Crawler Summary

@auth0/auth0-mcp-server answer-first brief

Auth0 Model Context Protocol (MCP) Server (Beta) — A secure and extendable implementation of an MCP server that provides AI assistants with controlled access to the Auth0 Management API through natural language. This project is in beta and not intended for production workloads. It enables AI-assisted tenant management while enforcing best practices around security, least-privilege access, and customizable toolsets. <div align="center"> $1 $1 $1 $1 $1 </div> <div align="center"> 📚 $1 • 🚀 $1 • 💻 $1 • 💬 $1 </div> $1 is an open protocol introduced by Anthropic that standardizes how large language models communicate with external tools, resources or remote services. [!CAUTION] **Beta Software Notice: This software is currently in beta and is provided AS IS without any warranties.** - Features, APIs, and functionality may change Published capability contract available. No trust telemetry is available yet. 93 GitHub stars reported by the source. Last updated 2/24/2026.

Freshness

Last checked 2/22/2026

Best For

Contract is available with explicit auth and schema references.

Not Ideal For

@auth0/auth0-mcp-server is not ideal for teams that need stronger public trust telemetry, lower setup complexity, or more explicit contract coverage before production rollout.

Evidence Sources Checked

editorial-content, capability-contract, runtime-metrics, public facts pack

Claim this agent
Agent DossierGitHubSafety: 100/100

@auth0/auth0-mcp-server

Auth0 Model Context Protocol (MCP) Server (Beta) — A secure and extendable implementation of an MCP server that provides AI assistants with controlled access to the Auth0 Management API through natural language. This project is in beta and not intended for production workloads. It enables AI-assisted tenant management while enforcing best practices around security, least-privilege access, and customizable toolsets. <div align="center"> $1 $1 $1 $1 $1 </div> <div align="center"> 📚 $1 • 🚀 $1 • 💻 $1 • 💬 $1 </div> $1 is an open protocol introduced by Anthropic that standardizes how large language models communicate with external tools, resources or remote services. [!CAUTION] **Beta Software Notice: This software is currently in beta and is provided AS IS without any warranties.** - Features, APIs, and functionality may change

MCPverified

Public facts

7

Change events

1

Artifacts

0

Freshness

Feb 22, 2026

Verifiededitorial-content1 verified compatibility signal93 GitHub stars

Published capability contract available. No trust telemetry is available yet. 93 GitHub stars reported by the source. Last updated 2/24/2026.

93 GitHub starsSchema refs publishedTrust evidence available

Trust score

Unknown

Compatibility

MCP

Freshness

Feb 22, 2026

Vendor

Auth0

Artifacts

0

Benchmarks

0

Last release

0.1.0-beta.8

Executive Summary

Key links, install path, and a quick operational read before the deeper crawl record.

Verifiededitorial-content

Summary

Published capability contract available. No trust telemetry is available yet. 93 GitHub stars reported by the source. Last updated 2/24/2026.

Setup snapshot

git clone https://github.com/auth0/auth0-mcp-server.git
  1. 1

    Setup complexity is MEDIUM. Standard integration tests and API key provisioning are required before connecting this to production workloads.

  2. 2

    Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.

Evidence Ledger

Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.

Verifiededitorial-content
Vendor (1)

Vendor

Auth0

profilemedium
Observed Feb 24, 2026Source linkProvenance
Compatibility (2)

Protocol compatibility

MCP

contracthigh
Observed Feb 24, 2026Source linkProvenance

Auth modes

mcp, api_key, oauth

contracthigh
Observed Feb 24, 2026Source linkProvenance
Artifact (1)

Machine-readable schemas

OpenAPI or schema references published

contracthigh
Observed Feb 24, 2026Source linkProvenance
Adoption (1)

Adoption signal

93 GitHub stars

profilemedium
Observed Feb 24, 2026Source linkProvenance
Security (1)

Handshake status

UNKNOWN

trustmedium
Observed unknownSource linkProvenance
Integration (1)

Crawlable docs

6 indexed pages on the official domain

search_documentmedium
Observed Apr 15, 2026Source linkProvenance

Release & Crawl Timeline

Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.

Self-declaredagent-index

Artifacts Archive

Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.

