Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Crawler Summary
MCP server for Authentik identity management $1 $1 $1 $1 MCP Authentik MCP server for $1 identity management. Manage users, groups, applications, flows, policies, providers, and more through natural language in Cursor, Claude Code, and Claude Desktop. **Disclaimer:** Most of this code has been AI-generated and has not been fully tested yet. I created this project for my own needs and plan to continue improving its quality, but it may be buggy in the early stage Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Freshness
Last checked 2/25/2026
Best For
@samik081/mcp-authentik is best for mcp, authentik, identity workflows where MCP compatibility matters.
Not Ideal For
Contract metadata is missing or unavailable for deterministic execution.
Evidence Sources Checked
editorial-content, GITHUB MCP, runtime-metrics, public facts pack
MCP server for Authentik identity management $1 $1 $1 $1 MCP Authentik MCP server for $1 identity management. Manage users, groups, applications, flows, policies, providers, and more through natural language in Cursor, Claude Code, and Claude Desktop. **Disclaimer:** Most of this code has been AI-generated and has not been fully tested yet. I created this project for my own needs and plan to continue improving its quality, but it may be buggy in the early stage
Public facts
4
Change events
1
Artifacts
0
Freshness
Feb 25, 2026
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Trust score
Unknown
Compatibility
MCP
Freshness
Feb 25, 2026
Vendor
Samik081
Artifacts
0
Benchmarks
0
Last release
0.3.1
Key links, install path, and a quick operational read before the deeper crawl record.
Summary
Capability contract not published. No trust telemetry is available yet. Last updated 2/25/2026.
Setup snapshot
git clone https://github.com/Samik081/mcp-authentik.gitSetup complexity is MEDIUM. Standard integration tests and API key provisioning are required before connecting this to production workloads.
Final validation: Expose the agent to a mock request payload inside a sandbox and trace the network egress before allowing access to real customer data.
Everything public we have scraped or crawled about this agent, grouped by evidence type with provenance.
Vendor
Samik081
Protocol compatibility
MCP
Handshake status
UNKNOWN
Crawlable docs
6 indexed pages on the official domain
Merged public release, docs, artifact, benchmark, pricing, and trust refresh events.
Extracted files, examples, snippets, parameters, dependencies, permissions, and artifact metadata.
Extracted files
0
Examples
6
Snippets
0
Languages
typescript
bash
AUTHENTIK_URL="https://auth.example.com" \ AUTHENTIK_TOKEN="your-api-token" \ npx -y @samik081/mcp-authentik
bash
docker run --rm -i \ -e AUTHENTIK_URL=https://auth.example.com \ -e AUTHENTIK_TOKEN=your-api-token \ ghcr.io/samik081/mcp-authentik
bash
docker run -d -p 3000:3000 \ -e MCP_TRANSPORT=http \ -e AUTHENTIK_URL=https://auth.example.com \ -e AUTHENTIK_TOKEN=your-api-token \ ghcr.io/samik081/mcp-authentik
bash
# Using npx claude mcp add --transport stdio authentik \ --env AUTHENTIK_URL=https://auth.example.com \ --env AUTHENTIK_TOKEN=your-api-token \ -- npx -y @samik081/mcp-authentik # Using Docker claude mcp add --transport stdio authentik \ --env AUTHENTIK_URL=https://auth.example.com \ --env AUTHENTIK_TOKEN=your-api-token \ -- docker run --rm -i ghcr.io/samik081/mcp-authentik # Using remote HTTP (connect to a running Docker container or HTTP server) claude mcp add --transport http authentik http://localhost:3000
json
{
"mcpServers": {
"authentik": {
"command": "npx",
"args": ["-y", "@samik081/mcp-authentik"],
"env": {
"AUTHENTIK_URL": "https://auth.example.com",
"AUTHENTIK_TOKEN": "your-api-token"
}
}
}
}json
{
"mcpServers": {
"authentik": {
"command": "docker",
"args": ["run", "--rm", "-i",
"-e", "AUTHENTIK_URL=https://auth.example.com",
"-e", "AUTHENTIK_TOKEN=your-api-token",
"ghcr.io/samik081/mcp-authentik"
]
}
}
}Full documentation captured from public sources, including the complete README when available.
Docs source
GITHUB MCP
Editorial quality
ready
MCP server for Authentik identity management $1 $1 $1 $1 MCP Authentik MCP server for $1 identity management. Manage users, groups, applications, flows, policies, providers, and more through natural language in Cursor, Claude Code, and Claude Desktop. **Disclaimer:** Most of this code has been AI-generated and has not been fully tested yet. I created this project for my own needs and plan to continue improving its quality, but it may be buggy in the early stage
MCP server for Authentik identity management. Manage users, groups, applications, flows, policies, providers, and more through natural language in Cursor, Claude Code, and Claude Desktop.
