On this page
Before you start
This guide is intentionally more conservative than the others. Zapier's public MCP docs are very clear about Zapier MCP as a server and about client compatibility requirements, but they are less explicit about a universal UI for connecting any third-party remote MCP server.
Pixelixe MCP endpoint
Authentication
If your Zapier surface exposes OAuth for the connector, use Pixelixe OAuth. If it exposes a secure manual auth field instead, store your Pixelixe API key there as a Bearer secret. Never paste it in a prompt or a plain text step body.
https://studio.pixelixe.com/api/mcp/v1Authentication
If your Zapier surface exposes OAuth for the connector, use Pixelixe OAuth. If it exposes a secure manual auth field instead, store your Pixelixe API key there as a Bearer secret. Never paste it in a prompt or a plain text step body.
What Zapier's public docs do prove
- Zapier documents streamable HTTP as the current protocol requirement for MCP client compatibility.
- Zapier also documents that OAuth with Dynamic Client Registration is preferred, even if not strictly required in every case.
- Pixelixe matches that direction: it exposes a remote MCP endpoint, supports OAuth, and supports stored Bearer credentials for secure fallback setups.
- The remaining variable is your exact Zapier product surface. If your account does not expose a place to add a third-party remote MCP server URL, this setup path is not available there yet.
Setup steps
- First confirm that your Zapier environment really exposes a setup surface for a third-party remote MCP server or custom connector.
- If it does, enter
https://studio.pixelixe.com/api/mcp/v1as the Pixelixe MCP endpoint. - Choose OAuth if the UI offers a Pixelixe sign-in flow. Otherwise, use the secure auth section to store your Pixelixe API key as a Bearer secret.
- Save the connection and run one read-only test before you build a larger automation around it.
- If your Zapier environment does not expose a third-party remote MCP setup surface, stop here rather than forcing Pixelixe credentials into ad hoc fields.
First test
Start with read-only tools first:
Tool: pixelixe_get_tool_docs
Arguments:
{
"tool_name": "pixelixe_get_document"
}
Then call pixelixe_search_documents or pixelixe_get_document before you move on to generated variants or saved outputs.
Troubleshooting
- If you do not see any setup screen for a third-party remote MCP server, the feature may not be available in your Zapier surface yet.
- If Zapier asks you to paste credentials into plain text fields inside the step body, stop and move the secret into the secure auth section instead.
- If Pixelixe tools do not appear after setup, recreate the connection once and retry the read-only test before assuming the server is incompatible.
- If you need a production workflow today and Zapier's MCP surface is still missing in your environment, use Make or n8n first, where the public MCP setup path is better documented.