Overview
Important: This guide is for users with theteam_admin role. Only team administrators can install and configure MCP servers for their teams. Users with the team_user role can only configure their personal settings after a team admin has installed the server.
As a team administrator (team_admin), you:
- Install MCP servers from the catalog into your team workspace (only
team_admincan do this) - Configure shared settings like team-wide API keys and common parameters
- Control credential policy - force shared credentials OR allow users to use private ones
- Manage team credentials securely that can be shared across team members
- Enable credential privacy - unlock settings so users can configure private credentials
team_user members cannot do:
- Cannot install MCP servers to the team
- Cannot view or modify team-level credentials set by team admins
- Cannot change lock/unlock settings
- Can only configure their own personal user-level settings (if unlocked)
Installation Process
The Installation Flow:- Browse Catalog - Find MCP servers in the global catalog (includes both official registry servers synced from registry.modelcontextprotocol.io and manually created servers)
- Select Server - Choose a server that meets your team’s needs
- Configure Team Settings - Set shared credentials and parameters
- Set Lock Controls - Decide what users can and cannot modify
- Deploy Installation - Make the server available to team members
Lock/Unlock Controls
The lock/unlock system gives you granular control over what team members can modify, working within the boundaries established by global administrator schema categorization: Your Control Scope:- You can only configure elements categorized as “Team Configurable” by the global administrator
- You can lock/unlock elements for team members (if the schema allows it)
- You cannot modify “Template” elements (locked forever by global admin)
- You cannot access “User Configurable” elements (managed by individual users)
- 🔒 Locked - Users cannot modify this setting (team-controlled)
- 🔓 Unlocked - Users can customize this setting (user-controlled)
- Shared Resources - When team should use same account for billing/tracking
- Standardization - Settings that must be consistent across team
- Compliance - Organizational policy requires shared credentials
- Cost Control - Prevent users from using personal premium accounts
- Rate Limits - Let users configure personal API keys for higher limits
- Individual Accountability - Track actions per user through personal tokens
- Personal Accounts - Users have their own service subscriptions
- Development vs Production - Users can test with personal dev credentials
Team Configuration Example
Scenario A: Locked Credentials (Forced Shared)Scenario B: Unlocked Credentials (Private Allowed)
Credential Management
Team Credential Types:-
Shared Team Credentials (Locked)
- All team members use the same credentials
- Encrypted in database, visible as
*****to users - Good for: Shared accounts, cost control, unified billing
-
Default Team Credentials (Unlocked)
- Team provides default credentials as fallback
- Users can override with their own private credentials
- Good for: Optional personal upgrades, rate limit flexibility
- All team credentials are encrypted in the database
- Only
team_admincan view and modify team credentials -team_usermembers cannot see or change them - Team credentials appear as
*****to all users (includingteam_adminin some contexts) - Users can ONLY see their own private credentials, not other users’ credentials
- Locked Credentials - Users must use team credentials (cannot see actual values)
- Unlocked Credentials - Users can configure private credentials (not shared with team)
- User Isolation - Each user’s private credentials are encrypted separately
- Role-Based Access - Only
team_admincan manage team-level credentials;team_usercannot access them
- Update shared team credentials without affecting user configurations
- Changes automatically apply to all team members using shared credentials
- Users with private credentials are unaffected by team credential changes
Security and Isolation
Team Boundaries:- Your team’s installations are completely separate from other teams
- No cross-team access to configurations or credentials
- Only team administrators can modify team installations
- Users can configure private credentials not shared with other team members
- Each user’s private credentials are encrypted separately in the database
- Team administrators cannot see individual users’ private credentials
- Users cannot see other team members’ private credentials
- Team settings automatically flow to all team members
- Users can inherit team credentials OR configure their own private ones
- Clean separation between shared and personal settings
What Team Members Experience
Based on your lock/unlock decisions and the schema boundaries set by global administrators, team members:- See only configurable elements - Configuration options you unlocked for them
- Choose credential source - Use team credentials OR their own private ones (if unlocked)
- Maintain privacy - Their private credentials are never visible to you or other team members
- Get consistent baseline - Inherit locked team settings while customizing unlocked ones
- Benefit from satellite execution - Remote MCP server execution with proper credential isolation
Related Documentation
For complete understanding of team installations in context:- MCP Configuration System - Overview of the three-tier system
- Admin Schema Workflow - How global administrators create the schemas that define your configuration options
- MCP User Configuration - How users interact with team installations
- Teams - Team structure and management
- MCP Catalog - Browsing and selecting MCP servers