Self-declaredGITHUB MCP

Extracted files

0

Examples

6

Snippets

0

Languages

typescript

Executable Examples

bash

npx @auth0/auth0-mcp-server init

bash

npx @auth0/auth0-mcp-server init --read-only

bash

npx @auth0/auth0-mcp-server init --tools 'auth0_list_*,auth0_get_*'

bash

npx @auth0/auth0-mcp-server init --client windsurf

bash

npx @auth0/auth0-mcp-server init --client cursor

bash

npx @auth0/auth0-mcp-server init --client cursor --tools 'auth0_list_applications,auth0_get_application'

Docs & README

Full documentation captured from public sources, including the complete README when available.

Self-declaredGITHUB MCP

Docs source

GITHUB MCP

Editorial quality

ready

Auth0 Model Context Protocol (MCP) Server (Beta) — A secure and extendable implementation of an MCP server that provides AI assistants with controlled access to the Auth0 Management API through natural language. This project is in beta and not intended for production workloads. It enables AI-assisted tenant management while enforcing best practices around security, least-privilege access, and customizable toolsets. <div align="center"> $1 $1 $1 $1 $1 </div> <div align="center"> 📚 $1 • 🚀 $1 • 💻 $1 • 💬 $1 </div> $1 is an open protocol introduced by Anthropic that standardizes how large language models communicate with external tools, resources or remote services. [!CAUTION] **Beta Software Notice: This software is currently in beta and is provided AS IS without any warranties.** - Features, APIs, and functionality may change

Full README

MCP server for Auth0

<div align="center">

License: MIT Node.js Version NPM Downloads NPM Version <img src="https://devin.ai/assets/deepwiki-badge.png" alt="Ask questions about auth0-mcp-server on DeepWiki" height="20"/>

</div> <div align="center">

📚 Documentation • 🚀 Getting Started • 💻 Supported Tools • 💬 Feedback

</div>

MCP (Model Context Protocol) is an open protocol introduced by Anthropic that standardizes how large language models communicate with external tools, resources or remote services.

[!CAUTION] Beta Software Notice: This software is currently in beta and is provided AS IS without any warranties.

  • Features, APIs, and functionality may change at any time without notice
  • Not recommended for production use or critical workloads
  • Support during the beta period is limited
  • Issues and feedback can be reported through the GitHub issue tracker

By using this beta software, you acknowledge and accept these conditions.

The Auth0 MCP Server integrates with LLMs and AI agents, allowing you to perform various Auth0 management operations using natural language. For instance, you could simply ask Claude Desktop to perform Auth0 management operations:

  • Create a new Auth0 app and get the domain and client ID

  • Create and deploy a new Auth0 action to generate a JWT token

  • Could you check Auth0 logs for logins from 192.108.92.3 IP address?

<br/> <div align="center"> <img src="https://cdn.auth0.com/website/mcp/assets/auth0-mcp-example-demo.gif" alt="Auth0 MCP Server Demo" width="800"> </div>

🚀 Getting Started

Prerequisites:

<br/>

Install the Auth0 MCP Server

Install Auth0 MCP Server and configure it to work with your preferred MCP Client. The --tools parameter specifies which tools should be available (defaults to * if not provided).

Claude Desktop with all tools

npx @auth0/auth0-mcp-server init

Claude Desktop with read-only tools

npx @auth0/auth0-mcp-server init --read-only

You can also explicitly select read-only tools:

npx @auth0/auth0-mcp-server init --tools 'auth0_list_*,auth0_get_*'

Windsurf

npx @auth0/auth0-mcp-server init --client windsurf

Cursor

Step 1:

Install MCP Server

Step 2:

npx @auth0/auth0-mcp-server init --client cursor

Cursor with limited tools access

npx @auth0/auth0-mcp-server init --client cursor --tools 'auth0_list_applications,auth0_get_application'

VS Code

npx @auth0/auth0-mcp-server init --client vscode

You can configure VS Code for either global or workspace scope:

  • Global: Available in all VS Code instances
  • Workspace: Available only in a specific project/repository

The command will prompt you to choose your preferred scope and automatically configure the appropriate mcp.json file.

