As GitHub Copilot expands its capabilities through the Model Context Protocol (MCP), it introduces an extra security challenge: how to give developers access to powerful AI tools while maintaining control over what external services those tools can access. This post walks you through setting up a curated MCP registry and enforcing access controls across your organization or enterprise when using Github Copilot.
Why restrict access?
MCP servers extend Copilot's capabilities by connecting it to external tools, databases, APIs, and services. While this opens up incredible possibilities for developer productivity, it also introduces potential security risks. Without proper controls, developers could:
- Connect Copilot to unauthorized external services
- Expose sensitive data to third-party MCP servers
- Use tools that don't meet your organization's security or compliance requirements
- Bypass established security policies through AI-assisted workflows
A way is needed to provide a curated catalog of approved MCP servers while preventing access to unapproved ones.
Understanding MCP registries
An MCP registry serves as a catalog of approved MCP servers, similar to a curated vendor list. Each registry entry points to a server's manifest, which describes the tools, resources, and prompts that server exposes.
The registry serves two key purposes:
- Discovery: Makes approved MCP servers visible and easily installable in MCP-compatible environments
- Enforcement: When combined with the "Registry only" policy, prevents usage of any MCP servers not defined in your internal registry
Think of the registry as your recommended vendor list, while the enforcement policy determines whether that list is merely suggested or strictly required.
Configuring MCP registry access
To manage the MCP registry access, go to the Organization settings in Github:
- Click your profile picture, then Organizations
- Next to your organization, click Settings
- In the sidebar under "Code, planning, and automation," click Copilot → Policies
- Under "Features," ensure MCP servers in Copilot is set to Enabled
- In the MCP Registry URL (optional) field, enter your registry URL
- Click Save
When you also select the "Registry only" enforcement option, the user experience changes significantly:
- In IDEs: Blocked servers appear greyed out with a clear warning message
- In configuration files: Blocked servers show "run": "blocked"in themcp.jsonfile
- For developers: They can only install and use MCP servers from your approved registry
Remark: MCP registry and allowlist controls are still rolling out across Copilot environments, so it could be that this option doesn’t work yet in your IDE.
Important limitations
The current "Registry only" enforcement has some limitations you should be aware of:
- Name-based matching: Enforcement is based only on server name/ID matching, which can be bypassed by editing configuration files
- No strict installation prevention: The system doesn't yet prevent installation of non-registry servers at the filesystem level
- Recommended security posture: For maximum security, consider disabling MCP servers entirely until strict enforcement becomes available
GitHub is actively working on enhanced enforcement with stricter configuration matching that will verify command paths, arguments, and environment variables.
More information
Managing policies and features for GitHub Copilot in your enterprise - GitHub Enterprise Cloud Docs
Internal MCP registry and allowlist controls for VS Code Insiders - GitHub Changelog
Meet the GitHub MCP Registry: The fastest way to discover MCP Servers - The GitHub Blog



