by asgardeo
An MCP server to interact with your Asgardeo organization through LLM tools, allowing for natural language-based configuration and management of applications and their authentication flows.
The Asgardeo MCP Server enables users to manage their Asgardeo organization or WSO2 Identity Server deployment using LLM tools. It facilitates natural language interactions for various configuration tasks, streamlining the management of identity and access management configurations.
Client ID
and Client Secret
for the M2M application..env
file with your organization name, client ID, and client secret.No, this is an experimental feature and is not intended for use in production environments. Features, APIs, and functionality may change without prior notice.
The Asgardeo MCP Server allows you to manage your Asgardeo organization or WSO2 Identity Server deployment seamlessly using LLM tools, enabling natural language interactions for various configuration tasks.
[!IMPORTANT] Experimental Feature Notice
This software includes experimental functionality and is not intended for use in production environments. Features, APIs, and functionality may change as the implementation evolves without prior notice.
With tools like Claude Desktop, you can:
Listing Applications in Claude
Fetching Application Details in Claude
API | Scopes |
---|---|
Application Management API (/api/server/v1/applications ) |
internal_application_mgt_view , internal_application_mgt_update , internal_application_mgt_create |
API Resource Management API (/api/server/v1/api-resources ) |
internal_api_resource_update , internal_api_resource_create , internal_api_resource_view |
Identity Provider Management API (/api/server/v1/identity-providers ) |
internal_idp_view |
Authenticators Management API (/api/server/v1/authenticators ) |
internal_authenticator_view |
Claim Management API (/api/server/v1/claim-dialects ) |
internal_claim_meta_view |
SCIM2 Users API (/scim2/Users ) |
internal_user_mgt_create |
OIDC Scope Management API (/api/server/v1/oidc/scopes ) |
internal_oidc_scope_mgt_view |
git clone <repository-url>
go mod tidy
go build -o asgardeo-mcp
File > Preferences > Settings
).settings.json
file:
"mcp": {
"servers": {
"asgardeo-mcp-server": {
"type": "stdio",
"command": "<absolute path to the asgardeo-mcp executable, e.g., /Users/<user directory>/<repository path>/asgardeo-mcp-server/asgardeo-mcp>",
"args": [],
"env": {
"BASE_URL" : "https://api.asgardeo.io/t/<asgardeo organization>",
"CLIENT_ID" : "<client ID>",
"CLIENT_SECRET" : "<client secret>"
}
}
}
}
settings.json
.Settings > Developer
.claude_desktop_config.json
file:
"asgardeo-mcp": {
"command": "<absolute path to the asgardeo-mcp executable, e.g., /Users/<user directory>/<repository path>/asgardeo-mcp-server/asgardeo-mcp>",
"args": [],
"env": {
"BASE_URL": "https://api.asgardeo.io/t/<asgardeo organization>",
"CLIENT_ID": "<client ID>",
"CLIENT_SECRET": "<client secret>"
}
}
Settings > MCP
.mcp.json
file:
"asgardeo-mcp": {
"command": "<absolute path to the asgardeo-mcp executable, e.g., /Users/<user directory>/<repository path>/asgardeo-mcp-server/asgardeo-mcp>",
"args": [],
"env": {
"BASE_URL": "https://api.asgardeo.io/t/<asgardeo organization>",
"CLIENT_ID": "<client ID>",
"CLIENT_SECRET": "<client secret>"
}
}
[!NOTE]
- If you are using the WSO2 Identity Server, you need to set an additional environment variable named
PRODUCT_MODE
towso2is
.- Also, replace the
BASE_URL
with your WSO2 Identity Server base URL (e.g.,https://<your-wso2is-host>/t/<tenant-domain>
).- Additionally, if you are using WSO2 Identity Server for local development or in internal networks, you may need to set the certificate authority (CA) for the server to avoid SSL errors. You can do this by setting the
CERT_PATH
environment variable to the path of your CA certificate file.
