Supports Auth0 as an OIDC connection provider for identity and access management within Scalekit environments
Supports GitHub as an OIDC connection provider for identity and access management within Scalekit environments
Supports GitLab as an OIDC connection provider for identity and access management within Scalekit environments
Supports Google as an OIDC connection provider for identity and access management within Scalekit environments
Supports Okta as an OIDC connection provider for identity and access management within Scalekit environments
Supports Salesforce as an OIDC connection provider for identity and access management within Scalekit environments
Scalekit MCP Server
A Model Context Protocol (MCP) server provides comprehensive tools for managing Scalekit environments, organizations, users, connections, and workspace operations. Built for developers who want to connect their AI tools to Scalekit context and capabilities based on simple natural language queries.
Overview
This MCP server enables AI assistants to interact with Scalekit's identity and access management platform through a standardized set of tools. It provides secure, OAuth-protected access to manage environments, organizations, users, authentication connections, and more.
Features
- Environment management and configuration
- Organization and user management
- Workspace member administration
- OIDC connection setup and management
- MCP server registration and configuration
- Role and scope management
- Admin portal link generation
Configuration
Based on your MCP Host, configuration instructions to add Scalekit as an MCP Server can be found below:
Claude Desktop
Configure the Claude app to use the MCP server:
- Open the Claude Desktop app, go to Settings, then Developer
- Click Edit Config
- Open the claude_desktop_config.json file
- Copy and paste the server config to your existing file, then save
- Restart Claude
Cursor
Configure Cursor to use the MCP server:
- Open Cursor, go to Settings, then Cursor Settings
- Select MCP on the left
- Click Add "New Global MCP Server" at the top right
- Copy and paste the server config to your existing file, then save
- Restart Cursor
Windsurf
Configure Windsurf to use the MCP server:
- Open Windsurf, go to Settings, then Developer
- Click Edit Config
- Open the windsurf_config.json file
- Copy and paste the server config to your existing file, then save
- Restart Windsurf
Available Tools
Environment Management
list_environments
- Description: List all available environments
- Scopes: Environment Read
get_environment_details
- Description: Get environment details by ID (e.g., env_123)
- Parameters: environmentId
- Scopes: Environment Read
list_environment_roles
- Description: List all roles in the specified environment
- Parameters: environmentId (format: env_)
- Scopes: Environment Read
create_environment_role
- Description: Create a new role in the specified environment
- Parameters:
- environmentId (format: env_)
- roleName
- displayName
- description
- isDefault (boolean)
- Scopes: Environment Write
list_environment_scopes
- Description: List all scopes in the specified environment
- Parameters: environmentId (format: env_)
- Scopes: Environment Read
create_environment_scope
- Description: Create a new scope in the specified environment
- Parameters:
- environmentId (format: env_)
- scopeName
- description
- Scopes: Environment Write
Workspace Management
list_workspace_members
- Description: List all members in the current workspace
- Parameters: pageToken (1-based index)
- Scopes: Workspace Read
invite_workspace_member
- Description: Invite a new member to the current workspace
- Parameters: email
- Scopes: Workspace Write
Organization Management
list_organizations
- Description: List all organizations under the specified environment
- Parameters:
- environmentId (format: env_)
- pageToken
- Scopes: Organization Read
get_organization_details
- Description: Get details of an organization by ID (e.g., org_123)
- Parameters:
- environmentId (format: env_)
- organizationId
- Scopes: Organization Read
create_organization
- Description: Create a new organization under the specified environment
- Parameters: environmentId (format: env_)
- Scopes: Organization Write
generate_admin_portal_link
- Description: Generate a magic link to the admin portal for the selected organization
- Parameters:
- environmentId (format: env_)
- organizationId (e.g., org_123)
- Scopes: Organization Write
create_organization_user
- Description: Create a new user in the selected organization
- Parameters:
- environmentId (format: env_)
- organizationId
- externalId
- firstName
- lastName
- metadata (JSON key-value pairs)
- Scopes: Organization Write
list_organization_users