Disclaimer: Most of this code has been AI-generated and has not been fully tested yet. I created this project for my own needs and plan to continue improving its quality, but it may be buggy in the early stages. If you find a bug, feel free to open an issue -- I'll try to work on it in my spare time.
AUTHENTIK_ACCESS_TIER=read-only for safe monitoringAUTHENTIK_CATEGORIES to expose only the tools you need@goauthentik/apilinux/amd64 and linux/arm64 on GHCRMCP_TRANSPORT=http) using the Streamable HTTP protocolRun the server directly with npx:
AUTHENTIK_URL="https://auth.example.com" \
AUTHENTIK_TOKEN="your-api-token" \
npx -y @samik081/mcp-authentik
The server validates your Authentik connection on startup and fails immediately with a clear error if credentials are missing or invalid.
Run with Docker (stdio transport, same as npx):
docker run --rm -i \
-e AUTHENTIK_URL=https://auth.example.com \
-e AUTHENTIK_TOKEN=your-api-token \
ghcr.io/samik081/mcp-authentik
To run as a remote MCP server with HTTP transport:
docker run -d -p 3000:3000 \
-e MCP_TRANSPORT=http \
-e AUTHENTIK_URL=https://auth.example.com \
-e AUTHENTIK_TOKEN=your-api-token \
ghcr.io/samik081/mcp-authentik
The MCP endpoint is available at http://localhost:3000 and a health check at http://localhost:3000/health.
Claude Code CLI (recommended):
# Using npx
claude mcp add --transport stdio authentik \
--env AUTHENTIK_URL=https://auth.example.com \
--env AUTHENTIK_TOKEN=your-api-token \
-- npx -y @samik081/mcp-authentik
# Using Docker
claude mcp add --transport stdio authentik \
--env AUTHENTIK_URL=https://auth.example.com \
--env AUTHENTIK_TOKEN=your-api-token \
-- docker run --rm -i ghcr.io/samik081/mcp-authentik
# Using remote HTTP (connect to a running Docker container or HTTP server)
claude mcp add --transport http authentik http://localhost:3000
JSON config (works with Claude Code .mcp.json, Claude Desktop claude_desktop_config.json, Cursor .cursor/mcp.json):
{
"mcpServers": {
"authentik": {
"command": "npx",
"args": ["-y", "@samik081/mcp-authentik"],
"env": {
"AUTHENTIK_URL": "https://auth.example.com",
"AUTHENTIK_TOKEN": "your-api-token"
}
}
}
}
Docker (stdio):
{
"mcpServers": {
"authentik": {
"command": "docker",
"args": ["run", "--rm", "-i",
"-e", "AUTHENTIK_URL=https://auth.example.com",
"-e", "AUTHENTIK_TOKEN=your-api-token",
"ghcr.io/samik081/mcp-authentik"
]
}
}
}
Remote MCP (connect to a running Docker container or HTTP server):
{
"mcpServers": {
"authentik": {
"type": "streamable-http",
"url": "http://localhost:3000"
}
}
}
Control which tools are available using the AUTHENTIK_ACCESS_TIER environment variable:
| Tier | Tools | Description |
|------|-------|-------------|
| full (default) | 245 | Read and write -- full control |
| read-only | 121 | Read only -- safe for monitoring, no state changes |
Tools that are not available in your tier are not registered with the MCP server. They will not appear in your AI tool's tool list, keeping the context clean.
