Skip to main content
Your admin has set up Ultra for your team. Ultra is a lightweight proxy that sits between your AI client (Claude Desktop, Cursor, VS Code, etc.) and the MCP servers you use every day. It gives your security team visibility into MCP activity without changing how you work. This guide gets you up and running in under 5 minutes.

Install Ultra

Visit ultra.security and download the installer for your platform. Run the installer and it will automatically detect your AI clients and configure them.
Restart your AI client (Claude Desktop, Cursor, etc.) after installing for Ultra to take effect.

Connect to Your Team

Your admin will provide you with a link to join your organization’s Ultra Hub workspace. Once you receive the invite:
Ask your AI client:
  • “Log in to Ultra Hub”
  • “Link this gateway to Ultra Hub”
Follow the browser prompts to authenticate and join your workspace.
Once linked, your MCP activity syncs to Ultra Hub where your admin can see connected gateways, manage servers, and monitor activity across the team.

Add Your MCP Servers

This is the part that replaces your old MCP setup. Instead of editing JSON config files manually, you add servers through Ultra and it handles configuration, authentication, and transport automatically.
Ask your AI client to add the servers you need:
  • “Add the Vanta MCP server”
  • “Connect to the GitHub MCP server”
  • “Set up the Notion MCP server”
  • “Add the Slack MCP server”
Your client will search the registry, install the server, and walk you through authentication.Restart your AI client after adding servers.
Select a server to see setup instructions.
Connects your AI client to your Notion workspace for reading and writing pages, databases, and comments.
Ask your AI client: “Add the Notion MCP server”Notion uses OAuth. You will be redirected to Notion in your browser to authorize access to your workspace.
You need to be a member of the Notion workspace you want to connect. The OAuth consent screen will show which workspace pages the integration can access.
Lets your AI client send messages, search conversations, and interact with your Slack workspace.
Ask your AI client: “Add the Slack MCP server”Slack uses OAuth. You will be redirected to Slack in your browser to authorize.
Connects your AI client to Linear for reading and managing issues, projects, and cycles.
Ask your AI client: “Add the Linear MCP server”Linear uses OAuth. Authorize in your browser when prompted.
Gives your AI client access to repositories, issues, pull requests, and code search.
Ask your AI client: “Add the GitHub MCP server”You will be prompted for a Personal Access Token (PAT). Create one at github.com/settings/tokens with the scopes you need (typically repo and read:org).
Use a fine-grained PAT scoped to only the repositories you need. This follows the principle of least privilege and is safer than a classic token with broad access.
Connects your AI client to Figma for accessing design files, components, and projects.
Ask your AI client: “Add the Figma MCP server”Figma uses OAuth. You will be redirected to Figma in your browser to authorize access.
Gives your AI client access to AWS services, documentation, and infrastructure management.
Ask your AI client: “Add the AWS MCP server”You will need AWS credentials configured on your machine. If you haven’t already, set up your AWS credentials before adding this server.
Connects your AI client to Atlassian Jira for reading and managing issues, sprints, and projects.
Ask your AI client: “Add the Jira MCP server”You will be prompted for your Jira instance URL and an API token. Create one at id.atlassian.com/manage-profile/security/api-tokens.
Connects your AI client to your Mintlify documentation for searching and reading docs pages.
Ask your AI client: “Add the Mintlify MCP server”You will need your Mintlify project subdomain or API key.
Gives your AI client access to Salesforce CRM data, objects, and reports.
Ask your AI client: “Add the Salesforce MCP server”Salesforce uses OAuth. You will be redirected to Salesforce in your browser to authorize access to your org.
Connects your AI client to Datadog for querying metrics, logs, and monitors.
Ask your AI client: “Add the Datadog MCP server”You will be prompted for your Datadog API key and application key. Find these in your Datadog org settings under API Keys.
Gives your AI client read access to a PostgreSQL database for querying tables and schemas.
Ask your AI client: “Add the PostgreSQL MCP server”You will be prompted for your database connection string.
Only connect to databases you are comfortable exposing to your AI client. Use a read-only database user when possible.
Lets your AI client interact with your compliance data, controls, and vulnerabilities.
Ask your AI client: “Add the Vanta MCP server”When prompted, authorize through your browser. Vanta uses OAuth, so you will be redirected to Vanta to grant access.
You need an active Vanta account with appropriate permissions. If you see an authentication error, check with your Vanta admin that your account has API access enabled.
Gives your AI client read/write access to specific directories on your machine. Useful for letting AI tools work with your project files.
Ask your AI client: “Add the filesystem server for my project files”You will be asked which directories to allow access to. Only grant access to directories you want the AI to read/write.
The filesystem server can read and write files. Only grant access to directories you are comfortable sharing with your AI client. Never point it at your home directory or root.
Don’t see your server listed? Check Upstream Servers for the full configuration guide.

What’s Next

Upstream Servers

Full guide to server configuration and management

Ultra Hub

Learn about team management features

Observability

Deep dive into traces and audit logs

How It Works

Understand the proxy architecture