VS Code with limited tools access

npx @auth0/auth0-mcp-server init --client vscode --tools 'auth0_list_*,auth0_get_*' --read-only

Gemini CLI

Initialize the gemini MCP server for the Gemini CLI

npx @auth0/auth0-mcp-server init --client gemini

Install the Gemini Extension

gemini extensions install https://github.com/auth0/auth0-mcp-server

Other MCP Clients

To use Auth0 MCP Server with any other MCP Client, you can manually add this configuration to the client and restart for changes to take effect:

{
  "mcpServers": {
    "auth0": {
      "command": "npx",
      "args": ["-y", "@auth0/auth0-mcp-server", "run"],
      "capabilities": ["tools"],
      "env": {
        "DEBUG": "auth0-mcp"
      }
    }
  }
}

You can add --tools '<pattern>' to the args array to control which tools are available. See Security Best Practices for recommended patterns.

Authorize with Auth0

Your browser will automatically open to initiate the OAuth 2.0 device authorization flow. Log into your Auth0 account and grant the requested permissions.

[!NOTE] Credentials are securely stored in your system's keychain. You can optionally verify storage through your keychain management tool. Check out Authentication for more info.

Verify your integration

Restart your MCP Client (Claude Desktop, Windsurf, Cursor, etc.) and ask it to help you manage your Auth0 tenant

<div align="left"> <img src="https://cdn.auth0.com/website/mcp/assets/help-image-01.png" alt="Claude Desktop help screen showing successful integration" width="300"> </div>

🛠️ Supported Tools

The Auth0 MCP Server provides the following tools for Claude to interact with your Auth0 tenant:

<div align="center" style="display: flex; justify-content: center; gap: 20px;"> <img src="https://cdn.auth0.com/website/mcp/assets/help-image-02.png" alt="Supported Tools img" width="400"> <img src="https://cdn.auth0.com/website/mcp/assets/help-image-03.png" alt="Supported Tools img" width="400"> </div>

Applications

| Tool | Description | Usage Examples | | -------------------------- | ----------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | auth0_list_applications | List all applications in the Auth0 tenant or search by name | - Show me all my Auth0 applications <br> - Find applications with 'api' in their name <br> - What applications do I have in my Auth0 tenant? | | auth0_get_application | Get details about a specific Auth0 application | - Show me details for the application called 'Customer Portal' <br> - Get information about my application with client ID abc123 <br> - What are the callback URLs for my 'Mobile App'? | | auth0_create_application | Create a new Auth0 application | - Create a new single-page application called 'Analytics Dashboard' <br> - Set up a new native mobile app called 'iOS Client' <br> - Create a machine-to-machine application for our background service | | auth0_update_application | Update an existing Auth0 application | - Update the callback URLs for my 'Web App' to include https://staging.example.com/callback <br> - Change the logout URL for the 'Customer Portal' <br> - Add development environment metadata to my 'Admin Dashboard' application |

Resource Servers

| Tool | Description | Usage Examples | | ------------------------------ | ---------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | auth0_list_resource_servers | List all resource servers (APIs) in the Auth0 tenant | - Show me all the APIs in my Auth0 tenant <br> - List my resource servers <br> - What APIs have I configured in Auth0? | | auth0_get_resource_server | Get details about a specific Auth0 resource server | - Show me details for the 'User API' <br> - What scopes are defined for my 'Payment API'? <br> - Get information about the resource server with identifier https://api.example.com" | | auth0_create_resource_server | Create a new Auth0 resource server (API) | - Create a new API called 'Inventory API' with read and write scopes <br> - Set up a resource server for our customer data API <br> - Create an API with the identifier https://orders.example.com" | | auth0_update_resource_server | Update an existing Auth0 resource server | - Add an 'admin' scope to the 'User API' <br> - Update the token lifetime for my 'Payment API' to 1 hour <br> - Change the signing algorithm for my API to RS256 |

Application Grants

| Tool | Description | Usage Examples | | -------------------------------- | ------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | auth0_create_application_grant | Create a client grant that authorizes an Auth0 application to access a specific API with defined scopes | - Grant my 'Backend Service' application access to the 'User API' <br> - Create a client grant for my M2M app to call the payments API <br> - Authorize my application to access the inventory API with read and write scopes |

