Server data from the Official MCP Registry
EAD Enterprise Suite MCP — signature workflows, evidence, notifications, dossiers for enterprises.
EAD Enterprise Suite MCP — signature workflows, evidence, notifications, dossiers for enterprises.
This MCP server for EAD Enterprise Suite demonstrates solid security fundamentals with proper authentication mechanisms and reasonable permission scoping. However, there are concerns around credential handling documentation, lack of HTTPS enforcement clarity, and some input validation gaps that should be addressed before production use. The server requires API credentials (email/password or OpenID) and communicates with an external legal/digital trust platform, which is appropriate for its purpose. Supply chain analysis found 7 known vulnerabilities in dependencies (0 critical, 1 high severity). Package verification found 1 issue.
3 files analyzed · 15 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: MCP_AUTH_EMAIL
Environment variable: MCP_AUTH_PASSWORD
Environment variable: MCP_OPENID_CLIENT_ID
Environment variable: MCP_OPENID_ISSUER
Environment variable: MCP_OPENID_REFRESH_TOKEN
Environment variable: PORT
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-g-digital-by-garrigues-ead-enterprise-suite": {
"env": {
"PORT": "your-port-here",
"MCP_AUTH_EMAIL": "your-mcp-auth-email-here",
"MCP_AUTH_PASSWORD": "your-mcp-auth-password-here",
"MCP_OPENID_ISSUER": "your-mcp-openid-issuer-here",
"MCP_OPENID_CLIENT_ID": "your-mcp-openid-client-id-here",
"MCP_OPENID_REFRESH_TOKEN": "your-mcp-openid-refresh-token-here"
},
"args": [
"-y",
"@g-digital/mcp-ead-enterprise-suite"
],
"command": "npx"
}
}
}From the project's GitHub README.
MCP server for EAD Enterprise Suite, EAD Trust's advanced Digital Trust platform. Full signature workflows, certified evidence, notifications, dossiers, and large-file uploads for enterprise legal processes.
npx -y @g-digital/mcp-ead-enterprise-suite
Or see ONBOARDING.md for a step-by-step setup guide (≤ 5 minutes).
This MCP is published to every major MCP distribution channel by the g-digital MCP distribution pipeline. Pick whichever fits your stack:
| Channel | Install command / URL |
|---|---|
| npm | npx -y @g-digital/mcp-ead-enterprise-suite — npmjs.com/package/@g-digital/mcp-ead-enterprise-suite |
| Docker Hub | docker pull gdigital/ead-enterprise-suite:latest — hub.docker.com/r/gdigital/ead-enterprise-suite |
| MCP Official Registry | Auto-discovered as io.github.g-digital-by-Garrigues/ead-enterprise-suite by any client that reads the registry — registry.modelcontextprotocol.io |
| n8n community node | In n8n Settings → Community Nodes → install @g-digital/n8n-nodes-ead-enterprise-suite (works with the AI Agent node via usableAsTool) — npmjs.com/package/@g-digital/n8n-nodes-ead-enterprise-suite |
| Smithery | smithery mcp install g-digital/ead-enterprise-suite (from v1.0.7) — smithery.ai/servers/g-digital/ead-enterprise-suite |
Every channel ships the same MCP server contract; the tools and env-var configuration below apply regardless of which install path you choose.
{
"mcpServers": {
"ead-enterprise-suite": {
"args": [
"-y",
"mcp-ead-enterprise-suite"
],
"command": "npx",
"env": {
"MCP_AUTH_EMAIL": "",
"MCP_AUTH_PASSWORD": "<PASTE_MCP_AUTH_PASSWORD_HERE>",
"MCP_OPENID_CLIENT_ID": "",
"MCP_OPENID_ISSUER": "",
"MCP_OPENID_REFRESH_TOKEN": "<PASTE_MCP_OPENID_REFRESH_TOKEN_HERE>",
"PORT": ""
}
}
}
}
Need credentials? See: https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/
{
"mcpServers": {
"ead-enterprise-suite": {
"args": [
"-y",
"mcp-ead-enterprise-suite"
],
"command": "npx",
"env": {
"MCP_AUTH_EMAIL": "",
"MCP_AUTH_PASSWORD": "<PASTE_MCP_AUTH_PASSWORD_HERE>",
"MCP_OPENID_CLIENT_ID": "",
"MCP_OPENID_ISSUER": "",
"MCP_OPENID_REFRESH_TOKEN": "<PASTE_MCP_OPENID_REFRESH_TOKEN_HERE>",
"PORT": ""
}
}
}
}
Need credentials? See: https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/
{
"mcpServers": {
"ead-enterprise-suite": {
"args": [
"-y",
"mcp-ead-enterprise-suite"
],
"command": "npx",
"env": {
"MCP_AUTH_EMAIL": "",
"MCP_AUTH_PASSWORD": "<PASTE_MCP_AUTH_PASSWORD_HERE>",
"MCP_OPENID_CLIENT_ID": "",
"MCP_OPENID_ISSUER": "",
