Skip to main content
Glama

API Manager

🔐 API Manager MCP Server

An enhanced MCP (Model Context Protocol) server for securely managing API keys that works seamlessly with Claude Desktop and Claude Code.

✨ Features

🔒 Security First

  • Secure file permissions (600) for environment files

  • Atomic file operations to prevent corruption

  • Automatic backups before deletions

  • Value masking for safe display

  • Input validation for all operations

📊 Smart Organization

  • Automatic categorization of API keys based on service providers

  • Advanced search across key names and categories

  • Statistics and analytics for your API key usage

  • Export functionality in multiple formats

🛠️ Enhanced Functionality

  • Comprehensive logging for audit trails

  • Command-line interface with flexible options

  • Error handling with detailed feedback

  • Backup management with timestamped backups

🎯 Supported Categories

  • AI/LLM Services: Anthropic, OpenAI, Google AI, Groq, Mistral, DeepSeek, etc.

  • Database & Storage: Supabase, Neo4j, Qdrant, Pinecone, Airtable, etc.

  • Communication: Discord, Slack, Twilio, Telegram, etc.

  • Development Tools: GitHub, Firebase, Vercel, Netlify, etc.

  • Cloud & Hosting: AWS, Azure, GCP, Railway, Heroku, etc.

  • And many more...

🚀 Quick Start

Prerequisites

  • Python 3.8 or higher

  • Claude Desktop or Claude Code

Installation

  1. Clone the repository:

git clone https://github.com/yourusername/API_Manager_MCPServer.git cd API_Manager_MCPServer
  1. Install dependencies:

pip install -r requirements.txt
  1. Configure for Claude Desktop:

Add to your Claude Desktop configuration file (claude_desktop_config.json):

{ "mcpServers": { "api-manager": { "command": "python", "args": ["/path/to/API_Manager_MCPServer/api_manager.py"], "env": {} } } }
  1. Configure for Claude Code:

Add to your Claude Code MCP settings:

{ "mcp": { "servers": { "api-manager": { "command": "python", "args": ["/path/to/API_Manager_MCPServer/api_manager.py"] } } } }

Basic Usage

Once configured, you can use the API Manager through Claude with natural language:

"List my API keys" "Add a new OpenAI API key" "Search for Discord keys" "Show statistics about my API keys" "Create a backup of my environment file"

📖 Detailed Usage

Available Commands

🔍 Query Commands

list_api_keys - List all API keys with categories

  • show_values: Show actual values (default: false)

  • category: Filter by specific category

get_api_key - Get a specific API key by name

  • key_name: Name of the key to retrieve

search_api_keys - Search for API keys by name or category

  • query: Search term

  • show_values: Show actual values (default: false)

list_categories - List all categories with counts

📝 Management Commands

add_api_key - Add or update an API key

  • key_name: Name of the API key

  • value: The API key value

delete_api_key - Delete an API key

  • key_name: Name of the key to delete

🛠️ Utility Commands

backup_env_file - Create timestamped backup

get_stats - Show detailed statistics

export_keys - Export keys in JSON or ENV format

  • format: "json" or "env" (default: json)

  • include_values: Include actual values (default: false)

help - Show comprehensive help

Command Line Options

python api_manager.py --help python api_manager.py --version python api_manager.py --env-file /custom/path/.env python api_manager.py --log-level DEBUG

Environment File Location

By default, API keys are stored in:

  • ~/.config/api_manager/.env

You can specify a custom location using:

  • Command line: --env-file /path/to/.env

  • Environment variable: API_MANAGER_ENV_FILE

🔧 Configuration

Environment File Format

# API Manager Environment File # Created on 2024-01-01 12:00:00 # AI Services ANTHROPIC_API_KEY=sk-ant-1234567890abcdef OPENAI_API_KEY=sk-1234567890abcdef # Database Services SUPABASE_API_KEY=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9 # Communication DISCORD_BOT_TOKEN=ODcyNzM0NjI5NjU2MjE3NjAw

Security Best Practices

  1. File Permissions: The environment file is automatically created with secure permissions (600)

  2. Backups: Always create backups before making changes

  3. Value Masking: Use show_values=false when listing keys

  4. Logging: Monitor the log file for any suspicious activity

  5. Access Control: Limit access to the environment file location

🧪 Testing

Run the test suite:

# Install test dependencies pip install pytest pytest-asyncio pytest-cov # Run tests pytest tests/ # Run with coverage pytest tests/ --cov=api_manager --cov-report=html

📊 Monitoring and Logs

The API Manager creates detailed logs in api_manager.log:

# View recent activity tail -f api_manager.log # Search for specific operations grep "Tool called" api_manager.log

🔧 Development

Project Structure

API_Manager_MCPServer/ ├── api_manager.py # Main MCP server ├── requirements.txt # Dependencies ├── setup.py # Package configuration ├── README.md # This file ├── LICENSE # License file ├── tests/ # Test suite │ ├── __init__.py │ ├── test_api_manager.py │ └── test_integration.py ├── docs/ # Documentation │ ├── configuration.md │ ├── security.md │ └── troubleshooting.md └── examples/ # Usage examples ├── claude_desktop_config.json └── usage_examples.md

Contributing

  1. Fork the repository

  2. Create a feature branch

  3. Make your changes

  4. Add tests for new functionality

  5. Submit a pull request

📜 License

This project is licensed under the MIT License - see the LICENSE file for details.

🤝 Support

🚧 Roadmap

  • Web UI for API key management

  • Integration with popular password managers

  • Multi-environment support (dev, staging, prod)

  • API key rotation notifications

  • Advanced audit logging

  • Team collaboration features

🙏 Acknowledgments

  • Built on the Model Context Protocol (MCP) by Anthropic

  • Inspired by the need for secure API key management in AI workflows

  • Community feedback and contributions


⚠️ Security Notice: API keys are sensitive credentials. Always follow security best practices and never commit API keys to version control systems.

-
security - not tested
A
license - permissive license
-
quality - not tested

local-only server

The server can only run on the client's local machine because it depends on local resources.

Enables secure management of API keys through an encrypted environment file with automatic categorization, search functionality, and backup operations. Provides comprehensive API key organization with value masking, audit trails, and export capabilities for safe credential management.

  1. ✨ Features
    1. 🔒 Security First
    2. 📊 Smart Organization
    3. 🛠️ Enhanced Functionality
    4. 🎯 Supported Categories
  2. 🚀 Quick Start
    1. Prerequisites
    2. Installation
    3. Basic Usage
  3. 📖 Detailed Usage
    1. Available Commands
    2. Command Line Options
    3. Environment File Location
  4. 🔧 Configuration
    1. Environment File Format
    2. Security Best Practices
  5. 🧪 Testing
    1. 📊 Monitoring and Logs
      1. 🔧 Development
        1. Project Structure
        2. Contributing
      2. 📜 License
        1. 🤝 Support
          1. 🚧 Roadmap
            1. 🙏 Acknowledgments

              MCP directory API

              We provide all the information about MCP servers via our MCP API.

              curl -X GET 'https://glama.ai/api/mcp/v1/servers/BlackWolf-Media/API_Manager_MCPServer'

              If you have feedback or need assistance with the MCP directory API, please join our Discord server