Admin AI Preferences Panel

Why This Exists

As Liongard expands its MCP ecosystem and AI capabilities, you need a centralized, self-service way to control how your data is accessed and extended.

Previously, enabling integrations required manual provisioning. With the Admin AI Preferences Panel, you can manage all AI access in one place—including MCP token creation. This panel is foundational to Liongard’s ecosystem strategy, enabling you to manage direct integrations securely.

📘

Prerequisites

Before using the Admin AI Preferences Panel and creating MCP tokens, ensure:

  • MCP Subscription: You have an active MCP subscription to enable access to the panel and token creation.

  • Tenant Admin Access: You must be a tenant administrator to create and manage MCP tokens.

  • LiongardIQ (Roar Assistant Only): Provides access to the in-app Roar Assistant but does not include MCP token creation or external integrations.

  • Additional Tokens: Beyond the first access token included with an MCP subscription, you can create multiple tokens to scope access by customer, environment, tool, or workflow.


Key Benefits

  • Self-Service Access Management: You can create, rotate, and revoke MCP access tokens without submitting support requests.

  • Granular Control: You can scope tokens to specific environments or groups, set expiration dates, and revoke access at any time.


How It Works

MCP Token Management (Phase 1)

  1. Navigate to Admin > AI in the Liongard platform.

  2. Select the Access Tokens tab to view and manage your active tokens.

  3. Click Create Credential.

  4. Configure the token:

    • Label Enter a descriptive name for the integration (for example, “n8n Automation” or “Claude Code Integration”).

    • Expiration (Optional) Set a date when the token will automatically expire.

    • Environments (Optional) Limit access to specific environments. Leave blank to allow full tenant access.

    • Environment Group Scoping (Optional) Scope access to environment groups for more flexible delegation.

  5. Copy and securely store your credentials:

    • Access Key ID

    • Access Key Secret

    The Access Key Secret is only displayed once and cannot be retrieved later.


Configure Your MCP Client

Use your credentials to configure your MCP client:

{
  "Liongard": {
    "url": "https://[server].app.liongard.com/api/mcp",
    "headers": {
      "Authorization": "Bearer [ACCESS_KEY_ID]:[ACCESS_KEY_SECRET]",
      "MCP-Protocol-Version": "2025-11-25"
    }
  }
}

📘

Best Practice

Scope Tokens to Limit Exposure

MCP tokens provide tenant-wide access by default and are not restricted by user role. To reduce risk:

  • Scope tokens to only the environments required
  • Set expiration dates whenever possible
  • Rotate tokens regularly

These practices help maintain strong security and minimize unnecessary data exposure.