Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,7 @@ At its core, an MCP registry is a set of HTTPS endpoints that serve details abou
* Publish your own custom implementation.

> [!NOTE]
> If you want your developers to have access to local MCP servers, include those servers in your registry with the correct server ID. For more information, see [AUTOTITLE](/copilot/reference/mcp-allowlist-enforcement).
> If you want your developers to have access to local MCP servers, include those servers in your registry with the correct server name/ID, description and version. For more information, see [AUTOTITLE](/copilot/reference/mcp-allowlist-enforcement).
To create a valid MCP registry that is reachable by {% data variables.product.prodname_copilot %}, the registry must meet the following requirements:
* [Endpoint and specification requirements](#endpoint-and-specification-requirements)
Expand Down
2 changes: 1 addition & 1 deletion content/copilot/reference/mcp-allowlist-enforcement.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ contentType: reference

MCP allowlist enforcement currently has the following limitations:

* Enforcement is based only on server name/ID matching, which can be bypassed by editing configuration files
* Enforcement is based only on server name/ID, description and version matching, which can be bypassed by editing configuration files
* Strict enforcement that prevents installation of non-registry servers is not yet available

For the highest level of security, you can **disable MCP servers in {% data variables.product.prodname_copilot_short %}** until strict enforcement is available.
Expand Down
Loading