Who should read this: Workspace administrators who want to connect AI assistants (Claude
Desktop, VS Code with Copilot, custom MCP clients) to their PlaneConnection data. You need the
Admin role and access to your workspace’s Settings > Integrations page.
Prerequisites
- An active PlaneConnection workspace with the Admin role.
- An MCP-compatible AI client (Claude Desktop, Claude Code, VS Code with Copilot, or any client supporting the MCP specification).
Generate a service API key
Read-write keys allow the AI agent to create trips, submit safety reports, modify crew
assignments, and cancel reservations. Only grant this scope if you trust the agent’s confirmation
workflow. Start with read-only and upgrade later if needed.
Connect your AI client
- Claude Desktop
- Claude Code
- Custom MCP Client
Add the following to your Claude Desktop MCP configuration file
(Restart Claude Desktop to activate the connection.
~/.claude/claude_desktop_config.json on macOS/Linux, or
%APPDATA%\Claude\claude_desktop_config.json on Windows):Find your workspace ID
Your workspace ID is displayed on the Settings > General page in PlaneConnection. It is also visible in the URL when you are logged in:X-Workspace-ID header is optional. If omitted, the MCP server uses the
default workspace associated with the API key. If your organization has
multiple workspaces, include the header to scope queries to the correct one.
Verify the connection
After configuring your client, verify the connection by asking your AI agent to list aircraft:list_aircraft tool and return your fleet data. If
you receive an authentication error, verify that:
- The API key is correct and has not been revoked.
- The
X-Workspace-IDheader matches a workspace your key has access to. - The endpoint URL includes the
/mcppath suffix.
Server endpoint
The production MCP server endpoint is:Contact PlaneConnection support if you need access to a non-production environment for testing
and integration.
Manage API keys
Rotate a key
Revoke a key
Navigate to Settings > Integrations > API Keys, find the key, and click Revoke. The key is immediately invalidated. Any AI agent using that key will receive401 Unauthorized responses.
Security considerations
- API keys grant the same access as the user who created them. The MCP server inherits the creator’s role and permissions for all tool invocations.
- Never commit API keys to version control. Use environment variables or secret managers.
- Monitor usage. The audit log under Settings > Activity tracks all MCP tool invocations with the API key name, tool invoked, and timestamp.
- Destructive tools require confirmation. Well-behaved MCP clients respect
the
destructiveHintannotation and prompt the user before invoking tools that create, modify, or delete data.
Troubleshooting
Connection refused or timeout
Connection refused or timeout
Verify the endpoint URL is correct and includes
/mcp. Check that your network allows outbound
HTTPS connections to mcp.planeconnection.com.401 Unauthorized
401 Unauthorized
403 Forbidden
403 Forbidden
The API key does not have access to the requested workspace. Check the
X-Workspace-ID header
value.Tools not appearing in the agent
Tools not appearing in the agent
Restart your AI client after updating the configuration. Some clients cache the tool list and
require a restart to pick up new tools.
Destructive tools blocked
Destructive tools blocked
If you created a read-only API key, destructive tools (create, update, cancel) will return an
error. Generate a read-write key to enable full access.
Related
MCP Tool Catalog
Complete reference for all 88 tools across 26 domain modules.
Manage Users and Roles
Role assignments that determine which tools an agent can invoke.
Set Up Integrations
Other integration options including QuickBooks and Stripe.
AI in Aviation Safety
How AI tools support SMS and flight operations compliance.