| Variable | Required | Default | Description |
|----------|----------|---------|-------------|
| AUTHENTIK_URL | Yes | -- | Authentik instance URL (e.g., https://auth.example.com) |
| AUTHENTIK_TOKEN | Yes | -- | API token with appropriate permissions |
| AUTHENTIK_ACCESS_TIER | No | full | read-only for read-only tools only, full for all tools |
| AUTHENTIK_CATEGORIES | No | (all) | Comma-separated category allowlist (e.g., core,admin,flows) |
| MCP_TRANSPORT | No | stdio | Transport mode: stdio (default) or http |
| MCP_PORT | No | 3000 | HTTP server port (only used when MCP_TRANSPORT=http) |
| MCP_HOST | No | 0.0.0.0 | HTTP server bind address (only used when MCP_TRANSPORT=http) |
admin, authenticators, core, crypto, enterprise, events, flows, managed, oauth2, outposts, policies, property-mappings, providers, rac, rbac, root, sources, ssf, stages, tenants
| Tool | Description | Access |
|------|-------------|--------|
| authentik_admin_system_info | Get system information including HTTP host, runtime environment, server time, and embedded outpost status | read-only |
| authentik_admin_version | Get Authentik version information including current version and build hash | read-only |
| authentik_admin_settings_get | Get current system settings | read-only |
| authentik_admin_settings_update | Update system settings (partial update) | full |
| authentik_admin_apps | List installed Django applications in the Authentik instance | read-only |
| authentik_admin_models | List all data models available in the Authentik instance | read-only |
| authentik_admin_version_history | List Authentik version history entries | read-only |
| authentik_admin_system_task_trigger | Trigger all system tasks (e.g., cleanup, cache clear) | full |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_authenticators_list | List all authenticator devices across all types for the current user | read-only |
| authentik_authenticators_admin_by_type_list | List authenticator devices of a specific type (admin view) | read-only |
| authentik_authenticators_admin_by_type_get | Get a single authenticator device by type and ID (admin view) | read-only |
| authentik_authenticators_admin_by_type_delete | Delete an authenticator device by type and ID (admin view) | full |
| authentik_authenticators_user_by_type_list | List authenticator devices of a specific type for the current user | read-only |
Users
| Tool | Description | Access |
|------|-------------|--------|
| authentik_users_list | List users with optional filters for username, email, name, active status, superuser status, path, groups, and search | read-only |
| authentik_users_get | Get a single user by their numeric ID | read-only |
| authentik_users_create | Create a new user | full |
| authentik_users_update | Update an existing user (partial update) | full |
| authentik_users_delete | Delete a user by their numeric ID | full |
| authentik_users_me | Get information about the currently authenticated user | read-only |
| authentik_users_set_password | Set a new password for a user | full |
| authentik_users_create_service_account | Create a new service account user with an optional associated group and token | full |
| authentik_users_generate_recovery_link | Generate a temporary recovery link for a user to regain account access | full |
| authentik_users_send_recovery_email | Send a recovery email to a user using a specified email stage | full |
| authentik_users_list_paths | List all user paths configured in the system | read-only |
Groups
| Tool | Description | Access |
|------|-------------|--------|
| authentik_groups_list | List groups with optional filters for name, superuser status, members, and search | read-only |
| authentik_groups_get | Get a single group by its UUID | read-only |
| authentik_groups_create | Create a new group with optional parent, superuser status, users, and custom attributes | full |
| authentik_groups_update | Update an existing group (partial update) | full |
| authentik_groups_delete | Delete a group by its UUID | full |
| authentik_groups_add_user | Add a user to a group by group UUID and user ID | full |
| authentik_groups_remove_user | Remove a user from a group by group UUID and user ID | full |
Applications
| Tool | Description | Access |
|------|-------------|--------|
| authentik_apps_list | List applications with optional filters for name, slug, group, search, and more | read-only |
| authentik_apps_get | Get a single application by its slug | read-only |
| authentik_apps_create | Create a new application with name, slug, and optional provider, group, and metadata | full |
| authentik_apps_update | Update an existing application (partial update) | full |
| authentik_apps_set_icon_url | Set an application icon from a URL, or clear it | full |
| authentik_apps_delete | Delete an application by its slug | full |
| authentik_apps_check_access | Check whether a specific user has access to an application | read-only |
| authentik_apps_update_transactional | Create or update an application and its provider in a single atomic transaction | full |
| authentik_app_entitlements_list | List application entitlements with optional filters | read-only |
| authentik_app_entitlements_get | Get a single application entitlement by its UUID | read-only |
| authentik_app_entitlements_create | Create a new application entitlement | full |
| authentik_app_entitlements_update | Update an existing application entitlement (partial update) | full |
| authentik_app_entitlements_delete | Delete an application entitlement by its UUID | full |
Tokens
| Tool | Description | Access |
|------|-------------|--------|
| authentik_tokens_list | List tokens with optional filters for identifier, intent, managed status, and search | read-only |
| authentik_tokens_get | Get a single token by its identifier | read-only |
| authentik_tokens_create | Create a new token with an identifier, optional intent, description, and expiration settings | full |
