MDM Deployment

Overview

Akto MCP Endpoint Shield provides enterprise-grade Mobile Device Management (MDM) support for seamless deployment and centralized management across your organization's devices.

Why MDM Integration Matters

In enterprise environments, manually configuring security tools on hundreds or thousands of developer machines is impractical. MDM support enables:

  • Zero-touch deployment across all managed devices

  • Centralized configuration and policy management

  • Automated updates and patch management

  • Compliance enforcement and audit trails

  • Remote monitoring of security posture

Supported MDM Platforms

Akto MCP Endpoint Shield integrates with leading MDM solutions:

  • Microsoft Intune (Windows, macOS)

  • Jamf Pro (macOS, iOS)

  • Workspace ONE (VMware)

  • Kandji (macOS)

  • Mosyle (Apple devices)

  • ManageEngine (Cross-platform)

  • IBM MaaS360

  • Any standard MDM supporting package deployment

Key MDM Capabilities

1. Automated Deployment

  • Silent installation without user interaction

  • Pre-configured API tokens pushed via MDM profiles

  • Automatic service startup on device enrollment

  • Version control and automated updates

2. Centralized Configuration

  • Configuration profiles for standard settings

  • Environment variables managed via MDM

  • Policy enforcement (blocking vs. monitoring mode)

  • Custom server lists and whitelist management

3. Compliance & Monitoring

  • Health check reporting back to MDM console

  • Installation verification via scripts

  • Log collection for security audits

  • Compliance dashboards in Akto platform

Prerequisites

  • Active Akto account with API token

  • MDM platform with package deployment capability

  • Administrator access to MDM console

  • MCP Endpoint Shield installer package (.pkg for macOS, .msi for Windows, .deb for Linux)

Step 1: Prepare the Installation Package

For macOS (Jamf Pro, Intune, Kandji)

1

Download the installer

  • Contact Akto Support to get akto-mcp-endpoint-shield.pkg

  • The .pkg file is signed and notarized by Apple for secure installation

  • Developer ID: Akto, Inc.

  • Notarization: Apple-verified for Gatekeeper compatibility

  • Upload to your MDM file repository

Why signing and notarization matters:

  • Passes Gatekeeper checks on macOS 10.15+ without manual overrides

  • No security warnings during installation

  • Compatible with MDM silent installs (no user interaction required)

  • Trusted by Apple - package integrity verified

  • Meets enterprise security policies for managed devices

2

Create a configuration profile:

3

Upload to MDM:

  • Navigate to Configuration Profiles section

  • Upload the .plist configuration

  • Assign to target device groups

For Windows (Intune, ManageEngine)

1

Download the installer:

  • Contact Akto Support to get akto-mcp-endpoint-shield.msi

  • Upload to your MDM software repository

2

Create installation script:

3

Configure in Intune:

  • Go to AppsWindows appsAdd

  • Select Line-of-business app

  • Upload the .msi file

  • Add the PowerShell script as a post-install action

  • Assign to device groups

For Linux (Fleet, Canonical Landscape)

1

Download the installer:

2

Create deployment script:

3

Deploy via MDM:

  • Use your MDM's script execution capability

  • Schedule deployment to target device groups

  • Set execution frequency (one-time for new devices)

Step 2: Configure Auto-Discovery Settings

The agent will automatically discover and protect MCP servers. However, you can customize behavior via MDM-managed configuration files.

