A collection of Model Context Protocol (MCP) servers for Authentik API integration, available in both Python and Node.js implementations.
This repository contains four MCP servers for integrating with Authentik:
- authentik-mcp (Python) - Complete Authentik API integration with full CRUD capabilities
- authentik-mcp (Node.js) - TypeScript implementation with complete API access
- authentik-diag-mcp (Python) - Read-only diagnostic and monitoring capabilities
- authentik-diag-mcp (Node.js) - TypeScript implementation for diagnostics and monitoring
This repository is designed for seamless integration with the Model Context Protocol (MCP) ecosystem. These servers are intended to be run and managed by MCP-compatible tools (such as VS Code extensions, automation platforms, or orchestration systems) rather than directly via the command line.
- Install the desired package(s):
- For full API access:
authentik-mcp
- For diagnostics/monitoring:
authentik-diag-mcp
- For full API access:
- Configure your MCP tool or platform to point to the installed server binary (e.g.,
authentik-mcp
orauthentik-diag-mcp
) and provide the required Authentik API token and base URL as arguments or environment variables. - Do not run these servers directly via CLI. Instead, let your MCP-compatible tool manage their lifecycle and communication.
- Interact with Authentik through the MCP tool interface, which will expose all available resources and tools for automation, monitoring, and diagnostics.
GitHub Copilot Workspace (settings.json) – Python (uvx):
GitHub Copilot Workspace (settings.json) – Node.js (npx):
"mcp": {
"servers": {
"authentik": {
"command": "npx",
"args": [
"@cdmx/authentik-diag-mcp",
"--base-url", "https://your-authentik-instance",
"--token", "your-api-token"
]
}
}
}
Claude Desktop (claude_desktop_config.json) – Python (uvx):
{
"mcpServers": {
"authentik": {
"command": "uvx",
"args": [
"authentik-diag-mcp",
"--base-url",
"https://your-authentik-instance",
"--token",
"your-api-token"
]
}
}
}
Claude Desktop (claude_desktop_config.json) – Node.js (npx):
{
"mcpServers": {
"authentik": {
"command": "npx",
"args": [
"@cdmx/authentik-diag-mcp",
"--base-url",
"https://your-authentik-instance",
"--token",
"your-api-token"
]
}
}
}
Note: These packages are not intended for direct CLI use. Integrate them with your MCP-compatible tool or platform as described above.
Note: These packages are not intended for direct CLI use. Integrate them with your MCP-compatible tool or platform as described above.
Managed by your MCP tool. No direct CLI usage required.
Managed by your MCP tool. No direct CLI usage required.
Feature | Full MCP | Diagnostic MCP |
---|---|---|
User Management (CRUD) | ✅ | ❌ (Read-only) |
Group Management (CRUD) | ✅ | ❌ (Read-only) |
Application Management (CRUD) | ✅ | ❌ (Read-only) |
Event Monitoring | ✅ | ✅ |
User Information | ✅ | ✅ (Read-only) |
Group Information | ✅ | ✅ (Read-only) |
Application Status | ✅ | ✅ (Read-only) |
Flow Management | ✅ | ✅ (Read-only) |
Provider Management | ✅ | ✅ (Read-only) |
Token Management | ✅ | ❌ |
System Health Monitoring | ✅ | ✅ |
Audit Trail Analysis | ✅ | ✅ |
- Log in to Authentik as an administrator
- Navigate to Directory > Tokens
- Create a new token with full API permissions
- Copy the token for use with the full MCP server
- Log in to Authentik as an administrator
- Navigate to Directory > Tokens
- Create a new token with minimal read-only permissions
- Copy the token for use with the diagnostic MCP server
authentik_list_users
- List users with filteringauthentik_get_user
- Get user detailsauthentik_create_user
- Create new userauthentik_update_user
- Update existing userauthentik_delete_user
- Delete user
authentik_list_groups
- List groupsauthentik_get_group
- Get group detailsauthentik_create_group
- Create new groupauthentik_update_group
- Update existing groupauthentik_delete_group
- Delete group
authentik_list_applications
- List applicationsauthentik_get_application
- Get application detailsauthentik_create_application
- Create new applicationauthentik_update_application
- Update existing applicationauthentik_delete_application
- Delete application
authentik_list_events
- List system eventsauthentik_get_event
- Get event details
authentik_list_flows
- List authentication flowsauthentik_get_flow
- Get flow details
authentik_list_providers
- List providersauthentik_get_provider
- Get provider details
authentik_list_tokens
- List API tokensauthentik_create_token
- Create new token
authentik_list_events
- List system events with filteringauthentik_get_event
- Get detailed event informationauthentik_search_events
- Search events by criteriaauthentik_get_user_events
- Get user-specific events
authentik_get_user_info
- Get user informationauthentik_list_users_info
- List users for diagnosticsauthentik_get_user_events
- Get user event history
authentik_get_group_info
- Get group informationauthentik_list_groups_info
- List groups for diagnosticsauthentik_get_group_members
- Get group members
authentik_get_system_config
- Get system configurationauthentik_get_version_info
- Get version information
authentik_get_application_status
- Check application statusauthentik_list_applications_status
- List application statusesauthentik_get_flow_status
- Check flow statusauthentik_list_flows_status
- List flow statusesauthentik_get_provider_status
- Check provider statusauthentik_list_providers_status
- List provider statuses
- User Management: Create, update, and manage user accounts
- Group Administration: Organize users into groups with appropriate permissions
- Application Setup: Configure and deploy new applications
- Flow Configuration: Set up and customize authentication flows
- System Administration: Complete system management and configuration
- Security Monitoring: Track authentication events and security incidents
- Performance Analysis: Monitor system performance and user experience
- Compliance Reporting: Generate audit reports and compliance documentation
- Troubleshooting: Diagnose authentication and access issues
- Health Monitoring: Monitor system health and configuration drift
- Use dedicated tokens for each server type
- Rotate tokens regularly
- Apply principle of least privilege
- Monitor token usage
- Always use HTTPS in production
- Verify SSL certificates
- Use environment variables for sensitive data
- Implement proper access controls
- Enable audit logging
- Monitor API usage patterns
- Set up alerting for suspicious activities
- Regular security reviews
chmod +x build.sh
./build.sh
chmod +x publish.sh
./publish.sh
cd python/authentik-mcp # or authentik-diag-mcp
uv sync
uv run authentik-mcp --base-url http://localhost:9000 --token your-token
cd nodejs/authentik-mcp # or authentik-diag-mcp
npm install
npm run dev -- --base-url http://localhost:9000 --token your-token
- Python 3.10 or higher
- uv package manager (recommended)
- Node.js 18.0.0 or higher
- Valid Authentik API token with appropriate permissions
- npm or yarn
authentik-mcp/
├── python/
│ ├── authentik-mcp/ # Full Python MCP server
│ └── authentik-diag-mcp/ # Diagnostic Python MCP server
├── nodejs/
│ ├── authentik-mcp/ # Full Node.js MCP server
│ └── authentik-diag-mcp/ # Diagnostic Node.js MCP server
├── build.sh # Build all packages
├── publish.sh # Publish all packages
└── README.md # This file
MIT License - see individual package LICENSE files for details.
We welcome contributions! Please see our Contributing Guide for details.
See individual package CHANGELOG.md files for version history and changes.