Track MCP LogoTrack MCP
Track MCP LogoTrack MCP

The world's largest repository of Model Context Protocol servers. Discover, explore, and submit MCP tools.

Product

  • Categories
  • Top MCP
  • New & Updated
  • Submit MCP

Company

  • About

Legal

  • Privacy Policy
  • Terms of Service
  • Cookie Policy

© 2026 TrackMCP. All rights reserved.

Built with ❤️ by Krishna Goyal

    Asgardeo Mcp Server

    MCP server to interact with your Asgardeo organization through LLM tools

    3 stars
    Go
    Updated Aug 12, 2025
    agents
    ai
    llm
    mcp

    Table of Contents

    • Key Use Cases
    • Demonstrations
    • How to Use
    • On Asgardeo / WSO2 Identity Server
    • On Your Machine
    • VS Code (GitHub Copilot)
    • Claude Desktop
    • Cursor
    • Available Tools
    • Application Management
    • API Resource Management
    • User Management
    • Claim Management
    • Example Prompts
    • Application Management
    • API Resource Management
    • User Management
    • Claim Management
    • Troubleshooting
    • Authentication & Permissions
    • Setup & Connection
    • Getting Help
    • Contributing

    Table of Contents

    • Key Use Cases
    • Demonstrations
    • How to Use
    • On Asgardeo / WSO2 Identity Server
    • On Your Machine
    • VS Code (GitHub Copilot)
    • Claude Desktop
    • Cursor
    • Available Tools
    • Application Management
    • API Resource Management
    • User Management
    • Claim Management
    • Example Prompts
    • Application Management
    • API Resource Management
    • User Management
    • Claim Management
    • Troubleshooting
    • Authentication & Permissions
    • Setup & Connection
    • Getting Help
    • Contributing

    Documentation

    Asgardeo MCP Server

    The Asgardeo MCP Server allows you to manage your Asgardeo organization or WSO2 Identity Server deployment seamlessly using LLM tools, enabling natural language interactions for various configuration tasks.

    [!IMPORTANT]

    Experimental Feature Notice

    This software includes experimental functionality and is not intended for use in production environments.

    Features, APIs, and functionality may change as the implementation evolves without prior notice.

    Key Use Cases

    With tools like Claude Desktop, you can:

    • List Applications: Retrieve a list of all applications in your organization.
    • Create Applications: Set up single-page, web, mobile or m2m applications and integrate it with the Asgardeo authentication SDK.
    • Retrieve Application Details: Fetch detailed information about specific applications.
    • Configure Login Flows: Customize the login flow of an application using natural language prompts and the available tools, enabling seamless user authentication experiences.

    Demonstrations

    • Listing Applications in Claude

    Listing applications in Claude

    • Fetching Application Details in Claude

    Getting application details in Claude

    ---

    How to Use

    On Asgardeo / WSO2 Identity Server

    1. Create an M2M Application: Set up an M2M application in your organization.

    2. Authorize Management APIs: Grant the following scopes to the application:

    APIScopes
    Application Management API (/api/server/v1/applications)internal_application_mgt_view, internal_application_mgt_update, internal_application_mgt_create
    API Resource Management API (/api/server/v1/api-resources)internal_api_resource_update, internal_api_resource_create, internal_api_resource_view
    Identity Provider Management API (/api/server/v1/identity-providers)internal_idp_view
    Authenticators Management API (/api/server/v1/authenticators)internal_authenticator_view
    Claim Management API (/api/server/v1/claim-dialects)internal_claim_meta_view
    SCIM2 Users API (/scim2/Users)internal_user_mgt_create
    OIDC Scope Management API (/api/server/v1/oidc/scopes)internal_oidc_scope_mgt_view