Actions

| Tool | Description | Usage Examples | | --------------------- | ----------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | auth0_list_actions | List all actions in the Auth0 tenant | - Show me all my Auth0 actions <br> - What actions do I have configured? <br> - List the actions in my tenant | | auth0_get_action | Get details about a specific Auth0 action | - Show me the code for my 'Enrich User Profile' action <br> - Get details about my login flow action <br> - What does my 'Add Custom Claims' action do? | | auth0_create_action | Create a new Auth0 action | - Create an action that adds user roles to tokens <br> - Set up an action to log failed login attempts <br> - Create a post-login action that checks user location | | auth0_update_action | Update an existing Auth0 action | - Update my 'Add Custom Claims' action to include department information <br> - Modify the IP filtering logic in my security action <br> - Fix the bug in my user enrichment action | | auth0_deploy_action | Deploy an Auth0 action | - Deploy my 'Add Custom Claims' action to production <br> - Make my new security action live <br> - Deploy the updated user enrichment action |

Logs

| Tool | Description | Usage Examples | | ----------------- | ------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | auth0_list_logs | List logs from the Auth0 tenant | - Show me recent login attempts <br> - Find failed logins from the past 24 hours <br> - Get authentication logs from yesterday <br> - Show me successful logins for user john@example.com | | auth0_get_log | Get a specific log entry by ID | - Show me details for log entry abc123 <br> - Get more information about this failed login attempt <br> - What caused this authentication error? |

Forms

| Tool | Description | Usage Examples | | -------------------- | --------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | auth0_list_forms | List all forms in the Auth0 tenant | - Show me all my Auth0 forms <br> - What login forms do I have configured? <br> - List the custom forms in my tenant | | auth0_get_form | Get details about a specific Auth0 form | - Show me the details of my 'Corporate Login' form <br> - What does my password reset form look like? <br> - Get the configuration for my signup form | | auth0_create_form | Create a new Auth0 form | - Create a new login form with our company branding <br> - Set up a custom signup form that collects department information <br> - Create a password reset form with our logo | | auth0_update_form | Update an existing Auth0 form | - Update the colors on our login form to match our new brand guidelines <br> - Add a privacy policy link to our signup form <br> - Change the logo on our password reset form | | auth0_publish_form | Publish an Auth0 form | - Publish my updated login form <br> - Make the new signup form live <br> - Deploy the password reset form to production |

🔒 Security Best Practices for Tool Access

When configuring the Auth0 MCP Server, it's important to follow security best practices by limiting tool access based on your specific needs. The server provides flexible configuration options that let you control which tools AI assistants can access.

You can easily restrict tool access using the --tools and --read-only flags when starting the server:

# Enable only read-only operations
npx @auth0/auth0-mcp-server run --read-only

# Alternative way to enable only read-only operations
npx @auth0/auth0-mcp-server run --tools 'auth0_list_*,auth0_get_*'

# Limit to just application-related tools
npx @auth0/auth0-mcp-server run --tools 'auth0_*_application*'

# Limit to read-only application-related tools
# Note: --read-only takes priority when used with --tools
npx @auth0/auth0-mcp-server run --tools 'auth0_*_application*' --read-only

# Restrict to only log viewing capabilities
npx @auth0/auth0-mcp-server run --tools 'auth0_list_logs,auth0_get_log'

# Run the server with all tools enabled
npx @auth0/auth0-mcp-server run --tools '*'

[!IMPORTANT] When both --read-only and --tools flags are used together, the --read-only flag takes priority for security. This means even if your --tools pattern matches non-read-only tools, only read-only operations will be available. This ensures you can rely on the --read-only flag as a security guardrail.

This approach offers several important benefits:

  1. Enhanced Security: By limiting available tools to only what's needed, you reduce the potential attack surface and prevent unintended modifications to your Auth0 tenant.

  2. Better Performance: Providing fewer tools to AI assistants actually improves performance. When models have access to many tools, they use more of their context window to reason about which tools to use. With a focused set of tools, you'll get faster and more relevant responses.

  3. Resource-Based Access Control: You can configure different instances of the MCP server with different tool sets based on specific needs - development environments might need full access, while production environments could be limited to read operations only.

  4. Simplified Auditing: With limited tools, it's easier to track which operations were performed through the AI assistant.

For most use cases, start with the minimum set of tools needed and add more only when required. This follows the principle of least privilege - a fundamental security best practice.

🧪 Security Scanning

We recommend regularly scanning this server, and any other MCP-compatible servers you deploy, with community tools built to surface protocol-level risks and misconfigurations.

These scanners help identify issues across key vulnerability classes including: server implementation bugs, tool definition and lifecycle risks, interaction and data flow weaknesses, and configuration or environment gaps.

