SSH Remote MCP Server
This server enables SSH remote access for MCP-compatible clients (e.g., Claude Desktop, Claude Code), allowing you to:
Connect to remote servers via SSH using passwords, private keys (including passphrase-protected), or saved credentials
Connect through jump hosts/bastions using native SSH tunneling
Execute commands on remote servers with configurable timeouts
Upload/download files via SFTP
Manage credentials: save, list, and delete reusable SSH connection profiles; password-based logins are automatically bootstrapped into key-based credentials
Set up key-based authentication: generate a local keypair, install the public key on the remote server, and save the credential for future use
Manage active connections: list open sessions, disconnect specific ones, and perform health checks on individual or all active connections
Handle host key verification: specify a custom
known_hostsfile or optionally trust unknown hosts
Click on "Install Server".
Wait a few minutes for the server to deploy. Once ready, it will show a "Started" state.
In the chat, type
@followed by the MCP server name and your instructions, e.g., "@SSH Remote MCP ServerConnect to my production server at 10.0.1.5 as user deploy with SSH key"
That's it! The server will respond to your query, and you can continue using it as needed.
Here is a step-by-step guide with screenshots.
SSH Remote MCP Server
SSH remote access for MCP-compatible clients through Model Context Protocol (MCP).
Quick Start
Use a virtual environment created by the same OS that will launch the MCP
server. Do not share one venv between Windows and WSL/Linux.
Windows
Install:
.\install.ps1Add the MCP in Claude Desktop, Claude Code, or Codex:
{ "mcpServers": { "ssh-remote": { "command": "C:\\Users\\Intel\\Desktop\\adremote-mcp\\.venv-win\\Scripts\\python.exe", "args": [ "C:\\Users\\Intel\\Desktop\\adremote-mcp\\ssh_mcp_server.py" ] } } }If you already have a Windows Python with
paramikoandmcpinstalled, you can use that interpreter directly instead of.venv-win.
WSL/Linux
Install:
./install.shAdd the MCP in Claude Desktop, Claude Code, or Codex:
{ "mcpServers": { "ssh-remote": { "command": "/home/user/adremote-mcp/.venv-linux/bin/python", "args": [ "/home/user/adremote-mcp/ssh_mcp_server.py" ] } } }If the repo is accessed through WSL from the Windows drive, use the WSL path:
{ "mcpServers": { "ssh-remote": { "command": "/mnt/c/Users/Intel/Desktop/adremote-mcp/.venv-linux/bin/python", "args": [ "/mnt/c/Users/Intel/Desktop/adremote-mcp/ssh_mcp_server.py" ] } } }
Portable Launchers
You can also point an MCP client at the included launcher for the matching OS:
Windows:
C:\Users\Intel\Desktop\adremote-mcp\run-ssh-mcp.cmdWSL/Linux:
/path/to/adremote-mcp/run-ssh-mcp.sh
The launchers prefer the OS-specific venv and then fall back to python3 or
python. On Windows, SSH_MCP_PYTHON can be set to force a specific Python
interpreter.
For WSL/Linux clients, use command: "/bin/sh" with
args: ["/path/to/adremote-mcp/run-ssh-mcp.sh"] if the script is not marked
executable.
Direct Run
After installing dependencies, you can run the server directly:
Windows:
.\.venv-win\Scripts\python.exe .\ssh_mcp_server.pyWSL/Linux:
./.venv-linux/bin/python ssh_mcp_server.pyAutomatic Setup
Download this repo, run Claude or Codex, and ask it to add this folder as a global MCP server for your current OS. After that, you can use it directly from chat.
Troubleshooting
If Windows reports:
No Python at '"/usr/bin\python.exe'the MCP is pointing at a venv created by WSL/Linux. Create a Windows venv with
.\install.ps1 and update the MCP command to .venv-win\Scripts\python.exe.
