MCP auth for enterprise is confusing and most of the confusion comes down to one thing: mixing up agent identity and MCP authentication.

It’s incredibly easy to blur the lines between agent identity and MCP authentication, which is exactly where things can get messy for an architecture team.

To help make sense of this, I recently ran a session that decodes the complexity.
1/4

One of the highlights I’m excited to share is a deep-dive into the "Gold Standard" MCP created by the Microsoft Entra engineering team themsleves.

Not theory, it’s the actual blueprint used for the Microsoft Graph MCP Server and in production use in hundreds of thousands of customers.

In this session, I break down:

✔️ The Blueprint: Why the engineering team chose a distinct App ID for MCP vs. the standard REST API.
2/4

✔️ Granular Permissions: How to design your scopes so they are audit-friendly and secure.

✔️ Identity vs. Auth: Why mixing up agent identity and MCP auth is a trap, and how to avoid it.

✔️ Hosting Patterns: A side-by-side of Azure API Management, Logic Apps, and App Service (EasyAuth).

If you’re currently architecting or building MCPs for your organization, I hope this helps you follow the same guidelines we’re using internally to build secure, scalable AI agents.
3/4

🎥 Watch the full session: https://www.youtube.com/watch?v=ZDlP1sFKMJo

📦 Get the slides & demo code: aka.ms/entra/mcp

I’m curious—for those of you building right now, has the "separate App ID" approach been on your radar, or have you been sticking to existing REST API registrations? 👇

#MicrosoftEntra #AI #Identity #ZeroTrust #CloudSecurity #Architecture #MCP
4/4

Building MCP on Entra: Design Choices for Enterprise Agents

YouTube