MCP Grows Up: The Spec That Makes AI Agents Real

MCP Grows Up: The Spec That Makes AI Agents Real

Nate Barbettini's avatar
Wils Dawson's avatar
Nate Barbettini & Wils Dawson
NOVEMBER 14, 2025
3 MIN READ
Rays decoration image
Ghost Icon

You tell your AI agent: “Send that report to my manager.”

It drafts the perfect message — and then stops.

The problem isn’t intelligence; it’s identity.

It can’t press “send,” because your email — like every good enterprise system — lives behind an auth wall.

That’s the invisible barrier keeping AI from doing real work: agents can’t safely act on behalf of their users.

That small roadblock points to a much bigger one. AI agents can reason, plan, and communicate — but they’ve been locked out of the real world. Every time an agent tries to connect to a real system like Gmail, Slack, or Salesforce, it hits that wall.

The invisible blocker behind every stalled agent project

Developers already know the culprit. Model Context Protocol (MCP) — the open standard for connecting AI tools — was designed beautifully for context sharing and tool discovery. But it's missing a crucial piece: secure external authorization.

Agents need OAuth tokens to act on behalf of users, but MCP didn’t define a safe way to get them. The result was predictable: hardcoded service accounts, unscalable hacks, and security reviews that killed projects before they reached production.

MCP worked great for single-user demos — but not for the multi-user, compliance-heavy environments where real work happens.

Why this matters for the enterprise

For enterprises, this wasn’t a minor technical issue, it was a stop sign. Without a secure, standards-based way to handle external authorization, enterprise AI teams couldn’t let agents touch real data or integrate with core systems. No matter how powerful the models or how elegant the workflows, they couldn’t go live — not without duplicating access policies, writing orchestration code, and building custom audit systems just to stay compliant. And no enterprise has time for that on their roadmap.

That’s the bottleneck URL Elicitation removes.

It’s not just about convenience — it’s about compliance, control, and scale.

With URL Elicitation, enterprises can finally deploy internal workforce agents that connect safely to external SaaS tools — using the same OAuth flows their security teams already trust. It’s the bridge between proof-of-concept and production rollout.

And when enterprises can deploy securely, innovation downstream accelerates. Startups, developers, and open-source communities all benefit from a shared, trustworthy standard. MCP becomes not just usable, but deployable.

The breakthrough: URL Elicitation

Arcade authored the new Specification Enhancement Proposal (SEP) for MCP — URL Elicitation — developed alongside Anthropic and the broader MCP community. It introduces a simple but powerful solution: instead of passing credentials through an untrusted client, the agent triggers a secure browser flow where the user authenticates directly. Tokens never touch the model or client, and security boundaries stay intact.

While existing form-based elicitation methods work fine for non-sensitive information, there wasn’t a mechanism to handle sensitive data. URL Elicitation now fills that gap for any action that requires authentication — unblocking MCP for production use.

From demos to deployment

This change unlocks the next phase of the MCP ecosystem.Enterprises can now connect AI agents to real systems securely. Developers can focus on deploying agents, not managing tokens. Security teams can greenlight pilots instead of blocking them.

It’s the difference between seeing AI agents in demos and seeing them in production.

Building the enterprise runtime for MCP

As the authors of this spec, Arcade is already shipping it.Arcade’s MCP Runtime fully supports URL Elicitation today — enabling enterprises to deploy multi-user agents with user-level permissions, standards-based security, and centralized governance out of the box.

Because building AI agents that can drive real impact requires trust, control, and action.

With URL Elicitation, MCP can finally deliver all three.


Learn more: the engineering deep dive

If you want to go deeper into how URL Elicitation works under the hood — from the OAuth token flow to the spec evolution itself — we’ve documented the full technical journey in our original post,Building MCP Together: Arcade’s Contribution to Secure Agent Auth

It walks through the security model, design decisions, and code-level examples that show why this spec finally makes MCP production-ready.

Read the full spec → Check out the complete URL Elicitation specification here.

Build the future with Arcade

Arcade is the only runtime built for secure, multi-user MCP deployments.If you’re building agents for real enterprise environments, this is the moment to start.

👉 Sign up for free and see how quickly you can deploy agents that your security team will actually approve.

SHARE THIS POST

RECENT ARTICLES

COMPANY NEWS

Your MCP Client Just Got Superpowers: Arcade Tools are now in Cursor, VS Code, and more

If you've been using Cursor, Claude Desktop*, VS Code, or any MCP-compatible client, you've probably experienced the same frustration: your agent is brilliant at reasoning through workflows, but the moment it needs to actually do something across your tools, you're back to juggling configurations for each individual tool, debugging auth flows, and troubleshooting why the setup that worked yesterday doesn't work today. Those days are over. With the launch of Arcade MCP Gateways, your MCP client

Rays decoration image
THOUGHT LEADERSHIP

Agent Skills vs Tools: What Actually Matters

The agent ecosystem has a terminology problem that masks a real architectural choice. "Tools" and "skills" get used interchangeably in marketing decks and conference talks, but they represent fundamentally different approaches to extending agent capabilities. Understanding this distinction is the difference between building agents that work in demos versus agents that work in production. But here's the uncomfortable truth that gets lost in the semantic debates: from the agent's perspective, it'

Rays decoration image
THOUGHT LEADERSHIP

Using LangChain and Arcade.dev to Build AI Agents For Consumer Packaged Goods: Top 3 Use Cases

Key Takeaways * CPG companies hit a multi-user authorization wall, not a capability gap: Most agent projects stall in production because leaders can’t safely govern what permissions and scopes an agent has after it’s logged in across fragmented, domain specific systems (ERPs, retailer portals, communications). Arcade.dev’s MCP runtime replaces months of custom permissioning, token/secret handling, and auditability work. * Weather-based demand forecasting delivers fastest ROI: Unilever achiev

Blog CTA Icon

Get early access to Arcade, and start building now.