Command Palette

Search for a command to run...

Part IV · Zoho MCP Service · Chapter 13

Security, Governance & Audit Logging

279 words · preserved verbatim from the master reference

Zoho MCP Platform Security

ControlDetails
AuthenticationOAuth 2.1 with two-layer consent (MCP account + service-level)
Unique Server URLEach MCP server gets a cryptographically unique URL; treat as a secret
API Key RotationImmediate revocation and regeneration via UI
Permission scopingAgents operate under invoking user's RBAC; no privilege escalation
Enterprise-grade protocolsEncrypted data handling, access controls (Zoho MCP product page)
Audit trailsAll tool invocations logged (documented in Billing; applies platform-wide)
Connection managementSuper Admin can share org-wide tokens OR enforce per-user auth

Authorization Modes Comparison

On-Demand (per-user)Via Connection (org-wide)
Who authenticatesEach user individuallySuper Admin sets up once
Applies toZoho products (default)Third-party services
RevocationPer-user revokeAdmin-controlled
Use caseUser-specific data boundariesShared service accounts

MCP-Specific Governance Risks (Industry Context)

Industry security research notes that MCP OAuth governance introduces two-layer consent complexity and "shadow MCP" risks if unvetted servers proliferate (Nudge Security, Feb 2026; Obot AI, Apr 2026). Zoho's centralized console and admin-controlled Connections feature mitigate this somewhat by providing a single configuration point and organizational token management. Best practices:

  1. Restrict tool selection to only what is needed for each task
  2. Use Authorization on Demand for sensitive data (user-scoped)
  3. Regularly audit MCP Logs (ZUID, Execution ID) for anomalous activity
  4. Rotate API keys if Server URL is suspected compromised
  5. Use Zoho's sandbox environment for testing before production deployment