Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@CipherTrust Manager MCP Serverlist all encryption keys in the production environment"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
CipherTrust Manager MCP Server
This project implements an independently-developed CipherTrust MCP (Model Context Protocol) server that allows AI Assistants like Claude or Cursor to interact with CipherTrust Manager resources using the ksctl CLI.
Table of Contents
Important Notice
This is an independent, open-source project. Please note:
⚠️ Not officially supported by Thales
✅ Uses public APIs and documented interfaces
🔧 Independently maintained
📝 Use at your own risk - test thoroughly in your environment
💼 No warranty - see license for full terms
For official CipherTrust Manager support, please contact Thales directly.
Features
The MCP server exposes a set of tools and endpoints for clients (such as Claude Desktop and Cursor) to interact with CipherTrust resources. Supported operations include:
Key management
CTE client management
User management
Connection management
And more
Benefits:
Unified interface for AI assistants to interact with CipherTrust Manager
Support for key management, connection management, CTE client management, and more
JSON-RPC communication over stdin/stdout
Configurable via environment variables
Prerequisites
Git
Python 3.11 or higher
uv for dependency management
Access to a CipherTrust Manager instance
Installing Git (Windows)
If you don't have Git installed on Windows, follow these steps:
Download and install Git for Windows: https://git-scm.com/download/win
Or install via winget:
winget install --id Git.Git -e --source wingetVerify installation - Open PowerShell and execute:
git --versionYou should see the installed Git version.
Installing Python and uv
Method 1: Manual Installation
1. Download Python
2. Run the Installer
3. Verify Installation
Open a new terminal and run:
4. Install uv
5. Clone the Repository
6. Create a Virtual Environment and Install Dependencies
Method 2: Using winget (Windows)
1. Install Python with winget
2. Close and Reopen PowerShell
This ensures Python is available in your PATH.
3. Verify Installation
4. Install uv
5. Clone the Repository
6. Create a Virtual Environment and Install Dependencies
Configuration
(Optional) Copy and Edit the Example Environment File
Example
You can also set these as environment variables directly instead of using a .env file.
Example
Usage
⚠️ Important: Before starting, either the environment variable or .env should contain a valid CipherTrust Manager URL.
You have two main ways to run the CipherTrust MCP Server:
Method 1: Direct Execution
This runs the main() function in ciphertrust_mcp_server/__main__.py.
Method 2: Module Execution
Testing
This project includes comprehensive testing capabilities using the Model Context Protocol Inspector and Python unit tests.
Quick Testing
Available Testing Methods
🔧 Manual JSON-RPC Testing: Direct stdin/stdout communication for debugging and development
🖥️ Interactive UI Testing: Visual web interface for manual testing and debugging
⚡ CLI Automated Testing: Command-line automation for CI/CD integration
🧪 Python Unit Tests: Comprehensive unit testing for server components
🔗 Integration Tests: End-to-end testing with real CipherTrust Manager instances
NPM Scripts
After creating a package.json file:
Comprehensive Testing Guide
📖 For detailed testing instructions, see
🔧 For example AI assistant prompts, see
The testing guide covers:
Complete setup and configuration
Advanced testing scenarios
The example prompts include:
Key management operations
User and group management
System and service management
Cluster management
License management
CTE operations
Crypto operations
And more practical scenarios
Integration with AI Assistants
Using with Cursor
1. Configure Cursor
Go to Settings > MCP Tools > Add Custom MCP
Add the following contents in the config file (e.g.,
mcp.json):
On Windows, use the .venv\Scripts\ciphertrust-mcp-server.exe path and double backslashes:
2. Apply Configuration
Disable and Re-enable the CipherTrust MCP server in Cursor to apply the changes.
Using with Claude Desktop
1. Locate or create the Claude Desktop config file:
macOS:
~/Library/Application Support/Claude/claude_desktop_config.jsonWindows:
%APPDATA%\Roaming\Claude\claude_desktop_config.json
2. Add or update the MCP server configuration:
macOS/Linux Example:
Windows Example:
Adjust the path to match your actual project location and environment.
3. Restart Claude Desktop
Restart Claude Desktop to apply the changes.
Environment Variables
Set these in your shell or in a .env file in the project root:
Variable Name | Description | Required/Default |
| CipherTrust Manager URL (http/https) | Required |
| CipherTrust Manager username | Required |
| CipherTrust Manager password | Required |
| Disable SSL verification (true/false) |
|
| Timeout for CipherTrust requests (seconds) |
|
| Default CipherTrust domain |
|
| Authentication domain |
|
| Path to ksctl binary |
|
| Path to ksctl config file |
|
| Logging level (DEBUG, INFO) |
|
Example
Troubleshooting
Successful startup logs:
The server is designed to be run as a subprocess by MCP clients (like Claude Desktop or Cursor) and communicates via JSON-RPC over stdin/stdout.
You'll see log output like in the AI assistant's MCP log:
Dependencies
The pyproject.toml file includes these dependencies:
mcp>=1.0.0pydantic>=2.0.0pydantic-settings>=2.0.0httpx>=0.27.0python-dotenv>=1.0.0
If you encounter issues, ensure all dependencies are installed and up-to-date.
Project Structure
Contributing
Contributions are welcome! Please feel free to submit a Pull Request. While this started as a personal project, contributions help make it better for everyone.
Legal
Trademark Notice
CipherTrust® and related trademarks are the property of Thales Group and its subsidiaries. This project is not affiliated with, endorsed by, or sponsored by Thales Group.
No Warranty
This software is provided "as is" without warranty of any kind. Use at your own risk.
Support
This is an independent project. For official CipherTrust Manager support, please contact Thales directly. For issues with this unofficial MCP server, please use the GitHub issue tracker.
License
This project is licensed under the MIT License. See the LICENSE file for details.