    3. Copy Credentials: Save the client ID and client secret of the M2M application.

    On Your Machine

    4. Clone the Repository:

    bash
    git clone https://github.com/asgardeo/asgardeo-mcp-server.git

    5. Install Dependencies:

    bash
    go mod tidy

    6. Build the Executable:

    bash
    go build -o asgardeo-mcp

    7. Configure Your MCP Client:

    VS Code (GitHub Copilot)

    • Install the GitHub Copilot extension.
    • Open VS Code Settings (File > Preferences > Settings).
    • Search for "MCP" and edit the settings.json file:
    json
    "mcp": {
        "servers": {
            "asgardeo-mcp-server": {
                "type": "stdio",
                "command": "//asgardeo-mcp-server/asgardeo-mcp>",
                "args": [],
                "env": {
                    "BASE_URL" : "https://api.asgardeo.io/t/",
                    "CLIENT_ID" : "",
                    "CLIENT_SECRET" : ""
                  }
                }
        }
        }
    • Save the file and start the MCP server from settings.json.

    Claude Desktop

    • Open Claude Desktop and navigate to Settings > Developer.
    • Edit the claude_desktop_config.json file:
    json
    "asgardeo-mcp": {
       "command": "//asgardeo-mcp-server/asgardeo-mcp>",
       "args": [],
       "env": {
        "BASE_URL": "https://api.asgardeo.io/t/",
        "CLIENT_ID": "",
        "CLIENT_SECRET": ""
       }
      }
    • Restart Claude Desktop.

    Cursor

    • Open Cursor and navigate to Settings > MCP.
    • Edit the mcp.json file:
    json
    "asgardeo-mcp": {
       "command": "//asgardeo-mcp-server/asgardeo-mcp>",
       "args": [],
       "env": {
        "BASE_URL": "https://api.asgardeo.io/t/",
        "CLIENT_ID": "",
        "CLIENT_SECRET": ""
       }
      }

    [!NOTE]

    - If you are using the WSO2 Identity Server, you need to set an additional environment variable named PRODUCT_MODE to wso2is.

    - Also, replace the BASE_URL with your WSO2 Identity Server base URL (e.g., https:///t/).

    - Additionally, if you are using WSO2 Identity Server for local development or in internal networks, you may need to set the certificate authority (CA) for the server to avoid SSL errors. You can do this by setting the CERT_PATH environment variable to the path of your CA certificate file.

    ---

    Available Tools

    The Asgardeo MCP Server provides the following tools for interacting with your organization:

    Application Management

    Tool NameDescriptionParameters
    list_applicationsLists all applications in your organizationNone
    create_single_page_appCreates a new Single Page Applicationapplication_name (required): Name of the applicationredirect_url (required): Redirect URL for the application
    create_webapp_with_ssrCreates a new web application with server-side renderingapplication_name (required): Name of the applicationredirect_url (required): Redirect URL for the application
    create_mobile_appCreates a new Mobile Applicationapplication_name (required): Name of the applicationredirect_url (required): Redirect URL for the application
    create_m2m_appCreates a new Machine-to-Machine Applicationapplication_name (required): Name of the application
    get_application_by_nameGets details of an application by nameapplication_name (required): Name of the application to search for
    get_application_by_client_idGets details of an application by client IDclient_id (required): Client ID of the application
    update_application_basic_infoUpdates basic information of an applicationid (required): ID of the applicationname, description, image_url, access_url, logout_return_url (optional)
    update_application_oauth_configUpdates OAuth/OIDC configurations of an applicationid (required): ID of the applicationredirect_urls, allowed_origins, user_access_token_expiry_time, application_access_token_expiry_time, refresh_token_expiry_time, etc. (optional)
    update_application_claim_configUpdates claim configurations of an applicationid (required): ID of the applicationclaims (required): List of requested claim URIs (Claim URIs should be specified using the default WSO2 claim dialect. Eg: http://wso2.org/claims/username)
    authorize_apiAuthorizes an application to access an APIappId (required): ID of the applicationid (required): ID of the API resourcepolicyIdentifier (required, default: "RBAC"): Authorization policyscopes (required): Scopes to authorize
    list_authorized_apiLists authorized API resources of an applicationapp_id (required): ID of the application
    update_login_flowUpdates login flow in an application based on a natural language promptapp_id (required): ID of the applicationuser_prompt (required): Natural language description of the desired login flow

