// building with ai · 3.3

MCP servers connect agents
to the real stack.

Synthwave integration hub with AI agent nodes connected to tools, files, databases, tickets, and approval gates through MCP server panels.

An MCP server is a controlled bridge between an AI agent and the systems it needs to use. Instead of hardcoding every tool connection into every agent, MCP gives the agent a standard way to discover tools, read context, and request actions. It does not make integrations safe by itself. You still need permissions, logging, approval gates, and a clear reason for every tool you expose.

What is an MCP server?

MCP stands for Model Context Protocol. An MCP server exposes tools, resources, and prompts to an AI client through a standard protocol. In business terms, it is a connector layer that lets an agent work with approved systems without inventing a new integration pattern every time.

What an MCP server actually does

An MCP server sits between an AI client and a system such as a database, ticket desk, file store, calendar, CRM, ecommerce platform, or internal app. The server describes what it can do, then handles requests from the agent.

That matters because agents become useful when they can see real context. A model with no tools can only respond from the text you paste. A model with controlled tools can look up an order, read a customer profile, summarize a document, or prepare a draft from current data.

MCP conceptPlain EnglishBusiness example
ToolAn action the agent can ask the server to perform.Look up an order, create a draft reply, search tickets.
ResourceContext the agent can read.A policy file, customer record, product catalog, or report.
PromptA reusable instruction pattern.Run the support-triage prompt on this ticket.
ClientThe AI app or agent environment.A desktop agent, internal dashboard, or workflow runner.
ServerThe connector that exposes approved capabilities.Your Shopify, helpdesk, Drive, or internal data connector.

Why MCP matters for business agents

Without a connector layer, every agent becomes a pile of custom API code. That can work for one prototype. It gets ugly when you have multiple agents, multiple tools, and different permission levels.

MCP helps by giving teams a common shape for integrations. The agent can ask what tools exist, what inputs they need, and what they return. The server can keep the business logic and credentials away from the model prompt.

It also helps with portability. If your agent client changes, the connector does not have to be rebuilt from scratch. That does not mean there is no work. It means the work has a better boundary.

Read tools should come before write tools

The safest first MCP servers are read-heavy. Let the agent search docs, pull customer context, inspect orders, check calendar availability, or fetch product information.

Write tools need more caution. Sending customer emails, issuing refunds, editing orders, publishing content, changing prices, or deleting records should sit behind approval gates. The server can expose the capability, but the workflow should decide when the action is allowed.

The MCP permission rule

Expose the smallest useful capability. Prefer read-only first. Add writes only when the workflow has logging, review, and a rollback plan.

What to put behind MCP

Good MCP candidates are systems the agent needs often and where a standard tool shape helps. They are not always public SaaS tools. Some of the best MCP servers wrap internal data, local files, or company-specific workflows.

What not to expose

Do not expose a raw database admin tool because it is convenient. Do not expose broad file-system access. Do not expose payment actions to an agent that has not earned that trust.

Also avoid tools with vague names like do_anything or run_sql. The tool name and input schema should make the allowed action obvious. If a human reviewer cannot understand the tool call, the tool is too loose.

Transport details without the fog

You will hear people talk about local and remote MCP servers. The business-level difference is simple: some servers run on the same machine as the client, and some run over a network boundary.

Local servers are useful for desktop workflows, file access, and developer tools. Remote servers are useful for shared business systems, cloud apps, and team workflows. Remote servers need stronger authentication, rate limits, monitoring, and secret handling.

The transport choice matters less than the boundary. Ask: where are the credentials, who can call the tool, what gets logged, and what can the tool change?

Security questions before shipping

MCP does not remove the need for security design. It gives you a cleaner place to put it.

  1. Which agent or user can call this server?
  2. Which tools are read-only and which can change state?
  3. Does the tool enforce permissions, or does it trust the prompt?
  4. What inputs are validated before hitting the real API?
  5. What is logged for audit?
  6. What action requires human approval?

A practical MCP rollout

Start with one server for one workflow. For example, a support agent gets a helpdesk read tool, an order lookup tool, and a draft-note tool. That is enough to prepare useful replies without giving it the send button.

Once the read tools are reliable, add one narrow write path. Maybe the agent can create an internal note, tag a ticket, or save a draft. Then measure correction rate and escalation quality before adding anything riskier.

