Skip to main content
Glama
pingidentity

PingOne Advanced Identity Cloud MCP Server

Official
by pingidentity

PingOne Advanced Identity Cloud MCP Server

License: Apache 2.0 GitHub release npm version Node.js TypeScript


FeaturesUse CasesPrerequisitesGetting StartedAuthenticationAvailable ToolsAgent SkillsDocker DeploymentSecurityMonitoring & AuditTroubleshootingDevelopmentLicense


CAUTION

Preview Software Notice

This is preview software provided AS IS with no warranties of any kind.

  • Current release is only for Sandbox and Development AIC tenants, the server is not enabled for production environments.

  • Limited support is available during the public preview phase — please report bugs and provide feedback via the GitHub issue tracker

Your use of this software constitutes acceptance of these terms.

CAUTION

Security Notice

Depending on the requests made to the MCP server, tenant configuration or data may be returned. Do not use the MCP server with untrusted MCP clients, agent code or LLM inference.

WARNING

Review Generated Configuration

Configuration can be generated dynamically using LLM and user feedback represented dynamically back to agents/conversations. Be sure to review generated configuration before promoting to production environments, or those serving live identity/access requests.

An MCP (Model Context Protocol) server that enables AI assistants to interact with PingOne Advanced Identity Cloud environments. Manage users, roles, groups, organizations, customize authentication themes, analyze logs, and query identity data directly from your AI conversations.

Ask questions like "Find all alpha_users with email starting with john@example.com", "Create a new theme called 'Corporate Brand' with primary color #0066cc", or "Show me all ERROR level logs from the am-authentication source in the last hour".

Features

  • Administer your AIC environment using natural language - Interact with PingOne AIC from whichever AI tool you use daily. No need to switch to the admin console or write API scripts - just ask your AI assistant.

  • Secure authentication - Supports OAuth 2.0 PKCE flow for local deployment and Device Code Flow for containerized deployment. All actions are user-based and auditable. Tokens stored securely in OS keychain (local) or ephemerally (Docker).

  • Broad tool support - Supports full CRUD operations against any managed object type in your environment (users, roles, groups, organizations, and custom types), authentication journey and script management, theme customization, advanced log querying, and environment variable configuration.

Use Cases

  • Journey Management - "Show me the Login journey", "Create a new MFA journey", "Add a scripted decision node to the registration flow", "Set Login as the default journey"

  • Authentication Customization - "Create a branded theme with our corporate colors", "Show me all themes in production", "Set the new theme as default"

  • Audit & Monitoring - "Show me failed login attempts in the last hour", "Find all logs for transaction abc-123", "What log sources are available?"

  • Identity Operations - "Find all users with admin in their username", "Create a new developer role", "Update the email for user xyz123"

  • Configuration Management - "List all environment variables", "Create a new API key variable", "Update the database connection string"

Getting Started

Prerequisites

  • Node.js 18+

  • PingOne Advanced Identity Cloud Sandbox or Development Tenant

  • MCP-compatible client (Claude Code, Claude Desktop, Cursor, VS Code with GitHub Copilot, Gemini CLI, Codex, etc.)

Configure Your MCP Client

The MCP server requires the AIC_BASE_URL environment variable to be set to your PingOne AIC hostname.

Add this to your MCP client configuration:

{
  "mcpServers": {
    "aic-mcp-server": {
      "type": "stdio",
      "command": "npx",
      "args": ["-y", "@ping-identity/aic-mcp-server"],
      "env": {
        "AIC_BASE_URL": "your-tenant.forgeblocks.com"
      }
    }
  }
}

Required: Replace your-tenant.forgeblocks.com with your PingOne AIC tenant URL.

Client-specific instructions:

Add this to your Claude MCP configuration (claude.json for Claude Code or claude_desktop_config.json for Claude Desktop):

{
  "mcpServers": {
    "aic-mcp-server": {
      "command": "npx",
      "args": ["-y", "@ping-identity/aic-mcp-server"],
      "env": {
        "AIC_BASE_URL": "your-tenant.forgeblocks.com"
      }
    }
  }
}

Install MCP Server with One-Click

Add this to your Cursor MCP configuration (.cursor/mcp.json):

{
  "mcpServers": {
    "aic-mcp-server": {
      "command": "npx",
      "args": ["-y", "@ping-identity/aic-mcp-server"],
      "env": {
        "AIC_BASE_URL": "your-tenant.forgeblocks.com"
      }
    }
  }
}

