Skip to main content
This page explains the major MCP server styles and the tradeoffs between them.

Why This Matters

Most integration issues come from transport mismatch:
  • local subprocess workflows expect stdio
  • hosted/shared workflows expect HTTP transports
  • some clients still use older SSE-compatible remote flows

Style Comparison

StyleTransportWhere it runsTypical authBest use caseOfficial references
Local subprocess serverstdioLocal machine (spawned process)Usually local trust boundary; optional server authBrowser automation and local dev toolingMCP transports, Claude Code MCP
Remote MCP server (modern)Streamable HTTPRemote serviceBearer/session/OAuth (server-defined)Shared hosted tools and multi-user environmentsMCP transports, Claude Code MCP
Remote MCP server (legacy compatibility)SSE + POST fallbackRemote serviceHTTP auth (server-defined)Backward compatibility with older client/server behaviorMCP transports
Connector-style remote usageRemote HTTP MCP onlyRemote service reachable by API providerOAuth or bearer token via connector configTool access in API-based agent workflowsAnthropic MCP connector
Registry-discovered ecosystem serversVaries (stdio and HTTP)Local or hostedServer-definedDiscovering existing production/community serversMCP Registry, MCP servers repo, servers README

How To Choose Quickly

  1. Use stdio when the tool must run locally and you control the machine.
  2. Use Streamable HTTP when the server is shared, hosted, or multi-tenant.
  3. Use legacy SSE mode only when a required client/server still depends on it.
  4. Use connector-style remote MCP when an API provider requires remote-only integration.

Security Notes

  • Validate Origin headers for browser-based transports and avoid exposing local servers beyond trusted boundaries.
  • Prefer binding local HTTP listeners to loopback (localhost) unless you explicitly need network exposure.
  • Treat access tokens as bearer credentials and store/forward them only over TLS.
  • Keep remote MCP endpoints authenticated by default; avoid unauthenticated public tool surfaces.
Authoritative guidance: MCP transports + security considerations