MCP Server Guides
Set up the incident.io MCP server
The incident.io MCP server lets AI agents create and update incidents, manage alerts, handle escalations, and interact with on-call schedules. This guide covers enabling the Remote MCP feature in incident.io and connecting it to MintMCP.
Prerequisites
- A MintMCP admin account
- An incident.io account (Pro or Enterprise plan recommended for AI features)
Enable the Remote MCP server
- Log in to your incident.io dashboard.
- Go to Settings → MCP.
- Enable the Remote MCP server.
Add incident.io to MintMCP
- Per-user OAuth (recommended)
- API key
Per-user OAuth lets each team member authenticate with their own incident.io account. Actions are attributed to that user and respect their dashboard permissions.
- In MintMCP, go to MCP store > Manage store.
- Find the incident.io MCP server and click to configure it.
- Select OAuth and click Save.
incident.io API keys are org-level service tokens — one key is shared across all tool calls and actions run as a service actor, not as any individual user. Use this option for automated agents and pipelines.
Generate an API key
- In your incident.io dashboard, go to Settings → API keys.
- Click New API key.
- Enter a name — for example,
MintMCP. - Select the account-level roles the key should have. Grant only the roles your agents need — for example,
incident_creatorandincident_editorto create and update incidents. - Click Create. Copy the key immediately — it is shown only once.
Configure in MintMCP
- In MintMCP, go to MCP store > Manage store.
- Find the incident.io MCP server and click to configure it.
- Select API key, paste the key, and click Save.
Security considerations
- API keys are shown only once at creation — copy the value immediately.
- API keys do not expire until deleted. Rotate them if they are compromised.
- Grant each key only the roles it needs — a key can only be granted roles within its creator's own role scope.
- The
api_keys_managepermission required to create keys can only be granted from the dashboard, not via the API. - Per-user OAuth ties actions to individual identities and permissions. An API key runs as a service actor — its actions are not attributed to a specific person.
Next steps
- Tool customization — Control which incident.io tools are exposed to users
- MCP gateway administration — Manage access and permissions