Introducing MCP Tool ACLs in Kong AI Gateway 3.13: Fine-Grained Authorization for AI Agent Tools
Greg Peranich
Staff Product Manager, Kong
Michael Field
Principal, Technical Product Marketing Manager, Kong
Kong AI Gateway 3.13 introduces MCP Tool ACLs, a powerful feature that enables fine-grained authorization and granular security policies for individual AI agent tools, solving the 'all-or-nothing' access problem.
The evolution of AI agents and autonomous systems has created new challenges for enterprise organizations. While securing API endpoints is well-understood, controlling access to individual AI agent tools presents a unique authorization problem. Today, we're excited to announce a powerful solution to this challenge: MCP Tool ACLs in Kong AI Gateway 3.13.
The authorization gap in AI agent architectures
Modern AI agents interact with external systems through the Model Context Protocol (MCP), accessing various tools and capabilities to accomplish their tasks. However, until now, organizations faced a binary choice: either grant full access to all tools exposed by an MCP server or deny access entirely. This all-or-nothing approach created significant security and governance challenges.
Consider a flight booking system: you might want developers to query flight data and retrieve booking details, but restrict the ability to actually book or delete flights to specific teams or applications. Traditional API authentication couldn't solve this problem at the tool level — you needed true authorization capabilities.
What are MCP Tool ACLs?
MCP Tool ACLs (Access Control Lists) enable organizations to implement granular authorization policies that control which tools within an MCP server can be accessed by specific users, applications, or AI agents. This feature operates at the gateway layer, allowing you to:
Filter tools based on identity: Different consumers receive different subsets of available tools based on their authenticated identity
Implement default-deny policies: Start with zero access and explicitly grant permissions to specific tools
Leverage consumer groups: Organize authorization policies using Kong's existing consumer group functionality
Maintain RESTful upstream APIs: Continue using standard REST APIs while exposing MCP interfaces at the gateway.
How It Works: From OpenAPI to Secured MCP
One of the most powerful aspects of Kong AI Gateway is its ability to bootstrap an MCP interface from existing RESTful APIs. Here's how the complete workflow operates:
1. Start with Your Existing API
Let's say you have a flight service API with several operations:
GET flight data (all flights, by flight number, flight details)
POST book new flights
DELETE existing bookings
This API is defined in OpenAPI specification and works with standard REST clients.
2. Deploy the MCP Proxy Plugin
Kong AI Gateway's MCP Proxy Plugin transforms your RESTful API into an MCP-compatible interface. Incoming requests from AI agents, IDEs, or MCP inspectors use the MCP protocol, while Kong translates these to standard RESTful upstream requests.
3. Secure with OAuth2/OIDC
Integration with authorization servers with the MCP OAuth2 plugin provides robust authentication, identifying the developer, application, or agent attempting to access your MCP server. The MCP OAuth2 plugin acts as an extension to OpenID Connect (OIDC), allowing for seamless integration with compliant identity providers. In our implementation, we use Okta as the identity provider, generating OAuth2 tokens that authenticate each connection.
4. Apply Tool-Level ACLs
Here's where the magic happens. In your Kong configuration, you define a default ACL policy and then explicitly grant permissions:
This creates a default-deny policy where the dev-team consumer group is blocked from all tools by default. Then, for specific tools you want to expose:
tools: - description: Get KongAir planned flights
method: GET
path: /flights
acl: allow: - dev-team # Explicitly allow this tool
This approach ensures that only explicitly permitted tools are accessible. Tools without an allow ACL—like booking and deletion operations—remain blocked by the default policy.
5. Dynamic Tool Filtering
When an MCP client connects and executes the tools/list RPC call, Kong intercepts the response from your upstream API and filters the tool list based on the authenticated user's permissions. Clients only see the tools they're authorized to use — they never even know about restricted tools.
Real-world use cases
Developer Environment Separation
Development teams can query production data and test integrations without risk of modifying critical records. QA teams receive read-write access to staging environments, while production write access remains restricted to specific service accounts.
Multi-Tenant SaaS Applications
Different customers or tenants can access different subsets of tools from the same MCP server. A basic tier might access read-only tools, while premium tiers unlock advanced capabilities—all managed through declarative ACL policies.
AI Agent Safety Rails
Deploy AI agents with confidence by limiting their tool access based on risk profiles. Customer-facing agents might only access retrieval tools, while internal agents receive broader permissions for automated workflows.
Compliance and Audit
Organizations in regulated industries can enforce strict segregation of duties by ensuring that users who can query sensitive data cannot also modify or delete it—a common compliance requirement.
Implementation example
Let's walk through a practical example using Kong's declarative configuration. We'll expose flight operations via MCP and give the development team read access while restricting booking and deletion operations.
This configuration integrates with your OAuth2 identity provider (Okta in this example) and validates the presented JWT Token.
The MCP OAuth2 plugin also offers RFC 8707 compliance, exposing a resource metadata endpoint. This allows MCP clients to discover the authorization server and resource location automatically.
