Preview release of FusionAuth API MCP server
This is a well-structured MCP server for FusionAuth API integration with proper authentication requirements and good security practices. It requires API key authentication stored in environment variables and provides appropriate permissions scoped to developer tools functionality for identity and access management operations. Supply chain analysis found 5 known vulnerabilities in dependencies (0 critical, 5 high severity). Package verification found 1 issue (1 critical, 0 high severity).
4 files analyzed · 9 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: API_KEY_APIKEYAUTH
Environment variable: API_BASE_URL
Environment variable: USE_TOOLS
Add this to your MCP configuration file:
{
"mcpServers": {
"io-fusionauth-mcp-api": {
"env": {
"USE_TOOLS": "your-use-tools-here",
"API_BASE_URL": "your-api-base-url-here",
"API_KEY_APIKEYAUTH": "your-api-key-apikeyauth-here"
},
"args": [
"-y",
"fusionauth-mcp-api"
],
"command": "npx"
}
}
}From the project's GitHub README.
A preview release of an MCP server for the FusionAuth API. Built with the excellent github.com/harsha-iiiv/openapi-mcp-generator
Using this MCP server requires providing the MCP client with a FusionAuth API key. Only use this for dev and test instances. FusionAuth is not responsible for potentially leaking sensitive information.
First, set up a limited API key in the FusionAuth instance. Here's documentation on creating an API key and configuring the correct permissions for an API key.
Next, configure your MCP client to use the FusionAuth API MCP server.
For example, to add to Claude Desktop, edit ~/Library/Application Support/Claude/claude_desktop_config.json to include the fusionauth-mcp-api key below.
If you don't have any previous MCP servers installed, it would look like this:
{
"mcpServers": {
"fusionauth-mcp-api": {
"command": "npx",
"args": [
"@fusionauth/mcp-api"
],
"env": {
"API_KEY_APIKEYAUTH": "<your fusionauth api key>",
"API_BASE_URL": "http://localhost:9011",
"USE_TOOLS": "retrieve,search"
}
}
}
}
The USE_TOOLS env variable above essentially restricts the available tools to read-only operations. You can omit this variable to allow full access, but you will need a model that can handle about 200k tokens.
Consult your MCP client's documentation to determine exactly how to add an MCP server to your client.
The default MCP Server has a tool for every API endpoint of FusionAuth. Over 300 of them! However, the tools, descriptions, requests, and responses combine to nearly 200k tokens, which can exceed the context window of many MCP clients.
You can restrict which tools this MCP server makes available by setting the USE_TOOLS env variable as shown above.
Each tool is defined by its prefix. The default prefixes are:
createdeletepatchupdateretrievesearchThere is also an other tool bucket that contains every tool with another prefix. The all tool bucket includes all tools and is the default value.
For example, if you don't need to use any delete or patch methods, the following setting reduces the tool list by 20%.
USE_TOOLS="create,update,retrieve,search,other"
If you only want to allow read-only operations, use the following configuration:
USE_TOOLS="retrieve,search"
This also reduces the tool list size by 66%.
There are three different approaches to secure your MCP server and you should combine them to enable secure access to your FusionAuth instance while still meeting your functionality needs. In order of granularity (from coarse to fine-grained):
delete set of tools, you don't have to worry about the LLM "helping" you by deleting FusionAuth configuration.Verify your API key has the correct permissions for the operation the MCP client is taking.
Check your MCP client logs; these vary by MCP client and platform. For example, $HOME/Library/Logs/Claude/mcp-server-fusionauth-api-server.log is the location for Claude Desktop on macOS. Consult your client's documentation for the precise location.
Use the modelcontextprotocol inspector to help determine if the issue is with the MCP server or with your MCP client: npx @modelcontextprotocol/inspector. If you want to change the USE_TOOLS variable, you cannot dynamically change it and must pass it on the command line. npx @modelcontextprotocol/inspector npx @fusionauth/mcp-api -e API_KEY_APIKEYAUTH=... -e USE_TOOLS=create
You can also build and run this locally.
git clone https://github.com/FusionAuth/fusionauth-mcp-api.git
cd fusionauth-mcp-api
cd packages/mcp-api
npm install
npm run build
# optional step to store config information in .env file
cp .env.example .env
# optionally edit .env to set API_BASE_URL and API_KEY_APIKEYAUTH
Then, similar to the instructions above, configure your MCP client to use the FusionAuth API MCP server.
For example, to add to Claude Desktop, edit ~/Library/Application Support/Claude/claude_desktop_config.json to include the fusionauth-mcp-api key below. If you don't have any previous MCP servers installed, it would look like this:
{
"mcpServers": {
"fusionauth-mcp-api": {
"command": "npm",
"args": [
"run",
"--silent",
"--prefix",
"<path to local git repo>/fusionauth-mcp-api/packages/mcp-api",
"start"
],
"env": {
"API_KEY_APIKEYAUTH": "<your fusionauth api key>",
"API_BASE_URL": "http://localhost:9011",
"USE_TOOLS": "retrieve,search"
}
}
}
}
You can omit the env section above if you have configured an .env file.
bin/updatemcp.sh git commit git tag git push origin main --tags npm publish --access public --workspace=packages/mcp-api
Please share feature requests and bugs in this repo.
If you want to share interesting use cases or ask how to use functionality, please post in the FusionAuth forum.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Web content fetching and conversion for efficient LLM usage
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.