The Asgardeo MCP Server provides the following tools for interacting with your organization:
Tool Name | Description | Parameters |
---|---|---|
list_applications |
Lists all applications in your organization | None |
create_single_page_app |
Creates a new Single Page Application | application_name (required): Name of the applicationredirect_url (required): Redirect URL for the application |
create_webapp_with_ssr |
Creates a new web application with server-side rendering | application_name (required): Name of the applicationredirect_url (required): Redirect URL for the application |
create_mobile_app |
Creates a new Mobile Application | application_name (required): Name of the applicationredirect_url (required): Redirect URL for the application |
create_m2m_app |
Creates a new Machine-to-Machine Application | application_name (required): Name of the application |
get_application_by_name |
Gets details of an application by name | application_name (required): Name of the application to search for |
get_application_by_client_id |
Gets details of an application by client ID | client_id (required): Client ID of the application |
update_application_basic_info |
Updates basic information of an application | id (required): ID of the applicationname , description , image_url , access_url , logout_return_url (optional) |
update_application_oauth_config |
Updates OAuth/OIDC configurations of an application | id (required): ID of the applicationredirect_urls , allowed_origins , user_access_token_expiry_time , application_access_token_expiry_time , refresh_token_expiry_time , etc. (optional) |
update_application_claim_config |
Updates claim configurations of an application | id (required): ID of the applicationclaims (required): List of requested claim URIs (Claim URIs should be specified using the default WSO2 claim dialect. Eg: http://wso2.org/claims/username ) |
authorize_api |
Authorizes an application to access an API | appId (required): ID of the applicationid (required): ID of the API resourcepolicyIdentifier (required, default: "RBAC"): Authorization policyscopes (required): Scopes to authorize |
list_authorized_api |
Lists authorized API resources of an application | app_id (required): ID of the application |
update_login_flow |
Updates login flow in an application based on a natural language prompt | app_id (required): ID of the applicationuser_prompt (required): Natural language description of the desired login flow |
Tool Name | Description | Parameters |
---|---|---|
list_api_resources |
Lists API resources in your organization | filter (optional): Filter expressionlimit (optional): Maximum results to return |
search_api_resources_by_name |
Searches for API resources by name | name (required): Name of the API resource to search for |
get_api_resource_by_identifier |
Gets an API resource by its identifier | identifier (required): Identifier of the API resource |
create_api_resource |
Creates a new API resource | identifier (required): Identifier for the API resourcename (required): Name of the API resourcerequiresAuthorization (required): Whether the API requires authorizationscopes (required): List of scopes for the API |
Tool Name | Description | Parameters |
---|---|---|
create_user |
Creates a user in your organization | username (required): Usernamepassword (required): Passwordemail (required): Email addressfirst_name (required): User's first namelast_name (required): User's last nameuserstore_domain (optional, default: "DEFAULT"): Userstore domain |
Tool Name | Description | Parameters |
---|---|---|
list_claims |
Lists claims in your organization | None |
[!NOTE] If you are using the WSO2 Identity Server and planning to use
update_login_flow
tool, make sure to follow the steps in Subscribe to AI features.
Create a SPA:
Create a new Single Page Application named "My Demo App" with redirect URL "https://example.com/callback".
Update Application:
Update my application with ID "abc123" to have a new name "Updated App".
Update Application Login Flow:
Update the login flow of my application with ID "abc123" to Username and Password as the first step and Email OTP as the second step.
Update Application Claim Configuration:
Update the claim configuration of my application with ID "abc123" to include "username", and "last_name".
Create a new API resource named "Customer API" and authorize my application to access it with "read:customers" scopes.
Create a test user with the username and email address 'test@example.com'.
List all claims in my Asgardeo organization.
go mod tidy
before buildingchmod +x asgardeo-mcp
)If issues persist after troubleshooting:
Contributions are welcome! Submit issues or pull requests via the GitHub repository.
Please log in to share your review and rating for this MCP.
Discover more MCP servers with similar functionality and use cases
by chaitin
Provides a self‑hosted web application firewall and reverse‑proxy that filters, monitors, and blocks malicious HTTP/S traffic, protecting web applications from attacks such as SQL injection, XSS, brute‑force, bot abuse, and various code injections.
by PortSwigger
Integrates Burp Suite with AI clients via the Model Context Protocol, providing a built‑in SSE server and a packaged Stdio proxy for seamless AI‑driven interaction with Burp.
by cycodehq
Boost security in the development lifecycle via static application security testing, software composition analysis, secrets detection, and infrastructure‑as‑code scanning.
by auth0
Auth0 MCP Server enables AI agents to manage Auth0 tenants using natural language, streamlining tasks like application and user management.
by ChristophEnglisch
keycloak-model-context-protocol is an MCP server implementation for Keycloak user management, enabling AI-powered administration of Keycloak users and realms through the Model Context Protocol (MCP).
by Spathodea-Network
OpenCTI MCP Server is a Model Context Protocol (MCP) server that provides seamless integration with the OpenCTI (Open Cyber Threat Intelligence) platform, enabling querying and retrieving threat intelligence data through a standardized interface.
by mytechnotalent
Provides real-time threat intelligence and detailed malware sample metadata from Malware Bazaar through an AI‑driven MCP server, enabling authorized cybersecurity research workflows.
by kapilduraphe
This project provides an Okta MCP (Multi-Cloud Platform) server that enables Claude to interact with Okta's user management system, offering comprehensive user and group management capabilities along with onboarding automation.
by descope-sample-apps
descope-mcp-server-stdio is a Model Context Protocol (MCP) server that integrates Descope's Management APIs with applications like Claude Desktop. It enables users to manage user data and audit logs directly from their desktop environment.