Install in VS Code Install in VS Code Insiders

Add this to your Copilot MCP configuration (mcp.json):

{
  "mcpServers": {
    "aic-mcp-server": {
      "command": "npx",
      "args": ["-y", "@ping-identity/aic-mcp-server"],
      "env": {
        "AIC_BASE_URL": "your-tenant.forgeblocks.com"
      }
    }
  }
}

Add this to your Gemini CLI MCP configuration (settings.json):

{
  "mcpServers": {
    "aic-mcp-server": {
      "command": "npx",
      "args": ["-y", "@ping-identity/aic-mcp-server"],
      "env": {
        "AIC_BASE_URL": "your-tenant.forgeblocks.com"
      }
    }
  }
}

Add this to your Codex MCP configuration (~/.codex/config.toml):

[mcp_servers.aic-mcp-server]
command = "npx"
args = ["-y", "@ping-identity/aic-mcp-server"]
env = {"AIC_BASE_URL" = "your-tenant.forgeblocks.com"}

Restart your MCP client and start asking questions! Your browser will open for authentication when you use the first tool in a session.

Authentication

The server uses OAuth 2.0 PKCE flow for secure user authentication:

  1. First Tool Use - Browser opens automatically for user login at PingOne AIC when you use a tool for the first time in a session

  2. Token Storage - Access tokens stored securely in OS keychain (macOS Keychain, Windows Credential Manager, Linux Secret Service)

  3. Automatic Reuse - Cached tokens used for subsequent tool calls within the same session

  4. Auto Re-authentication - When tokens expire during a session, browser opens again for new login

Docker Deployment: Uses OAuth 2.0 Device Code Flow with ephemeral token storage (tokens deleted on container restart).

Security Features:

  • User-based actions provide complete audit trail

  • All actions traceable to authenticated users for compliance

CAUTION

Administrator Access Required: This server requires administrative authentication and provides administrative capabilities to your PingOne AIC development and sandbox environments. All operations are performed as the authenticated administrator and are fully auditable.

Development and Sandbox Environments Only: This server can only be used with development and sandbox environments. Use with trusted AI assistants in secure contexts. AI-driven operations can make mistakes - review and test changes carefully before promoting to higher environments.

Available Tools

The server provides tools for AI agents to interact with your PingOne AIC environment:

Managed Objects

Generic CRUD operations for any managed object type in your environment, plus administrative tools for managing object type definitions and relationship properties.

Tool

Description

Usage Examples

listManagedObjects

Discover all managed object types in your environment

- What object types are available?

- List all managed objects

- Show me what types I can work with

getManagedObjectSchema

Get schema definition for an object type

- What fields are required for alpha_user?

- Show me the schema for bravo_role

- What properties does alpha_group have?

queryManagedObjects

Query objects with filters, pagination, sorting

- Find users with email @example.com

- List all roles sorted by name

- Show me the first 10 alpha_groups

getManagedObject

Retrieve an object's complete profile

- Get user xyz123

- Show me the details for role abc456

- Display the profile for alpha_user xyz

createManagedObject

Create a new managed object

- Create user jsmith

- Add a new admin role

- Create a bravo_group called Developers

patchManagedObject

Update object fields

- Update user xyz123 email to new@example.com

- Change role description

- Modify the alpha_group name

deleteManagedObject

Delete an object

- Delete user xyz123

- Remove role abc456

- Delete the test group

createManagedObjectDefinition

Create a new managed object type definition

- Create a new alpha_device object type

- Add a custom_application managed object

- Define a new managed object type for vehicles

patchManagedObjectDefinition

Modify an existing managed object type definition using ForgeRock PATCH operations

- Add an email property to alpha_user

- Remove the unused field from custom_application

- Update the description on the alpha_device schema

deleteManagedObjectDefinition

Delete a managed object type definition from the managed config

- Delete the custom_application object type

- Remove the alpha_device managed object

- Drop the unused custom object type

patchManagedObjectRelationship

Add, update, or remove a custom relationship property (must use custom_ prefix)

- Add a custom_manager relationship to alpha_user

- Update the custom_teams relationship definition

- Remove custom_department from bravo_user

Themes

Customize login and account page appearance.

Tool

Description

Usage Examples

getThemeSchema

Get complete theme schema documentation

- Show me available theme customizations

- What fields can I set on a theme?

