Skip to main content
Glama
RhombusSystems

Rhombus MCP Server

Official

user-access-trail-tool

Trace a user's physical access events across all doors. Retrieve badge-in history by user UUID or email address.

Instructions

This tool traces a specific user's physical access events across all doors and access points. It answers questions like "Where did this person badge in?" or "Show me all access events for this user."

It has the following modes of operation, determined by the "requestType" parameter:

  • get-access-events-by-user: Get access events using a known userUuid. Requires userUuid.

  • get-access-events-by-email: Get access events by looking up the user's email first. Requires email. Automatically resolves the user UUID.

Both modes support optional startTimeMs, endTimeMs, and limit parameters. Use the user-tool to find user UUIDs if needed, or use the email-based lookup directly.

Output filtering (all tools):

  • includeFields (string[]): Dot-notation paths to keep in the response (e.g. "vehicleEvents.vehicleLicensePlate"). Omit to return all fields.

  • filterBy (array): Predicates to filter array items. Each entry: {field, op, value} where op is one of = != > >= < <= contains. All conditions are ANDed. Example: [{field:"vehicleLicensePlate", op:"=", value:"ABC123"}] WARNING: some tool responses exceed 400k characters — use these params to request only the data you need.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
requestTypeYesThe type of access trail request.
userUuidYesUser UUID. Required for 'get-access-events-by-user'.
emailYesUser email address. Required for 'get-access-events-by-email'. Will resolve to userUuid automatically.
startTimeMsYesStart time filter in milliseconds since epoch.
endTimeMsYesEnd time filter in milliseconds since epoch.
limitYesMaximum number of events to return. Defaults to 100.
includeFieldsYesDot-notation field paths to include in the response (e.g. "vehicleEvents.vehicleLicensePlate"). Pass null to return all fields. WARNING: some responses can exceed 400k characters — use includeFields to request only the data you need. For high-volume tools this may be required to get a complete answer.
filterByYesFilter array items in the response by field values. All conditions are ANDed. Example: [{field: "vehicleLicensePlate", op: "=", value: "ABC123"}, {field: "confidence", op: ">", value: 0.8}] Use alongside includeFields to get only the specific records and fields you need.

Output Schema

TableJSON Schema
NameRequiredDescriptionDefault
userUuidNoResolved user UUID
userNameNoResolved user name
accessEventsNoList of access control events for the user, ordered by time
errorNoAn error message if the request failed.
Behavior3/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

With no annotations, the description must carry full burden. It explains modes, output filtering, and warns about large responses. But it doesn't disclose read-only nature, authentication needs, or error handling for missing users.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is well-structured: first paragraph states purpose, second details modes, third covers output filtering. No fluff, every sentence adds value. Front-loaded with key info.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness5/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given complexity (8 params, modes, output filtering), the description covers all necessary parts: modes, parameter dependencies, default limit, output filtering syntax and warning. With output schema present, return value explanation is not needed.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters4/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema coverage is 100%, so baseline is 3. The description adds meaning by explaining how requestType determines mode, role of email vs userUuid, and output filtering with examples. This extra context justifies a 4.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states it traces physical access events for a specific user across all doors and access points, and gives example questions. It distinguishes from sibling tools like user-tool by indicating when to use user-tool for UUID lookup.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines4/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

It explains two modes of operation and when to use each, and recommends user-tool for UUID lookup. However, it doesn't explicitly exclude other tools (e.g., events-tool) or state when not to use this tool.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/RhombusSystems/rhombus-node-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server