| authentik_tokens_update | Update an existing token (partial update) | full |
| authentik_tokens_delete | Delete a token by its identifier | full |
| authentik_tokens_view_key | View the raw key value of a token (privileged, logged) | full |
| authentik_tokens_set_key | Set a custom key value for a token | full |
Brands
| Tool | Description | Access |
|------|-------------|--------|
| authentik_brands_list | List brands with optional filters for UUID, domain, and search | read-only |
| authentik_brands_get | Get a single brand by its UUID | read-only |
| authentik_brands_create | Create a new brand with domain, branding settings, flow assignments, and optional attributes | full |
| authentik_brands_update | Update an existing brand (partial update) | full |
| authentik_brands_delete | Delete a brand by its UUID | full |
| authentik_brands_current | Get the brand configuration for the current domain | read-only |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_crypto_list | List certificate keypairs with optional filters | read-only |
| authentik_crypto_get | Get a single certificate keypair by its UUID | read-only |
| authentik_crypto_create | Create a new certificate keypair from PEM-encoded certificate and optional private key data | full |
| authentik_crypto_update | Update an existing certificate keypair (partial update) | full |
| authentik_crypto_delete | Delete a certificate keypair by its UUID | full |
| authentik_crypto_generate | Generate a new self-signed certificate keypair | full |
| authentik_crypto_view_certificate | View the PEM-encoded certificate data for a keypair | read-only |
| authentik_crypto_view_private_key | View the PEM-encoded private key data for a keypair (sensitive) | full |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_enterprise_license_list | List enterprise licenses with optional filters | read-only |
| authentik_enterprise_license_get | Get a single enterprise license by its UUID | read-only |
| authentik_enterprise_license_create | Install a new enterprise license key | full |
| authentik_enterprise_license_update | Update an existing enterprise license (partial update) | full |
| authentik_enterprise_license_delete | Delete an enterprise license by its UUID | full |
| authentik_enterprise_license_summary | Get the total enterprise license status summary | read-only |
| authentik_enterprise_license_forecast | Forecast how many users will be required in a year based on current growth | read-only |
| authentik_enterprise_install_id | Get the authentik installation ID (used for license generation) | read-only |
Events
| Tool | Description | Access |
|------|-------------|--------|
| authentik_events_list | List audit events with optional filters for action, username, client IP, and more | read-only |
| authentik_events_get | Get a single audit event by its UUID | read-only |
| authentik_events_create | Create a new audit event | full |
| authentik_events_actions_list | List all available event action types | read-only |
| authentik_events_top_per_user | Get the top N events grouped by user count | read-only |
| authentik_events_volume | Get event volume data for specified filters and timeframe | read-only |
| authentik_events_rules_list | List notification rules with optional filters | read-only |
| authentik_events_rules_get | Get a single notification rule by its UUID | read-only |
| authentik_events_rules_create | Create a new notification rule | full |
| authentik_events_rules_update | Update an existing notification rule (partial update) | full |
| authentik_events_rules_delete | Delete a notification rule by its UUID | full |
| authentik_events_transports_list | List notification transports with optional filters | read-only |
| authentik_events_transports_get | Get a single notification transport by its UUID | read-only |
| authentik_events_transports_create | Create a new notification transport | full |
| authentik_events_transports_update | Update an existing notification transport (partial update) | full |
| authentik_events_transports_delete | Delete a notification transport by its UUID | full |
| authentik_events_transports_test | Send a test notification using the specified transport | full |
| authentik_events_notifications_list | List notifications for the current user with optional filters | read-only |
| authentik_events_notifications_update | Update a notification, typically to mark it as seen or unseen | full |
| authentik_events_notifications_delete | Delete a notification by its UUID | full |
| authentik_events_notifications_mark_all_seen | Mark all notifications as seen for the current user | full |
System Tasks
| Tool | Description | Access |
|------|-------------|--------|
| authentik_tasks_list | List system tasks with optional filters by name, status, or UID | read-only |
| authentik_tasks_get | Get details of a specific system task by UUID | read-only |
| authentik_tasks_retry | Retry a failed system task by UUID | full |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_flows_list | List flows with optional filters for search, designation, and ordering | read-only |
| authentik_flows_get | Get a single flow by its slug | read-only |
| authentik_flows_create | Create a new flow with name, slug, title, and designation | full |
| authentik_flows_update | Update an existing flow (partial update) | full |
| authentik_flows_delete | Delete a flow by its slug | full |
| authentik_flows_diagram | Get a visual diagram of a flow showing its stages and bindings | read-only |
| authentik_flows_export | Export a flow as YAML | read-only |
| authentik_flows_import | Import a flow from YAML content | full |
| authentik_flows_cache_info | Get information about cached flows | read-only |
| authentik_flows_cache_clear | Clear the flow cache | full |
| authentik_flows_bindings_list | List flow stage bindings with optional filters | read-only |