- Display the theme configuration options

getThemes

List all themes in a realm

- Show themes in alpha realm

- List all available themes

- What themes exist in bravo?

getTheme

Get a theme's complete configuration

- Get the Corporate Brand theme

- Show me theme xyz123

- Display the Dark Mode theme settings

createTheme

Create a new theme

- Create theme called Dark Mode

- Add new theme with blue color scheme

- Create a Corporate Brand theme with our colors

updateTheme

Update theme properties

- Change Corporate Brand logo

- Update theme colors

- Modify the Dark Mode background color

deleteTheme

Delete a theme

- Delete Test Theme

- Remove theme xyz123

- Delete the old branding theme

setDefaultTheme

Set a theme as the realm default

- Set Corporate Brand as default

- Make Dark Mode the default theme

- Use the new theme as default for alpha

Logging

Query and analyze authentication and activity logs.

Tool

Description

Usage Examples

getLogSources

List available log sources

- What log sources are available?

- Show me all log types

- Display available logging sources

queryLogs

Query logs with time range, source, and content filters

- Show ERROR logs from last 2 hours

- Find login failures for user jsmith

- Get logs for transaction xyz

ESVs (Environment Secrets and Variables)

Manage environment secrets and variables.

Tool

Description

Usage Examples

queryESVs

Query variables or secrets by ID pattern

- List all environment variables

- Find variables starting with esv-prod

- Show me all secrets in the environment

getVariable

Retrieve a variable with decoded value

- Get esv-database-url

- Show me the API key variable

- Display the value of esv-config

setVariable

Create or update a variable

- Create variable esv-api-key

- Update esv-max-connections to 100

- Set esv-endpoint to https://api.example.com

deleteVariable

Delete a variable

- Delete esv-old-config

- Remove variable xyz

- Delete the deprecated esv-legacy-url

Feature Management

Inspect and enable optional features in PingOne AIC. A single listFeatures tool returns a unified view of all IDM and AIC platform features with install status. Install operations are one-way and cannot be undone from these tools.

Tool

Description

Usage Examples

listFeatures

List all features (IDM + AIC platform) and their install status

- What features are available?

- Which features are installed?

- Is AI Agents installed?

validateIdmFeature

Check whether an IDM feature can be installed without making any changes

- Can I install the groups feature?

- Validate the password/timestamps feature before installing

installIdmFeature

Install an IDM feature (one-way — cannot be undone). Run validateIdmFeature first

- Install the groups feature

- Install password/timestamps

enableAiAgent

Enable AI Agents (one-way — cannot be undone). Re-running is safe

- Enable AI Agents

- Set up AI Agents in this tenant

Applications (Not available when using Docker)

**📍 Not available when using MCP from a Docker container **: Application tools are automatically excluded in Docker deployments because they require browser-based PKCE authentication which is incompatible with the Device Code Flow used in containers.

Manage OIDC applications in a realm.

Tool

Description

Usage Examples

getOidcAppSchema

Get the OIDC app schema (compact summary by default, full detail with section filtering available)

- What fields can I set on an OIDC app?

- Show me the OIDC application schema

- Show the full schema for coreOAuth2ClientConfig

listOidcApps

List OIDC applications in a realm with summary fields

- Show all OIDC apps in alpha

- List applications in bravo

- What OIDC apps exist?

getOidcApp

Retrieve a complete OIDC application configuration

- Get the MyPortal OIDC app

- Show me the configuration for app xyz

- Display the full config for the Checkout application

createOidcApp

Create a new OIDC application

- Create an OIDC app called MyPortal

- Add a new OIDC application for Checkout

- Create an OIDC client with client ID my-spa

updateOidcApp

Update an OIDC application (partial updates — send only changed fields)

- Update the redirect URIs on MyPortal

- Change the owners of the Checkout app

- Update the token lifetime for the SPA app

deleteOidcApp

Delete an OIDC application

- Delete the MyPortal app

- Remove the old Checkout application

- Delete OIDC app xyz

AM Journeys (Not available when using Docker)

**📍 Not available when using MCP from a Docker container **: AM Journey tools are automatically excluded in Docker deployments because they require browser-based PKCE authentication which is incompatible with the Device Code Flow used in containers.

Manage authentication journeys, node types, and scripts.