Useful tools include:

  • mcpscan.ai
    Web-based scanner that inspects live MCP endpoints for exposed tools, schema enforcement gaps, and other issues.

  • mcp-scan
    CLI tool that simulates attack paths and evaluates server behavior from a client perspective.

These tools are not a substitute for a full audit, but they offer meaningful guardrails and early warnings. We suggest including them in your regular security review process.

If you discover a vulnerability, please follow our responsible disclosure process.

🕸️ Architecture

The Auth0 MCP Server implements the Model Context Protocol, allowing Claude to:

  1. Request a list of available Auth0 tools
  2. Call specific tools with parameters
  3. Receive structured responses from the Auth0 Management API

The server handles authentication, request validation, and secure communication with the Auth0 Management API.

<div align="center"> <img src="https://cdn.auth0.com/website/mcp/assets/auth0-mcp-server-hld.png" alt="Auth0 MCP Server HLD" width="800"> </div>

[!NOTE] The server operates as a local process that connects to Claude Desktop, enabling secure communication without exposing your Auth0 credentials.

🔐 Authentication

The Auth0 MCP Server uses the Auth0 Management API and requires authentication to access your Auth0 tenant.

Initial Setup

To authenticate the MCP Server:

npx @auth0/auth0-mcp-server init

This will start the device authorization flow, allowing you to log in to your Auth0 account and select the tenant you want to use.

[!NOTE] Authenticating using device authorization flow is not supported for private cloud tenants. Private Cloud users should authenticate with client credentials.Keep the token lifetime as minimal as possible to reduce security risks. See more

npx @auth0/auth0-mcp-server init --auth0-domain <auth0-domain> --auth0-client-id <auth0-client-id> --auth0-client-secret <auth0-client-secret>

[!IMPORTANT]

<details> <summary>Keep limited scope for client credentials M2M application:</summary>

Supported scopes:

  • read:clients
  • create:clients
  • update:clients
  • read:resource_servers
  • create:resource_servers
  • update:resource_servers
  • read:actions
  • create:actions
  • update:actions
  • read:logs
  • read:forms
  • create:forms
  • update:forms
</details> The `init` command needs to be run whenever:
  • You're setting up the MCP Server for the first time
  • You've logged out from a previous session
  • You want to switch to a different tenant
  • Your token has expired

The run command will automatically check for token validity before starting the server and will provide helpful error messages if authentication is needed.

[!NOTE] Using the MCP Server will consume Management API rate limits according to the subscription plan. Refer to the Rate Limit Policy for more information.

[!TIP] Using the --no-interaction flag skips the user interaction (press return) to open the browser during setup. This can be usefull if the MCP server is initiated in certain environments like an AI Agent.

Session Management

To see information about your current authentication session:

npx @auth0/auth0-mcp-server session

Logging Out

For security best practices, always use the logout command when you're done with a session:

npx @auth0/auth0-mcp-server logout

This ensures your authentication tokens are properly removed from the system keychain.

Authentication Flow

The server uses OAuth 2.0 device authorization flow for secure authentication with Auth0. Your credentials are stored securely in your system's keychain and are never exposed in plain text.

<div align="center"> <img src="https://cdn.auth0.com/website/mcp/assets/mcp-server-auth.png" alt="Authentication Sequence Diagram" width="800"> </div>

🩺 Troubleshooting

When encountering issues with the Auth0 MCP Server, several troubleshooting options are available to help diagnose and resolve problems.

Start troubleshooting by exploring all available commands and options:

npx @auth0/auth0-mcp-server help

🚥 Operation Modes

🐞 Debug Mode

  • More detailed logging
  • Enable by setting environment variable: export DEBUG=auth0-mcp

[!TIP] Debug mode is particularly useful when troubleshooting connection or authentication issues.

🔑 Scope Selection

The server provides an interactive scope selection interface during initialization:

  • Interactive Selection: Navigate with arrow keys and toggle selections with spacebar

  • No Default Scopes: By default, no scopes are selected for maximum security

  • Glob Pattern Support: Quickly select multiple related scopes with patterns:

    # Select all read scopes
    npx @auth0/auth0-mcp-server init --scopes 'read:*'
    
    # Select multiple scope patterns (comma-separated)
    npx @auth0/auth0-mcp-server init --scopes 'read:*,create:clients,update:actions'
    

[!NOTE] Selected scopes determine what operations the MCP server can perform on your Auth0 tenant.

