Stacklok Enterprise
A hardened and production-ready distribution of ToolHive Community
Securely scale MCP servers across your enterprise with Stacklok Enterprise's signed binaries, hardened images, formal semantic versioning, backported security patches, and turnkey identity provider integrations. Kubernetes native and LLM agnostic. Self-hosted in your environment, governed by your policies, no vendor lock-in.In production at Fortune 500 financial services, Fortune 500 technology, and Fortune 2000 software companies.
When Community isn't enough
Teams typically move to Stacklok Enterprise when they hit one of these walls:
Developers are bringing their own MCP servers to work — shadow AI is spreading and there is no central control
Your organization has multiple coding assistants and AI agents that need access to business context
Your security or compliance team is asking how MCP servers are authenticated, audited, and patched
You need SSO and IdP integration (Okta, Entra ID) across your organization
You are running MCP in production and need SLA-backed support for incidents
You need centralized governance and policy enforcement across multiple teams or business units
Your environment requires a semantically versioned, supply-chain-attested distribution rather than continuous rolling release
Recognizing these challenges in your organization? Schedule a demo to see how Stacklok Enterprise addresses them.
ToolHive Community vs. Stacklok Enterprise
Distribution & packaging
| Capability | Community | Enterprise |
|---|---|---|
| ToolHive core platform | ✓ | ✓ |
| Release model | Continuous | Semantically versioned (MAJOR.MINOR.PATCH) |
| SigStore Cosign package signing with SBOM | ✓ | ✓ |
| Patch versions retained for bugfixes and security updates | — | ✓ |
| Scanning attestations | — | ✓ |
| SLSA build provenance | — | ✓ |
Security and supply chain
| Capability | Community | Enterprise |
|---|---|---|
| Basic scanning (Trivy, unit tests, integration tests) | ✓ | ✓ |
| Static analysis on every release (attested via SigStore) | — | ✓ |
| Autonomous pen testing on every minor release | — | ✓ |
| Hardened container base images (Chainguard or equiv.) | — | ✓ |
| Proactive notification of vulnerabilities | — | ✓ |
| CVEs addressed within SLO with responsible disclosure | — | ✓ |
| All Sev 0–3 vulnerabilities backported as patch updates | — | ✓ |
Auth, identity & governance
| Capability | Community | Enterprise |
|---|---|---|
| Basic authentication | ✓ | ✓ |
| Policy-as-code engine (CEDAR) | ✓ | ✓ |
| Audit logging & compliance reporting | ✓ | ✓ |
| Built-in IdP integration (Okta, Entra ID) | — | ✓ |
| IdP group → ToolHive role mapping | — | ✓ |
| Canonical policy packs (read-only, full CRUD, custom) | — | ✓ |
| Token exchange & credential brokering | — | ✓ |
Enterprise UI & management
| Capability | Community | Enterprise |
|---|---|---|
| ToolHive CLI | ✓ | ✓ |
| Usage telemetry & analytics (OpenTelemetry) | ✓ | ✓ |
| Enterprise MCP registry server and catalog | ✓ | ✓ |
| Enterprise Cloud UI (full CRUD management console) | — | ✓ |
| Hardened Desktop UI (enterprise lockdown controls) | — | ✓ |
Versioning, maintenance & support
| Capability | Community | Enterprise |
|---|---|---|
| Latest release | ✓ | ✓ |
| Supported versions: LATEST, LATEST-1, LATEST-2 | — | ✓ |
| Community support (GitHub) | ✓ | ✓ |
| Dedicated support with SLA | — | ✓ |
| Proactive security advisories | — | ✓ |
| Onboarding & integration assistance | — | ✓ |
Enterprise Connectors (MCP Servers)
| Attribute | Community | Enterprise |
|---|---|---|
| Base image | Open source | Chainguard or equivalent |
| Signing & attestations | — | SigStore signed with SLSA provenance |
| Customized tools (tuned to agent workflows) | — | ✓ |
| Streamable HTTP transport | — | ✓ |
| SBOM & dependency vetting | — | ✓ |
| Qualified for target workload | — | ✓ |
| Maintained on enterprise release cadence | — | ✓ |
| Backported security patches | — | ✓ |
Seen enough to want a closer look? Schedule a demo to walk through the capabilities that matter most to your team.
Product offerings
Stacklok aims to keep pricing and licensing simple. Stacklok Enterprise and its Enterprise Connectors are licensed as an annual subscription. Professional services are priced based on time and materials.
| SKU | Description | Pricing Model |
|---|---|---|
| Stacklok Enterprise Platform | Enterprise licensed distribution of ToolHive with Cloud UI, Desktop UI, IdP integration, policy engine, and SLA-backed support | Annual subscription |
| Enterprise Connectors | Production-ready connectors, maintained on enterprise release cadence | Annual subscription (per connector) |
| Professional Services | Extended integration, policy configuration, additional IdP onboarding, connector development | Time & materials |
Ready to discuss what the right package looks like for your organization? Schedule a demo to talk through your requirements.
Enterprise Platform Components
Stacklok Enterprise Platform secures MCP servers across your organization through its registry, runtime, gateway, and portal.