Create Custom Policy File

Location: /etc/akto-mcp-endpoint-shield/policy.json (Linux/macOS) or C:\ProgramData\Akto\mcp-endpoint-shield\policy.json (Windows)

Example policy:

Deploy Policy via MDM

For Jamf:

For Intune:

  • Create a Device Configuration Profile

  • Use Custom Settings for file deployment

  • Upload policy.json to target path

Step 3: Deploy to Target Devices

Scope Configuration

Define device groups:

  • Engineering_Developers → Full deployment with auto-wrap enabled

  • Security_Team → Deployment with audit mode enabled

  • Contractors → Strict blocking mode with limited allowlist

Example Jamf Smart Group:

Deployment Schedule

Staged rollout recommended:

  1. Pilot group (10-20 users) → Week 1

  2. Early adopters (100 users) → Week 2

  3. Full deployment → Week 3+

Installation Command Examples

  • Jamf:

  • Intune:

  • Fleet:

Step 4: Verify Deployment Status

Check Installation via MDM Console

  1. Navigate to ComputersInventory

  2. Search for application: Akto MCP Endpoint Shield

  3. View Installation Status and Version

Automated Health Check Script

Deploy this script via MDM to verify installation:

Schedule in MDM:

  • Frequency: Daily

  • Remediation: Auto-restart service if failed

  • Alerting: Notify security team on repeated failures

Step 5: Monitor and Maintain

Centralized Logging

Configure log forwarding to SIEM:

For Splunk:

For Azure Sentinel:

Update Management

Automatic updates via MDM:

Jamf Patch Management:

  1. Subscribe to Akto MCP Shield patch definition

  2. Set auto-update policy: Install updates within 7 days

  3. Test updates on pilot group first

Intune Update Ring:

Compliance Reporting

Key metrics to track:

  • Installation success rate (target: >95%)

  • Agent uptime (target: >99%)

  • Policy violations detected per device

  • Blocked threats count

  • Configuration drift incidents

View in Akto Dashboard:

  • Navigate to MCP ShieldEnterprise Console

  • Filter by MDM deployment group

  • Export compliance reports for audits

🔍 Auto-Detection

Akto MCP Endpoint Shield automatically detects MCP client configurations:

  • Cursor → Reads ~/.cursor/mcp.json

  • Visual Studio Code → Reads .vscode/mcp.json inside your workspace

  • Claude Desktop → Reads Claude’s MCP config JSON

For each detected MCP server config:

  1. The JSON file is parsed.

  2. Each server entry is automatically wrapped with Akto MCP Endpoint Shield.

  3. Your MCP clients transparently run through the shield without requiring manual reconfiguration.

👉 You don’t need to manually edit your MCP config files — the wrapper handles this for you.

chevron-right📄 Example — Cursor mcp.jsonhashtag

Original file (before wrapping):

Automatically wrapped file (after Akto MCP Endpoint Shield):

What changed:

  • mcp-endpoint-shield is now the entry command.

  • Original server command (npx -y chrome-devtools-mcp@latest) is passed through --exec.

🔧 Manual Setup

Follow these steps to manually set up and run MCP Endpoint Shield to protect your MCP servers.

Prerequisites

  • You have the mcp-endpoint-shield binary available

  • You have an Akto API token

  • uninstall MCP Endpoint Shield if installed previously using installers

1

Set Your API Token

Set the AKTO_API_TOKEN environment variable:

Make it permanent (optional):

For bash users, add to ~/.bashrc:

For zsh users, add to ~/.zshrc:

Verify it's set:

2

Start the Agent

The agent automatically discovers and protects your MCP servers.

Expected output:

Keep this terminal running. The agent will:

  • Find your MCP configuration files (Cursor, VS Code, Claude Desktop)

  • Wrap your MCP servers with security

  • Sync security policies from Akto backend

  • Watch for changes and auto-update configs

circle-info

Note

If you want the agent to run in the background, use:

3

Protecting Local MCP Servers (STDIO)

4

Protecting Remote MCP Servers (HTTP)

For HTTP-based MCP servers, run the HTTP proxy in a new terminal:

Expected output:

Keep this terminal running.

circle-info

Note: The proxy runs on port 57294 by default.