Features
Works with MCP-compatible clients on Windows and Linux
Connect to remote servers via SSH
Native SSH jump-host / bastion support
Execute commands remotely
Upload/download files via SFTP
Manage multiple connections
Health monitoring
Usage Examples
Connect with password:
Connect to 192.168.1.100 with username ubuntu and password mypassor in shorter form:
ssh 192.168.1.100:22 ubuntu mypassThe MCP first tests the SSH connection with your username and password. If the login works, it generates or installs an SSH key, saves the key-based credential locally, and does not save the password. The password is only used the first time.
Connect with password for a one-off session:
ssh 192.168.1.100:22 ubuntu mypass, save_credentials falseThis keeps the live connection only. No reusable credential is saved and no automatic key bootstrap is attempted.
Connect later using the saved name:
ssh saved-nameAfter the first successful setup, just use the saved credential name to connect again.
Connect with an encrypted (passphrase-protected) private key:
Connect to 10.0.2.15 as ubuntu using private key ~/.ssh/id_ed25519 with passphrase mysecretor via tool parameters:
{
"hostname": "10.0.2.15",
"username": "ubuntu",
"private_key_path": "~/.ssh/id_ed25519",
"private_key_passphrase": "mysecret"
}The passphrase is stored alongside the saved credential so future calls to ssh_connect_saved do not require it again. You can still supply private_key_passphrase on ssh_connect_saved to override the stored value for a single session.
Connect through a jump host:
Use the jump_host object on ssh_connect or ssh_save_credentials:
{
"hostname": "10.0.2.15",
"username": "ubuntu",
"private_key_path": "~/.ssh/id_ed25519",
"jump_host": {
"hostname": "203.0.113.10",
"username": "bastion",
"private_key_path": "~/.ssh/id_ed25519",
"port": 22
}
}Jump host keys can also be passphrase-protected — add private_key_passphrase inside the jump_host object.
This uses a native SSH tunnel to the target host and saved credentials retain the same jump-host configuration.
For reusable saved credentials, the jump host must use private_key_path rather than a password.
Execute commands:
List files in /home directory on my server
Run 'top' command on the remote server
Execute script.py and monitor its logFile transfers:
Upload local file.txt to /home/user/ on the server
Download /var/log/app.log from the serverConnection health and inventory:
Check health of all SSH connections
Show me all active SSH connectionsRequirements
Python 3.10+
paramiko
mcp
Latest Update
Version 1.0.3 persists the private key passphrase in saved credentials:
private_key_passphraseis now stored in the credential file when saving viassh_connectorssh_save_credentialsssh_connect_saveduses the stored passphrase automatically — no need to supply it on every callSupplying
private_key_passphraseonssh_connect_savedoverrides the stored value for that session onlyssh_list_saved_credentialsshowsprivate key (passphrase saved)when a passphrase is stored
Version 1.0.2 adds support for passphrase-protected (encrypted) private keys:
private_key_passphraseaccepted onssh_connect,ssh_connect_saved, andssh_save_credentialsApplies to both the target host key and the jump host key
Clear error messages when a key is encrypted but no passphrase is supplied, or when the passphrase is wrong
Version 1.0.1 adds safer and more practical day-to-day SSH workflows:
Direct logins still save reusable credentials by default, but
save_credentials=falsenow cleanly opts out for password sessions tooSaved credential flows now include connect, save, list, delete, and manual key setup helpers
Host trust and file transfer rules are stricter, with local root restrictions and trust-on-first-use host pinning
Native jump-host connections are supported for both live sessions and saved credentials
Saved credentials are key-based, so no master password is required for normal use
Manually saved private key paths are validated when you save them, not later on first connect
Support
Contact me to collaborate.
Resources
Unclaimed servers have limited discoverability.
Looking for Admin?
If you are the server author, to access and configure the admin panel.
Latest Blog Posts
MCP directory API
We provide all the information about MCP servers via our MCP API.
curl -X GET 'https://glama.ai/api/mcp/v1/servers/nqmn/adremote-mcp'
If you have feedback or need assistance with the MCP directory API, please join our Discord server