"MCP_OPENID_REFRESH_TOKEN": "<PASTE_MCP_OPENID_REFRESH_TOKEN_HERE>",
"PORT": ""
}
}
}
}
Need credentials? See: https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/
{
"mcpServers": {
"ead-enterprise-suite": {
"args": [
"-y",
"mcp-ead-enterprise-suite"
],
"command": "npx",
"env": {
"MCP_AUTH_EMAIL": "",
"MCP_AUTH_PASSWORD": "<PASTE_MCP_AUTH_PASSWORD_HERE>",
"MCP_OPENID_CLIENT_ID": "",
"MCP_OPENID_ISSUER": "",
"MCP_OPENID_REFRESH_TOKEN": "<PASTE_MCP_OPENID_REFRESH_TOKEN_HERE>",
"PORT": ""
}
}
}
}
Need credentials? See: https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/
{
"mcpServers": {
"ead-enterprise-suite": {
"args": [
"-y",
"mcp-ead-enterprise-suite"
],
"command": "npx",
"env": {
"MCP_AUTH_EMAIL": "",
"MCP_AUTH_PASSWORD": "<PASTE_MCP_AUTH_PASSWORD_HERE>",
"MCP_OPENID_CLIENT_ID": "",
"MCP_OPENID_ISSUER": "",
"MCP_OPENID_REFRESH_TOKEN": "<PASTE_MCP_OPENID_REFRESH_TOKEN_HERE>",
"PORT": ""
}
}
}
}
Need credentials? See: https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/
{
"servers": {
"ead-enterprise-suite": {
"args": [
"-y",
"mcp-ead-enterprise-suite"
],
"command": "npx",
"env": {
"MCP_AUTH_EMAIL": "",
"MCP_AUTH_PASSWORD": "<PASTE_MCP_AUTH_PASSWORD_HERE>",
"MCP_OPENID_CLIENT_ID": "",
"MCP_OPENID_ISSUER": "",
"MCP_OPENID_REFRESH_TOKEN": "<PASTE_MCP_OPENID_REFRESH_TOKEN_HERE>",
"PORT": ""
}
}
}
}
Need credentials? See: https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/
{
"mcpServers": {
"ead-enterprise-suite": {
"args": [
"-y",
"mcp-ead-enterprise-suite"
],
"command": "npx",
"env": {
"MCP_AUTH_EMAIL": "",
"MCP_AUTH_PASSWORD": "<PASTE_MCP_AUTH_PASSWORD_HERE>",
"MCP_OPENID_CLIENT_ID": "",
"MCP_OPENID_ISSUER": "",
"MCP_OPENID_REFRESH_TOKEN": "<PASTE_MCP_OPENID_REFRESH_TOKEN_HERE>",
"PORT": ""
}
}
}
}
Need credentials? See: https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/
{
"mcpServers": {
"ead-enterprise-suite": {
"args": [
"-y",
"mcp-ead-enterprise-suite"
],
"command": "npx",
"env": {
"MCP_AUTH_EMAIL": "",
"MCP_AUTH_PASSWORD": "<PASTE_MCP_AUTH_PASSWORD_HERE>",
"MCP_OPENID_CLIENT_ID": "",
"MCP_OPENID_ISSUER": "",
"MCP_OPENID_REFRESH_TOKEN": "<PASTE_MCP_OPENID_REFRESH_TOKEN_HERE>",
"PORT": ""
}
}
}
}
Need credentials? See: https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/
Add to your ~/.claude.json or claude_desktop_config.json:
{
"mcpServers": {
"ead-enterprise-suite": {
"command": "npx",
"args": ["-y", "@g-digital/mcp-ead-enterprise-suite"],
"env": {
"MCP_AUTH_EMAIL": "your-email@example.com",
"MCP_AUTH_PASSWORD": "your-password"
}
}
}
}
docker run --rm -i \
-e MCP_AUTH_EMAIL=your-email@example.com \
-e MCP_AUTH_PASSWORD=your-password \
gdigital/ead-enterprise-suite:latest
| Name | Required | Secret | Description |
|---|---|---|---|
MCP_AUTH_EMAIL | Yes | No | Flow 1: Email / password description: Your GoCertius account email address isSecret: false |
MCP_AUTH_PASSWORD | Yes | Yes | description: Your GoCertius account password isSecret: true (See https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/ for credential acquisition.) |
MCP_OPENID_CLIENT_ID | Yes | No | description: OpenID Connect client ID isSecret: false |
MCP_OPENID_ISSUER | Yes | No | Flow 2: OpenID Connect (alternative to email/password) description: OpenID Connect issuer URL isSecret: false |
MCP_OPENID_REFRESH_TOKEN | Yes | Yes | description: OpenID Connect refresh token isSecret: true (See https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/ for credential acquisition.) |
PORT | Yes | No | Transport (optional) description: HTTP port when running in hosted (HTTP) mode; ignored in stdio mode isSecret: false |
| Variable | Required | Description |
|---|---|---|
MCP_AUTH_EMAIL | One of flow 1 or 2 | Your account email |
MCP_AUTH_PASSWORD | One of flow 1 or 2 | Your account password |
MCP_OPENID_ISSUER | One of flow 1 or 2 | OpenID Connect issuer URL |
MCP_OPENID_CLIENT_ID | One of flow 1 or 2 | OpenID Connect client ID |
MCP_OPENID_REFRESH_TOKEN | One of flow 1 or 2 | OpenID Connect refresh token |
MCP_AUTH_JWT | Optional | Pre-seeded JWT (skips interactive login) |
MCP_OTEL_ENABLED | Optional | Set to true to enable OpenTelemetry tracing |
MCP_API_BASE_URL | Optional | Override upstream API base URL |
