Who can access your
MCP server?
Right now: anyone with the URL. TLSMCP adds mTLS so only approved clients can connect. No certificate = no TCP handshake. Drop-in proxy, no code changes.
The problem with MCP today
Anyone can connect
MCP servers have no native access control. If someone knows the URL, they're in.
API keys aren't enough
Keys can be stolen from logs, env vars, or intercepted. Attackers can still probe your endpoints.
No visibility
You can't see who's connecting, when, or whether unauthorized access attempts are being made.
tlsmcp proxy \
--bundle ./certs \
--listen 8443 \
--upstream localhost:3000
How TLSMCP works
Drop-in proxy. No changes to your MCP server code.
What you get
Server Authenticated TLS (HTTPS) + mTLS access control. Free to start.
Server Authenticated TLS (HTTPS)
TLS 1.3 only. Authenticated Encryption with Associated Data (AEAD) ciphers. No weak configurations. No downgrade attacks possible.
Mutual TLS (mTLS)
Both client and server authenticate with certificates. No certificate = no connection.
Certificate Management
Issue, rotate, and revoke certificates via Cyphers Hub. No PKI expertise required.
Connection Auditing
Every connection logged. Who connected, when, with which certificate. SIEM-ready.
Zero Trust Ready
Never trust, always verify. Every connection authenticated at the transport layer.
Drop-in Proxy
No code changes to your MCP server. TLSMCP proxy sits in front and handles TLS.
Free vs Pro
Same security. Different scale.
Free
Get started with Server Authenticated TLS (HTTPS) + mTLS
- Server Authenticated TLS (HTTPS) (TLS 1.3, Authenticated Encryption with Associated Data (AEAD))
- mTLS with 5 client certificates
- 2 server certificates
- 2 endpoints
- Basic revocation checking
- Cyphers Hub access
Pro
Scale + compliance for production
Everything in Free, plus:
- Unlimited client certificates
- Unlimited server certificates
- Unlimited endpoints
- FIPS 140-3 mode
- Certificate pinning
- Hard-fail revocation
- SIEM export (JSON, CEF, Syslog)
Technical docs at tlsmcp.com
Control who connects to your MCP server.
5 minutes to set up. Free tier includes Server Authenticated TLS (HTTPS) + 5 client certificates.