Base URLs, auth settings, the Warpy API key, MCP connections, and custom headers power every request path. If this step is wrong, browser backend calls, MCP calls, and widget token refresh will fail.
Warpy API Key
API Config is also where you manage the single user-scoped Warpy API Key. Use it to:- copy the current key
- rotate the key
- copy the coding-agent handoff prompt
- direct Warpy API access
- coding-agent control-plane access
- signed widget token exchange
Base URLs
Base URLs tell the widget where to send backend tool requests for each environment. At minimum, create:| Environment | Purpose | Example |
|---|---|---|
local | local development | http://localhost:8000 |
production | live environment | https://api.yourcompany.com |
Authentication
Use the auth section to tell Warpy how backend requests should authenticate.Authorization header
If your API expects anAuthorization header, choose:
- the browser storage source:
localStorageorsessionStorage - the exact storage key
- the auth type:
Bearer,Basic, orNo prefix
Send browser cookies with requests
If your app authenticates browser requests with cookies, enable Send browser cookies with requests. Warpy does not ask for a cookie key for auth in this mode. Instead, it sends customer-owned requests withcredentials: "include" so the browser attaches cookies normally.
This works with HttpOnly auth cookies because the browser sends them directly. Warpy does not try to read them in JavaScript.
Session headers
Session headers map values from browser storage into outgoing request headers. Supported storage sources:localStoragesessionStorage- JavaScript-readable
cookies
- reads the stored value from the browser
- builds the request header
- sends the backend tool request to your configured base URL
MCP connections
Use MCP connections when you want Warpy to discover and call tools from a remote MCP server directly, without importing those tools into Features. Each MCP connection stores:- a connection name
- the MCP server URL
- one auth mode:
NoneStatic headersToken exchange
Static headers
Use this when the MCP server always expects the same header values for every request from your workspace. Warpy stores the header map server-side and sends it on each MCP request.Token exchange
Use this when the MCP server should run as the currently signed-in user. In this mode:- the widget calls your token-exchange endpoint using the user’s existing browser session
- your app returns short-lived MCP headers for that user
- Warpy uses those headers only for the active run
How to find the right storage key
- Sign in to your product.
- Open browser DevTools.
- Check Application or Storage for
localStorage,sessionStorage, or cookies. - Find the value your app uses for authenticated requests.
- If the stored value already includes
Bearer, useNo prefix. - If the stored value is just the raw token, use
Bearer.
Common mappings
| What your app stores | Where to configure it | Source | Key | Sent as |
|---|---|---|---|---|
| raw JWT token | auth section | localStorage | access_token | Authorization: Bearer <token> |
full Bearer ... string | auth section | localStorage | auth_header | Authorization: <stored value> |
| session cookie auth | auth section | browser cookies | no key | browser-managed cookies on credentialed requests |
| tenant or workspace id | custom headers | cookies | tenant_id | x-tenant-id: <cookie value> |
Cookie behavior
Auth cookies used through Send browser cookies with requests
can be HttpOnly, because the browser sends them automatically on credentialed
requests. Explicit cookie-to-header mappings still require a
JavaScript-readable cookie value from document.cookie.
Cross-origin note
Warpy executes backend tool requests from the browser, not from a hidden server-side proxy. The configured base URL must be reachable from the user’s browser and compatible with your CORS and auth setup. For cookie auth, your API must allow credentialed browser requests.Recommended baseline
For the first launch:- add
localandproduction - configure auth
- add MCP connections only if you need live MCP tools
- verify one backend tool manually
- only then continue to Features and tools