The Asgardeo MCP Server allows you to manage your Asgardeo organization or WSO2 Identity Server deployment seamlessly using LLM tools, enabling natural language interactions for various configuration tasks.
Important
Experimental Feature Notice
This software includes experimental functionality and is not intended for use in production environments. Features, APIs, and functionality may change as the implementation evolves without prior notice.
With tools like Claude Desktop, you can:
/api/server/v1/applications
) internal_application_mgt_view
, internal_application_mgt_update
, internal_application_mgt_create
API Resource Management API (/api/server/v1/api-resources
) internal_api_resource_update
, internal_api_resource_create
, internal_api_resource_view
Identity Provider Management API (/api/server/v1/identity-providers
) internal_idp_view
Authenticators Management API (/api/server/v1/authenticators
) internal_authenticator_view
Claim Management API (/api/server/v1/claim-dialects
) internal_claim_meta_view
SCIM2 Users API (/scim2/Users
) internal_user_mgt_create
OIDC Scope Management API (/api/server/v1/oidc/scopes
) internal_oidc_scope_mgt_view
git clone https://github.com/asgardeo/asgardeo-mcp-server.git
File > Preferences > Settings
).settings.json
file:
"mcp": { "servers": { "asgardeo-mcp-server": { "type": "stdio", "command": "<absolute path to the asgardeo-mcp executable, e.g., /Users/<user directory>/<repository path>/asgardeo-mcp-server/asgardeo-mcp>", "args": [], "env": { "BASE_URL" : "https://api.asgardeo.io/t/<asgardeo organization>", "CLIENT_ID" : "<client ID>", "CLIENT_SECRET" : "<client secret>" } } } }
settings.json
.Settings > Developer
.claude_desktop_config.json
file:
"asgardeo-mcp": { "command": "<absolute path to the asgardeo-mcp executable, e.g., /Users/<user directory>/<repository path>/asgardeo-mcp-server/asgardeo-mcp>", "args": [], "env": { "BASE_URL": "https://api.asgardeo.io/t/<asgardeo organization>", "CLIENT_ID": "<client ID>", "CLIENT_SECRET": "<client secret>" } }
Settings > MCP
.mcp.json
file:
"asgardeo-mcp": { "command": "<absolute path to the asgardeo-mcp executable, e.g., /Users/<user directory>/<repository path>/asgardeo-mcp-server/asgardeo-mcp>", "args": [], "env": { "BASE_URL": "https://api.asgardeo.io/t/<asgardeo organization>", "CLIENT_ID": "<client ID>", "CLIENT_SECRET": "<client secret>" } }
Note
PRODUCT_MODE
to wso2is
.BASE_URL
with your WSO2 Identity Server base URL (e.g., https://<your-wso2is-host>/t/<tenant-domain>
).CERT_PATH
environment variable to the path of your CA certificate file.The Asgardeo MCP Server provides the following tools for interacting with your organization:
Tool Name Description Parameterslist_applications
Lists all applications in your organization None create_single_page_app
Creates a new Single Page Application application_name
(required): Name of the application
redirect_url
(required): Redirect URL for the application create_webapp_with_ssr
Creates a new web application with server-side rendering application_name
(required): Name of the application
redirect_url
(required): Redirect URL for the application create_mobile_app
Creates a new Mobile Application application_name
(required): Name of the application
redirect_url
(required): Redirect URL for the application create_m2m_app
Creates a new Machine-to-Machine Application application_name
(required): Name of the application get_application_by_name
Gets details of an application by name application_name
(required): Name of the application to search for get_application_by_client_id
Gets details of an application by client ID client_id
(required): Client ID of the application update_application_basic_info
Updates basic information of an application id
(required): ID of the application
name
, description
, image_url
, access_url
, logout_return_url
(optional) update_application_oauth_config
Updates OAuth/OIDC configurations of an application id
(required): ID of the application
redirect_urls
, allowed_origins
, user_access_token_expiry_time
, application_access_token_expiry_time
, refresh_token_expiry_time
, etc. (optional) update_application_claim_config
Updates claim configurations of an application id
(required): ID of the application
claims
(required): List of requested claim URIs (Claim URIs should be specified using the default WSO2 claim dialect. Eg: http://wso2.org/claims/username
) authorize_api
Authorizes an application to access an API appId
(required): ID of the application
id
(required): ID of the API resource
policyIdentifier
(required, default: "RBAC"): Authorization policy
scopes
(required): Scopes to authorize list_authorized_api
Lists authorized API resources of an application app_id
(required): ID of the application update_login_flow
Updates login flow in an application based on a natural language prompt app_id
(required): ID of the application
user_prompt
(required): Natural language description of the desired login flow Tool Name Description Parameters list_api_resources
Lists API resources in your organization filter
(optional): Filter expression
limit
(optional): Maximum results to return search_api_resources_by_name
Searches for API resources by name name
(required): Name of the API resource to search for get_api_resource_by_identifier
Gets an API resource by its identifier identifier
(required): Identifier of the API resource create_api_resource
Creates a new API resource identifier
(required): Identifier for the API resource
name
(required): Name of the API resource
requiresAuthorization
(required): Whether the API requires authorization
scopes
(required): List of scopes for the API Tool Name Description Parameters create_user
Creates a user in your organization username
(required): Username
password
(required): Password
email
(required): Email address
first_name
(required): User's first name
last_name
(required): User's last name
userstore_domain
(optional, default: "DEFAULT"): Userstore domain Tool Name Description Parameters list_claims
Lists claims in your organization None
Note
If you are using the WSO2 Identity Server and planning to use update_login_flow
tool, make sure to follow the steps in Subscribe to AI features.
Create a SPA:
Create a new Single Page Application named "My Demo App" with redirect URL "https://example.com/callback".
Update Application:
Update my application with ID "abc123" to have a new name "Updated App".
Update Application Login Flow:
Update the login flow of my application with ID "abc123" to Username and Password as the first step and Email OTP as the second step.
Update Application Claim Configuration:
Update the claim configuration of my application with ID "abc123" to include "username", and "last_name".
Create a new API resource named "Customer API" and authorize my application to access it with "read:customers" scopes.
Create a test user with the username and email address 'test@example.com'.
List all claims in my Asgardeo organization.
go mod tidy
before buildingchmod +x asgardeo-mcp
)If issues persist after troubleshooting:
Contributions are welcome! Submit issues or pull requests via the GitHub repository.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4