{
"mcpServers": {
"mock-mcp-server": {
"command": "<see-readme>",
"args": []
}
}
}No install config available. Check the server's README for setup instructions.
Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
mock mcp server hosted on azure functions
Is it safe?
No package registry to scan.
No authentication — any process on your machine can connect.
License not specified.
Is it maintained?
Last commit 55 days ago.
Will it work with my client?
Transport: stdio. Works with Claude Desktop, Cursor, Claude Code, and most MCP clients.
No automated test available for this server. Check the GitHub README for setup instructions.
No known vulnerabilities.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationHave you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
MCP Server for GCP environment for interacting with various Observability APIs.
MCP Server for kubernetes management commands
Model Context Protocol (MCP) server for Kubernetes and OpenShift
The power of Claude Code / GeminiCLI / CodexCLI + [Gemini / OpenAI / OpenRouter / Azure / Grok / Ollama / Custom Model / All Of The Above] working as one.
MCP Security Weekly
Get CVE alerts and security updates for Mock Mcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A mock MCP (Model Context Protocol) proxy server with two-part authentication, SSE notifications, and CIMD-based client identity. Built as a .NET 8 ASP.NET Core app. Models a real-world architecture where an MCP proxy authenticates clients via CIMD (AAD App #1) and internally authenticates to a backend MCP server via a separate AAD app (App #2).
VS Code (MCP Client)
│
├─ CIMD OAuth ──→ AAD App #1 ──→ proxy token
│
├─ tools/list ──→ [discover_tools only]
│
├─ tools/call discover_tools ──→ elicitation URL
│ │
│ └─ User opens browser → /backend-auth/login
│ → Entra login (AAD App #2)
│ → Backend tokens stored server-side
│ → "Success, close window"
│
├─ tools/list ──→ [full tools list]
│
└─ tools/call echo ──→ proxy uses stored backend token internally
/.well-known/oauth-protected-resource/oauth/authorize → /oauth/token)tools/list returns only discover_toolsdiscover_tools → receives elicitation URLtools/list returns full tools and tools/call works| Method | Route | Description |
|--------|-------|-------------|
| GET | /.well-known/oauth-protected-resource | Protected Resource Metadata (PRM) |
| GET | /.well-known/oauth-authorization-server | OAuth Authorization Server Metadata |
| GET | /oauth/authorize | OAuth authorization endpoint (CIMD) |
| GET | /oauth/callback | Entra ID callback (proxy auth) |
| POST | /oauth/token | OAuth token endpoint (proxy auth) |
| GET/POST | /mcp | MCP JSON-RPC endpoint |
| GET | /backend-auth/login | Start backend auth (AAD App #2) |
| GET | /backend-auth/callback | Backend auth callback |
| GET | /backend-auth/status | Check backend auth status |
| GET | /cimd-policy | Current CIMD policy configuration |
| GET/POST | /backend/mcp | Backend MCP server (JSON-RPC + SSE) |
initialize - Returns server capabilitiestools/list - Returns available tools (expands after consent)tools/call - Executes a tool call (echo, get_weather, calculate)resources/list - Returns available resources (empty)prompts/list - Returns available prompts (empty)After backend auth completes, the proxy needs to receive server-initiated notifications from the backend MCP server. The BackendSseManager acts as an in-process SSE sidecar:
initialize (proxy token)GET /backend/mcp (backend token)McpServer.NotifyClient() → written to client SSEIn production, the sidecar would be a separate Azure Container App per environment, keeping backend SSE connections off APIM.
Set MCP_AUTH_MODE in local.settings.json:
| Mode | Description |
|------|-------------|
| mock (default) | No external calls. Auth codes and tokens generated locally. Good for offline testing. |
| entra | Real Azure AD integration. Redirects to Entra ID for user authentication. Requires AAD app registration. |
Set MCP_AUTH_STRATEGY in local.settings.json:
| Strategy | Description |
|----------|-------------|
| cimd (default) | Proxy acts as its own OAuth Authorization S