MCP Server for
Industrial AI Assistants
Proxus MCP Server connects your chosen AI assistants to unified namespace and telemetry data, enabling grounded answers with strict read-only access and full governance.
Why Proxus MCP Server?
MCP (Model Context Protocol) is the standard way to connect AI assistants to your systems. Proxus MCP Server provides a secure bridge to industrial data with strict scope controls. See how it works.
- Secure authentication—JWT caching and session management built-in.
- OData proxy—controlled access to Device, Tag, Rule, and Function entities.
- Telemetry querying—read-only ClickHouse access with injection protection.
- Schema discovery—auto-generated documentation for entities and data models.
- Governance—rate limiting, IP whitelisting, and full audit logging.
What stays protected
- No direct PLC/SCADA access
- Read-only access to telemetry DB and UNS topics you approve
- Outbound-only; no inbound control paths
- Auditability of queries and actions
How it works
Assistants connect through MCP. Proxus provides read-only tools for telemetry, UNS, and entity metadata. You decide the scope. Read the MCP Server docs for setup steps.
- Select which telemetry tables, UNS topics, and entities are visible.
- Assistants authenticate via MCP; no direct DB credentials are shared.
- Queries run read-only against telemetry data; results are contextualized with UNS.
- Optional actions (tickets/notifications) go through approved endpoints.
- Audit logs capture who asked what and when.
Allowed data paths
- Telemetry database (read-only, scoped tables/time ranges)
- UNS topics (read-only)
- Metadata: sites, lines, assets for better grounding
Use Cases
Give teams instant answers while keeping production safe and read-only. Review FAQ for governance details.
Operations Q&A
Ask for current throughput, quality yields, or downtime reasons per line or shift.
Maintenance triage
Summarize recent faults and suggest the right work order in ERP/CMMS.
Energy & cost insight
Answer consumption and cost questions from telemetry without custom reports.
Shift handover
Generate concise summaries of alarms, stoppages, and KPIs for the next crew.
Security and governance
AI access is explicitly limited. You choose the data and time ranges; everything is logged.
- Scoped tools—only the telemetry/UNS readers you enable are visible to assistants.
- No credentials leak—assistants never receive DB passwords; access is proxied.
- Audit trails—questions and actions are recorded for review.
What AI can’t do
- No control writes or setpoint changes
- No direct PLC/SCADA connectivity
- No access outside approved telemetry/UNS scope
FAQ
Common questions on safety, data access, and governance.
No. Access is proxied through read-only tools; credentials are never shared.
No. It only reads approved telemetry/UNS data. Optional actions are limited to governed endpoints like ticketing.
Choose which topics, tables, and time windows are exposed. Everything else stays invisible.
Yes. Queries and actions are logged for review.
Ready to let your team talk to the factory safely?
Turn on read-only AI access to telemetry and UNS. Keep control logic isolated, keep answers fast.