The Google Workspace MCP Server enables seamless integration with Google Workspace services, providing:
Authentication: Secure OAuth 2.0 flow for Google Workspace access
Gmail: Search, read, send, and manage emails, drafts, threads, and labels
Google Drive: Search, access, and manage files/folders including shared drives and Office formats
Google Calendar: Create, modify, delete, and retrieve events and calendars
Google Docs: Search, read, create, and manage documents
Google Sheets: Create, read, modify spreadsheets and cell values
Google Forms: Create forms, manage publish settings, and retrieve responses
Google Chat: Manage chat spaces, send messages, and search chat history
The server supports multiple transport methods (HTTP, SSE) and integrates with AI assistants like Claude Desktop and Open WebUI.
Enables complete email management including searching messages, retrieving content, sending emails, and creating drafts with full support for Gmail query syntax.
Provides full calendar management capabilities including listing calendars, fetching events, creating/modifying/deleting events with support for all-day and timed events.
Allows searching for documents, reading document content, listing documents in folders, and creating new documents directly from chat.
Enables searching files, listing folder contents, reading file content, and creating new files with support for extraction and retrieval of Microsoft Office formats.
Google Workspace MCP Server
Full natural language control over Google Calendar, Drive, Gmail, Docs, Sheets, Slides, Forms, Tasks, and Chat through all MCP clients, AI assistants and developer tools.
The most feature-complete Google Workspace MCP server, now with Remote OAuth2.1 multi-user support and 1-click Claude installation.
Support for all free Google accounts (Gmail, Docs, Drive etc) & Google Workspace plans (Starter, Standard, Plus, Enterprise, Non Profit) with expanded app options like Chat & Spaces. Interested in a private cloud instance? That can be arranged.
See it in action:
A quick plug for AI-Enhanced Docs
This README was written with AI assistance, and here's why that matters
As a solo dev building open source tools, comprehensive documentation often wouldn't happen without AI help. Using agentic dev tools like Roo & Claude Code that understand the entire codebase, AI doesn't just regurgitate generic content - it extracts real implementation details and creates accurate, specific documentation.
In this case, Sonnet 4 took a pass & a human (me) verified them 8/16/25.
Overview
A production-ready MCP server that integrates all major Google Workspace services with AI assistants. It supports both single-user operation and multi-user authentication via OAuth 2.1, making it a powerful backend for custom applications. Built with FastMCP for optimal performance, featuring advanced authentication handling, service caching, and streamlined development patterns.
Simplified Setup: Now uses Google Desktop OAuth clients - no redirect URIs or port configuration needed!
Related MCP server: Azure MCP Server
Features
• •
Complete Gmail management, end to end coverage
Full calendar management with advanced features
File operations with Office format support
Document creation, editing & comments
Deep, exhaustive support for fine grained editing
• • •
Form creation, publish settings & response management
Space management & messaging capabilities
Spreadsheet operations with flexible cell management
Presentation creation, updates & content manipulation
Advanced OAuth 2.0 & OAuth 2.1 support
Automatic token refresh & session management
Transport-aware callback handling
Multi-user bearer token authentication
Innovative CORS proxy architecture
• •
Full support for all MCP Transports
Task & task list management with hierarchy
Programmable Search Engine (PSE) integration
▶ Quick Start
⊠ Credentials
▶ Launch Commands
★ Tool Tiers
●
core- Essential tools◐
extended- Core + extras○
complete- Everything Details →
1. One-Click Claude Desktop Install (Recommended)
Download: Grab the latest
google_workspace_mcp.dxtfrom the “Releases” pageInstall: Double-click the file – Claude Desktop opens and prompts you to Install
Configure: In Claude Desktop → Settings → Extensions → Google Workspace MCP, paste your Google OAuth credentials
Use it: Start a new Claude chat and call any Google Workspace tool
Why DXT?
Desktop Extensions (
.dxt) bundle the server, dependencies, and manifest so users go from download → working MCP in one click – no terminal, no JSON editing, no version conflicts.
