Documentation Index
Fetch the complete documentation index at: https://docs.igrisecurity.com/llms.txt
Use this file to discover all available pages before exploring further.
Connections
Connections are encrypted credential vaults for upstream MCP servers. Instead of putting real API keys in your code, you create a connection in Igris that stores the credential securely and gives you a clean gateway URL.How Connections Work
- Real credentials never leave Igris — encrypted at rest with AES-256-GCM
- Rotate credentials instantly without changing any code
- Revoke access by disabling the connection
- Full audit trail of every request per connection
Create a Connection
In the dashboard: Governance → Connections → New Connection Or via API:Auth Types
Connections support three authentication types for upstream credential injection:| Auth Type | Behavior |
|---|---|
bearer | Injects credential as Authorization: Bearer <credential> (default) |
header | Injects credential as a raw header value with a custom header name |
none | No credential injection — upstream doesn’t require auth |
Custom Auth Headers
Some MCP servers expect credentials in a non-standard header. UseauthType: "header" with authHeaderName:
X-API-Key: sk_my_secret_key to the upstream server.
Use a Connection
With the SDK
Direct MCP Client Config
Credential Injection
When the gateway receives a request, it:- Strips your Igris API key (never forwarded upstream)
- Decrypts the connection’s credential
- Injects it using the configured auth type:
- bearer:
Authorization: Bearer <credential> - header:
<authHeaderName>: <credential> - none: no credential injected
- bearer:
Rotate Credentials
Update a credential without changing any SDK configs:Slug Format
Connection slugs must be:- Lowercase letters, numbers, underscores, hyphens
- 3-64 characters
- Start with a letter or number
github-prod, slack-mcp, analytics01