Skip to Content

MCP Configuration Guide

Overview

QueryPie ACP (Access Control Platform) Community Edition 11.5.0 has added Remote MCP (Model Context Protocol) Server functionality. You can now safely perform various tasks using LLMs in various AI coding assistants under QueryPie ACP’s access control.

Supported AI Coding Assistants

Prerequisites

  • Running QueryPie ACP Community Edition 11.5.0 or higher
  • Valid user account created in QueryPie ACP Community Edition

Integration

MCP Server URL

To configure AI coding assistants, you need to enter the URL of QueryPie ACP that acts as an MCP Server. Setting this MCP Server URL is a common step required across multiple AI coding assistants.

{QueryPie_URL}/api/mcp

{QueryPie_URL} is the address of the running QueryPie ACP Community Edition.

Example: https://querypie.example.com/api/mcp


Claude Code

1. Add MCP server address.
claude mcp add querypie --transport http {QuerPie_URL}/api/mcp

Example: claude mcp add querypie --transport http https://querypie.example.com/api/mcp

Add MCP server

Add MCP server

2. Perform OAuth login.

First, enter /mcp to check the status of currently configured MCP Servers.

image-20251211-092208.png

Select querypie from the list. Then, select Authenticate.

image-20251211-092454.png

When the browser opens, log in on the QueryPie login page. If login is successful, the browser will display “Authentication Successful”.

image-20251211-092741.png

Claude Code will also display “Authentication successful. Connect to querypie.” message.

image-20251211-092842.png

3. Verify MCP connection.

If Claude Code is not running, you can verify the MCP connection with the claude mcp list command.

Result of executing claude mcp list command

Result of executing claude mcp list command

Try performing tasks through queries.

Query example

Query example

When available tools are confirmed, a query about proceeding will be displayed. Select ‘yes’ or ‘yes, and don’t ask again for querypie -…’.

Response example

Response example

Authentication management: You can manage authentication status by running the /mcp command in Claude Code. Authentication tokens are automatically renewed. You can clear authentication using the “Clear authentication” option.


gemini-cli

1. Edit configuration file to add MCP server address.

Edit configuration file: Edit the ~/.gemini/settings.json file.

{ "mcpServers": { "acp": { "httpUrl": "https://acp.example.com/api/mcp" } } }

Servers that support OAuth are automatically detected.

image-20251211-102950.png

2. Perform OAuth login.

Use the /mcp auth command in Gemini CLI to proceed with authentication.

/mcp auth acp

When the browser opens, log in on the QueryPie login page. If login is successful, the browser will display “Authentication Successful”.

image-20251211-104053.png

image-20251211-103846.png

If the browser does not open automatically, you can also proceed by copying and pasting the address displayed on the screen into your browser, as shown in the figure above.

Cursor

1. Edit configuration file to add MCP server address.

Edit configuration file: Create or edit the ~/.cursor/mcp.json file:

{ "mcpServers": { "acp": { "url": "https://querypie.example.com/api/mcp" } } }
2. Perform OAuth login.
  • Restart Cursor or refresh the MCP server list.
  • Click the authentication button for the acp server in the MCP server list.
  • A web browser opens and displays the ACP login page.
  • After completing authentication in ACP, you can use MCP features in Cursor.
3. Verify MCP connection.

Check in Cursor Settings that MCP tools are properly integrated.

image-20251212-012243.png


Windsurf

1. Edit configuration file to add MCP server address.

Create or edit configuration file: ~/.codeium/windsurf/mcp_config.json

{ "mcpServers": { "acp": { "serverUrl": "https://querypie.example.com/api/mcp" } } }
2. Perform OAuth login.
  • Restart Windsurf or refresh the MCP server list.
  • Click the authentication button for the acp server in the MCP server list.
  • A web browser opens and displays the ACP login page.
  • After completing authentication in ACP, you can use MCP features in Windsurf.
3. Verify MCP connection.

Check in the Windsurf Agents screen that MCP tools are properly integrated.

image-20251212-012554.png

QueryPie ACP Community Edition MCP server Supported Tool List

DAC (Database Access Control)

Tools for database access and query execution.

ToolDescription
dac_list_accessible_connectionsList accessible DB connections for the current user (pagination supported)
dac_execute_queryExecute SQL query on specified DB connection. SELECT returns CSV results

SAC (Server Access Control)

Tools for server access and SSH shell sessions.

ToolDescription
sac_list_assigned_rolesList roles assigned to the current user
sac_select_roleSelect/apply role
sac_list_accessible_serversList servers accessible with selected role
sac_start_shellStart SSH shell session on server
sac_list_running_shellList running shell sessions
sac_execute_commandExecute command in shell session
sac_get_shell_outputRetrieve output from previous command
sac_stop_shellStop shell session

KAC (Kubernetes Access Control)

Tools for Kubernetes cluster management and resource manipulation.

User Tools

Tools that general users can use within their assigned permissions.

ToolDescription
kac_list_accessible_clustersList accessible K8s clusters
kac_analyze_kube_clusterAnalyze cluster status and generate problem report
kac_execute_list_resourcesList K8s resources
kac_execute_get_resourceRetrieve detailed information of K8s resource
kac_execute_create_resourceCreate K8s resource
kac_execute_update_resourceUpdate K8s resource
kac_execute_delete_resourceDelete K8s resource
kac_execute_list_node_metricsRetrieve node metrics
kac_execute_list_eventsList cluster events
Admin Tools

Tools that require administrator privileges.

ToolDescription
kac_create_cloud_providerAdd cloud provider (AWS supported)
kac_synchronize_cloud_providerSynchronize clusters from cloud provider
kac_create_policyCreate K8s access control policy (YAML format)
kac_create_roleCreate role (policy group)
kac_assign_role_meAssign role to current user

Permissions and Security

  • Each Tool follows the ACP permission system.
  • Based on the DAC DB connections, access control policies according to Privilege Type, SAC server access control policies, and KAC access control policies provided to each user in ACP, users can only use Tools within the scope of permissions granted to them.
  • All Tool calls are recorded in ACP audit logs.
  • ACP IP access control policies are applied.

Troubleshooting

Connection Failure

  • Verify that the ACP API server is running
  • Check network/firewall settings

Permission Errors

  • Verify that you have the required permissions for the Tool
  • Verify that roles are correctly assigned
  • Verify that your current IP is included in the IP allowlist
Last updated on