⚙️ Configuration

Other MCP Clients:

To use Auth0 MCP Server with any other MCP Client, you can add this configuration to the client and restart for changes to take effect:

{
  "mcpServers": {
    "auth0": {
      "command": "npx",
      "args": ["-y", "@auth0/auth0-mcp-server", "run"],
      "capabilities": ["tools"],
      "env": {
        "DEBUG": "auth0-mcp"
      }
    }
  }
}

[!NOTE]
You can manually update if needed or if any unexpected errors occur during the npx init command.

🚨 Common Issues

  1. Authentication Failures

    • Ensure you have the correct permissions in your Auth0 tenant
    • Try re-initializing with npx @auth0/auth0-mcp-server init
  2. Claude Desktop Can't Connect to the Server

    • Restart Claude Desktop after installation
    • Check that the server is running with ps aux | grep auth0-mcp
  3. API Errors or Permission Issues

    • Enable debug mode with export DEBUG=auth0-mcp
    • Check your Auth0 token status: npx @auth0/auth0-mcp-server session
    • Reinitialize with specific scopes: npx @auth0/auth0-mcp-server init --scopes 'read:*,update:*,create:*'
    • If a specific operation fails, you may be missing the required scope
  4. Invalid Auth0 Configuration Error

    • This typically happens when your authorization token is missing or expired
    • Run npx @auth0/auth0-mcp-server session to check your token status
    • If expired or missing, run npx @auth0/auth0-mcp-server init to authenticate

[!TIP] Most connection issues can be resolved by restarting both the server and Claude Desktop.

📋 Debug logs

Enable debug mode to view detailed logs:

export DEBUG=auth0-mcp

Get detailed MCP Client logs from Claude Desktop:

# Follow logs in real-time
tail -n 20 -F ~/Library/Logs/Claude/mcp*.log

For advanced troubleshooting, use the MCP Inspector:

npx @modelcontextprotocol/inspector -e DEBUG='auth0-mcp' @auth0/auth0-mcp-server run

For detailed MCP Server logs, run the server in debug mode:

DEBUG=auth0-mcp npx @auth0/auth0-mcp-server run

👨‍💻 Development

Building from Source

# Clone the repository
git clone https://github.com/auth0/auth0-mcp-server.git
cd auth0-mcp-server

# Install dependencies
npm install

# Build the project
npm run build

# Initiate device auth flow
npx . init

# Configure your MCP Client (e.g. Claude Desktop) with MCP server path
npm run setup

Development Scripts

# Run directly with TypeScript (no build needed)
npm run dev

# Run with debug logs enabled
npm run dev:debug

# Run with MCP inspector for debugging
npm run dev:inspect

# Run the compiled JavaScript version
npm run start

[!NOTE] This server requires Node.js v18 or higher.

🔒 Security

The Auth0 MCP Server prioritizes security:

  • Credentials are stored in the system's secure keychain
  • No sensitive information is stored in plain text
  • Authentication uses OAuth 2.0 device authorization flow
  • No permissions (scopes) are requested by default
  • Interactive scope selection allows you to choose exactly which permissions to grant
  • Support for glob patterns to quickly select related scopes (e.g., read:*)
  • Easy token removal via logout command when no longer needed

[!IMPORTANT] For security best practices, always use npx @auth0/auth0-mcp-server logout when you're done with a session or switching between tenants. This ensures your authentication tokens are properly removed from the system keychain.

[!CAUTION] Always review the permissions requested during the authentication process to ensure they align with your security requirements.

Anonymized Analytics Disclosure

Anonymized data points are collected during the use of this MCP server. This data includes the MCP version, operating system, timestamp, and other technical details that do not personally identify you.

Auth0 uses this data to better understand the usage of this tool to prioritize the features, enhancements and fixes that matter most to our users.

To opt-out of this collection, set the AUTH0_MCP_ANALYTICS environment variable to false.

💬 Feedback and Contributing

We appreciate feedback and contributions to this project! Before you get started, please see:

Reporting Issues

To provide feedback or report a bug, please raise an issue on our issue tracker.

Vulnerability Reporting

Please do not report security vulnerabilities on the public GitHub issue tracker. The Responsible Disclosure Program details the procedure for disclosing security issues.

