poke-bank
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@poke-bankshow me my recent transactions from the last week"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
poke-bank
An MCP server that exposes Enable Banking (EU/Nordic) and Teller (US) as MCP tools for Poke. Provides AI agents with tools to connect bank accounts, list accounts, fetch transactions, and check balances.
Features
Dual provider support: Enable Banking for EU/Nordic banks, Teller for US banks
5 MCP tools: authorize bank connections, list accounts, get transactions, get balances, create sessions
Automatic callback: Bank redirects back to
/callbackwhich auto-completes the session — no manual code copyingTeller Connect widget: Embedded JS widget at
/connect/tellerfor US bank enrollment (100 free enrollments)Encrypted session store: AES-256-GCM encrypted SQLite database for session metadata
Bearer token auth: Secure the server with
MCP_API_KEYso only you can use itPoke webhook: Automatically notifies Poke when a bank account is connected
Quick Start
Prerequisites: Python 3.10+ and Node.js 18+ (which includes npx and npm).
git clone https://github.com/kacperkwapisz/poke-bank.git
cd poke-bankIf you haven't logged into Poke yet, do that first — start.sh will pick up your token automatically:
npx poke loginThen just run:
./start.shOn the first run, start.sh automatically handles the full setup:
Creates a Python virtualenv and installs dependencies
Copies
.env.example→.envReads your Poke API key from
poke logincredentials and injects it into.envGenerates a random
MCP_API_KEYandSESSION_ENCRYPTION_KEYand saves them to.envPrompts you for your
ENABLE_BANKING_APP_ID(or you can set it manually in.envlater)Immediately starts the server and tunnel
After the first run, open .env and fill in your provider credentials — Enable Banking (ENABLE_BANKING_APP_ID, ENABLE_BANKING_PRIVATE_KEY, ENABLE_BANKING_REDIRECT_URI) for EU/Nordic banks and/or Teller (TELLER_APP_ID, TELLER_CERT, TELLER_KEY) for US banks — then run ./start.sh again.
On subsequent runs, start.sh skips setup and goes straight to starting the server and tunnel.
AI coding agent setup
Copy this prompt into your AI coding agent (Claude Code, Cursor, etc.):
Set up poke-bank (https://github.com/kacperkwapisz/poke-bank) for me — clone the repo, run 'npx poke login' so I can authenticate with Poke (wait for me to confirm), then run './start.sh' which will automatically wire up my Poke API key, generate an MCP_API_KEY and SESSION_ENCRYPTION_KEY, set up the virtualenv, and start the server and tunnel. Before configuring bank providers, ask me: "Do you want to connect US banks, EU/Nordic banks, or both?" Then only set up what I choose. For EU/Nordic banks (Enable Banking): guide me to https://enablebanking.com to create an application, generate an RSA key pair (openssl genrsa -out private.pem 2048 && openssl rsa -in private.pem -pubout -out public.pem), upload the public key to the dashboard, copy the Application ID into ENABLE_BANKING_APP_ID, and set ENABLE_BANKING_REDIRECT_URI to https://<my-domain>/callback. For US banks (Teller): guide me to https://teller.io to create an application, copy the Application ID into TELLER_APP_ID, and download the mTLS certificate (teller.zip) — extract certificate.pem and private_key.pem and set TELLER_CERT and TELLER_KEY to their paths (not needed for sandbox mode). Do NOT type passwords or secrets, tell me to enter those myself and confirm when done; if the server fails due to missing credentials, have me update .env and run './start.sh' again.Enable Banking Setup
To use poke-bank, you need credentials from Enable Banking:
Create an account at enablebanking.com and create a new application
Generate an RSA key pair for JWT signing:
openssl genrsa -out private.pem 2048 openssl rsa -in private.pem -pubout -out public.pemUpload
public.pemto the Enable Banking dashboard under your applicationCopy the Application ID (a UUID) — this is your
ENABLE_BANKING_APP_IDSet the redirect URI in the dashboard to
https://<your-domain>/callback— this must matchENABLE_BANKING_REDIRECT_URIin.envAdd credentials to
.env:ENABLE_BANKING_APP_ID=<your-application-uuid> ENABLE_BANKING_PRIVATE_KEY=-----BEGIN PRIVATE KEY-----\n...\n-----END PRIVATE KEY----- ENABLE_BANKING_REDIRECT_URI=https://your-domain.com/callback
Note: You can also point
ENABLE_BANKING_PRIVATE_KEYto the PEM file path instead of inlining the key.
Teller Setup (US Banks)
To connect US bank accounts, you need a Teller application:
Create an account at teller.io and create a new application
Copy your Application ID — this is your
TELLER_APP_IDDownload your mTLS certificate —
teller.zipwas downloaded when you signed up (containscertificate.pemandprivate_key.pem). If lost, regenerate from the Certificates section of the Teller Dashboard.Add credentials to
.env:TELLER_APP_ID=app_xxxxx TELLER_ENV=sandbox # sandbox | development | production TELLER_CERT=/path/to/certificate.pem # required for development/production TELLER_KEY=/path/to/private_key.pem # required for development/production
Note: Sandbox mode works without mTLS certificates and provides test data. You get 100 free enrollments on the developer plan.
Note: You can also inline the PEM strings directly in
TELLER_CERTandTELLER_KEYinstead of pointing to file paths (use\nfor newlines).