The right MCP setup feels boring from the outside. The agent asks for context, gets a structured answer, prepares useful work, and leaves a trail.

MCP vs direct API calls

You do not need MCP for every integration. A single app with one model call and one private API can call that API directly. That may be simpler.

MCP earns its place when multiple agents, clients, or workflows need a shared connector. It also helps when the tool needs a discoverable schema, reusable resources, or a boundary between the agent environment and the underlying system.

The wrong reason to use MCP is fashion. The right reason is that the connector boundary reduces duplicate work and makes permissions easier to reason about.

A starter tool contract

Every tool should have a small contract a human can read. The contract should say what the tool does, what it can never do, required inputs, returned fields, error states, and whether it changes anything.

For example, lookup_order_status should return order number, customer email, fulfillment status, tracking link, delivery status, and last update time. It should not edit the order. It should not refund the order. It should not guess if the record is missing.

That boring contract is what lets the agent use the tool safely. It also makes debugging easier when the model output is wrong.

Operational gotchas

MCP servers are still software. They can go down, hit rate limits, return stale data, or expose too much if the boundary is sloppy.

Set timeouts. Return clear errors. Avoid dumping huge records when the agent needs three fields. Keep secrets inside the server, not inside prompts. Log calls with enough detail to audit behavior without leaking sensitive data everywhere.

When a tool fails, the agent should say the tool failed and stop or route to a human. It should not invent the missing result.

Authentication and tenancy

For a personal desktop workflow, a local MCP server may use the user's existing machine context. For a business system, that is not enough. The server needs to know who is calling, what organization they belong to, and which actions they are allowed to request.

Do not rely on the model to enforce tenancy. The server should enforce it. If the agent asks for another client's records, the server should refuse before any data reaches the model.

Multi-client or multi-brand setups need extra care. Tool calls should include the organization or workspace context, and the server should validate that context against the authenticated caller.

Observability for MCP tools

At minimum, log tool name, caller, timestamp, input shape, success or failure, latency, and a safe summary of the result. Do not log secrets or full sensitive payloads unless there is a real reason and a retention policy.

Track rate limits and stale reads. A support agent that relies on stale order data can create bad replies even if the model follows the prompt perfectly.

For write tools, log the approval chain too. Who approved the action, what draft they saw, what changed, and what external system was updated?

A good MCP server feels small

The best MCP server does not expose the whole business. It exposes the exact capabilities one or more agents need to do a controlled job.

That might be five tools and three resources. It might be less. The goal is a clean interface, not a giant menu of every API endpoint the vendor offers.

If the agent needs more context later, add a specific capability with a reason. Do not preemptively expose the kitchen sink.

How to turn this into a project brief

If this topic is moving from article to build, write the project brief before picking tools. The brief should fit on one page. If it cannot, the scope is probably still too wide.

Use five fields: workflow, owner, sources, allowed actions, and proof. The workflow names the repeat job. The owner names the human reviewer. The sources name the systems and documents the agent may trust. The allowed actions name what the agent can read, draft, update, or never touch. The proof names the metric that decides whether the build worked.

This keeps the build tied to business work. Agents fail when they become an abstract technology project. They work when the job, reviewer, sources, permissions, and proof are clear before code starts.

Frequently asked questions

What is an MCP server?

An MCP server is a connector that exposes tools, resources, and prompts to an AI client through the Model Context Protocol. It helps agents work with approved systems in a standard way.

Is MCP the same as an API?

No. An API is a system interface. MCP is a protocol that lets AI clients discover and use tools, resources, and prompts exposed by a server. MCP servers often wrap normal APIs.

Do I need MCP for every AI agent?

No. Simple agents can use direct API calls or no tools at all. MCP becomes useful when several agents or clients need a common integration layer.

Are MCP servers safe?

They can be safe if permissions, authentication, logging, input validation, and approval gates are designed well. MCP is a protocol, not a security policy by itself.

What should my first MCP server expose?

Start with read-only context for one workflow: documents, orders, tickets, customer records, or product data. Add write tools only after the agent proves reliable.

Key takeaways

Related reading

Need agents connected without handing them the keys?

The intake shows us which tools your agents need, which ones should stay read-only, and where approval gates belong before anything touches customers or money.

Start the intake →