Required Configuration
Required
Variable | Purpose |
| OAuth client ID from Google Cloud |
| OAuth client secret |
| Development only (allows
redirect) |
Optional
Variable | Purpose |
| Default email for single-user auth |
| API key for Custom Search |
| Search Engine ID for Custom Search |
| Set to
for OAuth 2.1 support |
| Set to
for external OAuth flow with bearer tokens (requires OAuth 2.1) |
| Set to
for stateless operation (requires OAuth 2.1) |
Claude Desktop stores these securely in the OS keychain; set them once in the extension pane.
Prerequisites
Python 3.10+
Google Cloud Project with OAuth 2.0 credentials
Configuration
1. Create Project
2. OAuth Credentials
Download & save credentials
3. Enable APIs
See quick links below
Complete Setup Process:
Create OAuth 2.0 Credentials - Visit Google Cloud Console
Create a new project (or use existing)
Navigate to APIs & Services → Credentials
Click Create Credentials → OAuth Client ID
Choose Desktop Application as the application type (no redirect URIs needed!)
Download credentials and note the Client ID and Client Secret
Enable Required APIs - In APIs & Services → Library
Search for and enable each required API
Or use the quick links below for one-click enabling
Configure Environment - Set your credentials:
export GOOGLE_OAUTH_CLIENT_ID="your-client-id" export GOOGLE_OAUTH_CLIENT_SECRET="your-secret"
1.1. Credentials: See Credential Configuration for detailed setup options
Environment Configuration:
◆ Development Mode
Allows HTTP redirect URIs
@ Default User
Single-user authentication
◆ Custom Search
Optional: Search API setup
Server Configuration:
◆ Base Configuration
Server URL & port settings
↻ Proxy Support
Leverage multi-user OAuth2.1 clients
@ Default Email
Skip email in auth flows in single user mode
Variable | Description | Default |
| Base server URI (no port) |
|
| Server listening port |
|
| External URL for reverse proxy setups | None |
| Override OAuth callback URL | Auto-constructed |
| Default auth email | None |
Google Custom Search Setup
1. Create Search Engine
2. Get API Key
3. Set Variables
Configure in environment
Complete Setup Process:
Create Search Engine - Visit the Control Panel
Choose "Search the entire web" or specify sites
Copy the Search Engine ID (looks like:
017643444788157684527:6ivsjbpxpqw)
Enable API & Get Key - Visit Google Developers Console
Enable "Custom Search API" in your project
Create credentials → API Key
Restrict key to Custom Search API (recommended)
Configure Environment - Add to your shell or
.env:export GOOGLE_PSE_API_KEY="AIzaSy..." export GOOGLE_PSE_ENGINE_ID="01764344478..."
Start the Server
▶ Quick Start
Default stdio mode
◆ HTTP Mode
Web interfaces & debugging
@ Single User
Simplified authentication
▶ Selective Tool Loading
★ Tool Tiers
◆ Docker Deployment
Available Services: gmail • drive • calendar • docs • sheets • forms • tasks • chat • search
Tool Tiers
The server organizes tools into three progressive tiers for simplified deployment. Choose a tier that matches your usage needs and API quota requirements.
Available Tiers
(--tool-tier core)
Essential tools for everyday tasks. Perfect for light usage with minimal API quotas. Includes search, read, create, and basic modify operations across all services.
(--tool-tier extended)
Core functionality plus management tools. Adds labels, folders, batch operations, and advanced search. Ideal for regular usage with moderate API needs.
(--tool-tier complete)
Full API access including comments, headers/footers, publishing settings, and administrative functions. For power users needing maximum functionality.
Important Notes
▶ Start with and upgrade as needed
▶ Tiers are cumulative – each includes all previous
▶ Mix and match with --tools for specific services
▶ Configuration in core/tool_tiers.yaml
▶ Authentication included in all tiers
Usage Examples
📋 Credential Configuration
🚀 Environment Variables
Best for production
📁 File-based
Traditional method
⚡ .env File
Best for development
Loading Priority
Environment variables (
export VAR=value).envfile in project root (warning - if you run viauvxrather thanuv runfrom the repo directory, you are spawning a standalone process not associated with your clone of the repo and it will not find your .env file without specifying it directly)client_secret.jsonviaGOOGLE_CLIENT_SECRET_PATHDefault
client_secret.jsonin project root
Why Environment Variables?