Tool

Description

Usage Examples

listJourneys

List all authentication journeys in a realm

- Show all journeys in alpha

- List authentication trees for bravo

- What journeys exist?

getJourney

Get journey with node schemas and configs automatically included

- Show me the Login journey

- Get the Registration journey with all node details

- Display the PasswordReset journey configuration

createJourney

Create or replace an authentication journey atomically (upsert)

- Create a new login journey

- Build a journey with these nodes

- Create a journey named Registration

updateJourney

Update an existing journey's metadata and/or replace its node graph

- Update the description on the Login journey

- Enable the Registration journey

- Replace the node graph for the PasswordReset journey

deleteJourney

Delete a journey and its associated nodes

- Delete the Test journey

- Remove the old login flow

- Delete journey OldRegistration

setDefaultJourney

Set the default authentication journey for a realm

- Set Login as the default journey

- Make Registration the default for alpha

- Change the default authentication journey

getJourneyPreviewUrl

Generate a preview URL to test a journey in a browser

- Get the preview URL for Login

- How can I test the Registration journey?

- Give me a link to try the PasswordReset flow

listNodeTypes

Discover all available authentication node types

- What node types are available?

- List all authentication node types

- Show me the available nodes for building journeys

getNodeTypeDetails

Get schema, template, and outcomes for node types

- Show me the PageNode schema

- What config does ScriptedDecisionNode need?

- Get details for UsernameCollectorNode

getDynamicNodeOutcomes

Calculate outcomes for a node based on its configuration

- What outcomes does this PageNode produce?

- Get the outcomes for a ChoiceCollectorNode with these choices

- List outcomes for this config

updateJourneyNode

Update a single node's configuration

- Update the config for node xyz

- Change the script on this ScriptedDecisionNode

- Modify the PageNode configuration

deleteJourneyNodes

Batch delete orphaned node instances

- Clean up orphaned nodes from the last update

- Delete these unused node instances

- Remove leftover nodes

listScripts

List Scripted Decision Node scripts in a realm

- Show all scripts in alpha

- List decision node scripts

- What scripts are available?

getAMScript

Get AM script with automatic base64 decoding

- Show me script 01e1a3c0-038b-4c16-956a-6c9d89328cff

- Get the decision node script

- Display the authentication script code

createScript

Create a new Scripted Decision Node script

- Create a script that checks user attributes

- Add a new decision script

- Write a script for conditional authentication

updateScript

Update an existing script's name, description, or content

- Update the login script code

- Rename script xyz

- Change the description on this script

deleteScript

Delete an AM script

- Delete script xyz

- Remove the old decision script

- Delete the unused test script

getScriptedDecisionNodeBindings

Get available bindings and allowed imports for scripting

- What variables are available in scripts?

- Show me the scripting API

- What can I import in decision scripts?

Key Feature: The getJourney tool automatically fetches and includes all node schemas and configurations in parallel, so you get complete journey details in a single call - no need to manually fetch node information.

Agent Skills

This repository ships agent skills that extend your AI assistant's ability to work with the AIC MCP server. Once installed, your agent can take on operational tasks — like auditing MCP usage in your environment — without needing explicit instructions.

Skill

What it does

Try it

monitor-usage

Audits MCP server activity in AIC logs — authentication events, user-attributed actions, and API traffic

"Show me what's been done via the MCP server today"

Install the Skills

Option 1 — Skills CLI (works with any supported agent):

npx skills add pingidentity/aic-mcp-server

Option 2 — Manual installation:

Clone the repository and copy the skills from .claude/skills/ to your agent's skills directory. See your agent's documentation for the correct location:

Once installed, verify by asking your agent "What skills do you have?" — you should see monitor-usage in the list.

Docker Deployment

⚠️ EXPERIMENTAL: Docker deployment uses OAuth 2.0 Device Code Flow with MCP form elicitation. This requires MCP client support for form elicitation, which is currently limited. If your client doesn't support it, use the local deployment method above.

Build Image

npm run docker:build

Configure Your MCP Client

Claude Code or Claude Desktop

Add this to your Claude MCP configuration (claude.json for Claude Code or claude_desktop_config.json for Claude Desktop):

{
  "mcpServers": {
    "aic-mcp-server": {
      "command": "docker",
      "args": [
        "run",
        "--rm",
        "-i",
        "-e",
        "AIC_BASE_URL=your-tenant.forgeblocks.com",
        "pingidentity/aic-mcp-server:latest"
      ]
    }
  }
}

Authentication: When authentication is required, your MCP client should display a URL. Click it to authenticate in your browser, then accept the prompt in your client.

