Recommended Use: Work through this checklist with your platform owner, security lead, and application owner together.
Source Guides
This checklist consolidates the most important steps from:- Trial Guide
- Registering MCP Servers
- Managing Policies
- Adding Your Agents
- Connecting Accounts to Barndoor
- Connect AI clients to Barndoor
- Connect your IdP
- IP Whitelisting
Go-Live Phases
1. Platform Readiness
1. Platform Readiness
Before configuring production integrations, confirm that your rollout owners, environment, and success criteria are defined.
- Confirm who owns the Barndoor production rollout internally.
- Confirm admin access to the Barndoor production organization.
- Decide which MCP servers, agents, and user groups are in scope for the first release.
- Define the launch success criteria.
- Identify a pilot agent, pilot server, and pilot user cohort for final validation.
- Document the production Barndoor base URLs your team will use.
2. MCP Server Registration and Connectivity
2. MCP Server Registration and Connectivity
Use this phase to ensure Barndoor can reliably reach and authenticate to every production MCP server you plan to expose.
- Register each production MCP server in Barndoor.
- Confirm whether each server is Barndoor Hosted, Barndoor Curated, or Custom.
- Set clear names, slugs, and descriptions for each production server.
- Enter the correct OAuth client credentials or upstream auth configuration.
- For custom servers, validate the server URL, protocol, issuer, auth endpoint, token endpoint, scopes, and metadata.
- Complete the OAuth connection flow for each server that requires admin-level setup.
- Verify the server appears connected and available in Barndoor.
- Test at least one representative tool call path per production server.
3. Agent Registration and App Configuration
3. Agent Registration and App Configuration
Agents should be registered and mapped to the right callback behavior before you let them reach production tools.
- Register every production agent or application in Barndoor.
- Confirm the correct application type for each agent.
- Review callback URLs and allowed logout URLs.
- Store generated credentials securely.
- Confirm each agent is associated with the correct internal owner.
- Verify that the agents included in first release are the only ones intended to receive production access.
4. Identity and Access Foundation
4. Identity and Access Foundation
If your rollout depends on enterprise identity or role-aware policy enforcement, complete the IdP integration before launch.
- Configure your IdP connection in Barndoor.
- Test SSO login with a standard user.
- Configure admin role mapping from IdP groups if needed.
- Verify that admin users receive admin access automatically.
- Verify that non-admin users remain standard users.
- Confirm your offboarding path works by removing a user from the mapped group and retesting login.
- Confirm the user and group attributes needed for production policies are available at runtime.
5. Connected Accounts and User Authorization
5. Connected Accounts and User Authorization
6. Policy Design and Enforcement
6. Policy Design and Enforcement
This is the most important pre-launch review. Your production policy model should be explicit, validated, and exercised before real traffic reaches production tools.Policy creationReference: Managing Policies
- Validate every new policy with the v2 validation endpoint before activation.
- Create production policies in
DRAFTfirst. - Confirm every policy has a clear name and description so admins understand what it governs.
- Confirm every policy has the correct
mcp_server_id. - Confirm
application_idsare scoped narrowly to the intended agents. - Confirm the correct agents are selected for each policy, especially when multiple AI clients are in scope.
- Review the MCP server metadata and full tool list before deciding what AI should be allowed to access.
- Toggle off any tool calls that should never be reachable by AI in production.
- Review rule sets for allow, deny, and conditional behavior.
- Confirm any condition expressions match your real runtime attributes.
- Test each policy with representative users, roles, groups, and tool calls before activation.
- Verify expected allow outcomes for approved actions.
- Verify expected deny outcomes for prohibited actions.
- Confirm denied requests are easy to trace back to the exact blocking policy.
- Promote only reviewed policies to
ACTIVE. - Confirm your team knows when to use
DRAFT,ACTIVE,INACTIVE, andARCHIVED. - Verify inactive and archived policies are removed from the active operational view without losing history.
- Confirm the team knows when to clone a policy instead of editing a stable production policy directly.
- Use policy summary and list endpoints to verify the final production state.
- Confirm admins can review policy name, status, server scope, agent scope, and last-updated metadata in one place.
- Verify filters such as agent, MCP server, and status return the expected policy set.
- Confirm enforcement logs show who made the call, which agent was used, which MCP server and tool were involved, and whether the action was allowed or denied.
- Confirm denied actions are traceable back to the exact policy or restriction that blocked them.
- Review policy revision history after changes to confirm auditability.
- Confirm you know which legacy toggles still exist and when not to use them.
If you are migrating from older policy APIs, make sure your team is using the v2 schema. The current model uses
application_ids, authorized, roles_groups, and lifecycle status values like DRAFT and ACTIVE.7. Client Rollout and User Experience
7. Client Rollout and User Experience
Once servers, agents, and policies are ready, confirm your target AI clients can connect and behave correctly end to end.
- Decide which AI clients are in scope for the first production release.
- Configure each client with the correct Barndoor MCP endpoint.
- Test authentication from each target client.
- Confirm only the intended MCP tools appear to the client.
- Run a representative user workflow in each client.
- Verify policy enforcement behavior during real tool calls.
- Capture any client-specific rollout notes for support teams and end users.
8. Network and Security Controls
8. Network and Security Controls
If Barndoor needs to reach internal infrastructure, complete network approvals before production traffic starts.
- Add Barndoor’s static outbound IPs to your firewall allowlist where required.
- Confirm the required inbound ports are open.
- Validate that only expected Barndoor traffic can reach your custom MCP servers.
- Confirm TLS and upstream auth requirements are enforced on custom servers.
- Review internal logging and alerting for Barndoor-originated requests.
- Confirm your security team has signed off on the connectivity model.
9. Final Validation Before Launch
9. Final Validation Before Launch
Treat this as the final dress rehearsal using the exact production path your users will rely on.
- Execute one complete end-to-end workflow from AI client to MCP server to downstream system.
- Verify the expected allow and deny policy outcomes.
- Validate observability and audit visibility for the workflow.
- Confirm support contacts are listed on active policies where needed.
- Confirm revision history is being recorded for the latest policy changes.
- Verify rollback options for agents, policies, and account connections.
- Confirm support and incident owners are on call for launch.
10. Launch Day and Early Post-Go-Live
10. Launch Day and Early Post-Go-Live
Production readiness is not just setup. It also means having a controlled first 24 to 72 hours.
- Announce launch scope internally.
- Enable only the approved production agents and policy set.
- Monitor the first user sessions closely.
- Review unexpected authorization denials or tool failures quickly.
- Confirm connected accounts and OAuth redirects continue to succeed after launch.
- Capture support questions and update docs or onboarding instructions immediately.
- Review the first revision and access-control changes after go-live.
Minimum Go-Live Bar
If you need a simple launch gate, do not go live until all of the following are true:- At least one production MCP server is connected and tested
- At least one production agent is registered and configured
- Required user accounts are connected successfully
- Production policies are validated and active
- Policy testing has confirmed both expected allows and expected denies
- Admins can use the policy summary view and enforcement logs to verify live behavior
- At least one target AI client has been tested end to end
- Network allowlisting is complete for any custom/internal MCP servers
- Your support and rollback owners are identified
Once every item above is checked off, your Barndoor environment is in a strong position for controlled production rollout.