✅ Docker/K8s ready - Native container support
✅ Cloud platforms - Heroku, Railway, Vercel
✅ CI/CD pipelines - GitHub Actions, Jenkins
✅ No secrets in git - Keep credentials secure
✅ Easy rotation - Update without code changes
🧰 Available Tools
Note: All tools support automatic authentication via
@require_google_service()decorators with 30-minute service caching.
📅 Google Calendar calendar_tools.py
Tool | Tier | Description |
| Core | List accessible calendars |
| Core | Retrieve events with time range filtering |
| Core | Create events with attachments & reminders |
| Core | Update existing events |
| Extended | Remove events |
📁 Google Drive drive_tools.py
Tool | Tier | Description |
| Core | Search files with query syntax |
| Core | Read file content (Office formats) |
| Core | Create files or fetch from URLs |
| Extended | List folder contents |
| Extended | Update file metadata, move between folders |
📧 Gmail gmail_tools.py
Tool | Tier | Description |
| Core | Search with Gmail operators |
| Core | Retrieve message content |
| Core | Batch retrieve message content |
| Core | Send emails |
| Extended | Get full thread content |
| Extended | Modify message labels |
| Extended | List available labels |
| Extended | Create/update/delete labels |
| Extended | Create drafts |
| Complete | Batch retrieve thread content |
| Complete | Batch modify labels |
| Complete | Initialize authentication |
📝 Google Docs docs_tools.py
Tool | Tier | Description |
| Core | Extract document text |
| Core | Create new documents |
| Core | Modify document text |
| Extended | Find documents by name |
| Extended | Find and replace text |
| Extended | List docs in folder |
| Extended | Add tables, lists, page breaks |
| Complete | Insert images from Drive/URLs |
| Complete | Modify headers and footers |
| Complete | Execute multiple operations |
| Complete | Analyze document structure |
| Extended | Export document to PDF |
| Complete | Create data tables |
| Complete | Debug table issues |
| Complete | Read, Reply, Create, Resolve |
📊 Google Sheets sheets_tools.py
Tool | Tier | Description |
| Core | Read cell ranges |
| Core | Write/update/clear cells |
| Core | Create new spreadsheets |
| Extended | List accessible spreadsheets |
| Extended | Get spreadsheet metadata |
| Complete | Add sheets to existing files |
| Complete | Read/create/reply/resolve comments |
🖼️ Google Slides slides_tools.py
Tool | Tier | Description |
| Core | Create new presentations |
| Core | Retrieve presentation details |
| Extended | Apply multiple updates |
| Extended | Get specific slide information |
| Extended | Generate slide thumbnails |
| Complete | Read/create/reply/resolve comments |
📝 Google Forms forms_tools.py
Tool | Tier | Description |
| Core | Create new forms |
| Core | Retrieve form details & URLs |
| Complete | Configure form settings |
| Complete | Get individual responses |
| Extended | List all responses with pagination |
✓ Google Tasks tasks_tools.py
Tool | Tier | Description |
| Core | List tasks with filtering |
| Core | Retrieve task details |
| Core | Create tasks with hierarchy |
| Core | Modify task properties |
| Extended | Remove tasks |
| Complete | Reposition tasks |
| Complete | Hide completed tasks |
| Complete | List/get/create/update/delete task lists |
💬 Google Chat chat_tools.py
Tool | Tier | Description |
| Extended | List chat spaces/rooms |
| Core | Retrieve space messages |
| Core | Send messages to spaces |
| Core | Search across chat history |
🔍 Google Custom Search search_tools.py
Tool | Tier | Description |
| Core | Perform web searches |
| Complete | Retrieve search engine metadata |
| Extended | Search within specific domains |
Tool Tier Legend:
• Core: Essential tools for basic functionality • Minimal API usage • Getting started
• Extended: Core tools + additional features • Regular usage • Expanded capabilities
• Complete: All available tools including advanced features • Power users • Full API access
Connect to Claude Desktop
The server supports two transport modes:
Stdio Mode (Default - Recommended for Claude Desktop)
In general, you should use the one-click DXT installer package for Claude Desktop.