Token Storage: Tokens are stored ephemerally in the container filesystem (/app/tokens/token.json) and deleted on container restart for enhanced security.

Security

The PingOne AIC MCP Server implements multiple security layers:

  • Secure credential storage - Tokens stored in OS keychain (macOS Keychain, Windows Credential Manager, Linux Secret Service) for local deployment, or ephemerally in container filesystem for Docker

  • No plain text secrets - No sensitive information stored in configuration files

  • OAuth 2.0 authentication - PKCE flow for local deployment prevents authorization code interception; Device Code flow for containerized deployment

  • User-based authentication - All API calls are authenticated as the user who logged in, providing complete audit trails

  • Input validation - Built-in protections against path traversal and query injection attacks

  • Tenant isolation - Tokens are validated against the configured AIC_BASE_URL to prevent accidental cross-tenant operations

Monitoring & Audit

All operations performed through the MCP server are executed as the authenticated user — there are no anonymous or service-account-attributed actions. Every tool invocation produces a full audit trail in the AIC audit logs, attributable to the individual who authenticated the session.

Authentication events

The server authenticates using two registered OAuth 2.0 clients:

  • AICMCPClient — used for the initial user login (PKCE or Device Code flow)

  • AICMCPExchangeClient — used to obtain scoped tokens for each tool call via RFC 8693 token exchange

Filtering the am-authentication log source for either of these client IDs will surface all MCP authentication activity. Each token exchange references the original user login, providing a complete chain from the tool call back to the authenticated identity.

Attributing actions to a user

All API calls made by the server carry the scoped token issued to the authenticated user. Configuration changes (journeys, scripts, OIDC apps) appear in AM audit logs and identity operations (managed objects, groups, relationships) appear in IDM audit logs — all attributed to the user identity, not a service account.

Identifying MCP traffic

All requests from the server include a User-Agent header of the form aic-mcp-server/<version>. This can be used to filter access logs and isolate MCP-originated traffic from browser sessions, automated reconciliation jobs, and other API clients.

"FATAL: AIC_BASE_URL environment variable is not set"

Set the AIC_BASE_URL environment variable in your MCP client configuration to your PingOne AIC tenant URL (e.g., your-tenant.forgeblocks.com or https://your-tenant.forgeblocks.com).

"Port 3000 is already in use"

Another service is using port 3000 (required for OAuth redirect). Stop that service and try again.

"Browser doesn't open during authentication"

Check that the open package has permissions to launch your browser, or manually navigate to the URL shown in the error message.

Docker: "URL not displayed during authentication"

Your MCP client may not support form elicitation yet. Use the local deployment method instead.

Development

To build the server from source for development:

# Clone the repository
git clone https://github.com/pingidentity/aic-mcp-server.git
cd aic-mcp-server

# Install dependencies
npm install

# Compile TypeScript
npm run build

Then configure your MCP client to use the local build:

{
  "mcpServers": {
    "aic-mcp-server": {
      "command": "node",
      "args": ["/absolute/path/to/aic-mcp-server/dist/index.js"],
      "env": {
        "AIC_BASE_URL": "your-tenant.forgeblocks.com"
      }
    }
  }
}

For type checking without building:

npm run typecheck

The project includes a comprehensive test suite covering all tools and authentication flows.

# Run all tests
npm test

# Watch mode for development
npm run test:watch

# Generate coverage report
npm run test:coverage

# Update tool schema snapshots
npm run test:snapshots:update

Use the MCP Inspector to visually test tools in a web interface:

# Development mode (no build required - faster iteration)
AIC_BASE_URL=your-tenant.forgeblocks.com npm run dev:inspect

# Production mode (requires build first)
npm run build
AIC_BASE_URL=your-tenant.forgeblocks.com npm run inspect

Hosts a web interface for interactive tool testing and OAuth flow debugging.

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

Feedback & Issues

We welcome your feedback! Please use this repository's issue tracker to submit feedback, bug reports, or enhancement requests. For existing issues, you can add a 👍 reaction to help our team gauge priority.

License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.

Install Server
A
license - permissive license
A
quality
B
maintenance

Maintenance

Maintainers
20dResponse time
5wRelease cycle
7Releases (12mo)
Issues opened vs closed

Resources

Unclaimed servers have limited discoverability.

Looking for Admin?

If you are the server author, to access and configure the admin panel.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/pingidentity/aic-mcp-server'

If you have feedback or need assistance with the MCP directory API, please join our Discord server