Calame
OfficialOAuth 2.1 authentication provider for MCP profiles, allowing users to authenticate with GitHub.
OAuth 2.1 authentication provider for MCP profiles, allowing users to authenticate with Google.
Connects to MySQL databases, introspects schema, and exposes tables via MCP with configurable access profiles, PII masking, and row-level scoping.
Custom OpenAI-compatible LLM provider for the built-in chat, enabling natural language querying of database data using self-hosted Ollama models.
Connects to PostgreSQL databases, introspects schema, and exposes tables via MCP with configurable access profiles, PII masking, and row-level scoping.
Connects to SQLite databases, introspects schema, and exposes tables via MCP with configurable access profiles, PII masking, and row-level scoping.
HashiCorp Vault integration for securely storing secrets such as database credentials and API keys.
Calame is a self-hosted web app that connects to your PostgreSQL, MySQL, or SQLite database, lets you configure access profiles — per-table permissions, PII masking, row-level scoping — and serves them as MCP (Model Context Protocol) servers with fine-grained auth.
Plug your profile into any MCP client (LLM, Claude Desktop, Cursor, VS Code, ChatGPT Desktop…) or use the built-in chat to query your data in natural language. No code generation, no lock-in — Calame is the control plane.
Quick start
git clone https://github.com/mgasnier95/calame.git
cd calame
pnpm install
pnpm devOpen http://localhost:4567 — create the admin account, connect a database, create a profile, and you're live.
Or with Docker:
docker compose upOn the first run Calame auto-generates a CALAME_SECRET_KEY used to encrypt
tokens and connection strings, and persists it next to your database
(.calame-secret). If you deploy with Docker, mount a persistent volume on
/data so that file survives restarts — otherwise every restart invalidates
your saved tokens. You can also set CALAME_SECRET_KEY yourself via the
environment to reuse an existing secret.
→ Detailed Quick Start — full walkthrough from install to your first MCP client query (~15 min).
Features
Database connectors
PostgreSQL · MySQL · SQLite — schema introspection, relations, sample data
Read-only by design (
SET TRANSACTION READ ONLY), parameterized queries onlyOptional SSH tunneling for remote databases
Access profiles
Pick tables & columns to expose per profile
PII detection & masking (auto + custom rules, global or per-column)
Row-level data scoping (e.g. restrict a profile to
client_email = X)Write queue with approval workflow for mutating queries
Auth — per profile
Open, Bearer token, password, OIDC SSO, OAuth 2.1 (Google, Microsoft, GitHub…), or external validation URL
Per-user tokens with revocation
MCP OAuth 2.1 Dynamic Client Registration (Claude Desktop / Cursor / VS Code auto-discover)
Full audit log with export
Built-in chat
Query your data in natural language from the UI — no external client needed
Pluggable LLM providers:
Anthropic (Claude direct)
OpenRouter (Claude, GPT, Gemini, Llama, …)
Custom OpenAI-compatible — self-hosted Ollama, vLLM, LM Studio
Operations
Email invitations (SMTP), user management, metrics dashboard
HashiCorp Vault integration for secrets
Docker + reverse-proxy templates (Caddy, nginx) included
How it works
┌────────────┐ ┌─────────────┐ ┌───────────────────────────────┐
│ Your DB │──▶│ Calame │──▶│ MCP client (Claude Desktop, │
│ (Pg/My/Lt) │ │ (profiles, │ │ Cursor, VS Code, ChatGPT, │
│ │ │ auth, PII) │ │ built-in chat, LLM…) │
└────────────┘ └─────────────┘ └───────────────────────────────┘Connect a database (Calame introspects the schema).
Create a profile — pick tables, mask PII columns, pick auth mode.
Start the profile. Its MCP endpoint is
http://localhost:4567/mcp/<profile>.Point your MCP client at it, or open the built-in chat.
Feedback
Something broken? Have a use case we missed? Open an issue or start a discussion.
License
Calame is dual-licensed:
Apache 2.0 — root,
packages/*,scripts/, and everything else outsideee/. SeeLICENSE.Business Source License 1.1 (BUSL-1.1) — the entire
ee/directory (currentlyee/sso, the SSO/OIDC implementation). Seeee/LICENSE.BUSLandee/README.md.
In short: you can self-host, fork, and modify Calame freely; the BUSL on ee/* only restricts repackaging it as a paid competing product. Each BUSL-licensed version automatically converts to Apache 2.0 four years after its publication.
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/Calame-Tech/calame'
If you have feedback or need assistance with the MCP directory API, please join our Discord server