- Runs outside of LangSmith (usually over HTTPS).
- Owns its own authentication and authorization.
- Acts as a bridge between your agent and an external system.
How it works
- Agent Builder discovers tools from remote MCP servers via the standard MCP protocol.
- Headers configured in your workspace are automatically attached when fetching tools or calling them. Headers are key-value pairs sent with every HTTP request to your MCP server. They’re commonly used for authentication (like API keys or bearer tokens), but can also provide configuration information, content types, or custom metadata.
- Tools from remote servers are available alongside built-in tools in Agent Builder.
- General configuration: Step-by-step instructions for connecting any remote MCP server with authentication headers. Use this if you’re familiar with MCP servers and want a quick reference.
- Example: Connecting a custom MCP server: A detailed walkthrough using a GitHub-based MCP server as an example. Use this if you want to see a complete end-to-end example with specific authentication details.
Add a remote MCP server
Configure remote MCP servers in your LangSmith workspace:1
Navigate to MCP server settings
In the LangSmith UI, select Settings in the lower left sidebar, then choose the MCP Servers tab.
2
Add the server
Click Add server and enter:
- Name: A descriptive name for the server
- URL: The MCP server endpoint URL
3
Configure authentication
Select an authentication type based on the server’s requirements:
-
Headers: Add key-value pairs sent with every request. The most common pattern is using an Authorization bearer token:
- Key:
Authorization - Value:
Bearer API_KEY
You can add multiple headers if your MCP server requires additional authentication or configuration parameters. Each header key-value pair is sent with every request to the server. - Key:
- OAuth 2.1 (Auto): Select this for servers that support OAuth via dynamic client registration. You’ll be prompted to log in with your account for that service.
- OAuth 2.1 (Manual): Select this for servers that support OAuth, but require specifying the client ID/secret beforehand. OAuth providers used in this flow must have PKCE enabled.
4
Save and verify
Click Save server. Agent Builder will automatically discover available tools from your MCP server and make them available in your agents. The configured headers are applied to both tool discovery requests and tool execution requests.
Update your MCP server URL
Agent Builder stores tool references by MCP server URL. If you update the URL of a custom MCP server, existing agents will fail when attempting to call those tools because the stored URL no longer matches. To update an MCP server URL:- Update your MCP server URL in the workspace settings.
- For each agent using tools from that server:
- Remove the affected tools from the agent configuration.
- Re-add the tools (they will now reference the new URL).
- Test the agent to confirm tools work correctly.
Example: Connect a custom MCP server
Here’s a practical example of connecting Agent Builder to a GitHub MCP server that requires authentication:1
Create a GitHub Authorization Token
The MCP server needs permission to access GitHub on your behalf. You’ll do this using a GitHub Personal Access Token (PAT).
- Go to GitHub → Settings → Developer settings.
- Open Personal access tokens.
- Create a Fine-grained token (recommended).
- Contents: Read
- Issues: Read
- Pull requests: Read
2
Understand the required headers
Remote MCP servers typically authenticate using HTTP headers.For the GitHub MCP server, the required headers look like this:
- Authorization proves who you are.
- The MCP server validates the token.
- Every tool call from the agent includes these headers.
3
Store the token as a workspace secret
In the LangSmith UI:
- Navigate to Settings > Workspaces > Secrets.
- Click Add secret.
- Name:
GITHUB_TOKEN(or any descriptive name). - Value: Your authentication token.
- Save the secret.
4
Configure the MCP server
In Settings > MCP Servers:
- Click Add server.
- Add a Name for the MCP server.
- URL: Enter your MCP server URL (e.g.,
https://mcp-github.example.com) - Add authentication header:
- Key:
Authorization - Value:
Bearer {{GITHUB_TOKEN}}
- Key:
- Save the configuration.
5
Use tools in your agent
The tools from your MCP server are now available in Agent Builder. When you create or edit an agent, you’ll see these tools alongside the built-in tools. All requests to your MCP server will include the authentication header automatically.Once connected, the workflow for this example looks like this:
- The agent decides it needs GitHub data.
- It selects a tool exposed by the MCP server.
- LangSmith forwards the request to the remote MCP server.
- The server authenticates using your token.
- GitHub data is fetched and returned.
- The agent receives structured results and continues reasoning.
Different MCP servers may use different authentication methods:
Authorization: Bearer {{TOKEN}}(most common)X-API-Key: {{API_KEY}}- Custom headers specific to your implementation
- Multiple headers for authentication
Supported servers
Arcade
Arcade provides a gateway for connecting to various tools and services. Configuration details| Setting | Value |
|---|---|
| URL | Dynamic. Create an MCP gateway in your Arcade dashboard, select the tools you want, then copy the generated URL. |
| Auth type | Headers or OAuth 2.1 (Auto). See below for specific details. |
| Header | Value |
|---|---|
Authorization | Bearer ARCADE_API_KEY |
Arcade-User-Id | Your email address |
- Select OAuth 2.1 (Auto) as the auth type when adding the server.
- Log in with your Arcade account when prompted.
Parallel
Parallel provides search and task automation tools. Configuration details| Setting | Value |
|---|---|
| URL | https://search-mcp.parallel.ai/mcp |
| Auth type | Headers |
| Header | Value |
|---|---|
Authorization | Bearer PARALLEL_API_KEY |
Notion
Notion provides tools for interacting with your Notion workspace. Configuration details| Setting | Value |
|---|---|
| URL | https://mcp.notion.com/mcp |
| Auth type | OAuth 2.1 (Auto) |
- Select OAuth 2.1 (Auto) as the auth type when adding the server.
- Log in with your Notion account when prompted.