A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://github.com/asgardeo/asgardeo-mcp-server below:

asgardeo/asgardeo-mcp-server: MCP server to interact with your Asgardeo organization through LLM tools

The Asgardeo MCP Server allows you to manage your Asgardeo organization or WSO2 Identity Server deployment seamlessly using LLM tools, enabling natural language interactions for various configuration tasks.

Important

Experimental Feature Notice
This software includes experimental functionality and is not intended for use in production environments. Features, APIs, and functionality may change as the implementation evolves without prior notice.

With tools like Claude Desktop, you can:

On Asgardeo / WSO2 Identity Server
  1. Create an M2M Application: Set up an M2M application in your organization.
  2. Authorize Management APIs: Grant the following scopes to the application:
API Scopes Application Management API (/api/server/v1/applications) internal_application_mgt_view, internal_application_mgt_update, internal_application_mgt_create API Resource Management API (/api/server/v1/api-resources) internal_api_resource_update, internal_api_resource_create, internal_api_resource_view Identity Provider Management API (/api/server/v1/identity-providers) internal_idp_view Authenticators Management API (/api/server/v1/authenticators) internal_authenticator_view Claim Management API (/api/server/v1/claim-dialects) internal_claim_meta_view SCIM2 Users API (/scim2/Users) internal_user_mgt_create OIDC Scope Management API (/api/server/v1/oidc/scopes) internal_oidc_scope_mgt_view
  1. Copy Credentials: Save the client ID and client secret of the M2M application.
  1. Clone the Repository:
git clone https://github.com/asgardeo/asgardeo-mcp-server.git
  1. Install Dependencies:
  1. Build the Executable:
  1. Configure Your MCP Client:

Note

The Asgardeo MCP Server provides the following tools for interacting with your organization:

Tool Name Description Parameters list_applications Lists all applications in your organization None create_single_page_app Creates a new Single Page Application application_name (required): Name of the application
redirect_url (required): Redirect URL for the application create_webapp_with_ssr Creates a new web application with server-side rendering application_name (required): Name of the application
redirect_url (required): Redirect URL for the application create_mobile_app Creates a new Mobile Application application_name (required): Name of the application
redirect_url (required): Redirect URL for the application create_m2m_app Creates a new Machine-to-Machine Application application_name (required): Name of the application get_application_by_name Gets details of an application by name application_name (required): Name of the application to search for get_application_by_client_id Gets details of an application by client ID client_id (required): Client ID of the application update_application_basic_info Updates basic information of an application id (required): ID of the application
name, description, image_url, access_url, logout_return_url (optional) update_application_oauth_config Updates OAuth/OIDC configurations of an application id (required): ID of the application
redirect_urls, allowed_origins, user_access_token_expiry_time, application_access_token_expiry_time, refresh_token_expiry_time, etc. (optional) update_application_claim_config Updates claim configurations of an application id (required): ID of the application
claims (required): List of requested claim URIs (Claim URIs should be specified using the default WSO2 claim dialect. Eg: http://wso2.org/claims/username) authorize_api Authorizes an application to access an API appId (required): ID of the application
id (required): ID of the API resource
policyIdentifier (required, default: "RBAC"): Authorization policy
scopes (required): Scopes to authorize list_authorized_api Lists authorized API resources of an application app_id (required): ID of the application update_login_flow Updates login flow in an application based on a natural language prompt app_id (required): ID of the application
user_prompt (required): Natural language description of the desired login flow Tool Name Description Parameters list_api_resources Lists API resources in your organization filter (optional): Filter expression
limit (optional): Maximum results to return search_api_resources_by_name Searches for API resources by name name (required): Name of the API resource to search for get_api_resource_by_identifier Gets an API resource by its identifier identifier (required): Identifier of the API resource create_api_resource Creates a new API resource identifier (required): Identifier for the API resource
name (required): Name of the API resource
requiresAuthorization (required): Whether the API requires authorization
scopes (required): List of scopes for the API Tool Name Description Parameters create_user Creates a user in your organization username (required): Username
password (required): Password
email (required): Email address
first_name (required): User's first name
last_name (required): User's last name
userstore_domain (optional, default: "DEFAULT"): Userstore domain Tool Name Description Parameters list_claims Lists claims in your organization None

Note

If you are using the WSO2 Identity Server and planning to use update_login_flow tool, make sure to follow the steps in Subscribe to AI features.

Authentication & Permissions

If issues persist after troubleshooting:

Contributions are welcome! Submit issues or pull requests via the GitHub repository.


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4