If you are unable to for some reason, you can configure it manually via claude_desktop_config.json
Manual Claude Configuration (Alternative)
Open Claude Desktop Settings → Developer → Edit Config
macOS:
~/Library/Application Support/Claude/claude_desktop_config.jsonWindows:
%APPDATA%\Claude\claude_desktop_config.json
Add the server configuration:
2. Advanced / Cross-Platform Installation
If you’re developing, deploying to servers, or using another MCP-capable client, keep reading.
Instant CLI (uvx)
Note: Configure OAuth credentials before running. Supports environment variables,
.envfile, orclient_secret.json.
Local Development Setup
uv sync --group testinstalls only the testing stack if you need a slimmer environment.uv run main.py --transport streamable-httplaunches the server with your checked-out code for manual verification.Ruff is part of the
devgroup because pre-push hooks callruff checkautomatically—run it locally before committing to avoid hook failures.
OAuth 2.1 Support (Multi-User Bearer Token Authentication)
The server includes OAuth 2.1 support for bearer token authentication, enabling multi-user session management. OAuth 2.1 automatically reuses your existing - no additional configuration needed!
When to use OAuth 2.1:
Multiple users accessing the same MCP server instance
Need for bearer token authentication instead of passing user emails
Building web applications or APIs on top of the MCP server
Production environments requiring secure session management
Browser-based clients requiring CORS support
Enabling OAuth 2.1:
To enable OAuth 2.1, set the MCP_ENABLE_OAUTH21 environment variable to true.
If MCP_ENABLE_OAUTH21 is not set to true, the server will use legacy authentication, which is suitable for clients that do not support OAuth 2.1.
FastMCP ships a native GoogleProvider that we now rely on directly. It solves the two tricky parts of using Google OAuth with MCP clients:
Dynamic Client Registration: Google still doesn't support OAuth 2.1 DCR, but the FastMCP provider exposes the full DCR surface and forwards registrations to Google using your fixed credentials. MCP clients register as usual and the provider hands them your Google client ID/secret under the hood.
CORS & Browser Compatibility: The provider includes an OAuth proxy that serves all discovery, authorization, and token endpoints with proper CORS headers. We no longer maintain custom
/oauth2/*routes—the provider handles the upstream exchanges securely and advertises the correct metadata to clients.
The result is a leaner server that still enables any OAuth 2.1 compliant client (including browser-based ones) to authenticate through Google without bespoke code.
Stateless Mode (Container-Friendly)
The server supports a stateless mode designed for containerized environments where file system writes should be avoided:
Enabling Stateless Mode:
Key Features:
No file system writes: Credentials are never written to disk
No debug logs: File-based logging is completely disabled
Memory-only sessions: All tokens stored in memory via OAuth 2.1 session store
Container-ready: Perfect for Docker, Kubernetes, and serverless deployments
Token per request: Each request must include a valid Bearer token
Requirements:
Must be used with
MCP_ENABLE_OAUTH21=trueIncompatible with single-user mode
Clients must handle OAuth flow and send valid tokens with each request
This mode is ideal for:
Cloud deployments where persistent storage is unavailable
Multi-tenant environments requiring strict isolation
Containerized applications with read-only filesystems
Serverless functions and ephemeral compute environments
MCP Inspector: No additional configuration needed with desktop OAuth client.
Claude Code: No additional configuration needed with desktop OAuth client.
External OAuth 2.1 Provider Mode
The server supports an external OAuth 2.1 provider mode for scenarios where authentication is handled by an external system. In this mode, the MCP server does not manage the OAuth flow itself but expects valid bearer tokens in the Authorization header of tool calls.