Step 3: Configure MCP Proxy with Tool-Level ACLs
plugins:- name: ai-mcp-proxy
config: mode: conversion-listener
consumer_identifier: username
include_consumer_groups:true
# Default deny policy for all tools
default_acl: - allow:null deny: - dev-team
scope: tools
# Define tools with specific ACLs
tools: # Allow read operations for dev-team
- description: Get KongAir planned flights
method: GET
path: /flights
acl: allow: - dev-team
- description: Get a specific flight by flight number
method: GET
path: /flights/{flightNumber} acl: allow: - dev-team
- description: Fetch more details about a flight
method: GET
path: /flights/{flightNumber}/details
acl: allow: - dev-team
# No ACL allow for write operations - blocked by default_acl
- description: Book a flight
method: POST
path: /flights/{flightNumber}/bookings
request_body: required:true content: application/json: schema: type: object
properties: passenger_name: type: string
passenger_email: type: string
format: email
seat_preference: type: string
enum:[window, aisle, middle]
# No ACL allow for delete operations - blocked by default_acl
- description: Delete a flight booking
method: DELETE
path: /bookings/{bookingId}
Understanding the ACL Logic
The configuration above implements a default-deny approach:
The default_acl blocks all tools for the dev-team consumer group
Individual tools explicitly allow access by adding the dev-team to their allow list
Tools without explicit allow ACLs (like booking and deletion) remain blocked
This creates a secure-by-default posture where new tools are automatically restricted
Step 4: Connect and Verify
When developers authenticate via OAuth2 and connect their MCP client (such as the Insomnia MCP inspector), the tools/list call returns only the three GET operations. The POST and DELETE tools are completely filtered out—clients never see them in the available tools list.
Technical architecture
The MCP Tool ACL feature integrates seamlessly with Kong's existing capabilities:
Better together: Insomnia + Kong AI Gateway as MCP trust layer
Kong’s MCP support isn’t locked down to the AI Gateway. You can also use Kong Insomnia to inspect and test MCP workflows–and even test how certain AI Gateway policies work when used for MCP use cases.
Looking ahead
MCP Tool ACLs represent a significant step forward in securing and governing AI agent architectures. As organizations increasingly deploy autonomous agents and agentic workflows, fine-grained authorization becomes not just a nice-to-have but a critical requirement.
We're excited to see how enterprises leverage this capability to build safer, more compliant AI systems. The combination of Kong's battle-tested API gateway capabilities with cutting-edge AI agent protocols creates a powerful foundation for the next generation of intelligent applications.
Ready to add fine-grained tool authorization to your AI agent infrastructure? Explore Kong AI Gateway 3.13 today and discover how MCP Tool ACLs can transform your approach to AI governance.
For questions, feedback, or to share your implementation stories, connect with the Kong Community or reach out to our team. We're here to help you build secure, scalable AI agent systems.
Claude Code is Anthropic's agentic coding and agent harness tool. Unlike traditional code-completion assistants that suggest the next line in an editor, Claude Code operates as an autonomous agent that reads entire codebases, edits files across mult
Alex Drag
From APIs to Agentic Integration: Introducing Kong Context Mesh
Agents are ultimately decision makers. They make those decisions by combining intelligence with context, ultimately meaning they are only ever as useful as the context they can access. An agent that can't check inventory levels, look up customer his
Alex Drag
AI Input vs. Output: Why Token Direction Matters for AI Cost Management
The Shifting Economic Landscape: The AI token economy in 2026 is evolving, and enterprise leaders must distinguish between low-cost input tokens and high-premium output tokens to maintain profitability. Agentic AI Financial Risks: The transition t
Dan Temkin
Model Context Protocol (MCP) Security: How to Restrict Tool Access Using AI Gateways
MCP servers expose all tools by default. There are two problems with this: security (agents get capabilities they shouldn't have) and performance (too many tools degrade LLM tool selection). The solution? Put a gateway between agents and MCP server
Deepak Grewal
Agentic AI Governance: Managing Shadow AI and Risk for Competitive Advantage
Why Risk Management Will Separate Agentic AI Winners from Agentic AI Casualties
Let's be honest about what's happening inside most enterprises right now. Development teams are under intense pressure to ship AI features. The mandate from leadership
Alex Drag
Kong Simplifies Multicloud Cloud Gateways with Managed Redis Cache
Managed Redis cache is a turnkey "Shared State" add-on for Kong Dedicated Cloud Gateways. It is designed to combine the performance of an in-memory data store with the simplicity of a SaaS product. When you spin up a Dedicated Cloud Gateway in Kong
Amit Shah
Building the Agentic AI Developer Platform: A 5-Pillar Framework
The first pillar is enablement. Developers need tools that reduce friction when building AI-powered applications and agents. This means providing: Native MCP support for connecting agents to enterprise tools and data sources SDKs and frameworks op
Alex Drag
Ready to see Kong in action?
Get a personalized walkthrough of Kong's platform tailored to your architecture, use cases, and scale requirements.