Om MCP Configuration Options
What you can configure in Codex, Claude Code, and other clients when connecting to the hosted Om MCP.
Om MCP is a hosted remote MCP server. In practice, the important configuration lives in your MCP client: the server URL and the auth mode. Unlike some hosted MCP products, Om MCP does not currently expose URL query parameters for read-only mode, project scoping, or feature-group selection.
Core connection settings
| Setting | Value | Notes |
|---|---|---|
| MCP URL | https://agents.omtx.ai/mcp | Hosted Om MCP endpoint. |
| Transport | streamable HTTP | Remote MCP clients should connect over HTTPS. |
| Codex auth | Authorization: Bearer $OM_API_KEY | Recommended for Codex because the current remote MCP setup supports bearer-token auth directly. |
| Custom-header auth | x-api-key: $OM_API_KEY | Recommended for Claude Code and other clients that support custom headers. |
Common client-side settings
Codex add commandBash
codex mcp add omtx --url https://agents.omtx.ai/mcp --bearer-token-env-var OM_API_KEYCodex remote MCP configtoml
[mcp_servers.omtx]
url = "https://agents.omtx.ai/mcp"
bearer_token_env_var = "OM_API_KEY"- Keep the API key in environment variables, not hard-coded in tracked files.
- Add timeout overrides only if your local setup actually needs them.
- For most users, the clean default config is enough.
What Om MCP does not currently expose
Om MCP does not currently document customer-facing URL query parameters for feature toggles, read-only mode, or project scoping. The public contract today is one hosted server plus Om API key authentication.
Recommended defaults
- Use
https://agents.omtx.ai/mcpas the server URL. - In Codex, use
Authorization: Bearer $OM_API_KEYviabearer_token_env_var = "OM_API_KEY". - In Claude Code and other header-capable clients, use
x-api-key: $OM_API_KEY. - Restart the client after any MCP config change.
- Start by verifying
om_statusbefore moving into Diligence, Data Access, or Hub workflows.