Skip to main content

Create a private tool catalog (preview)

This feature is currently in public preview. This preview is provided without a service-level agreement, and we don’t recommend it for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see Supplemental Terms of Use for Microsoft Azure Previews.
Create a private tool catalog so developers in your organization can discover, configure, and use MCP server tools through Foundry Tools. A private tool catalog uses Azure API Center to register organization-scoped tools that only your developers can access.

Prerequisites

The API Center name is the name that developers use to find the catalog in Foundry Tools. Use a descriptive name.

Plan administrator and developer access

Before you create the catalog, decide who manages it and who consumes it.
GoalWhoWhereWhat to do
Create and manage the tool catalogCatalog adminsAzure API CenterCreate the API Center resource, register MCP servers, and (optionally) configure authorization settings.
Discover tools from the private catalogDevelopersAzure API Center (RBAC)Assign access so developers can view the registered MCP servers.
Configure and use toolsDevelopersFoundry projectConfirm developers can access the Foundry project and can configure tools in Foundry Tools.

Configure MCP server authentication

If your remote MCP server requires authentication, configure the authentication settings in Azure API Center. This step is optional if your MCP server doesn’t require authentication.
  1. In the Azure portal, go to your API Center resource.
  2. Select Governance > Authorization.
Screenshot that shows the Governance menu expanded with the Authorization option selected in Azure API Center.
  1. Select Add configuration.
  2. Under Security scheme, choose the scheme required by your MCP server (for example, API Key, OAuth, or HTTP bearer token), then provide the required values.
Treat any credentials as secrets. Don’t paste secrets into prompts or source control. For guidance on authentication approaches in Agent Service (including shared and per-user authentication), see MCP server authentication.
  1. Select the MCP server, then select Details > Versions > Manage access (preview).
Screenshot that shows the Versions page with the Manage access option for configuring authorization in Azure API Center.
  1. Select the authorization configuration you created.
After you complete these steps, the MCP server is configured to use the selected authentication scheme when developers invoke it from Foundry Tools.

Grant developer access to the catalog

Assign Azure RBAC permissions so developers can discover MCP servers from your private tool catalog in Foundry Tools.
  1. Decide whether to grant access to a security group or to individual users.
  2. Assign at least the Azure API Center Data Reader role (or an equivalent custom role) to those users.
Role assignments can take up to 24 hours to propagate. If developers don’t see the catalog immediately, wait and try again.

Verify catalog discovery in Foundry Tools

After you grant access, confirm that developers can find and use the catalog in the Foundry portal.
  1. In the Foundry portal, open the project that your developers use.
  2. Go to Build > Tools.
  3. Use search and filters to find your private tool catalog by the API Center name.
  4. Select a tool from the catalog and review its setup requirements.
If the catalog appears and displays your registered MCP servers, the configuration is complete. To add an MCP server tool to an agent, see Connect to Model Context Protocol servers.

Troubleshoot private tool catalog issues

If you encounter problems setting up or using your private tool catalog, use the following table to identify and resolve common issues.
IssueCauseResolution
The private tool catalog doesn’t appear in Foundry Tools.You don’t have access to the API Center resource, or you’re in the wrong Foundry project.Confirm you have the Azure API Center Data Reader role assignment. Then confirm you’re in the expected Foundry project and go to Build > Tools.
The catalog appears, but you can’t configure a tool.The tool requires authentication or configuration values you don’t have.Review the tool’s setup requirements, then ask a catalog admin for the required access. For MCP authentication options, see MCP server authentication.
Tool calls fail after configuration.Authentication is incorrect, expired, or not supported by the MCP server.Re-check the authentication method required by the MCP server, and validate the credential format. For guidance, see MCP server authentication.
The catalog doesn’t appear after role assignment.Azure RBAC role assignments can take up to 24 hours to propagate.Wait up to 24 hours and try again. If the issue persists, verify the role assignment in the Azure portal under Access control (IAM).
MCP server shows as unavailable.The MCP server URL changed, or the server is offline.Verify the MCP server endpoint is accessible. Update the server registration in API Center if the URL changed.
OAuth authentication prompts repeatedly.Token expiration or consent not granted.Ensure users grant consent when prompted. For long-running sessions, tokens might expire. Re-authenticate through the tool configuration.
Discover and manage tools in the Foundry tool catalog Connect to Model Context Protocol servers