MCP tunnels is a Research Preview feature. Request access to try it.
This page covers the Console side of an MCP tunnels deployment: creating a tunnel, registering your CA certificate, retrieving the tunnel token, and attaching the tunneled servers to an agent. Deploy MCP tunnels with Helm and Deploy MCP tunnels with Docker Compose cover running the stack inside your network.
org:manage_tunnels scope.Your organization can have up to 10 active tunnels. Creating a tunnel does not establish any connectivity; that happens once your stack dials in with the tunnel token and a CA certificate is registered.
Open the tunnel. The detail page shows a Connection section with the domain and token and a Certificates section.
| Row | Action |
|---|---|
| Domain | Copy the assigned abcd1234.tunnel.anthropic.com value. Your proxy's routes are subdomains of this domain. |
| Token | Click the eye icon (Show token) to fetch the tunnel token, then use the copy icon to copy it into your deployment's secret store. Click Rotate token to invalidate the current token and issue a new one. |
Every reveal and rotation is recorded. Rotation does not sever cloudflared connections that are already established, so you can rotate, redeploy with the new value, and let the old connections drain.
Anthropic verifies inner TLS to your proxy against the CA certificates you register on the tunnel. A tunnel with no active certificates cannot accept connections, and does not appear in the agent MCP server picker until one is registered.
Find the Certificates section
On the tunnel's detail page, scroll to the Certificates section and click Add certificate.
Provide the certificate
Either click Choose file and select a .pem, .crt, or .cer file, drag the file onto the text area, or paste the PEM block directly. The modal rejects private-key material and content that isn't a -----BEGIN CERTIFICATE----- block. The file must be 8 kB or smaller.
Add the certificate
Click Add certificate. The fingerprint and expiry appear in the certificate list, and the slot count on the section header increments.
A tunnel holds up to two active certificates so you can rotate without downtime: register the new certificate alongside the old one, redeploy your proxy with the new key pair, confirm traffic is flowing, then click Revoke on the old certificate's row. Revoked certificates remain visible in the list with a Revoked badge.
The tunnel exists in the Console, but no traffic flows until the stack is running inside your network and dialed in with the tunnel token. Follow one of the deploy guides:
Run the stack on a single host. Both programmatic-access and manual flows.
Run the stack on a Kubernetes cluster. Both programmatic-access and manual flows.
Once your stack is running and has one or more MCP servers configured, attach a tunneled MCP server to a Managed Agent session. To call the same servers from the Messages API instead, see Use the tunneled MCP servers.
The picker only shows tunnels with at least one active certificate. A tunnel that still shows Needs certificate in the MCP tunnels list will not appear in the dropdown; register a CA certificate first. The picker is also workspace-scoped: it lists tunnels in the same workspace as the session, not other workspaces.
Open the New session modal
Go to Managed Agents > Sessions and click New session.
Define an inline agent
In the agent picker, choose Create new agent so you can edit the MCP server list directly.
Add the MCP server
Click + MCP Server and open the dropdown. Tunnels created in the current workspace appear at the top of the list, above the public connector catalog. Select the tunnel that fronts the server you want to reach.
Supply the routing
The card shows two optional fields: Subdomain (prefixed to the tunnel domain) and Path (appended after it). Enter whichever your proxy's routes use. The Resolves to line shows the exact URL that will be written to agent.mcp_servers.
The tunnel carries traffic; it does not authenticate to the upstream. Configure OAuth or bearer auth on the MCP server the same way as for any other MCP server.
Archiving immediately stops the tunnel from accepting connections and is permanent.
In the MCP tunnels list, open the row menu for the tunnel and choose Archive. Archived tunnels remain visible when you filter the list by Archived or All.
Install on a Kubernetes cluster using the Anthropic Helm chart.
Hardening guidance, credential rotation, and breach response.
Was this page helpful?
Open the MCP tunnels page
In the Console sidebar, go to Manage > MCP tunnels.
Name the tunnel
Click New tunnel and enter a name in the Create tunnel dialog. The name is required and identifies the tunnel in the list, on the detail page, and in the agent MCP server picker. A domain of the form abcd1234.tunnel.anthropic.com is assigned automatically.
Optionally set up programmatic access
The Set up programmatic access toggle is off by default. To turn it on you need the following in place:
org:manage_tunnels scope. Turning on the toggle reveals a Federation rule picker; each rule shows the service account it binds to. Choose an existing rule scoped to tunnel management, or click Create federation rule to create one inline; the new-rule form lets you select the issuer and service account. The federation rule binds tokens from your issuer to a service account; the service account is the principal the Tunnels API sees.api.wif.workspaceId for Helm, ANTHROPIC_WORKSPACE_ID for Compose). See Workload Identity Federation for how rules, service accounts, and workspaces relate.Skipping this step is fully supported; both deploy guides have a Without programmatic access tab.
Create the tunnel
Click Create tunnel. The Console provisions the tunnel and opens the detail page.
Record the deployment identifiers
Both deploy paths need:
tnl_...), shown on the tunnel detail page.abcd1234.tunnel.anthropic.com), shown on the tunnel detail page. Used as the proxy's tunnel_domain and in the server certificate's SAN.Without programmatic access, you also need the values your stack uses to connect and authenticate:
With programmatic access, your stack fetches the tunnel token through the Tunnels API and generates the CA and server certificate locally (the private key never leaves your environment), registering only the CA's public certificate with Anthropic. You're still responsible for securing the private keys and renewing the server certificate before it expires. Record the identifiers your stack needs to authenticate over Workload Identity Federation:
fdrl_...) of the rule you selected. The Console doesn't store the rule on the tunnel; find it later under Settings > Workload identity > Rules.