Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@iA Document Management MCP Serverfind documents containing 'invoice' in folder ID '123'"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
iA Document Management MCP Server
MCP (Model Context Protocol) server for interacting with WingArc's iA Document Management System.
Features
This MCP server provides three main tools for interacting with iA Document Management:
ia_login - Authenticate with the iA Document Management System
ia_search_documents - Search for documents using free word search
ia_logout - Logout from the system
Installation
Configuration
Set the base URL for your iA Document Management System:
Or provide it as a parameter when calling the tools.
Usage with Claude Desktop
Add the following to your Claude Desktop configuration file:
MacOS: ~/Library/Application Support/Claude/claude_desktop_config.json
Windows: %APPDATA%/Claude/claude_desktop_config.json
Tools
ia_login
Authenticate with the iA Document Management System.
Parameters:
user(required): Usernamepassword(required): Passworddomain(optional): Domain name (defaults to "local")baseUrl(optional): Base URL of the system
Returns:
sessionCookie: Session cookie (JSESSIONID) to use for subsequent requestsxsrfCookie: XSRF token cookie for CSRF protectionxsrfToken: XSRF token value (also available in response header)userId: Authenticated user ID
ia_search_documents
Search for documents using free word search.
Parameters:
searchWord(optional): Free word search termfolderIds(required): Array of folder IDs to search (format:[{id: "123", federationId: "optional"}])operator(optional): "AND" or "OR" (defaults to "AND")recursive(optional): Include subfolders (defaults to true)properties(optional): System properties to retrieve (e.g.,["name", "createDate", "updateDate"])sessionCookie(required): Session cookie from ia_loginxsrfToken(recommended): XSRF token from ia_login for CSRF protectionbaseUrl(optional): Base URL of the system
Returns:
results: Array of matching documentsresultCount: Number of documents found
ia_logout
Logout from the iA Document Management System.
Parameters:
sessionCookie(required): Session cookie from ia_loginxsrfToken(required): XSRF token from ia_login for CSRF protectionbaseUrl(optional): Base URL of the system
Returns:
success: Boolean indicating logout successuserId: User ID that was logged out (when successful)
Note: Logout now works correctly with proper CSRF headers (X-Requested-With and X-XSRF-TOKEN).
Example Workflow
Login:
Search Documents:
Logout:
Security Notes
CSRF Protection
The iA Document Management System uses XSRF (Cross-Site Request Forgery) tokens for security:
Login response includes an
X-Xsrf-Tokenheader andXSRF-TOKENcookieSubsequent requests must include:
X-Requested-With: XMLHttpRequestheader (required for all non-GET requests)X-XSRF-TOKENheader with the token value
The MCP server automatically handles these CSRF headers when xsrfToken is provided
Important: Using an incorrect CSRF token will invalidate it, requiring a new login
Session Management
Sessions are maintained via
JSESSIONIDcookieSessions automatically expire after a period of inactivity
Logout works correctly when proper CSRF headers are included
Always store session credentials securely and never commit them to version control
API Documentation
License
MIT