| authentik_flows_bindings_get | Get a single flow stage binding by its UUID | read-only |
| authentik_flows_bindings_create | Create a new flow stage binding to attach a stage to a flow | full |
| authentik_flows_bindings_update | Update an existing flow stage binding | full |
| authentik_flows_bindings_delete | Delete a flow stage binding by its UUID | full |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_blueprints_list | List managed blueprint instances with optional filters | read-only |
| authentik_blueprints_get | Get a single blueprint instance by its UUID | read-only |
| authentik_blueprints_create | Create a new managed blueprint instance | full |
| authentik_blueprints_update | Update an existing blueprint instance (partial update) | full |
| authentik_blueprints_delete | Delete a blueprint instance by its UUID | full |
| authentik_blueprints_available | List all available blueprint files that can be used to create blueprint instances | read-only |
| authentik_blueprints_apply | Apply a blueprint instance, executing its configuration | full |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_oauth2_access_tokens_list | List OAuth2 access tokens with optional filters | read-only |
| authentik_oauth2_access_tokens_get | Get a single OAuth2 access token by its numeric ID | read-only |
| authentik_oauth2_access_tokens_delete | Delete (revoke) an OAuth2 access token by its ID | full |
| authentik_oauth2_auth_codes_list | List OAuth2 authorization codes with optional filters | read-only |
| authentik_oauth2_auth_codes_get | Get a single OAuth2 authorization code by its numeric ID | read-only |
| authentik_oauth2_auth_codes_delete | Delete an OAuth2 authorization code by its ID | full |
| authentik_oauth2_refresh_tokens_list | List OAuth2 refresh tokens with optional filters | read-only |
| authentik_oauth2_refresh_tokens_get | Get a single OAuth2 refresh token by its numeric ID | read-only |
| authentik_oauth2_refresh_tokens_delete | Delete (revoke) an OAuth2 refresh token by its ID | full |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_outposts_list | List outpost instances with optional filters | read-only |
| authentik_outposts_get | Get a single outpost instance by its UUID | read-only |
| authentik_outposts_create | Create a new outpost instance | full |
| authentik_outposts_update | Update an existing outpost instance (partial update) | full |
| authentik_outposts_delete | Delete an outpost instance by its UUID | full |
| authentik_outposts_health | Get the current health status of an outpost | read-only |
| authentik_outposts_default_settings | Get the global default outpost configuration | read-only |
| authentik_outposts_service_connections_list | List all service connections (Docker and Kubernetes) with optional filters | read-only |
| authentik_outposts_service_connections_state | Get the current state of a service connection | read-only |
| authentik_outposts_service_connections_types | List all available service connection types | read-only |
| authentik_outposts_docker_create | Create a new Docker service connection | full |
| authentik_outposts_docker_update | Update an existing Docker service connection (partial update) | full |
| authentik_outposts_kubernetes_create | Create a new Kubernetes service connection | full |
| authentik_outposts_kubernetes_update | Update an existing Kubernetes service connection (partial update) | full |
| authentik_outposts_service_connections_delete | Delete a service connection by its UUID | full |
Policies use a type+config pattern. Cross-type tools operate on any policy, while per-type tools accept a policy_type parameter. Available types: dummy, event_matcher, expression, geoip, password, password_expiry, reputation, unique_password.
| Tool | Description | Access |
|------|-------------|--------|
| authentik_policies_list | List all policies across all types with optional filters | read-only |
| authentik_policies_get | Get a single policy by its UUID (cross-type) | read-only |
| authentik_policies_delete | Delete a policy by its UUID (cross-type) | full |
| authentik_policies_types_list | List all available policy types | read-only |
| authentik_policies_test | Test a policy against a specific user to see if it passes or fails | read-only |
| authentik_policies_cache_info | Get information about cached policies | read-only |
| authentik_policies_cache_clear | Clear the policy cache | full |
| authentik_policies_by_type_list | List policies of a specific type with optional filters | read-only |
| authentik_policies_by_type_get | Get a single policy of a specific type by its UUID | read-only |
| authentik_policies_by_type_create | Create a new policy of a specific type | full |
| authentik_policies_by_type_update | Update an existing policy of a specific type | full |
| authentik_policies_by_type_delete | Delete a policy of a specific type by its UUID | full |
| authentik_policy_bindings_list | List policy bindings with optional filters | read-only |
| authentik_policy_bindings_get | Get a single policy binding by its UUID | read-only |
| authentik_policy_bindings_create | Create a new policy binding to attach a policy to a target | full |
| authentik_policy_bindings_update | Update an existing policy binding | full |
| authentik_policy_bindings_delete | Delete a policy binding by its UUID | full |
| authentik_reputation_scores_list | List reputation scores with optional filters | read-only |
| authentik_reputation_scores_delete | Delete a reputation score by its UUID | full |
Property mappings use a type+config pattern. Cross-type tools operate on any mapping, while per-type tools accept a mapping_type parameter. Available types: notification, provider_google_workspace, provider_microsoft_entra, provider_rac, provider_radius, provider_saml, provider_scim, provider_scope, source_kerberos, source_ldap, source_oauth, source_plex, source_saml, source_scim.
| Tool | Description | Access |
|------|-------------|--------|
| authentik_property_mappings_list | List all property mappings across all types | read-only |
| authentik_property_mappings_get | Get a single property mapping by its UUID (cross-type) | read-only |
| authentik_property_mappings_delete | Delete a property mapping by its UUID | full |
| authentik_property_mappings_types_list | List all available property mapping types | read-only |
| authentik_property_mappings_test | Test a property mapping by UUID | full |
| authentik_property_mappings_by_type_list | List property mappings of a specific type | read-only |
| authentik_property_mappings_by_type_get | Get a single property mapping by type and UUID | read-only |
| authentik_property_mappings_by_type_create | Create a new property mapping of a specific type | full |
| authentik_property_mappings_by_type_update | Update an existing property mapping by type and UUID | full |
| authentik_property_mappings_by_type_delete | Delete a property mapping by type and UUID | full |
Providers use a type+config pattern. Cross-type tools operate on any provider, while per-type tools accept a provider_type parameter. Available types: oauth2, saml, ldap, proxy, radius, scim, rac, google_workspace, microsoft_entra.
| Tool | Description | Access |
|------|-------------|--------|
| authentik_providers_list | List all providers across all types with optional filters | read-only |
| authentik_providers_get | Get a single provider by its numeric ID (cross-type) | read-only |
| authentik_providers_delete | Delete a provider by its numeric ID (cross-type) | full |
| authentik_providers_types_list | List all available provider types | read-only |
| authentik_providers_by_type_list | List providers of a specific type with optional filters | read-only |
| authentik_providers_by_type_get | Get a single provider of a specific type by its numeric ID | read-only |
| authentik_providers_by_type_create | Create a new provider of a specific type | full |
| authentik_providers_by_type_update | Update an existing provider of a specific type | full |
| authentik_providers_by_type_delete | Delete a provider of a specific type by its numeric ID | full |
| authentik_providers_oauth2_setup_urls | Get OAuth2 provider setup URLs (authorize, token, userinfo, etc.) | read-only |
| authentik_providers_saml_metadata | Get SAML provider metadata XML | read-only |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_rac_endpoints_list | List RAC (Remote Access Control) endpoints with optional filters | read-only |
| authentik_rac_endpoints_get | Get a single RAC endpoint by its UUID | read-only |
| authentik_rac_endpoints_create | Create a new RAC endpoint for remote access | full |
| authentik_rac_endpoints_update | Update an existing RAC endpoint (partial update) | full |
| authentik_rac_endpoints_delete | Delete a RAC endpoint by its UUID | full |
| authentik_rac_connection_tokens_list | List RAC connection tokens with optional filters (system-managed, no create) | read-only |
| authentik_rac_connection_tokens_get | Get a single RAC connection token by its UUID | read-only |
| authentik_rac_connection_tokens_delete | Delete a RAC connection token by its UUID | full |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_rbac_roles_list | List RBAC roles with optional filters | read-only |
| authentik_rbac_roles_get | Get a single RBAC role by its UUID | read-only |
| authentik_rbac_roles_create | Create a new RBAC role | full |
| authentik_rbac_roles_update | Update an existing RBAC role (partial update) | full |
| authentik_rbac_roles_delete | Delete an RBAC role by its UUID | full |
| authentik_rbac_permissions_list | List all available permissions, filterable by model and app | read-only |
| authentik_rbac_permissions_by_role_list | List object permissions assigned to a specific model, filterable by role | read-only |
| authentik_rbac_permissions_by_role_assign | Assign permission(s) to a role | full |
| authentik_rbac_permissions_by_role_unassign | Unassign permission(s) from a role | full |
| authentik_rbac_permissions_by_user_list | List object permissions assigned to a specific model, filterable by user | read-only |
| authentik_rbac_permissions_by_user_assign | Assign permission(s) to a user | full |
| authentik_rbac_permissions_by_user_unassign | Unassign permission(s) from a user | full |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_root_config | Get root configuration including capabilities, error reporting settings, and UI configuration | read-only |
Sources use a type+config pattern. Cross-type tools operate on any source, while per-type tools accept a source_type parameter. Available types: oauth, saml, ldap, plex, kerberos, scim.
| Tool | Description | Access |
|------|-------------|--------|
| authentik_sources_list | List all sources across all types (OAuth, SAML, LDAP, Plex, Kerberos, SCIM) | read-only |
| authentik_sources_get | Get a single source by its slug (cross-type) | read-only |
| authentik_sources_delete | Delete a source by its slug | full |
| authentik_sources_types_list | List all available source types | read-only |
| authentik_sources_by_type_list | List sources of a specific type | read-only |
| authentik_sources_by_type_get | Get a single source by type and slug | read-only |
| authentik_sources_by_type_create | Create a new source of a specific type | full |
| authentik_sources_by_type_update | Update an existing source by type and slug | full |
| authentik_sources_by_type_delete | Delete a source by type and slug | full |
| authentik_sources_user_connections_list | List user-source connections across all source types | read-only |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_ssf_streams_list | List Shared Signals Framework (SSF) event streams with optional filters | read-only |
| authentik_ssf_streams_get | Get a single SSF event stream by its UUID | read-only |
Stages use a type+config pattern. Cross-type tools operate on any stage, while per-type tools accept a stage_type parameter. Available types: authenticator_duo, authenticator_email, authenticator_endpoint_gdtc, authenticator_sms, authenticator_static, authenticator_totp, authenticator_validate, authenticator_webauthn, captcha, consent, deny, dummy, email, identification, invitation, mtls, password, prompt, redirect, source, user_delete, user_login, user_logout, user_write.
| Tool | Description | Access |
|------|-------------|--------|
| authentik_stages_list | List all stages across all types with optional filters | read-only |
| authentik_stages_get | Get a single stage by its UUID (cross-type) | read-only |
| authentik_stages_delete | Delete a stage by its UUID (cross-type) | full |
| authentik_stages_types_list | List all available stage types | read-only |
| authentik_stages_by_type_list | List stages of a specific type with optional filters | read-only |
| authentik_stages_by_type_get | Get a single stage of a specific type by its UUID | read-only |
| authentik_stages_by_type_create | Create a new stage of a specific type | full |
| authentik_stages_by_type_update | Update an existing stage of a specific type | full |
| authentik_stages_by_type_delete | Delete a stage of a specific type by its UUID | full |
| authentik_invitations_list | List invitations with optional filters | read-only |
| authentik_invitations_get | Get a single invitation by its UUID | read-only |
| authentik_invitations_create | Create a new invitation | full |
| authentik_invitations_update | Update an existing invitation | full |
| authentik_invitations_delete | Delete an invitation by its UUID | full |
| authentik_prompts_list | List prompt field definitions with optional filters | read-only |
| authentik_prompts_get | Get a single prompt field definition by its UUID | read-only |
| authentik_prompts_create | Create a new prompt field definition | full |
| authentik_prompts_update | Update an existing prompt field definition | full |
| authentik_prompts_delete | Delete a prompt field definition by its UUID | full |
| Tool | Description | Access |
|------|-------------|--------|
| authentik_tenants_list | List tenants with optional filters | read-only |
| authentik_tenants_get | Get a single tenant by its UUID | read-only |
| authentik_tenants_create | Create a new tenant | full |
| authentik_tenants_update | Update an existing tenant (partial update) | full |
| authentik_tenants_delete | Delete a tenant by its UUID (irreversible, removes all tenant data) | full |
| authentik_tenants_create_admin_group | Create an admin group for a tenant and add a user to it | full |
| authentik_tenants_create_recovery_key | Create a recovery key for a user in a tenant | full |
| authentik_tenants_domains_list | List tenant domains with optional filters | read-only |
| authentik_tenants_domains_create | Create a new domain for a tenant | full |
| authentik_tenants_domains_delete | Delete a tenant domain by its numeric ID | full |
The following enterprise endpoint features are not available in the @goauthentik/api SDK:
These enterprise endpoint features require SDK support that is not yet available.
After configuring your MCP client, ask your AI assistant:
"What version of Authentik is running?"
If the connection is working, the assistant will call authentik_admin_version and return your server version and build hash.
authentik_users_list and authentik_groups_list to find and display admin group members.authentik_apps_list to show all applications with their providers and groups.authentik_users_create to set up the new user account.AUTHENTIK_URL is reachable from the machine running the MCP serverhttps://auth.example.com not https://auth.example.com/)full access tier will fail if your token only has read permissions -- set AUTHENTIK_ACCESS_TIER=read-only to limit exposureAUTHENTIK_CATEGORIES with the actual category values listed above (e.g., core,admin,flows), not source file namescore category, not separate categoriescore,admin,events)# Install dependencies
npm install
# Build the project
npm run build
# Run in development mode (auto-reload)
npm run dev
# Open the MCP Inspector for interactive testing
npm run inspect
Machine endpoints, protocol fit, contract coverage, invocation examples, and guardrails for agent-to-agent use.
Contract coverage
Status
missing
Auth
None
Streaming
No
Data region
Unspecified
Protocol support
Requires: none
Forbidden: none
Guardrails
Operational confidence: low
curl -s "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/snapshot"
curl -s "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/contract"
curl -s "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/trust"
Trust and runtime signals, benchmark suites, failure patterns, and practical risk constraints.
Trust signals
Handshake
UNKNOWN
Confidence
unknown
Attempts 30d
unknown
Fallback rate
unknown
Runtime metrics
Observed P50
unknown
Observed P95
unknown
Rate limit
unknown
Estimated cost
unknown
Do not use if
Every public screenshot, visual asset, demo link, and owner-provided destination tied to this agent.
Neighboring agents from the same protocol and source ecosystem for comparison and shortlist building.
