1. What the Glean MCP Server Is
The Glean MCP server is a managed, remote implementation of the Model Context Protocol (MCP) that exposes Glean’s permission-aware enterprise context as standard MCP tools (e.g.,search, chat, read_document, and selected agents).
Instead of building and operating their own MCP servers, customers point MCP-compatible hosts at Glean-managed endpoints such as:
2. Deployment and Hosting Model
2.1 Customer-isolated tenants
Glean is deployed as a dedicated tenant per customer, in its own cloud project/VPC. All standard ingestion, indexing, and query processing takes place inside that tenant. The remote MCP server:- Is deployed within the customer’s existing Glean tenant (customer VPC / project)
- Reuses the same infrastructure and security boundaries (networking, encryption, IAM, auditing) as Glean search and assistant
- Presents one or more per-server URLs (e.g.,
…/mcp/default,…/mcp/chatgpt,…/mcp/eng) that admins can create and configure via the Glean Admin Console
2.2 Remote MCP: The production deployment model
Glean’s remote MCP server is the recommended and supported deployment model for all production use cases, accessed over HTTPS from MCP hosts (ChatGPT, Claude, VS Code, etc.) and officially supported by Glean for major MCP hosts.3. Identity, Authentication, and Authorization
The Glean MCP server never bypasses Glean’s native identity or permission model. It acts as a thin protocol adapter that:- Authenticates the end user or client via Glean OAuth or API tokens
- Maps that identity to a Glean user in the customer’s tenant
- Executes MCP tool calls as that user via Glean’s APIs and Knowledge Graph
3.1 Supported authentication methods
MCP servers support the following authentication methods, in order of preference:Glean OAuth Authorization Server (Recommended)
IdP-based OAuth
3.2 Authorization and permission enforcement
Once authenticated, the MCP server executes all tools as that specific user, with enforcement at multiple layers:Knowledge Graph-level ACLs
Knowledge Graph-level ACLs
Scope-based API Access
Scope-based API Access
No Cross-tenant Access
No Cross-tenant Access
4. Data Flow and Residency
4.1 High-level data flow
For a remote MCP request (e.g., Claude asking Glean toread_document):
MCP Host → Glean MCP Endpoint
https://{customer-instance}-be.glean.com/mcp/{server} using TLS 1.2+.The request includes an OAuth token or API token bound to a user in the customer tenant.Within the Customer's Glean Tenant
search, chat, read_document, etc.) exactly as if the user had called Glean directly via API or UI.Response Back to Host
4.2 Where customer data lives
All indexed content, permissions, embeddings, and query processing occur inside the customer’s Glean tenant (their cloud project/VPC). The remote MCP server runs within that same environment, so tool invocations and intermediate results also remain inside the tenant boundary.4.3 Data sent to MCP hosts
The MCP server only sends data that the user is already allowed to see (snippets, metadata, full documents viaread_document), and only in response to explicit tool calls from the MCP host.
Once data reaches the host, it is subject to that host’s own data processing and retention policies. From a data handling perspective, connecting an MCP host to Glean is equivalent to any application that consumes Glean’s APIs.
5. Permissions and Tool Behavior
5.1 Permission-aware tools
Each MCP tool enforces permissions per the model in Section 3.2:| Tool | Permission Behavior |
|---|---|
search | Returns only items the user can already access in Glean |
read_document | Can only fetch documents the user may open directly |
| People, org, and code tools | Respect underlying directory, HR, and repo permissions |
5.2 Scope and least privilege
Admins can choose which tools to expose on each MCP server. Access from MCP hosts is controlled via OAuth client configuration (including client IDs, secrets, and redirect URI restrictions) at the tenant level, and applies across all servers rather than being configured per server. Typical patterns:General-purpose Server
/mcp/default) with read-heavy tools like search and document retrieval.Persona-specific Servers
/mcp/eng, /mcp/sales) with tools tailored to a team’s workflows.6. Compliance, Privacy, and Data Protection
Remote MCP servers inherit Glean’s platform-level guarantees:- Covered under Glean’s Data Processing Addendum (DPA) and standard contractual controls
- Built on top of the same infrastructure that underpins Glean’s SOC-aligned security program and regional data residency posture
- Subject to the same user session management capabilities (e.g., admins can sign users out of all sessions, including MCP-originated sessions, via the Glean Admin UI)
- Enterprise features such as regional data residency, multi-region HA, and OAuth / IdP integration apply uniformly to MCP endpoints
7. FAQ for Security / Architecture Reviews
Q1. Does confidential data leave our cloud boundary when using the Glean remote MCP server?
Q1. Does confidential data leave our cloud boundary when using the Glean remote MCP server?
Q2. Does Glean MCP introduce any new permission model?
Q2. Does Glean MCP introduce any new permission model?
Q3. How is the user authenticated from ChatGPT/Claude/VS Code into Glean?
Q3. How is the user authenticated from ChatGPT/Claude/VS Code into Glean?
- OAuth, often with Dynamic Client Registration (preferred), or
- User-scoped Client API tokens (fallback where OAuth is not yet supported)
Q4. Can the MCP server access or exfiltrate data the user isn't allowed to see?
Q4. Can the MCP server access or exfiltrate data the user isn't allowed to see?
Q5. Should we prefer remote or local MCP from a security standpoint?
Q5. Should we prefer remote or local MCP from a security standpoint?
Additional Resources
For additional detail, see:- About Glean MCP Servers – Product overview, supported hosts, authentication, and high-level security notes
- Data Flow – Full platform data flow, ingestion, and processing model
- Glean OAuth Authorization Server – Detailed review of Glean OAuth Authorization Server
Appendix: Local MCP Servers
What is local MCP?
Some MCP implementations use thestdio transport, which runs an MCP server locally on a user’s machine. This is typically done by dynamically invoking a package using npx, which downloads, installs, and executes the MCP Node package’s default binary.
Security concerns with local MCP
Local MCP servers introduce security risks that do not apply to Glean’s remote MCP:| Risk | Description |
|---|---|
| Supply chain vulnerabilities | npm packages are subject to attacks such as package jacking, where a threat actor takes control of a legitimate package to distribute malicious code. |
| Full local privileges | The MCP server inherits the full privileges of the local OS, including file system access, network access, and stored credentials. |
| No centralized controls | Local servers operate outside of Glean’s authentication, authorization, monitoring, and compliance controls. |
Glean’s guidance
- Always prefer remote MCP for production workloads and when connecting SaaS hosts like ChatGPT or Claude
- Treat local MCP as development-only, and only when there is no remote MCP server available and additional local security controls are in place
- Note: Some SaaS hosts (e.g., ChatGPT) cannot reliably use local MCP at all