MCP server to interact with your Asgardeo organization through LLM tools.
The Asgardeo MCP Server allows you to manage your Asgardeo organization or WSO2 Identity Server deployment seamlessly using LLM tools, enabling natural language interactions for various configuration tasks.
[!IMPORTANT] Experimental Feature Notice
This software includes experimental functionality and is not intended for use in production environments. Features, APIs, and functionality may change as the implementation evolves without prior notice.
With tools like Claude Desktop, you can:
Listing Applications in Claude
Fetching Application Details in Claude
API | Scopes |
---|---|
Application Management API (/api/server/v1/applications ) |
internal_application_mgt_view , internal_application_mgt_update , internal_application_mgt_create |
API Resource Management API (/api/server/v1/api-resources ) |
internal_api_resource_update , internal_api_resource_create , internal_api_resource_view |
Identity Provider Management API (/api/server/v1/identity-providers ) |
internal_idp_view |
Authenticators Management API (/api/server/v1/authenticators ) |
internal_authenticator_view |
Claim Management API (/api/server/v1/claim-dialects ) |
internal_claim_meta_view |
SCIM2 Users API (/scim2/Users ) |
internal_user_mgt_create |
OIDC Scope Management API (/api/server/v1/oidc/scopes ) |
internal_oidc_scope_mgt_view |
git clone <repository-url>
go mod tidy
go build -o asgardeo-mcp
File > Preferences > Settings
).settings.json
file:
"mcp": {
"servers": {
"asgardeo-mcp-server": {
"type": "stdio",
"command": "<absolute path to the asgardeo-mcp executable, e.g., /Users/<user directory>/<repository path>/asgardeo-mcp-server/asgardeo-mcp>",
"args": [],
"env": {
"BASE_URL" : "https://api.asgardeo.io/t/<asgardeo organization>",
"CLIENT_ID" : "<client ID>",
"CLIENT_SECRET" : "<client secret>"
}
}
}
}
settings.json
.Settings > Developer
.claude_desktop_config.json
file:
"asgardeo-mcp": {
"command": "<absolute path to the asgardeo-mcp executable, e.g., /Users/<user directory>/<repository path>/asgardeo-mcp-server/asgardeo-mcp>",
"args": [],
"env": {
"BASE_URL": "https://api.asgardeo.io/t/<asgardeo organization>",
"CLIENT_ID": "<client ID>",
"CLIENT_SECRET": "<client secret>"
}
}
Settings > MCP
.mcp.json
file:
"asgardeo-mcp": {
"command": "<absolute path to the asgardeo-mcp executable, e.g., /Users/<user directory>/<repository path>/asgardeo-mcp-server/asgardeo-mcp>",
"args": [],
"env": {
"BASE_URL": "https://api.asgardeo.io/t/<asgardeo organization>",
"CLIENT_ID": "<client ID>",
"CLIENT_SECRET": "<client secret>"
}
}
[!NOTE]
- If you are using the WSO2 Identity Server, you need to set an additional environment variable named
PRODUCT_MODE
towso2is
.- Also, replace the
BASE_URL
with your WSO2 Identity Server base URL (e.g.,https://<your-wso2is-host>/t/<tenant-domain>
).- Additionally, if you are using WSO2 Identity Server for local development or in internal networks, you may need to set the certificate authority (CA) for the server to avoid SSL errors. You can do this by setting the
CERT_PATH
environment variable to the path of your CA certificate file.
The Asgardeo MCP Server provides the following tools for interacting with your organization:
Tool Name | Description | Parameters |
---|---|---|
list_applications |
Lists all applications in your organization | None |
create_single_page_app |
Creates a new Single Page Application | application_name (required): Name of the applicationredirect_url (required): Redirect URL for the application |
create_webapp_with_ssr |
Creates a new web application with server-side rendering | application_name (required): Name of the applicationredirect_url (required): Redirect URL for the application |
create_mobile_app |
Creates a new Mobile Application | application_name (required): Name of the applicationredirect_url (required): Redirect URL for the application |
create_m2m_app |
Creates a new Machine-to-Machine Application | application_name (required): Name of the application |
get_application_by_name |
Gets details of an application by name | application_name (required): Name of the application to search for |
get_application_by_client_id |
Gets details of an application by client ID | client_id (required): Client ID of the application |
update_application_basic_info |
Updates basic information of an application | id (required): ID of the applicationname , description , image_url , access_url , logout_return_url (optional) |
update_application_oauth_config |
Updates OAuth/OIDC configurations of an application | id (required): ID of the applicationredirect_urls , allowed_origins , user_access_token_expiry_time , application_access_token_expiry_time , refresh_token_expiry_time , etc. (optional) |
update_application_claim_config |
Updates claim configurations of an application | id (required): ID of the applicationclaims (required): List of requested claim URIs (Claim URIs should be specified using the default WSO2 claim dialect. Eg: http://wso2.org/claims/username ) |
authorize_api |
Authorizes an application to access an API | appId (required): ID of the applicationid (required): ID of the API resourcepolicyIdentifier (required, default: "RBAC"): Authorization policyscopes (required): Scopes to authorize |
list_authorized_api |
Lists authorized API resources of an application | app_id (required): ID of the application |
update_login_flow |
Updates login flow in an application based on a natural language prompt | app_id (required): ID of the applicationuser_prompt (required): Natural language description of the desired login flow |
Tool Name | Description | Parameters |
---|---|---|
list_api_resources |
Lists API resources in your organization | filter (optional): Filter expressionlimit (optional): Maximum results to return |
search_api_resources_by_name |
Searches for API resources by name | name (required): Name of the API resource to search for |
get_api_resource_by_identifier |
Gets an API resource by its identifier | identifier (required): Identifier of the API resource |
create_api_resource |
Creates a new API resource | identifier (required): Identifier for the API resourcename (required): Name of the API resourcerequiresAuthorization (required): Whether the API requires authorizationscopes (required): List of scopes for the API |
Tool Name | Description | Parameters |
---|---|---|
create_user |
Creates a user in your organization | username (required): Usernamepassword (required): Passwordemail (required): Email addressfirst_name (required): User's first namelast_name (required): User's last nameuserstore_domain (optional, default: "DEFAULT"): Userstore domain |
Tool Name | Description | Parameters |
---|---|---|
list_claims |
Lists claims in your organization | None |
[!NOTE] If you are using the WSO2 Identity Server and planning to use
update_login_flow
tool, make sure to follow the steps in Subscribe to AI features.
Create a SPA:
Create a new Single Page Application named "My Demo App" with redirect URL "https://example.com/callback".
Update Application:
Update my application with ID "abc123" to have a new name "Updated App".
Update Application Login Flow:
Update the login flow of my application with ID "abc123" to Username and Password as the first step and Email OTP as the second step.
Update Application Claim Configuration:
Update the claim configuration of my application with ID "abc123" to include "username", and "last_name".
Create a new API resource named "Customer API" and authorize my application to access it with "read:customers" scopes.
Create a test user with the username and email address '[email protected]'.
List all claims in my Asgardeo organization.
go mod tidy
before buildingchmod +x asgardeo-mcp
)If issues persist after troubleshooting:
Contributions are welcome! Submit issues or pull requests via the GitHub repository.