- Description: List all users in the selected organization
- Parameters:
- environmentId (format: env_)
- organizationId
- pageToken
- Scopes: Organization Read
update_organization_settings
- Description: Update the settings of an organization
- Parameters:
- environmentId (format: env_)
- organizationId
- feature (JSON array of feature objects)
- Scopes: Organization Write
Connection Management
list_environment_connections
- Description: List all connections for the specified environment
- Parameters: environmentId (format: env_)
- Scopes: Environment Read
list_organization_connections
- Description: List all connections for the selected organization
- Parameters:
- environmentId (format: env_)
- organizationId (e.g., org_123)
- Scopes: Organization Read
create_environment_oidc_connection
- Description: Create a new OIDC connection for the specified environment
- Parameters:
- environmentId (format: env_)
- provider (OKTA, GOOGLE, MICROSOFT_AD, AUTH0, ONELOGIN, PING_IDENTITY, JUMPCLOUD, CUSTOM, GITHUB, GITLAB, LINKEDIN, SALESFORCE, MICROSOFT, IDP_SIMULATOR, SCALEKIT, ADFS)
- Scopes: Environment Write
update_environment_oidc_connection
- Description: Update an existing OIDC connection for the specified environment
- Parameters:
- environmentId (format: env_)
- connectionId (e.g., conn_123)
- key_id
- provider
- oidc_config (comprehensive OIDC configuration object)
- Scopes: Environment Write
enable_environment_connection
- Description: Enable an existing connection for the specified environment
- Parameters:
- environmentId (format: env_)
- connectionId (e.g., conn_123)
- Scopes: Environment Write
MCP Server Management
list_mcp_servers
- Description: List all MCP servers in the specified environment
- Parameters:
- environmentId (format: env_)
- pageToken
- Scopes: Environment Read
register_mcp_server
- Description: Register a new MCP server in the specified environment
- Parameters:
- environmentId (format: env_)
- name
- description
- url
- access_token_expiry (in seconds)
- provider (optional, required when use_scalekit_authentication is false)
- use_scalekit_authentication (boolean)
- Scopes: Environment Write
update_mcp_server
- Description: Update an existing MCP server in the specified environment
- Parameters:
- environmentId (format: env_)
- id (MCP server ID)
- name (optional)
- description (optional)
- url (optional)
- access_token_expiry (optional, in seconds)
- provider (optional)
- use_scalekit_authentication (optional boolean)
- Scopes: Environment Write
switch_mcp_auth_to_scalekit
- Description: Switch the authentication of an existing MCP server to Scalekit authentication
- Parameters:
- environmentId (format: env_)
- id (MCP server ID)
- Scopes: Environment Write
Authentication for MCP Server
Scalekit MCP server uses OAuth2.1 based authentication. As soon as you register Scalekit MCP Server in your MCP Host, your MCP Host will initiate an OAuth authorization workflow so that the MCP Client can get appropriate tokens to securely communicate with Scalekit's MCP Server.
Note
If you are building your own MCP Server and would like to add OAuth based authorization, you can refer to our solution Auth for MCP Servers here: https://docs.scalekit.com/guides/mcp/overview/
This server cannot be installed
remote-capable server
The server can be hosted and run remotely because it primarily relies on remote services or has no dependency on the local environment.
Enables AI assistants to interact with Scalekit's identity and access management platform through natural language queries. Supports managing environments, organizations, users, OIDC connections, workspace operations, and MCP server configurations with OAuth-protected access.
Related MCP Servers
- -securityAlicense-qualityEnables AI assistants to interact with Slack workspaces through the Model Context Protocol, providing tools for reading/sending messages, managing channels, and accessing Slack API functionality.Last updated -1MIT License
- -securityFlicense-qualityEnables AI assistants like Claude to interact with Databricks workspaces through secure OAuth authentication. Supports custom prompts, tools for cluster management, SQL execution, and job operations via the Databricks SDK.Last updated -8
- -securityFlicense-qualityEnables AI assistants like Claude to interact with Databricks workspaces through secure OAuth authentication. Supports custom prompts, tools for cluster management, SQL execution, and job operations via the Databricks SDK.Last updated -
- -securityFlicense-qualityEnables AI agents to manage Linear issues, projects, teams, users, comments, and cycles through an optimized interface designed specifically for language models. Supports both local and remote deployment with OAuth authentication and batch operations.Last updated -1016