Understanding the Target Audience
The recent update from Microsoft regarding Azure Logic Apps is particularly relevant for IT professionals, developers, and business managers. These individuals often face challenges when integrating various systems, ensuring secure access to workflows, and maintaining operational efficiency. Their primary goals include streamlining processes, enhancing productivity, and leveraging existing tools to create more efficient workflows. They typically seek detailed technical specifications, integration capabilities, and best practices for implementation, often turning to technical documentation, tutorials, and community forums for support.
Overview of the MCP Public Preview
Microsoft has launched a public preview that allows Azure Logic Apps (Standard) to operate as Model Context Protocol (MCP) servers. This functionality enables Logic Apps workflows to be exposed as agent tools, which can be discovered and utilized by MCP-capable clients, such as Visual Studio Code with Copilot. This integration opens up new avenues for automation and efficiency in workflow management.
Key Features of the Release
- Remote MCP Server on Logic Apps (Standard): Users can configure a Standard logic app to host an MCP endpoint (/api/mcp), exposing HTTP Request/Response workflows as tools. Authentication is managed through Easy Auth, with MCP endpoints defaulting to OAuth 2.0.
- API Center Registration Path (Preview): Users can create and register MCP servers in Azure API Center, where selected managed connector actions become tools with cataloging and governance capabilities.
Technical Specifications
Understanding the technical requirements is crucial for effective implementation:
- Workflow Shape: Tools must be implemented as an HTTP Request trigger along with a Response action.
- Authentication & Access Control: MCP uses OAuth 2.0 by default, with Easy Auth enforcing client, identity, and tenant restrictions.
- Transports: Streamable HTTP is available out of the box, while Server-Sent Events (SSE) requires VNET integration and specific settings.
- Enablement Switch: MCP APIs can be enabled by adding
extensions.workflow.McpServerEndpoints.enable=truein the host.json file.
API Center Path Limitations
While creating MCP servers via API Center backed by Logic Apps, users should be aware of several limitations:
- Start with an empty Standard logic app resource.
- Only one connector per MCP server is allowed.
- Built-in service-provider and custom connectors are not supported; only managed connectors can be used.
- Only one action per tool is permitted.
Why Standard Logic Apps?
Standard Logic Apps operate on a single-tenant runtime (on Azure Functions), which supports multiple workflows per app and direct integration with virtual networks and private endpoints. This setup is essential for safely exposing private systems to agents while ensuring predictable throughput and latency. In contrast, Consumption Logic Apps are multitenant, support a single workflow per app, and operate on a pay-per-execution model, which may not be suitable for all use cases.
Tooling Semantics and Discoverability
To improve agent tool selection and invocation reliability, Microsoft recommends adding trigger descriptions, parameter schemas, and required markers. These annotations are read by MCP clients and can significantly influence calling behavior, making it easier for users to interact with the tools.
Operations, Governance, and Testing
For diagnostics and auditability, run history, Application Insights, and Log Analytics are available. Visual Studio Code offers quick client validation through MCP: Add Server, which includes OAuth sign-in and tool enumeration. Registering via API Center enhances the discoverability and governance of MCP servers across teams.
Production Notes
For those considering production use, it is important to note the following:
- SSE requires both VNET and the cross-worker setting; without these, users should utilize streamable HTTP.
- Easy Auth must be configured accurately, including the “allow unauthenticated” toggle, or client sign-in flows may fail despite OAuth expectations.
- Throttling, idempotency, and schema versioning remain the user’s responsibility when wrapping connectors as tools.
Conclusion
The public preview of MCP for Logic Apps (Standard) presents a significant opportunity for users to expose HTTP-based workflows as OAuth-protected tools. This functionality allows for the cataloging of tools in the API Center and provides access to private systems through single-tenant networking. For teams already utilizing Logic Apps, this update offers a low-friction, standards-aligned approach to operationalizing enterprise agent tooling, while keeping in mind the API Center limits, SSE prerequisites, and Easy Auth configurations during rollout.
FAQ
- What is the Model Context Protocol (MCP)? MCP is a protocol that allows workflows to be exposed as tools that can be discovered and called by clients.
- How do I configure a Standard Logic App to host an MCP endpoint? You can configure it by setting up an HTTP Request trigger and a Response action in your Logic App.
- What authentication method is used for MCP endpoints? MCP endpoints use OAuth 2.0 by default, managed through Easy Auth.
- Can I use custom connectors with MCP servers? No, only managed connectors are supported in the current preview.
- What are the limitations when creating MCP servers via API Center? Limitations include starting with an empty Standard logic app resource, one connector per MCP server, and only one action per tool.

























