Create an identiy aware MCP server that runs inside your private Tailscale network (Tailnet). This example leverages identity headers that are passed through to applications running behind tailscale serve.
Using this as starting point you can create MCP servers that are identity aware (with access to the logged in user's email) and can access internal APIs or services on thier behalf.
- If you don't already have a Tailnet setup you'll need to signup for one.
- Create an API auth key and save it into a
.envfile in the root of this project with the following format:TS_AUTHKEY=tskey-auth-... - With Docker already installed, run
docker compose upto start the server.
This will spin up two containers. The MCP server and a Tailscale container running tailscale serve as a proxy to your tailnet.
If you have an MCP Client that supports direct access to Streaming HTTP MCP servers, then you should be able to connect to the server by pointing it to https://ts-mcp-echo.yourtailnetname.ts.net/mcp.
Claude desktop does not currently support remote MCP servers (only stdio), but you can use the mcp-remote tool (or any other proxy) to connect to it.
-
Install mcp-remote with
npm install -g mcp-remote -
Add the following configuration to your
claude_desktop_config.jsonfile:{ "mcpServers": { "tailscale-remote-echo-example": { "command": "npx", "args": [ "mcp-remote", "https://ts-mcp-echo.yourtailnetname.ts.net/mcp" ] } } }You can find your tailnet name by visiting the Tailscale admin console DNS page.
-
Restart Claude Desktop.
-
You should now see a new MCP server called
tailscale-remote-echo-examplewith agreettool. -
Ask Claude
Who am I logged into my tailnet as?allow the tool, and wait for the response!