Connect Trino to Cursor

Enable Cursor to access your Trino data through secure, governed MCP servers—no manual queries or engineering bottlenecks

How it works

1. Connect your database

Provide your Trino connection details. We'll securely connect to your data source.

2. Define your MCP tools

Configure the tools and data available to your AI agents.

3. Deploy your MCP server

We convert your config into a production-ready MCP server with enterprise governance.

How to connect

Connect your Trino database

  • Host and port: Trino server endpoint and port number
  • User and authentication: Username and password (optional for anonymous access)
  • Catalog and schema: Target catalog (e.g., hive, iceberg) and schema for data access
  • Configure data access: Define which catalogs, schemas, and queries are available to AI agents
  • Automatic deployment: We deploy your MCP server with enterprise governance—no manual setup required

Link your PostgreSQL MCP to Cursor

  • 1.Open Cursor settings (⌘,)
  • 2.Navigate to Features → MCP Servers
  • 3.Add your MintMCP Gateway endpoint
  • 4.Authenticate with your organization credentials
  • 5.Use AI-powered database queries while coding

Other supported AI clients

One-time setup connects Trino to all your AI tools

What you get

Faster deployment

Define your Trino connection once, then add more MCP tools as needed through simple config updates. No code required.

Rapid iteration

Build team or use-case specific tools rapidly by adding new queries and parameters to your config. Deploy updates in minutes, not days.

Enterprise governance

All database access goes through MintMCP Gateway with full observability, authentication, rate limiting, and audit trails.

Why MintMCP gateway

Centralized governance

Unified authentication, audit logging, and rate control for all database MCP connections.

One-click deployment

Instantly enable database MCP for AI teams via MintMCP's standardized gateway without manual server setup.

OAuth + SSO enforcement

Automatic enterprise authentication wrapping for database MCP endpoints.

Host stdio servers on MintMCP instead of running locally

Containerized servers become accessible to clients like ChatGPT without local installations. Better risk management and security posture without requiring users to run servers on their machines.

Observability and control

Real-time dashboards for monitoring usage, detecting anomalies, and maintaining SLA compliance.

Enterprise hardening

High availability, security, and compliance alignment transform MCP from developer utility to production-grade infrastructure.

Supports shared and per-user auth

Flexibility to configure service accounts at the admin level or enable individual OAuth flows. Secrets remain protected while users gain access, with centralized revocation capabilities.

Granular tool access control

Configure tool access by role. For example, enable read-only operations and exclude write tools like create and delete.

Use cases

Conversational data lake analytics

Enable data teams to explore petabyte-scale data lakes through natural language queries—AI agents access S3, HDFS, and cloud storage using Hive, Iceberg, or Delta Lake formats without writing SQL or understanding data partitioning.

Federated queries across sources

Let analysts investigate data across MySQL, PostgreSQL, Cassandra, MongoDB, and object storage by asking questions naturally—AI agents join data from multiple sources without manual ETL or federated query syntax.

Ad-hoc analytics and exploration

Enable business users to run exploratory analytics and answer ad-hoc questions through conversational queries—AI agents access Trino's distributed SQL engine without Presto knowledge or query optimization skills.

FAQs

Yes. MintMCP Gateway is SOC 2 compliant and uses OAuth-based authentication for all database MCP interactions.

Ready to connect Trino to Cursor?

Join enterprises that trust MintMCP Gateway to manage their database AI integrations securely and efficiently.