Configure Your Remote MCP Server

Original config (direct connection to remote server):

Protected config (route through proxy):

Key changes:

  1. Change url to http://localhost:57294/mcp/streamable

  2. Keep your existing Authorization header (or any other headers)

  3. Add new header mcp-server-base-url with the original remote server URL

The proxy will:

  • Receive requests at http://localhost:57294/mcp/streamable

  • Read the mcp-server-base-url header to know where to forward

  • Apply security policies

  • Forward to your actual remote MCP server

  • Return the response back to your client

Restart your MCP client to apply changes.

5

Verify Everything is Working

Check Agent Status

Look at the agent terminal - you should see:

No errors means it's working!

Check HTTP Proxy Status

Look at the proxy terminal:

Test Your MCP Server

Open your MCP client (Cursor, VS Code, Claude Desktop) and try using your wrapped MCP server. It should work normally, but now with security protection.

circle-check

⚙️ Common Flags

Quick Command Reference

  • Terminal 1 - Agent:

  • Terminal 2 - HTTP Proxy:

  • Get Help:

This protects:

  • STDIO servers (like npx -y chrome-devtools) via agent

  • HTTP servers (remote MCP servers) via proxy

circle-info

🔐 Enterprise Best Practices for MDM Deployments

1. Token Management

  • Use dedicated service accounts for API tokens

  • Rotate tokens every 90 days via automated scripts

  • Store tokens in MDM secrets vault (e.g., Azure Key Vault, AWS Secrets Manager)

  • Never hardcode tokens in configuration files

2. Network Considerations

  • Allow outbound HTTPS to *.akto.io on port 443

  • Whitelist proxy settings if using corporate proxy

  • Configure firewall rules for HTTP proxy (port 57294)

  • Use VPN for remote workers

3. User Communication

  • Pre-deployment announcement explaining the security enhancement

  • Documentation with FAQs and support contact

  • Training sessions for power users

  • Feedback channel for reporting issues

4. Rollback Strategy

  • Keep previous version available in MDM repository

  • Test rollback procedure on pilot devices

  • Document rollback steps for IT helpdesk

  • Monitor for issues during first 48 hours post-deployment

5. Compliance & Auditing

  • Enable comprehensive logging (audit mode initially)

  • Integrate with SIEM for security monitoring

  • Schedule regular compliance reviews (monthly)

  • Document security incidents and response actions

🧩 Troubleshooting

Issue: AKTO_API_TOKEN is not set ➡ Cause: Environment variable not configured. ➡ Fix: Set the token with export AKTO_API_TOKEN="your-token" and verify with echo $AKTO_API_TOKEN.

Issue: Port already in use (HTTP Proxy) ➡ Cause: Port 57294 is already being used by another process. ➡ Fix 1: Find and kill the process with lsof -i :57294 and kill -9 PID. ➡ Fix 2: Use a different port with ./mcp-endpoint-shield http --port 8080 and update your config.

Issue: MCP server not working after wrapping ➡ Cause: Multiple possible causes. ➡ Fix:

  1. Restart your MCP client,

  2. Verify binary path with which mcp-endpoint-shield,

  3. Check logs at ~/.akto-mcp-endpoint-shield/logs/ or /var/log/akto-mcp-endpoint-shield/ (if installed using installer)

  4. Test original command works standalone.

Issue: permission denied: ./mcp-endpoint-shield ➡ Cause: Binary doesn't have execute permissions. ➡ Fix: Run chmod +x ./mcp-endpoint-shield.

Issue: command not found: mcp-endpoint-shield ➡ Cause: Binary not in PATH or wrong path used. ➡ Fix: Use full path (./mcp-endpoint-shield or /usr/local/bin/mcp-endpoint-shield) or add to PATH with export PATH=$PATH:/path/to/binary/directory.

circle-check

🔒 Guarantees

Get Support

There are multiple ways to request support from Akto. We are 24X7 available on the following:

  1. In-app intercom support. Message us with your query on intercom in Akto dashboard and someone will reply.

  2. Join our discord channelarrow-up-right for community support.

  3. Contact [email protected] for email support.

  4. Contact us herearrow-up-right.

Last updated