Before Armature can test your MCP tools, it needs to know where your server lives and how to authenticate with it. The connection flow takes under a minute: you fill in your server’s URL and auth details, and Armature immediately probes the server live — calling MCPDocumentation Index
Fetch the complete documentation index at: https://docs.armature.tech/llms.txt
Use this file to discover all available pages before exploring further.
initialize and tools/list — to confirm connectivity and build your tool catalog. From that point on, your server appears on the MCP Servers page and is ready for monitors, workflow coverage, and agent-driven repair.
Connect a server
Open the connection modal
On the MCP Servers page, click New server. The “Connect new MCP server” modal opens. If your organization is on a free plan, you will be prompted to upgrade before continuing.
Enter a server name and endpoint URL
Give the server a descriptive name (for example,
Acme Payments MCP) — this label appears throughout the Armature UI. In the Endpoint URL field, enter the full https:// URL of your MCP server’s HTTP endpoint.Configure authentication
Choose the authentication method that matches how your MCP server secures its API. Armature supports three modes:
- Bearer token
- API key header
- No auth
Select Bearer token to use standard HTTP Bearer authentication. Paste your token into the Token value field — you do not need to include the Your token is stored in a secure secrets backend and is never exposed in the Armature UI after you save.
Bearer prefix; Armature adds it automatically.When Armature calls your server, every request includes:Add extra headers (optional)
If your server requires additional HTTP headers beyond the primary auth credential — for example, a Extra headers are sent on every request alongside the primary auth header. The field accepts any valid JSON object; arrays and primitives are rejected.
X-Base-URL routing header or a tenant identifier — paste them as a JSON object into the Extra headers field:Save and watch the live probe
Click Connect server. Armature saves your server record, stores the auth secret securely, and immediately runs a live probe:
- Calls MCP
initializeto verify the server responds. - Calls
tools/listto discover every tool the server exposes.
Set up tool monitors (optional)
After a successful probe, Armature opens the tool monitor wizard. You can select which tools to monitor on a schedule, set per-tool intervals, and supply any required arguments. This step is optional — you can dismiss the wizard and add monitors later from the MCP Servers page or the Monitors page.See MCP tool monitors for a full walkthrough.
Explore your server
Once connected, click your server’s card to open the server detail panel. The panel has three tabs:| Tab | What you’ll find |
|---|---|
| Tools | The full tool catalog discovered during the last probe, with a badge indicating which tools are currently monitored. |
| Monitors | All tool monitors attached to this server, with their last-run status and cadence. |
| Connection history | A log of every probe attempt with timestamps and any error details. |
tools/list and refreshes the tool catalog with any changes your server has made since the last probe.
Edit or remove a server
From the server detail panel you can:- Edit the server name or endpoint URL using the Edit details button.
- Delete the server using the Delete button. Deleting a server removes it and all of its tool monitors permanently. Armature asks for confirmation before proceeding.
Auth secret security
Armature stores auth secrets — bearer tokens and API key values — in a secure secrets backend. Once you save a server, the token or key is never displayed again in the Armature UI. If you need to rotate a credential, delete the server and reconnect it with the new secret.Tool monitors
Schedule recurring pings for individual tools and get alerted when they fail.
Coverage report
See which tools in your server’s catalog are exercised by workflows and which are not.