Vault MCP¶
This guide adds Vault MCP Server to the local unified gateway stack.
Enable Vault MCP¶
Vault MCP is available at:
http://127.0.0.1:8811/mcp
Enable the server and start the stack:
Vault credentials¶
Mint Vault MCP credentials with Terraform:
- In
terraform-hcp-bootstrap, create the backend workspace forterraform-vault-bootstrap. - In
terraform-vault-bootstrap, run apply against HCP Vault. - Copy outputs into Bitwarden item
HCP Vault Ezrausing fieldsVAULT_ADDR,VAULT_TOKEN(frommcp_token), andVAULT_NAMESPACE(typicallyadmin).
Hydrate Vault MCP credentials from Bitwarden:
Expected .env keys:
VAULT_ADDRVAULT_TOKENVAULT_NAMESPACE(defaults toadminwhen omitted)
Default Bitwarden item name used by hydration:
HCP Vault Ezra
Validate end-to-end¶
Run the normal MCP validation flow:
If you changed stack wiring, also run:
Notes¶
- Vault MCP in Vault docs is currently marked beta.
- This stack uses local Docker MCP runtime only; no hosted MCP endpoint is added.