How enterprises are deploying the middleware layer
H1 - Heading
H2 - Heading
H3 - Heading
Paragraph - 18px - Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Paragraph - 16px - Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Paragraph - 14px - Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Paragraph - 12px - Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Chapter - 1
Workstation
Laptop / Desktop
Agent
IDE / Desktop Client
MCP Client
The internal MCP server
Internal MCP Server
Shared
Key property
Not for single entity access
Internal Network / Cloud Boundary
Employee Directory
HR Data
MCP Client
No Identity Context
Local assumption vs reality
Thought: âonly I run this agent.â Reality: many users can reach a shared server.
Internal MCP Server
Blind to Who
No user identity
Requests carry no authenticated user identity or cryptographically verifiable claims.
Trust assumption
If a request is inside the network, it is treated as safe.
CRM System
getCustomer / updateAccountStatus
Employee Tools
lookupEmployee
No authorization boundary
No distinction between read vs write, intern vs manager, sandbox vs production.
Identity Provider
Auth Service
User Token (JWT)
sub, roles, scopes
Developer / Support
alice@company
MCP Client
Identity Carrier
Works broadly
Supports IDEs and headless clients using token-based flows
Internal MCP Server
Identity & Policy Engine
Authorization Layer
Roles & Scopes
No implicit network trust
Decisions depend on who the user is, not where the request originated.
Fail closed
Anonymous, invalid, or under-scoped calls are rejected.
Employee Tools
Scoped Access
Admin / Workflow Tools
Guarded
Reject unsafe calls
Requests without tokens, invalid signatures, or missing scopes never reach systems.
Chapter - 2
Internal Network / MCP Hub
Internal Network / MCP Hub
Internal Network / MCP Hub
Chapter - 3
Identity System
Auth Service / IdP
Identity System
Opaque Token Mode
MCP Server
Failing Verification
Result
Auth failures or over-permissions
Identity System
JWT Issuer
MCP-Compatible JWT
sub, tenant_id, roles
Downstream Tools
Authorized by user/tenant
Chapter - 4
Employees & their devices
IDE Agent
Cursor / VS Code
MCP Server B
Infrastructure
MCP Server C
Collaboration
Central Identity
Token Layer
Employees & their devices
Security Risk
Broad scopes, rarely rotated
Ops Burden
Manual audits, expired tokens
Chat / Messaging
Leaked Risk
Hard to revoke
Reusable if leaked
Manual rotation
Employees & their devices
Token Broker
Central Vault
Encrypted storage / Scoped grants
MCP Server B
Infrastructure
MCP Server C
Collaboration
Policy
Min scopes, traceable
Chat / Messaging
Centrally Managed
Chapter - 5
Firebase APIs + Rules
Single Source of Truth
Product Data
User Collections & References
Access Rules
Same for UI & Agents
MCP Server
New Entry Point
getReferenceDetails
getReferenceDetails
applyTag
Clean Interface
No product logic duplication
Firebase APIs + Rules
Expects User Context
Broad Service Key
Bypasses User Rules
Incomplete Context
Missing User Info
Core Risk
Agents outside permission model
Result
Auth failures or over-permissions
Agent
Carries User Context
MCP Server
Forwards Context
Firebase APIs + Rules
Applies Access Rules
Access Rules
Same as UI Path
Result
Agent = UI behavior