Claude Setup
Use this page to connect Claude-compatible MCP clients to Zerq.
Recommended topology
- Use Gateway MCP for runtime API tooling.
- Use Management MCP only for controlled platform automation identities.
Connection requirements
Gateway MCP
- Endpoint:
https://api.example.com/mcp - Required headers:
Authorization,X-Client-ID,X-Profile-ID
Management MCP
- Endpoint:
https://api.example.com/api/v1/mcp - Required header:
Authorization(OIDC bearer token)
Desktop MCP config (Claude)
If you use Claude Desktop, configure MCP servers in your desktop config JSON and restart the app after saving.
Template:
{
"mcpServers": {
"zerq-gateway": {
"url": "https://api.example.com/mcp",
"transport": "streamableHttp",
"headers": {
"Authorization": "Bearer <GATEWAY_TOKEN_OR_JWT>",
"X-Client-ID": "<CLIENT_ID>",
"X-Profile-ID": "<PROFILE_ID>"
}
},
"zerq-management": {
"url": "https://api.example.com/api/v1/mcp",
"transport": "streamableHttp",
"headers": {
"Authorization": "Bearer <OIDC_ACCESS_TOKEN>"
}
}
}
}
Notes:
- Do not send
X-Client-ID/X-Profile-IDto management MCP. - Use separate entries for staging and production.
- Keep tokens out of git-tracked files.
Protocol sequence
Claude-side MCP traffic must follow:
initializetools/listtools/call(orprompts/list/prompts/getfor management MCP)
Always propagate Mcp-Session-Id after initialize.
Validation checklist
initializesucceeds (200) and returns session header.tools/listreturns only expected tools.- Out-of-scope call returns
403. - Missing/expired auth returns
401.
Security controls
- Separate identities for read-only and mutating automations.
- Restrict management roles to required minimum (
viewerormodifier; keepadminisolated). - Apply ingress controls for concurrency spikes.