Options de transport MCP : serveurs distants vs locaux
Understand MCP transport options and choose between remote and local server deployments. Learn the tradeoffs, security implications, and ideal use cases for each approach.
What is MCP Transport?
MCP transport refers to how your AI client connects to the MCP server. There are two main approaches:
Remote Server
Connect to a cloud-hosted MCP server over HTTPS.
- No local setup required
- Always up-to-date
- Managed infrastructure
- Requires internet connection
Serveur local
Exécuter le serveur MCP sur votre machine ou réseau.
- Full control over infrastructure
- Works offline
- Data stays local
- Requires setup and maintenance
Comparison Table
| Criteria | Remote Server | Local Server |
|---|---|---|
| Setup Time | 5 minutes | 30-60 minutes |
| Maintenance | None (managed) | Updates, security patches |
| Internet Required | Yes | No (after setup) |
| Data Location | Cloud (encrypted) | Your infrastructure |
| Performance | Network-dependent | Low latency |
| Cost | Subscription-based | Infrastructure + time |
| Scalability | Automatic | Manual provisioning |
When to Use Remote Server
Best For
- Quick start: Get up and running in minutes without infrastructure setup
- Small teams: 1-10 people who want hassle-free deployment
- Standard workflows: Project management, task tracking, time tracking
- Always-connected environments: Teams with reliable internet
- Managed infrastructure preference: Focus on usage, not operations
When to Use Local Server
Best For
- Data sovereignty: Regulatory requirements to keep data on-premises
- Air-gapped environments: Networks without internet access
- Custom integrations: Need to modify or extend MCP server code
- High-security environments: Defense, healthcare, finance with strict policies
- Low-latency requirements: Need sub-100ms response times
- Large enterprises: 100+ users with existing infrastructure
Security Considerations
Remote Server Security
- TLS encryption for all communications
- API key authentication with rotation
- Data encrypted at rest in cloud storage
- Regular security audits and patches
- Compliance certifications (SOC 2, GDPR)
Local Server Security
- Full control over encryption and access
- Network isolation from internet
- Integration with existing security stack
- Custom authentication (SSO, LDAP)
- Your responsibility for patching
