Product Update

ApexMCP Platform Update: What We've Built

May 14, 2026 · 8 min read · by ApexMCP

When we launched the initial beta, ApexMCP could do one thing well: take a data source, wrap it as MCP tools, and hand you an endpoint. That was enough to validate the idea. It wasn't enough to ship to teams who actually need to run this in production.

The last several months have been heads-down building everything around that core: compliance features, team management, billing, event observability, and the security posture that enterprise customers require before they'll point an AI agent at production data. Here's what's in the platform now.

Connectors: More Sources, Smarter Discovery

The connector layer is how you tell ApexMCP what data sources to expose. We've expanded what you can connect and made the configuration process significantly less painful.

GraphQL with automatic schema discovery

Connect a GraphQL endpoint and ApexMCP introspects the schema automatically — no manual tool definitions required. The platform maps your types and queries to MCP tool descriptions that agents can reason over. Schema discovery runs on connect and can be refreshed on demand. Tool results are cached in Redis per-org so repeated agent queries don't hammer your upstream.

External MCP backends

If you already have an MCP server — a custom one you built, or a third-party service that speaks the protocol — you can federate it through ApexMCP. Your existing MCP endpoint gets proxied through the platform, gaining ApexMCP's auth layer, rate limiting, and audit logging without any changes to the upstream server. Redis-backed caching and pub/sub invalidation mean stale tool lists never reach the agent.

Credential vault

Connector credentials — API keys, connection strings, OAuth tokens — are stored in HashiCorp Vault, not in the application database. Each connector gets a vault path; the credential never touches the app layer in plaintext. Rotation works without downtime: update the vault entry, the next request picks it up.

Audit Logs

Every action on the platform — tool calls, connector changes, member invitations, billing events, API key creation — is written to a tamper-evident audit log.

Each entry is chained: a SHA-256 hash of the previous entry is included in the next one, making it detectable if any record is deleted or modified. You can verify chain integrity from the dashboard or via the API. Export is available as CSV or JSON for ingestion into your SIEM. PII fields are redacted in exports by default, with per-field opt-in for internal compliance workflows.

Why tamper-evident? Audit logs are only useful for compliance if an attacker who compromises the app layer can't quietly clean up after themselves. The hash chain means any gap or modification is immediately visible.

Audit log inserts are locked down at the database level: the application role has INSERT revoked on the audit_logs table directly. All writes go through a SECURITY DEFINER function that enforces the schema and cannot be bypassed by application code.

Webhooks

ApexMCP now emits outbound webhooks for platform events: tool calls, connector status changes, member changes, billing transitions, and more. Configure a target URL per event type, and every matching event is delivered with an HMAC-SHA256 signature in the X-ApexMCP-Signature header so your endpoint can verify authenticity.

Delivery failures are retried with backoff. A per-org event ring buffer lets you inspect recent webhook payloads and replay failed deliveries from the dashboard.

Billing and Tiers

Billing is live and Stripe-integrated. Tiers — limits, feature flags, and prices — are all database-driven rather than hardcoded, which means we can adjust them without a deploy. The trial tier is fully functional: you get a 14-day trial with a real MCP endpoint, real connectors, and real audit logs. Upgrading converts the trial subscription to paid without data loss.

Usage is metered per API call against your MCP endpoint, aggregated daily, and reflected in the dashboard's usage chart in near real-time. The billing view shows current period consumption, your tier limits, and a day-by-day breakdown.

Team and Access Management

BYOIDP — Bring Your Own Identity Provider

Enterprise teams that already have an IdP (Okta, Azure AD, Google Workspace, any OIDC-compliant provider) can connect it to ApexMCP. Members authenticate through their existing SSO flow. Provisioning and deprovisioning can be automated via SCIM. No separate password to manage, no shadow IT.

IP allowlist

Lock down access to your MCP endpoint, your dashboard, or both by IP range. CIDR notation, per-context (MCP traffic vs. dashboard traffic can have separate rules). Requests outside the allowlist are rejected before they reach the application layer.

OAuth2 agent tokens

For automated pipelines — scheduled agents, CI/CD integrations, server-to-server calls — you can issue OAuth2 client_credentials tokens scoped to specific tools or connector sets. These tokens are separate from user sessions, can be rotated independently, and show up distinctly in audit logs so you can tell human actions from agent actions.

MCP Endpoint Improvements

Tool enable/disable

New tools discovered from a connector are now disabled by default. You explicitly enable the tools you want to expose to agents. This prevents a schema change or a new connector from accidentally expanding an agent's surface area without review.

Provisioning versions and rollback

Every time your MCP endpoint is re-provisioned — new connectors added, tools toggled, schema refreshed — a versioned snapshot is saved. If a change breaks an agent workflow, you can roll back to the previous provisioning state in one click from the dashboard.

Compliance Pages

We've shipped the compliance foundation that enterprise procurement requires: a Trust Center with security architecture overview and sub-processor list, a Privacy Policy with data retention detail, a Terms of Service, and a Security page covering encryption, authentication, audit logging, and our responsible disclosure process.

Status Page

Live uptime monitoring is at apexmcp.ai/status, powered by BetterStack. Incident history, response time graphs, and component-level status for the gateway, MCP manager, connector service, and identity provider.

What's Next

The platform is approaching launch-ready. The remaining work before we open access broadly:

If you're building on MCP and want early access, the waitlist is open.

Get early access to ApexMCP

Private beta. MCP endpoints, connectors, audit logs, and team management — production-ready from day one.

Join the waitlist