mssql-mcp
Enables the MCP server to retrieve SQL Server connection secrets from AWS Secrets Manager, supporting read-only database exploration and querying.
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@mssql-mcplist all tables in the database"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
mssql-mcp
A read-only Microsoft SQL Server MCP server using connection details from AWS Secrets Manager at tool-call time — nothing is read from disk or environment variables except the secret reference itself.
Cross-platform: it's a pure-JavaScript MCP server (no native or ODBC
dependencies), so it runs identically on macOS, Linux, and Windows via
npx.
Configure in .claude.json
{
"mcpServers": {
"my-db": {
"command": "npx",
"args": ["-y", "@dhipskind253/mssql-mcp"],
"env": {
"AWS_ACCOUNT_ID": "123456789012",
"SECRET_NAME": "my-aws-secret",
"AWS_REGION": "us-east-1",
"TRUST_SERVER_CERTIFICATE": "false"
}
}
}
}Env var | Required | Default | Description |
| yes | — | The AWS account where the secret lives. Combined with name + region into a full ARN. |
| yes | — | The Secrets Manager secret name (no ARN suffix needed). |
| yes | — | AWS region the secret is in (e.g. |
| no |
| Skip TLS cert validation to the SQL Server. Accepts |
Standard AWS SDK env vars (AWS_PROFILE, AWS_ACCESS_KEY_ID, etc.) are
honored via the default credential provider chain. Most users just need
aws sso login to be current.
Required secret JSON
The secret value must be a JSON document with at least these fields:
{
"host": "myserver.database.windows.net",
"port": 1433,
"database": "mydb",
"username": "ro_user",
"password": "..."
}database may also be supplied as dbname — the field name AWS uses
in its built-in RDS-credentials secret template. If both are present,
database wins.
Optional fields (with defaults shown):
Field | Default | Notes |
|
| |
|
| TLS to the server. |
TLS cert trust is not read from the secret — set
TRUST_SERVER_CERTIFICATEin the MCP server'senvblock instead. AnytrustServerCertificatefield in the secret JSON is ignored.
Read-only by design
This server cannot insert, update, or delete data. Two layers enforce that:
The
run_selecttool lexically rejects anything that isn't a singleSELECTorWITH(CTE) statement — includingINSERT,UPDATE,DELETE,EXEC,MERGE,DROP,ALTER,SELECT INTO, etc.No other tool emits write SQL.
get_procedure_definitionreturns procedure source — it does not run procedures.
Courtesy note: treat the lexical check as UX, not a security boundary. As a courtesy to your future self, configure the credentials you put in Secrets Manager to be a read-only database login — one with
SELECTandVIEW DEFINITIONonly. That way an accidental write (or a future bug here) is rejected by SQL Server itself.
Refreshing AWS credentials without restarting
Because the server uses the default AWS credential chain, an expired SSO session can be recovered without restarting Claude or the MCP server:
Run
aws sso loginin any terminal.Ask Claude to call the
refresh_secrettool.Continue working.
If a tool call fails because of AWS auth, the error message will tell you exactly that and prompt the same flow. Errors are tagged with stable prefixes:
Prefix | Meaning |
| SSO session expired or no credentials available. |
| Principal lacks |
| Secret name / account / region mismatch. |
| Secret JSON is missing fields or malformed. |
| Could not reach the SQL Server instance. |
| SQL Server returned an error executing the query. |
| The submitted query violated the read-only rules. |
Tools
Tool | Purpose |
| User schemas in the database. |
| Tables, optionally filtered by schema. |
| Columns, types, nullability, identity, PK, defaults. |
| Indexes on a table (one row per index/column). |
| Outgoing FKs from a table. |
| Views, optionally filtered by schema. |
| View source SQL. |
| Stored procedures, optionally filtered by schema. |
| Procedure source SQL (does not execute). |
|
|
| Single SELECT/CTE, capped at |
| Re-fetch the secret and reconnect. |
Local development
npm install
npm run build
# point your .claude.json command at the local build:
# "command": "node",
# "args": ["/absolute/path/to/mssql-mcp/dist/index.js"]Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/dhipskind253/mssql-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server