MCP
Model Context Protocol servers expose tools and resources to AI clients. Adding an AI Identity Passport lets clients (Claude Desktop, Cursor, custom hosts) confirm which operator runs the server before granting it tool access.
modelcontextprotocol.io1Issue an AI Identity
If you haven't already, create an identity for this agent in the dashboard. Free for the first identity per account.
Issue identity2Register your surface
On the identity's edit page, add the agent's endpoint to Surfaces using the mcp scheme:
mcp://{your-mcp-host}mcp://tools.example.com/sse3Carry the Passport in MCP
Click Issue Passport on the identity detail page to generate a signed token. Then drop it into your MCP agent using one of the snippets below. Replace <PASSPORT_TOKEN> and <IDENTITY_ID> with the values shown in the dashboard.
import { Server } from "@modelcontextprotocol/sdk/server/index.js";
const server = new Server(
{ name: "my-mcp-server", version: "1.0.0" },
{
capabilities: { tools: {} },
metadata: {
"x-ai-identity": {
id: "<IDENTITY_ID>",
passport: "<PASSPORT_TOKEN>",
registry: "https://aiidentity.org",
},
},
},
);from mcp.server import Server
app = Server("my-mcp-server", version="1.0.0")
app.metadata = {
"x-ai-identity": {
"id": "<IDENTITY_ID>",
"passport": "<PASSPORT_TOKEN>",
"registry": "https://aiidentity.org",
}
}HTTP/1.1 200 OK
Content-Type: text/event-stream
X-AI-Identity: <PASSPORT_TOKEN>How verifiers consume this
MCP clients should read `metadata['x-ai-identity']` from the server's initialize response and verify the Passport before adding any of the server's tools to the model's tool list. See /spec/mcp-identity for the full client-side verification flow.