Manual Setup
1. Configure .env
cp .env.example .envEdit .env with your Enable Banking credentials, then generate the required keys:
# MCP_API_KEY
openssl rand -hex 32
# SESSION_ENCRYPTION_KEY (64 hex chars)
python3 -c "import secrets; print(secrets.token_hex(32))"2. Install dependencies
python3 -m venv .venv
source .venv/bin/activate
pip install -r requirements.txt3. Run
source .venv/bin/activate
python3 src/server.py4. Test
npx @modelcontextprotocol/inspectorOpen http://localhost:6274 and connect to http://localhost:3000/mcp using "Streamable HTTP" transport. Pass Authorization: Bearer <your-MCP_API_KEY> header.
Authentication
Set MCP_API_KEY to secure the server. All requests must include Authorization: Bearer <MCP_API_KEY>.
When running via start.sh (which uses poke tunnel), set POKE_TUNNEL=1 to make MCP_API_KEY optional — the tunnel handles authentication. start.sh sets this automatically.
If MCP_API_KEY is not set and POKE_TUNNEL is not 1, the server runs unauthenticated (with a warning). Always set it in non-tunnel deployments.
Enable Banking uses JWT-based authentication (not OAuth2 client credentials). Your application signs short-lived JWTs with the RSA private key registered in the Enable Banking dashboard. These JWTs are sent as Bearer tokens on every API request.
Docker
docker compose up -dOr use the pre-built image from GitHub Container Registry:
docker run -d \
-p 3000:3000 \
--env-file .env \
-v poke-bank-data:/data \
ghcr.io/kacperkwapisz/poke-bank:mainResource Limits
The server is mostly idle (lightweight HTTP + on-demand banking API calls). Recommended limits for container orchestrators:
Resource | Reservation | Limit |
Memory | 64 MB | 256 MB |
CPU | 0.1 | 0.5 |
Routes
Path | Method | Description |
| GET | Health check — returns |
| POST | MCP protocol endpoint |
| GET | Enable Banking redirect — auto-completes the authorization flow |
| GET | Serves the Teller Connect widget page for US bank enrollment |
| POST | Receives enrollment data from the Teller Connect widget |
All other paths return 404.
MCP Tools
Tool | Description |
| Start the authorization flow — returns a URL for the user to open and a |
| Exchange the authorization code for a banking session (returns accounts) |
| List all bank accounts linked to a session |
| Get transactions for an account (optional date range filter) |
| Get current balances for an account |
Environment Variables
Variable | Required | Description |
| Yes | Bearer token for MCP clients. Optional when |
| Yes | Application UUID from the Enable Banking dashboard (JWT |
| Yes | RSA private key PEM string or path to PEM file (signs API JWTs) |
| Yes | Redirect URL registered with Enable Banking |
| Yes | 64 hex chars (32 bytes) for AES-256-GCM session encryption |
| No | API base URL — defaults to |
| No | Fallback consent validity in days when ASPSP lookup fails (default: 90). By default the maximum validity supported by the bank is used. |
| No | SQLite path — defaults to |
| No | GET rate limit per IP (default: 30) |
| No | POST rate limit per IP (default: 120) |
| No | Webhook URL to notify Poke when a bank account is connected |
| No | API key for Poke webhook authentication |
| No | Teller application ID (enables US bank support via Teller) |
| No | Teller environment: |
| No | Teller mTLS certificate — file path or inline PEM string (required for development/production) |
| No | Teller mTLS private key — file path or inline PEM string (required for development/production) |
| No | Set to |
| No | Exposed port on the host (default: 3000) |
| No | Server port inside the container (default: 3000) |
Authorization Flow
Enable Banking (EU/Nordic)
Call
get_auth_urlwith the bank name and country codeOpen the returned
auth_urlin a browser and authorizeThe bank redirects to
/callbackwhich auto-completes the session — no manual code copying neededUse
list_accounts,get_transactions,get_balanceswith thesession_id
Fallback: If the callback redirect doesn't work, you can also manually copy the
codefrom the redirect URL and callcreate_sessionwith thecodeandsession_id.
Teller (US)
Call
get_auth_urlwithprovider='teller'Open the returned
auth_url— the Teller Connect widget loads in the browserUser authenticates with their bank through the widget
On success, the page POSTs enrollment data to
/callback/tellerand shows "Connected"Use
list_accounts,get_transactions,get_balanceswith thesession_id
If POKE_WEBHOOK_URL and POKE_API_KEY are set, a webhook is sent to Poke when a bank account is successfully connected (for both providers).
Session Store
Session metadata (authorization IDs, account lists) is stored in an encrypted SQLite database at /data/sessions.db inside the container (or ./sessions.db when running locally via start.sh). The poke-bank-data Docker volume persists this across restarts.
All session data is encrypted with AES-256-GCM using the SESSION_ENCRYPTION_KEY. The key never leaves your server.
Poke Setup
Connect your MCP server to Poke at poke.com/settings/connections. Add the bearer token (MCP_API_KEY) in the connection auth settings.
When a bank account is connected, poke-bank can automatically notify Poke via webhook. Set POKE_WEBHOOK_URL and POKE_API_KEY in .env to enable this.
License
MIT
This server cannot be installed
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/kacperkwapisz/poke-bank'
If you have feedback or need assistance with the MCP directory API, please join our Discord server