Pylee Platform Overview

Pylee is the infrastructure layer that makes MCP production-ready.
Where MCP defines the open protocol for exposing tools and data, Pylee provides the secure hosting, registries, governance, and observability that enterprises need to operate at scale.
We apply proven infrastructure patterns — organizations, registries, versioning, secrets, and audit — to MCP. Developers focus on building servers. Pylee handles everything else.

Organizations and Teams

Every account in Pylee begins with an organization.
Organizations are the top-level container for:
  • Inviting team members: manage admins, developers, and users with role-based permissions.
  • Access control: grant permissions at the org, registry, server, or tool level.
  • Audit and compliance: track activity across the entire org.
See Understanding Organizations for details.

Secrets and Variables

Secrets and environment variables are managed centrally in Pylee’s encrypted vault.
Resolution follows a clear most specific → least specific order:
  • User level: personal tokens or local configs.
  • Server level: one server’s runtime.
  • Registry level: shared across all servers in a registry.
  • Org level: defaults shared across the entire organization.
This hierarchy allows centralized defaults with granular overrides where needed.
No keys in configs, no drift between environments. All reads/writes are audited, and masked values never display in plaintext.
ScopeExampleOverride?Typical Use
UserGITHUB_TOKEN (nick)✅ overrides server/registry/orgPersonal tokens, local testing
ServerDB_CONN_STR (customer-svc)✅ overrides registry/orgPer service credentials/config
RegistryOPENAI_MODEL (prod-registry)✅ overrides orgShared server defaults for a project
OrgSENTRY_DSN (org)⛔ cannot override user/server/registryGlobal defaults/fallbacks
See Secrets & Variables.

Registries

Registries are the unit of governance in Pylee. They are more than a list of servers — they provide:
  • Namespaces and versioning rules.
  • Role based access controls.
  • Approval workflows.
  • Shared secrets and configs.
Teams often use multiple registries:
  • Production registry with pinned, approved versions.
  • Development registry for experimentation.
  • Team registries for specialized workflows.
See Understanding Registries.

Servers and Configurations

An MCP server in Pylee includes its runtime, configuration, secrets, and versions.
When you deploy a server, Pylee:
  • Provisions secure endpoints with SSL/TLS.
  • Injects secrets at runtime.
  • Configures authentication (OAuth 2.1, API key, JWT, SAML/SSO).
  • Autos-scales based on load.
  • Enables version pinning and rollback.

Versioning

  • Pin exact versions to prevent drift.
  • Run canary deployments for new builds.
  • Roll back instantly if needed.
  • Track config and version history with full audit.
See Server Configurations and Versions.

Observability and Governance

Pylee gives every team visibility and control:
  • Monitoring dashboards: requests, latency, errors, token usage.
  • Cost management: attribute spend by team, registry, or server.
  • Approval workflows: require reviews for deployments, updates, or access.
  • Audit logging: immutable, exportable logs of every change and invocation.
See Governance & Approvals.

Developer Experience

Pylee is designed to make MCP servers easy to build, test, and adopt:
  • Local development support: run and debug with production-like authentication.
  • One-click IDE integration: deep links for Claude Desktop, Cursor, VS Code.
  • APIs for automation: publish new server versions, update configs, integrate with CI/CD.
See Developer Experience.

How the Platform Fits Together

Think of Pylee as the platform layer on top of MCP:
  • MCP Protocol defines interoperability.
  • Pylee Platform provides hosting, registries, governance, observability.
  • Clients & Agents consume MCP servers safely and consistently.

Layered architecture


Example Journeys

  • Developer publishes a new server → hosted, versioned, shared via registry.
  • Platform team imports an external server → reviews, applies RBAC, pins version.
  • Security team monitors audit logs → enforces approval workflows, manages secrets centrally.

Deployment Options

Pylee fits different operational models:
  • Pylee-hosted: fastest path to production.
  • Enterprise VPC or on-prem: for regulated environments with strict compliance.
[Diagram Placeholder: Deployment options diagram – Pylee Cloud vs Customer VPC/On-Prem, same registry + governance experience] See Platform Implementation.

Next Steps