MCP Elicitation
What is Elicitation?
Elicitation allows MCP servers to request structured user input during interactions. When a server needs specific data (like API keys, file paths, or configuration parameters), it can request that information through a defined JSON schema, and Dexto will prompt the user for input that matches that structure.
Specification: MCP Elicitation Spec
How It Works
During tool execution or other server operations, an MCP server can:
- Send an
elicitation/createrequest with a JSON schema defining required input - Dexto prompts the user for the structured data
- User provides input matching the schema
- Dexto validates and returns the data to the server
- Server continues with the provided information
This enables dynamic, context-aware data collection without requiring all parameters upfront.
Configuration
Elicitation is automatically enabled when you connect MCP servers:
mcpServers:
my-server:
type: stdio
command: npx
args: ["-y", "my-mcp-server"]
No additional setup required - servers that support elicitation can use it immediately.
Elicitation Schema
Servers define what data they need using JSON Schema:
{
"title": "API Configuration",
"description": "Please provide your API credentials",
"type": "object",
"properties": {
"apiKey": {
"type": "string",
"description": "Your API key"
},
"region": {
"type": "string",
"enum": ["us-east", "eu-west", "ap-south"],
"description": "Preferred region"
}
},
"required": ["apiKey", "region"]
}
Dexto validates user input against this schema before returning it to the server.
Use Cases
Common scenarios where servers use elicitation:
- Configuration parameters - Requesting deployment regions, environment settings
- File selection - Asking users to choose specific files or paths
- Disambiguation - Clarifying ambiguous commands (e.g., "which branch?")
- Progressive workflows - Multi-step processes that need user decisions
Security Considerations
Elicitation is designed for workflow data, not sensitive credentials:
- ❌ DON'T: Request passwords, private keys, or PII through elicitation
- ✅ DO: Use for configuration, file paths, and workflow decisions
- Store sensitive data in environment variables or secure vaults
See Also
- Tools - Understanding agent tools and capabilities
- MCP Prompts - Templated prompts from servers
- MCP Overview - Introduction to MCP