Registry: No more fighting shadow AI
| The source of truth for approved MCP servers within the enterprise. |
|---|
| Integrate with the official MCP registry |
| Add custom MCP servers and skills |
| Group servers based on role or use case |
| Manage your registry with an API-driven interface |
| Verify provenance and sign servers with built-in security controls |
| Preset configurations and permissions for a frictionless user experience |
Runtime: Kubernetes-native deployment
| Deploy, run, and manage MCP servers in Kubernetes with security guardrails. |
|---|
| Deploy MCP servers in the cloud via Kubernetes |
| Run MCP servers locally via Docker or Podman |
| Proxy remote MCP servers securely for unified management |
| Kubernetes Operator for fleet and resource management |
| Leverage OpenTelemetry for centralized monitoring and audit logging |
Gateway: Single endpoint, full control
| Intelligent MCP gateway for authentication, authorization, and policy enforcement. |
|---|
| Integrate with your IdP for SSO (OIDC/OAuth compatible) |
| Build composite tools that orchestrate multiple tools in parallel or sequential chains |
| Customize and filter tools and descriptions |
| Reduce context bloat and token usage |
| Connect with local clients like Claude Desktop, Cursor, and Visual Studio Code (VS Code) |
Portal: Self-service with guardrails
| Custom UI for teams to discover, deploy and manage approved MCP servers. |
|---|
| Cross-platform desktop app and web-based cloud UI |
| Make it easy for admins to curate MCP servers and tools |
| Automate server discovery |
| Install MCP servers with a single click |
| Compatible with hundreds of AI clients |
Ready to see how the platform works in your environment? Start a proof of concept to take the next step.
Validate Stacklok Enterprise in your environment
Stacklok helps you validate Stacklok Enterprise in your environment at your pace with forward-deployed engineering support.
Frequently asked questions
How does Stacklok Enterprise relate to ToolHive Community?
ToolHive Community is an open source distribution optimized for individual developers and pre-production use, making it the right tool for evaluating MCP and building a proof of concept. Stacklok Enterprise is a separate, hardened distribution built for production: semantically versioned, with IdP integration, centralized governance, and SLA-backed support. Moving from Community to Enterprise is a supported migration where Stacklok provides the enterprise binaries and dedicated engineering support to take you from proof of concept to production. See the full comparison or learn about the proof of concept engagement.
Can I migrate my existing ToolHive Community setup to Enterprise?
Yes. Enterprise uses different binaries from Community, so migration is a manual process, but every Enterprise license includes dedicated engineering support to make it seamless. In practice, most customers use Community for evaluation and have not built significant production configuration before engaging with Stacklok, so the migration is typically straightforward. Learn about the proof of concept engagement to understand how Stacklok supports the transition.
What happens to my data if I end my Enterprise contract?
Your data never leaves your environment. Stacklok Enterprise is self-hosted, so you retain full control of your data and your deployment regardless of your contract status. If you end your contract, your existing Enterprise binary continues to run. There is no vendor lock-in. You lose access to new releases, backported security patches, and dedicated support, but your deployment remains fully operational. Learn more about the product offerings.
How long does a typical deployment take?
Most deployments reach production within 60 days of contract signing. Stacklok works directly with your platform team, and every Enterprise license includes dedicated engineering support throughout the process. You will need an existing Kubernetes environment to get started. Timelines are scoped to your environment, so if your situation is more complex, Stacklok will work at your pace. Learn about the proof of concept engagement.
Why should I use an MCP platform instead of running MCP servers directly?
Running MCP servers directly gives you no isolation, no access controls, and no visibility into what those servers are doing. ToolHive addresses this by running each server in its own container with least-privilege permissions, encrypting credentials at rest, and tracing every tool call via OpenTelemetry. Stacklok Enterprise adds centralized governance, IdP-backed authentication, and audit logging for teams running MCP at scale across their organization. Explore the core concepts to dig deeper into how ToolHive works.
What AI clients work with Stacklok Enterprise?
Stacklok Enterprise works with any AI coding assistant or agent that supports MCP. This includes Claude Code, GitHub Copilot, Cursor, Windsurf, VS Code, Zed, Cline, Continue, Roo Code, Goose, LM Studio, OpenAI Codex, and many more. Most clients support automatic configuration so developers can connect without manual setup. See the full client compatibility reference for the complete list.
Can I run custom MCP servers outside the Stacklok registry?
Yes. Stacklok Enterprise starts with a base registry of vetted, hardened MCP servers maintained by Stacklok. From there, you have full control to add your own servers from public package managers, Docker images, remote URLs, or build a private registry tailored to your organization. You are never limited to Stacklok's catalog. See how to run MCP servers in Kubernetes for the full details.
What is the difference between Enterprise Connectors and Custom Connectors?
Enterprise Connectors are production-ready MCP servers built, hardened, and maintained by Stacklok on the enterprise release cadence, signed, attested, and qualified for your target workload so your security team does not have to validate them independently. Custom Connectors are servers you bring yourself, which ToolHive can run and govern, but which remain your responsibility to maintain and secure. Enterprise Connectors are sold per connector on an annual basis. See Enterprise Connectors in the product offerings.
Is Stacklok Enterprise available on AWS or Azure Marketplace?
Stacklok Enterprise is not currently available on AWS or Azure Marketplace. Stacklok is actively exploring cloud marketplace availability and welcomes your input on procurement requirements. Get in touch to share your use case.
Explore ToolHive Community
ToolHive Community is free, open source, and the best way to evaluate MCP before moving to production.