- Primeros pasos
- Mejores prácticas
- Tenant
- Acerca del contexto de tenant
- Buscar recursos en un tenant
- Gestionar robots
- Conexión de los robots a Orchestrator
- Almacenar credenciales de robots en CyberArk
- Almacenar contraseñas de robots desatendidos en Azure Key Vault (solo lectura)
- Almacenar las credenciales de robots desatendidos en HashiCorp Vault (solo lectura)
- Almacenamiento de credenciales de Unattended Robot en AWS Secrets Manager (solo lectura)
- Eliminar sesiones desconectadas y sin respuesta no atendidas
- Autenticación de Robot
- Autenticación de robots con credenciales de cliente
- Configurar las capacidades de automatización
- Soluciones
- Auditoría
- Configuración
- Registro
- Cloud Robots
- Descripción general de Cloud Robots
- Ejecución de automatizaciones unattended utilizando robots en la nube: VM
- Cargar tu propia imagen
- Reutilizar imágenes de máquina personalizadas (para grupos manuales)
- Restablecer credenciales para una máquina (para grupos manuales)
- Supervisión
- Actualizaciones de seguridad
- Pedir una prueba
- Preguntas frecuentes
- Configuración de VPN para robots en la nube
- Configurar una conexión de ExpressRoute
- Transmisión en vivo y control remoto
- Automation Suite Robots
- Contexto de carpetas
- Procesos
- Trabajos
- Apps
- Desencadenadores
- Registros
- Supervisión
- Índices
- Colas
- Activos
- Sobre los activos
- Gestión de Activos en Orchestrator
- Gestión de Activos en Studio
- Almacenar activos en Azure Key Vault (solo lectura)
- Almacenamiento de activos en HashiCorp Vault (solo lectura)
- Almacenamiento de activos en AWS Secrets Manager (solo lectura)
- Almacenamiento de activos en Google Secret Manager (solo lectura)
- Conexiones
- Reglas empresariales
- Depósitos de almacenamiento
- Servidores MCP
- Pruebas de Orchestrator
- Servicio de catálogo de recursos
- Integraciones
- Solución de problemas
Guía del usuario de Orchestrator
Personal access tokens (PATs) are user-scoped tokens with a configurable lifetime (up to one year). They are useful when you need a longer-lived token than interactive login provides, or when you cannot run uipath auth interactively but still need to authenticate as a user.
When you create a PAT, you must select permissions from the Orchestrator API Access resource that cover the MCP operations you need.
Requisitos previos
- You have the Automation User, Automation Developer, or Folder Administrator role in the folder containing the MCP Server. These roles include the
MCPServers.Viewpermission.
Generate a personal access token
-
Go to UiPath, select your user icon, then select Preferences.
-
Navigate to Personal access token and select Generate new token.
-
Enter a name and an expiration date.
-
Under Scopes, select the following permissions from the Orchestrator API Access resource:
OR.Execution: required for listing tools. MCP Servers calls the OrchestratorListReleasesAPI to resolve process metadata, and that endpoint requires this scope.OR.Jobs: required for executing tools. All MCP Server types that run processes as tools (UiPath, Coded, and Command) call the OrchestratorStartJobsAPI, which requires this scope.
-
Select Save and copy the token immediately.
Importante:The token is shown only once. If you do not copy it now, you must generate a new token.
Resultado
The token is now available for use in the Authorization header of HTTP requests to the MCP Server.
Use the personal access token
To call an MCP Server with the token:
curl -X POST "https://cloud.uipath.com/{org}/{tenant}/agenthub_/mcp/{folderKey}/{slug}" \
-H "Authorization: Bearer <your-PAT>" \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"initialize","params":{...},"id":1}'
curl -X POST "https://cloud.uipath.com/{org}/{tenant}/agenthub_/mcp/{folderKey}/{slug}" \
-H "Authorization: Bearer <your-PAT>" \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"initialize","params":{...},"id":1}'
Token characteristics
- Opaque token with audience
UiPath.Orchestrator. - Configurable expiration (up to one year).
- Access is the intersection of the PAT scopes and the user's folder-level role permissions.
- Works with any HTTP client (cURL, Postman, MCP Inspector, custom code).
Limitaciones
- PATs are tied to a specific user identity. If the user is deactivated, the PAT stops working.
- PATs can only be created by users who have interactive access to UiPath.
- Integration Service activities do not support PAT authentication. The MCP connection succeeds, but tool calls that rely on Integration Service connections fail.