📄 License

This project is licensed under the MIT license. See the LICENSE file for more info.

What is Auth0?

<p align="center"> <picture> <source media="(prefers-color-scheme: dark)" srcset="https://cdn.auth0.com/website/auth0-logos/2023-branding/favicon/auth0-icon-ondark.svg" width="150" height="75"> <source media="(prefers-color-scheme: light)" srcset="https://cdn.auth0.com/website/auth0-logos/2023-branding/favicon/auth0-icon-onlight.svg" width="150" height="75"> <img alt="Auth0 Logo" src="https://cdn.auth0.com/website/sdks/logos/auth0_light_mode.png" width="150"> </picture> </p> <p align="center"> Auth0 is an easy to implement, adaptable authentication and authorization platform. To learn more checkout <a href="https://auth0.com/why-auth0">Why Auth0?</a> </p>

Contract & API

Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.

Verifiedcapability-contract

Contract coverage

Status

ready

Auth

mcp, api_key, oauth

Streaming

No

Data region

global

Protocol support

MCP: verified

Requires: mcp, lang:typescript

Forbidden: none

Guardrails

Operational confidence: medium

Contract is available with explicit auth and schema references.
Trust confidence is not low and verification freshness is acceptable.
Protocol support is explicitly confirmed in contract metadata.
Invocation examples
curl -s "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/snapshot"
curl -s "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/contract"
curl -s "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/trust"

Reliability & Benchmarks

Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.

Missingruntime-metrics

Trust signals

Handshake

UNKNOWN

Confidence

unknown

Attempts 30d

unknown

Fallback rate

unknown

Runtime metrics

Observed P50

unknown

Observed P95

unknown

Rate limit

unknown

Estimated cost

unknown

No benchmark suites or observed failure patterns are available.

Media & Demo

Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.

Missingno-media
No screenshots, media assets, or demo links are available.

Related Agents

Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.

Self-declaredprotocol-neighbors
GITLAB_AI_CATALOGgitlab-mcp

Rank

83

A Model Context Protocol (MCP) server for GitLab

Traction

No public download signal

Freshness

Updated 2d ago

MCP
GITLAB_PUBLIC_PROJECTSgitlab-mcp

Rank

80

A Model Context Protocol (MCP) server for GitLab

Traction

No public download signal

Freshness

Updated 2d ago

MCP
GITLAB_AI_CATALOGrmcp-openapi

Rank

74

Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)

Traction

No public download signal

Freshness

Updated 2d ago

MCP
GITLAB_AI_CATALOGrmcp-actix-web

Rank

72

An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)

Traction

No public download signal

Freshness

Updated 2d ago

MCP
Machine Appendix

Contract JSON

{
  "contractStatus": "ready",
  "authModes": [
    "mcp",
    "api_key",
    "oauth"
  ],
  "requires": [
    "mcp",
    "lang:typescript"
  ],
  "forbidden": [],
  "supportsMcp": true,
  "supportsA2a": false,
  "supportsStreaming": false,
  "inputSchemaRef": "https://github.com/auth0/auth0-mcp-server#input",
  "outputSchemaRef": "https://github.com/auth0/auth0-mcp-server#output",
  "dataRegion": "global",
  "contractUpdatedAt": "2026-02-24T19:45:38.497Z",
  "sourceUpdatedAt": "2026-02-24T19:45:38.497Z",
  "freshnessSeconds": 4441859
}

Invocation Guide

{
  "preferredApi": {
    "snapshotUrl": "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/snapshot",
    "contractUrl": "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/contract",
    "trustUrl": "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/trust"
  },
  "curlExamples": [
    "curl -s \"https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/snapshot\"",
    "curl -s \"https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/contract\"",
    "curl -s \"https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/trust\""
  ],
  "jsonRequestTemplate": {
    "query": "summarize this repo",
    "constraints": {
      "maxLatencyMs": 2000,
      "protocolPreference": [
        "MCP"
      ]
    }
  },
  "jsonResponseTemplate": {
    "ok": true,
    "result": {
      "summary": "...",
      "confidence": 0.9
    },
    "meta": {
      "source": "GITHUB_MCP",
      "generatedAt": "2026-04-17T05:36:37.541Z"
    }
  },
  "retryPolicy": {
    "maxAttempts": 3,
    "backoffMs": [
      500,
      1500,
      3500
    ],
    "retryableConditions": [
      "HTTP_429",
      "HTTP_503",
      "NETWORK_TIMEOUT"
    ]
  }
}