For credential setup instructions, visit: https://www.eadtrust.eu/soluciones-legaltech/enterprise-suite/
This package ships Claude Code slash-commands under .claude/commands/. After install, invoke them from Claude Code:
/signature-lifecycle — step-by-step workflow guide/notification-lifecycle — step-by-step workflow guide/evidence-lifecycle — step-by-step workflow guideSee docs/agent-prompts.md for end-to-end prompt examples and the tool sequences they trigger.
This server exposes 31 tools:
| Tool | Description |
|---|---|
evidence_create | Performs the evidence_create operation against the GoCertius API. |
evidence_list | Performs the evidence_list operation against the GoCertius API. |
evidence_seal | Performs the evidence_seal operation against the GoCertius API. |
evidence_get | Performs the evidence_get operation against the GoCertius API. |
evidence_group_create | Performs the evidence_group_create operation against the GoCertius API. |
evidence_group_list | Performs the evidence_group_list operation against the GoCertius API. |
dossier_create | Performs the dossier_create operation against the GoCertius API. |
dossier_list | Performs the dossier_list operation against the GoCertius API. |
dossier_get | Performs the dossier_get operation against the GoCertius API. |
dossier_template_list | Performs the dossier_template_list operation against the GoCertius API. |
notification_request_create | Performs the notification_request_create operation against the GoCertius API. |
notification_request_send | Performs the notification_request_send operation against the GoCertius API. |
notification_request_status | Performs the notification_request_status operation against the GoCertius API. |
notification_receiver_add | Performs the notification_receiver_add operation against the GoCertius API. |
notification_certificate_get | Performs the notification_certificate_get operation against the GoCertius API. |
case_file_list | Performs the case_file_list operation against the GoCertius API. |
case_file_get | Performs the case_file_get operation against the GoCertius API. |
session_login | Performs the session_login operation against the GoCertius API. |
session_info | Performs the session_info operation against the GoCertius API. |
use_case_list | Performs the use_case_list operation against the GoCertius API. |
signature_request_create | Performs the signature_request_create operation against the GoCertius API. |
signature_request_get | Performs the signature_request_get operation against the GoCertius API. |
signature_request_cancel | Performs the signature_request_cancel operation against the GoCertius API. |
signature_request_add_document | Performs the signature_request_add_document operation against the GoCertius API. |
signature_document_list | Performs the signature_document_list operation against the GoCertius API. |
signature_participant_create | Performs the signature_participant_create operation against the GoCertius API. |
signature_participant_list | Performs the signature_participant_list operation against the GoCertius API. |
activate_signature_request | Performs the activate_signature_request operation against the GoCertius API. |
signature_certificate_get | Performs the signature_certificate_get operation against the GoCertius API. |
large_evidence_upload_initiate | Performs the large_evidence_upload_initiate operation against the GoCertius API. |
large_evidence_upload_complete | Performs the large_evidence_upload_complete operation against the GoCertius API. |
This MCP server is the current, actively maintained interface for the EAD Enterprise Suite API.
If you previously used an earlier MCP server for EAD Enterprise Suite (prior to v1.0), note that this server supersedes it. Both servers can run side-by-side during a migration window — they connect to the same upstream API and share no local state. To avoid duplicate tool names in multi-server MCP setups, run only one at a time once migration is complete.
MIT — see LICENSE.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Web content fetching and conversion for efficient LLM usage
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.