Enabling External OAuth 2.1 Provider Mode:
How It Works:
Protocol-level auth disabled: MCP handshake (
initialize) andtools/listdo not require authenticationTool-level auth required: All tool calls must include
Authorization: Bearer <token>headerExternal OAuth flow: Your external system handles the OAuth flow and obtains Google access tokens
Token validation: Server validates bearer tokens via Google's tokeninfo API
Multi-user support: Each request is authenticated independently based on its bearer token
Key Features:
No local OAuth flow: Server does not provide OAuth callback endpoints or manage OAuth state
Bearer token only: All authentication via Authorization headers
Stateless by design: Works seamlessly with
WORKSPACE_MCP_STATELESS_MODE=trueExternal identity providers: Integrate with your existing authentication infrastructure
Tool discovery: Clients can list available tools without authentication
Requirements:
Must be used with
MCP_ENABLE_OAUTH21=trueOAuth credentials still required for token validation (
GOOGLE_OAUTH_CLIENT_ID,GOOGLE_OAUTH_CLIENT_SECRET)External system must obtain valid Google OAuth access tokens (ya29.*)
Each tool call request must include valid bearer token
Use Cases:
Integrating with existing authentication systems
Custom OAuth flows managed by your application
API gateways that handle authentication upstream
Multi-tenant SaaS applications with centralized auth
Mobile or web apps with their own OAuth implementation
VS Code MCP Client Support
Claude Code MCP Client Support
Reverse Proxy Setup
If you're running the MCP server behind a reverse proxy (nginx, Apache, Cloudflare, etc.), you have two configuration options:
Problem: When behind a reverse proxy, the server constructs OAuth URLs using internal ports (e.g., http://localhost:8000) but external clients need the public URL (e.g., https://your-domain.com).
Solution 1: Set WORKSPACE_EXTERNAL_URL for all OAuth endpoints:
Solution 2: Set GOOGLE_OAUTH_REDIRECT_URI for just the callback:
You also have options for:
| OAUTH_CUSTOM_REDIRECT_URIS (optional) | Comma-separated list of additional redirect URIs |
| OAUTH_ALLOWED_ORIGINS (optional) | Comma-separated list of additional CORS origins |
Important:
Use
WORKSPACE_EXTERNAL_URLwhen all OAuth endpoints should use the external URL (recommended for reverse proxy setups)Use
GOOGLE_OAUTH_REDIRECT_URIwhen you only need to override the callback URLThe redirect URI must exactly match what's configured in your Google Cloud Console
Your reverse proxy must forward OAuth-related requests (
/oauth2callback,/oauth2/*,/.well-known/*) to the MCP server
Requires Python 3.10+ and
Development Installation
For development or customization:
Development Installation (For Contributors):
HTTP Mode (For debugging or web interfaces)
If you need to use HTTP mode with Claude Desktop:
Note: Make sure to start the server with
First-Time Authentication
The server uses Google Desktop OAuth for simplified authentication:
No redirect URIs needed: Desktop OAuth clients handle authentication without complex callback URLs
Automatic flow: The server manages the entire OAuth process transparently
Transport-agnostic: Works seamlessly in both stdio and HTTP modes
When calling a tool:
Server returns authorization URL
Open URL in browser and authorize
Google provides an authorization code
Paste the code when prompted (or it's handled automatically)
Server completes authentication and retries your request
◆ Development
Project Structure
Adding New Tools
Architecture Highlights
Service Caching: 30-minute TTL reduces authentication overhead
Scope Management: Centralized in
SCOPE_GROUPSfor easy maintenanceError Handling: Native exceptions instead of manual error construction
Multi-Service Support:
@require_multiple_services()for complex tools
Credential Store System
The server includes an abstract credential store API and a default backend for managing Google OAuth credentials with support for multiple storage backends:
Features:
Abstract Interface:
CredentialStorebase class defines standard operations (get, store, delete, list users)Local File Storage:
LocalDirectoryCredentialStoreimplementation stores credentials as JSON filesConfigurable Storage: Environment variable
GOOGLE_MCP_CREDENTIALS_DIRsets storage locationMulti-User Support: Store and manage credentials for multiple Google accounts
Automatic Directory Creation: Storage directory is created automatically if it doesn't exist
Configuration:
Usage Example:
The credential store automatically handles credential serialization, expiry parsing, and provides error handling for storage operations.
⊠ Security
Credentials: Never commit
.env,client_secret.jsonor the.credentials/directory to source control!OAuth Callback: Uses
http://localhost:8000/oauth2callbackfor development (requiresOAUTHLIB_INSECURE_TRANSPORT=1)Transport-Aware Callbacks: Stdio mode starts a minimal HTTP server only for OAuth, ensuring callbacks work in all modes
Production: Use HTTPS & OAuth 2.1 and configure accordingly
Scope Minimization: Tools request only necessary permissions
≡ License
MIT License - see LICENSE file for details.
Validations: