Enterprise-grade security for MCP
Encrypted credential vault, team isolation, and role-based access control. The only MCP platform built for team security from day one.
Credentials Secured
47
AES-256-GCM encrypted
Team Members
12
3 admins, 9 users
Isolated Instances
84
Per-user processes
Credential Vault
EncryptedYour team shares MCP credentials.
Is that really secure?
DeployStack brings enterprise-grade security to MCP. Encrypted vault, team isolation, and role-based access control - without the enterprise complexity.
API keys in Slack, .env files, everywhere.
Credentials scattered across laptops, shared in DMs, copy-pasted between machines. When someone leaves, their access stays. No central control, no revocation.
Every developer sees every credential.
One shared config means everyone has access to everything. Junior devs see production database passwords. Contractors access customer data. No boundaries.
Employee leaves. Now what?
Which MCP servers did they configure? What credentials did they have? Where are those credentials now? You don't know, and you can't revoke what you can't find.
Compliance review coming. You're unprepared.
No encryption at rest, no access logs, no proof of controls. When auditors ask how you protect API credentials, you have no good answer.
Your team shares MCP credentials.
Is that really secure?
DeployStack brings enterprise-grade security to MCP. Encrypted vault, team isolation, and role-based access control - without the enterprise complexity.
Security that works for teams, not against them.
API keys in Slack, .env files, everywhere.
Credentials scattered across laptops, shared in DMs, copy-pasted between machines. When someone leaves, their access stays. No central control, no revocation.
Every developer sees every credential.
One shared config means everyone has access to everything. Junior devs see production database passwords. Contractors access customer data. No boundaries.
Employee leaves. Now what?
Which MCP servers did they configure? What credentials did they have? Where are those credentials now? You don't know, and you can't revoke what you can't find.
Compliance review coming. You're unprepared.
No encryption at rest, no access logs, no proof of controls. When auditors ask how you protect API credentials, you have no good answer.
No more credentials in Slack
All credentials encrypted with AES-256-GCM. Team credentials shared securely, personal credentials stay private. Secrets never appear in logs, UI, or API responses.
- AES-256-GCM encryption at rest
- Secrets masked as ***** in UI and API
- Team credentials vs. personal credentials
GitHub API access
Slack integration
Production database
Personal API key
Secrets decrypted only at runtime. Never exposed in API responses.
Team: DeployStack DevOps
GitHub MCP Server installed
alice@deploystack.io
github-acme-alice-abc123
bob@deploystack.io
github-acme-bob-abc123
charlie@deploystack.io
github-acme-charlie-abc123
Per-user isolation: Each team member gets their own MCP server process. Alice's tools don't see Bob's data. Charlie must complete config before access.
One installation, complete isolation
Each team member gets their own MCP server instance with isolated processes. OAuth-based authentication ensures users only access their own resources. No cross-user data leakage.
- OAuth-based team and user authentication
- Each user gets their own MCP server instance
- Complete process isolation per user
ProcessId format:{'{server}'}-{'{team}'}-{'{user}'}-{'{id}'}
Right access for the right people
Team Admin vs Team User roles. Admins manage servers and credentials. Users work within defined boundaries. Simple, effective RBAC.
Team Admin
Full team management
Team User
Use within boundaries
MCP Server Management
| Feature | Team Admin | Team User |
|---|---|---|
| Install MCP servers to team | Yes | No |
| Use installed MCP servers | Yes | Yes |
| Remove MCP servers from team | Yes | No |
Credentials
| Feature | Team Admin | Team User |
|---|---|---|
| Configure team credentials | Yes | No |
| View team credentials | Masked ***** | Masked ***** |
| Configure user credentials | Yes | Yes |
| View user credentials | Own only | Own only |
Team Management
| Feature | Team Admin | Team User |
|---|---|---|
| Add/remove team members | Yes | No |
| List team members | Yes | Yes |
| Override MCP team settings | Yes | No |
Visibility
| Feature | Team Admin | Team User |
|---|---|---|
| View team audit logs | Yes | No |
| View own usage metrics | Yes | Yes |
| View team analytics | Yes | No |
Feature comparison
Team Admin
Full team management
MCP Server Management
- Install MCP servers to team
- Yes
- Use installed MCP servers
- Yes
- Remove MCP servers from team
- Yes
Credentials
- Configure team credentials
- Yes
- View team credentials
- Masked *****
- Configure user credentials
- Yes
- View user credentials
- Own only
Team Management
- Add/remove team members
- Yes
- List team members
- Yes
- Override MCP team settings
- Yes
Visibility
- View team audit logs
- Yes
- View own usage metrics
- Yes
- View team analytics
- Yes
Team User
Use within boundaries
MCP Server Management
- Install MCP servers to team
- No
- Use installed MCP servers
- Yes
- Remove MCP servers from team
- No
Credentials
- Configure team credentials
- No
- View team credentials
- Masked *****
- Configure user credentials
- Yes
- View user credentials
- Own only
Team Management
- Add/remove team members
- No
- List team members
- Yes
- Override MCP team settings
- No
Visibility
- View team audit logs
- No
- View own usage metrics
- Yes
- View team analytics
- No
Three-Tier Configuration
Configuration flows from Template → Team → User, merging into the final MCP runtime
["-y", "@mcp/server-fs"]
PROTOCOL_VERSION=1.0
GITHUB_TOKEN=*****
SLACK_TOKEN=*****
["/home/alice/dev"]
DEBUG=true
command: "npx"
args: ["-y", "@mcp/server-fs", "/home/alice/dev"]
env: PROTOCOL_VERSION, GITHUB_TOKEN, SLACK_TOKEN, DEBUG
Per-user configuration within teams
Each team member receives their own MCP server instance with personalized settings. User A can configure Google search with 10 results while User B uses Bing with 20 results—both sharing the same team API credentials.
Secure credential sharing
Team credentials like API keys are encrypted and shared across all members, while personal credentials remain private. Users never see each other's individual settings or private tokens.
Complete process isolation
Every user gets a dedicated MCP server process with a unique instance ID. Configurations merge at runtime: template settings provide the foundation, team settings add shared credentials, and user settings personalize the experience.
Lock/unlock controls
Team admins decide which settings users can customize. Lock sensitive configurations to enforce standards, unlock personal preferences for flexibility. The perfect balance between governance and autonomy.
Secure your team's MCP usage today
Enterprise-grade security without the enterprise complexity. Free to start, no credit card required.