DA Live Admin - Remote MCP Server
A remote Model Context Protocol (MCP) server for Document Authoring (DA) Live Admin API, deployable on Cloudflare Workers. This server provides LLM assistants like Claude with direct access to DA repository management operations.
Features
12 DA Admin Tools: Complete set of tools for managing DA repositories
Remote Access: Deployable on Cloudflare Workers with global edge distribution
Streamable HTTP: Modern MCP transport protocol for remote servers
Token Pass-through: Simple authentication by passing DA API tokens through Authorization header
Production Ready: Error handling, logging, CORS support, and health checks
TypeScript: Fully typed codebase for reliability and maintainability
Available Tools
Tool | Description |
| List sources and directories in a repository |
| Get content of a specific source file |
| Create a new source file |
| Update an existing source file |
| Delete a source file |
| Copy content between locations |
| Move content between locations |
| Get version history for a file |
| Get repository configuration |
| Update repository configuration |
| Lookup media references |
| Lookup fragment references |
Prerequisites
Node.js 18+ and npm
Cloudflare account (free tier works)
Wrangler CLI installed (
npm install -g wrangler)DA Admin API token
Installation
Clone and install dependencies:
Configure Wrangler:
Edit wrangler.toml if needed to customize your deployment settings.
Set up secrets (optional):
If you want a fallback token for testing:
Development
Local Development
Run the server locally with hot reload:
The server will be available at http://localhost:8787
Test Endpoints
Health check:
http://localhost:8787/healthMCP endpoint:
http://localhost:8787/mcp
Testing with MCP Inspector
Start the local server:
npm run devOpen MCP Inspector
Configure connection:
Type:
Streamable HTTPURL:
http://localhost:8787/mcpHeaders:
Authorization: Bearer YOUR_DA_TOKEN
Deployment
Deploy to Cloudflare Workers
After deployment, note your Worker URL (e.g., https://mcp-da-admin.your-account.workers.dev)
Client Configuration
Claude Desktop
Add to ~/Library/Application Support/Claude/claude_desktop_config.json (macOS) or equivalent:
VS Code / Cursor
Add to .vscode/mcp.json or Cursor settings:
Authentication
The server uses simple token pass-through authentication:
Client sends DA Admin API token in the
AuthorizationheaderServer extracts the token and passes it to DA Admin API
All requests to DA Admin API use this token
Authorization Header Format:
or simply:
Usage Examples
Once configured, you can ask your AI assistant to perform DA operations:
API Endpoints
GET /health
Health check endpoint returning server status.
Response:
POST /mcp
MCP protocol endpoint for tool execution. Requires Authorization header with DA Admin API token.
Architecture
Project Structure
Error Handling
All tools include comprehensive error handling:
401 Unauthorized: Missing or invalid DA Admin token
404 Not Found: Invalid endpoint
408 Timeout: Request took longer than 30 seconds
500 Internal Error: Server-side errors with details
Errors are formatted for easy understanding by LLM clients.
Logging
The server logs important events and errors to Cloudflare Workers logs:
Security Considerations
Token Security: DA Admin tokens are never logged or stored
HTTPS Only: All communication is encrypted (enforced by Cloudflare)
CORS: Configured for secure cross-origin requests
Input Validation: All tool inputs are validated against schemas
Rate Limiting: Inherits Cloudflare Workers rate limiting
Troubleshooting
"Missing DA Admin API token"
Solution: Ensure your MCP client configuration includes the Authorization header with your DA Admin API token.
"Request timeout"
Solution: The default timeout is 30 seconds. Large operations may need optimization or the DA Admin API may be slow.
"401 Unauthorized from DA API"
Solution: Your DA Admin token may be invalid or expired. Generate a new token and update your client configuration.
Tools not appearing in Claude
Solution:
Restart Claude Desktop after configuration changes
Check the configuration file path is correct
Verify the Worker URL is accessible
Check Claude Desktop logs for connection errors
Monitoring
Monitor your deployed Worker:
Cloudflare Dashboard: View invocations, errors, and performance
Wrangler Tail: Real-time logs (
wrangler tail)Health Endpoint: Regular health checks at
/health
Future Enhancements
OAuth 2.1 authentication flow
Cloudflare KV for token storage
Rate limiting per user
Advanced error recovery
Caching for frequently accessed resources
Webhook support for real-time updates
Contributing
Contributions are welcome! Please:
Fork the repository
Create a feature branch
Make your changes with tests
Submit a pull request
License
MIT License - see LICENSE file for details
Resources
Support
For issues and questions:
Open an issue on GitHub
Check existing documentation
Review Cloudflare Workers logs
Built with ❤️ using Model Context Protocol and Cloudflare Workers