Trust JSON

{
  "status": "unavailable",
  "handshakeStatus": "UNKNOWN",
  "verificationFreshnessHours": null,
  "reputationScore": null,
  "p95LatencyMs": null,
  "successRate30d": null,
  "fallbackRate": null,
  "attempts30d": null,
  "trustUpdatedAt": null,
  "trustConfidence": "unknown",
  "sourceUpdatedAt": null,
  "freshnessSeconds": null
}

Capability Matrix

{
  "rows": [
    {
      "key": "MCP",
      "type": "protocol",
      "support": "supported",
      "confidenceSource": "contract",
      "notes": "Confirmed by capability contract"
    },
    {
      "key": "auth0",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "mcp",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "model context protocol",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "experimental",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "beta",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "claude",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    },
    {
      "key": "cli",
      "type": "capability",
      "support": "supported",
      "confidenceSource": "profile",
      "notes": "Declared in agent profile metadata"
    }
  ],
  "flattenedTokens": "protocol:MCP|supported|contract capability:auth0|supported|profile capability:mcp|supported|profile capability:model context protocol|supported|profile capability:experimental|supported|profile capability:beta|supported|profile capability:claude|supported|profile capability:cli|supported|profile"
}

Facts JSON

[
  {
    "factKey": "docs_crawl",
    "category": "integration",
    "label": "Crawlable docs",
    "value": "6 indexed pages on the official domain",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  },
  {
    "factKey": "protocols",
    "category": "compatibility",
    "label": "Protocol compatibility",
    "value": "MCP",
    "href": "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/contract",
    "sourceType": "contract",
    "confidence": "high",
    "observedAt": "2026-02-24T19:45:38.497Z",
    "isPublic": true
  },
  {
    "factKey": "auth_modes",
    "category": "compatibility",
    "label": "Auth modes",
    "value": "mcp, api_key, oauth",
    "href": "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/contract",
    "sourceUrl": "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/contract",
    "sourceType": "contract",
    "confidence": "high",
    "observedAt": "2026-02-24T19:45:38.497Z",
    "isPublic": true
  },
  {
    "factKey": "schema_refs",
    "category": "artifact",
    "label": "Machine-readable schemas",
    "value": "OpenAPI or schema references published",
    "href": "https://github.com/auth0/auth0-mcp-server#input",
    "sourceUrl": "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/contract",
    "sourceType": "contract",
    "confidence": "high",
    "observedAt": "2026-02-24T19:45:38.497Z",
    "isPublic": true
  },
  {
    "factKey": "vendor",
    "category": "vendor",
    "label": "Vendor",
    "value": "Auth0",
    "href": "https://github.com/auth0/auth0-mcp-server#readme",
    "sourceUrl": "https://github.com/auth0/auth0-mcp-server#readme",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-02-24T19:43:14.176Z",
    "isPublic": true
  },
  {
    "factKey": "traction",
    "category": "adoption",
    "label": "Adoption signal",
    "value": "93 GitHub stars",
    "href": "https://github.com/auth0/auth0-mcp-server",
    "sourceUrl": "https://github.com/auth0/auth0-mcp-server",
    "sourceType": "profile",
    "confidence": "medium",
    "observedAt": "2026-02-24T19:43:14.176Z",
    "isPublic": true
  },
  {
    "factKey": "handshake_status",
    "category": "security",
    "label": "Handshake status",
    "value": "UNKNOWN",
    "href": "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/trust",
    "sourceUrl": "https://xpersona.co/api/v1/agents/mcp-auth0-auth0-mcp-server/trust",
    "sourceType": "trust",
    "confidence": "medium",
    "observedAt": null,
    "isPublic": true
  }
]

Change Events JSON

[
  {
    "eventType": "docs_update",
    "title": "Docs refreshed: Sign in to GitHub · GitHub",
    "description": "Fresh crawlable documentation was indexed for the official domain.",
    "href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
    "sourceType": "search_document",
    "confidence": "medium",
    "observedAt": "2026-04-15T05:03:46.393Z",
    "isPublic": true
  }
]

Sponsored

Ads related to @auth0/auth0-mcp-server and adjacent AI workflows.