    API Resource Management

    Tool NameDescriptionParameters
    list_api_resourcesLists API resources in your organizationfilter (optional): Filter expressionlimit (optional): Maximum results to return
    search_api_resources_by_nameSearches for API resources by namename (required): Name of the API resource to search for
    get_api_resource_by_identifierGets an API resource by its identifieridentifier (required): Identifier of the API resource
    create_api_resourceCreates a new API resourceidentifier (required): Identifier for the API resourcename (required): Name of the API resourcerequiresAuthorization (required): Whether the API requires authorizationscopes (required): List of scopes for the API

    User Management

    Tool NameDescriptionParameters
    create_userCreates a user in your organizationusername (required): Usernamepassword (required): Passwordemail (required): Email addressfirst_name (required): User's first namelast_name (required): User's last nameuserstore_domain (optional, default: "DEFAULT"): Userstore domain

    Claim Management

    Tool NameDescriptionParameters
    list_claimsLists claims in your organizationNone

    [!NOTE]

    If you are using the WSO2 Identity Server and planning to use update_login_flow tool, make sure to follow the steps in Subscribe to AI features.

    ---

    Example Prompts

    Application Management

    • Create a SPA:
    code
    Create a new Single Page Application named "My Demo App" with redirect URL "https://example.com/callback".
    • Update Application:
    code
    Update my application with ID "abc123" to have a new name "Updated App".
    • Update Application Login Flow:
    code
    Update the login flow of my application with ID "abc123" to Username and Password as the first step and Email OTP as the second step.
    • Update Application Claim Configuration:
    code
    Update the claim configuration of my application with ID "abc123" to include "username", and "last_name".

    API Resource Management

    • Create and Authorize API:
    code
    Create a new API resource named "Customer API" and authorize my application to access it with "read:customers" scopes.

    User Management

    • Create a User:
    code
    Create a test user with the username and email address 'test@example.com'.

    Claim Management

    • Get Claim list:
    code
    List all claims in my Asgardeo organization.

    ---

    Troubleshooting

    Authentication & Permissions

    • Invalid Credentials: Verify your client ID, client secret, and organization name in the base URL
    • 403 Forbidden: Check if your M2M application has all required scopes authorized

    Setup & Connection

    • Build Issues: Ensure Go 1.18+ is installed, run go mod tidy before building
    • MCP Connection: Verify executable path is absolute and correct, check permissions (chmod +x asgardeo-mcp)

    Getting Help

    If issues persist after troubleshooting:

    • Check GitHub issues
    • Create a new detailed issue including error messages and environment info
    • Join the WSO2 community forums for support

    ---

    Contributing

    Contributions are welcome! Submit issues or pull requests via the GitHub repository.

    Similar MCP

    Based on tags & features

    • AN

      Anyquery

      Go·
      1.4k
    • AN

      Anilist Mcp

      TypeScript·
      57
    • BI

      Biomcp

      Python·
      327
    • MC

      Mcpjungle

      Go·
      617

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k
    View All MCP Servers

    Similar MCP

    Based on tags & features

    • AN

      Anyquery

      Go·
      1.4k
    • AN

      Anilist Mcp

      TypeScript·
      57
    • BI

      Biomcp

      Python·
      327
    • MC

      Mcpjungle

      Go·
      617

    Trending MCP

    Most active this week

    • PL

      Playwright Mcp

      TypeScript·
      22.1k
    • SE

      Serena

      Python·
      14.5k
    • MC

      Mcp Playwright

      TypeScript·
      4.9k
    • MC

      Mcp Server Cloudflare

      TypeScript·
      3.0k