Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@Zintlr MCP ServerFind marketing directors at software companies in San Francisco"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
Zintlr MCP Server
Remote MCP (Model Context Protocol) server for LLM integration with Zintlr sales intelligence platform.
Overview
This server allows LLM users to connect to Zintlr directly from their MCP client's Settings → Connectors interface by simply pasting the server URL.
Features
Remote MCP Protocol: Works with any MCP-compatible LLM client
OAuth Passthrough: Redirects to Zintlr login, stores existing JWT tokens
Direct API Access: Bypasses auth.zintlr.com proxy, calls api.zintlr.com directly
13 Tools: Search prospects, get profiles, unlock contacts, and more
Quick Start
1. Configure Environment
Edit .env with your secrets:
CIPHER_SECRET: Same asprocess.env.CIPHERin Next.js proxyCAPTCHA_TOKEN: Same asCAPTCHA_TOKENin Next.js proxyMCP_SERVER_URL: Public URL of this server
2. Run with Docker
3. Run Locally (Development)
User Setup
Open your MCP-compatible LLM client (e.g., Claude, etc.)
Go to Settings → Connectors
Click "Add custom connector"
Enter URL:
https://mcp.zintlr.com(your deployed URL)Complete OAuth flow (redirects to Zintlr login)
Done! Tools are now available in your LLM
Available Tools
Tool | Description |
| Search people/companies with filters |
| Company name autocomplete |
| Find company by domain |
| Job title autocomplete |
| Location autocomplete |
| Tech stack autocomplete |
| Get detailed person info |
| Get detailed company info |
| Reveal email/phone (uses credits) |
| Get current user's profile |
| View recent searches |
| View saved search templates |
| Save a search for later |
Architecture
Authentication Flow
User adds connector URL in LLM client
LLM client requests OAuth metadata from
/.well-known/oauth-authorization-serverUser redirected to
/oauth/authorize→ Zintlr loginAfter login, Zintlr redirects to
/oauth/callbackwith JWT tokensMCP server stores tokens in Redis, returns session ID to LLM client
LLM client uses session ID as Bearer token for MCP requests
MCP server decrypts tokens, calls Zintlr API directly
Proxy Bypass
This server replicates the Next.js proxy logic (auth.zintlr.com):
Decrypts JWT tokens using
verify_and_decrypt_jwt(token, CIPHER)Sets
Authorizationheader with decrypted access_tokenSets
visitor-idandclient-ip-addressheadersAdds decrypted
keyto request bodyCalls
api.zintlr.comdirectly
API Endpoints
Endpoint | Method | Description |
| POST | MCP JSON-RPC endpoint |
| GET | Server info |
| GET | OAuth metadata |
| GET | Start OAuth flow |
| GET | OAuth callback from Zintlr |
| POST | Exchange code for token |
| POST | Revoke token (logout) |
| GET | Health check |
Environment Variables
Variable | Default | Description |
|
| Direct API URL |
|
| Frontend for OAuth |
| - | JWT decryption secret |
| - | API authentication token |
|
| This server's public URL |
|
| Redis for sessions |
|
| Session TTL (1 hour) |
|
| Server host |
|
| Server port |
|
| Debug mode |
Testing
Test MCP Endpoint
Test Health
Deployment
Docker
Docker Compose
Production Checklist
Set
DEBUG=falseConfigure proper
MCP_SERVER_URLwith HTTPSSet secure
CIPHER_SECRETandCAPTCHA_TOKENConfigure Redis persistence
Set up reverse proxy (nginx) with SSL
Configure DNS for
mcp.zintlr.com
License
Proprietary - Zintlr