ACL allow for write operations - blocked by default_acl
- description: Book a flight
method: POST
path: /flights/{flightNumber}/bookings
request_body: required:true content: application/json: schema: type: object
properties: passenger_name: type: string
passenger_email: type: string
format: email
seat_preference: type: string
enum:[window, aisle, middle]
# No ACL allow for delete operations - blocked by default_acl
- description: Delete a flight booking
method: DELETE
path: /bookings/{bookingId}
**Understanding the ACL Logic**
The configuration above implements a default-deny approach:
-
The `default_acl` blocks all tools for the `dev-team` consumer group
-
Individual tools explicitly allow access by adding the `dev-team` to their `allow` list
-
Tools without explicit `allow` ACLs (like booking and deletion) remain blocked
-
This creates a secure-by-default posture where new tools are automatically restricted
**Step 4: Connect and Verify**
When developers authenticate via OAuth2 and connect their MCP client (such as the Insomnia MCP inspector), the `tools/list` call returns only the three GET operations. The POST and DELETE tools are completely filtered out—clients never see them in the available tools list.
## Technical architecture
The MCP Tool ACL feature integrates seamlessly with Kong's existing capabilities:
## **Better together: Insomnia + Kong AI Gateway as MCP trust layer**
Kong’s MCP support isn’t locked down to the AI Gateway. You can also use Kong Insomnia to inspect and test MCP workflows–and even test how certain AI Gateway policies work when used for MCP use cases.
**This content contains a video which can not be displayed in Agent mode**
## Looking ahead
MCP Tool ACLs represent a significant step forward in securing and governing AI agent architectures. As organizations increasingly deploy autonomous agents and agentic workflows, fine-grained authorization becomes not just a nice-to-have but a critical requirement.
We're excited to see how enterprises leverage this capability to build safer, more compliant AI systems. The combination of Kong's battle-tested API gateway capabilities with cutting-edge AI agent protocols creates a powerful foundation for the next generation of intelligent applications.
Ready to add fine-grained tool authorization to your AI agent infrastructure? Explore Kong AI Gateway 3.13 today and discover how MCP Tool ACLs can transform your approach to AI governance.
*For questions, feedback, or to share your implementation stories, connect with the Kong Community or reach out to our team. We're here to help you build secure, scalable AI agent systems.*
Claude Code is Anthropic's agentic coding and agent harness tool. Unlike traditional code-completion assistants that suggest the next line in an editor, Claude Code operates as an autonomous agent that reads entire codebases, edits files across mult
Agent-to-agent communication is the next frontier of AI infrastructure. As teams decompose monolithic AI workflows into specialized agents — a research agent, a booking agent, a summarization agent — the calls between those agents become as importa
Agents are ultimately decision makers. They make those decisions by combining intelligence with context, ultimately meaning they are only ever as useful as the context they can access. An agent that can't check inventory levels, look up customer his
The Shifting Economic Landscape: The AI token economy in 2026 is evolving, and enterprise leaders must distinguish between low-cost input tokens and high-premium output tokens to maintain profitability. Agentic AI Financial Risks: The transition t
When an organization deploys AI agents at scale, high uptime and low latency are an important baseline. However, Platform owners and business stakeholders could be flying blind on several fronts: The Insights Gap: Non-technical stakeholders have li
Kong Agent Gateway Is Here — And It Completes the AI Data Path
Kong Agent Gateway is a new capability within Kong AI Gateway that extends our platform to more robustly cover agent-to-agent (A2A) communication. With this release, Kong AI Gateway n
Managed Redis cache is a turnkey "Shared State" add-on for Kong Dedicated Cloud Gateways. It is designed to combine the performance of an in-memory data store with the simplicity of a SaaS product. When you spin up a Dedicated Cloud Gateway in Kong