Rank
83
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
80
A Model Context Protocol (MCP) server for GitLab
Traction
No public download signal
Freshness
Updated 2d ago
Rank
74
Expose OpenAPI definition endpoints as MCP tools using the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Rank
72
An actix_web backend for the official Rust SDK for the Model Context Protocol (https://github.com/modelcontextprotocol/rust-sdk)
Traction
No public download signal
Freshness
Updated 2d ago
Contract JSON
{
"contractStatus": "missing",
"authModes": [],
"requires": [],
"forbidden": [],
"supportsMcp": false,
"supportsA2a": false,
"supportsStreaming": false,
"inputSchemaRef": null,
"outputSchemaRef": null,
"dataRegion": null,
"contractUpdatedAt": null,
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Invocation Guide
{
"preferredApi": {
"snapshotUrl": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/snapshot",
"contractUrl": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/contract",
"trustUrl": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/trust"
},
"curlExamples": [
"curl -s \"https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/snapshot\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/contract\"",
"curl -s \"https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/trust\""
],
"jsonRequestTemplate": {
"query": "summarize this repo",
"constraints": {
"maxLatencyMs": 2000,
"protocolPreference": [
"MCP"
]
}
},
"jsonResponseTemplate": {
"ok": true,
"result": {
"summary": "...",
"confidence": 0.9
},
"meta": {
"source": "GITHUB_MCP",
"generatedAt": "2026-04-17T03:25:54.073Z"
}
},
"retryPolicy": {
"maxAttempts": 3,
"backoffMs": [
500,
1500,
3500
],
"retryableConditions": [
"HTTP_429",
"HTTP_503",
"NETWORK_TIMEOUT"
]
}
}Trust JSON
{
"status": "unavailable",
"handshakeStatus": "UNKNOWN",
"verificationFreshnessHours": null,
"reputationScore": null,
"p95LatencyMs": null,
"successRate30d": null,
"fallbackRate": null,
"attempts30d": null,
"trustUpdatedAt": null,
"trustConfidence": "unknown",
"sourceUpdatedAt": null,
"freshnessSeconds": null
}Capability Matrix
{
"rows": [
{
"key": "MCP",
"type": "protocol",
"support": "unknown",
"confidenceSource": "profile",
"notes": "Listed on profile"
},
{
"key": "mcp",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "authentik",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "identity",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "sso",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "iam",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "ai",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "claude",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
},
{
"key": "cli",
"type": "capability",
"support": "supported",
"confidenceSource": "profile",
"notes": "Declared in agent profile metadata"
}
],
"flattenedTokens": "protocol:MCP|unknown|profile capability:mcp|supported|profile capability:authentik|supported|profile capability:identity|supported|profile capability:sso|supported|profile capability:iam|supported|profile capability:ai|supported|profile capability:claude|supported|profile capability:cli|supported|profile"
}Facts JSON
[
{
"factKey": "docs_crawl",
"category": "integration",
"label": "Crawlable docs",
"value": "6 indexed pages on the official domain",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
},
{
"factKey": "vendor",
"category": "vendor",
"label": "Vendor",
"value": "Samik081",
"href": "https://github.com/Samik081/mcp-authentik#readme",
"sourceUrl": "https://github.com/Samik081/mcp-authentik#readme",
"sourceType": "profile",
"confidence": "medium",
"observedAt": "2026-02-25T03:09:41.539Z",
"isPublic": true
},
{
"factKey": "protocols",
"category": "compatibility",
"label": "Protocol compatibility",
"value": "MCP",
"href": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/contract",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/contract",
"sourceType": "contract",
"confidence": "medium",
"observedAt": "2026-02-25T03:09:41.539Z",
"isPublic": true
},
{
"factKey": "handshake_status",
"category": "security",
"label": "Handshake status",
"value": "UNKNOWN",
"href": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/trust",
"sourceUrl": "https://xpersona.co/api/v1/agents/mcp-samik081-mcp-authentik/trust",
"sourceType": "trust",
"confidence": "medium",
"observedAt": null,
"isPublic": true
}
]Change Events JSON
[
{
"eventType": "docs_update",
"title": "Docs refreshed: Sign in to GitHub · GitHub",
"description": "Fresh crawlable documentation was indexed for the official domain.",
"href": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceUrl": "https://github.com/login?return_to=https%3A%2F%2Fgithub.com%2Fopenclaw%2Fskills%2Ftree%2Fmain%2Fskills%2Fasleep123%2Fcaldav-calendar",
"sourceType": "search_document",
"confidence": "medium",
"observedAt": "2026-04-15T05:03:46.393Z",
"isPublic": true
}
]Sponsored
Ads related to @samik081/mcp-authentik and adjacent AI workflows.