Server data from the Official MCP Registry
MCP server for ConnectWise Manage PSA — companies, tickets, projects, time entries, and more.
MCP server for ConnectWise Manage PSA — companies, tickets, projects, time entries, and more.
This ConnectWise Manage MCP server is well-architected with proper authentication mechanisms and reasonable permission scopes for its purpose. However, there are notable concerns around credential handling in gateway mode, timing of environment variable assignments, and some input validation gaps that warrant attention. The server implements OAuth 2.1 support responsibly, but credentials passed via HTTP headers in gateway mode create a window of exposure. Supply chain analysis found 3 known vulnerabilities in dependencies (1 critical, 1 high severity).
7 files analyzed · 11 issues found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: CW_MANAGE_COMPANY_ID
Environment variable: CW_MANAGE_PUBLIC_KEY
Environment variable: CW_MANAGE_PRIVATE_KEY
Environment variable: CW_MANAGE_CLIENT_ID
Environment variable: CW_MANAGE_URL
Environment variable: MCP_TRANSPORT
Environment variable: AUTH_MODE
Environment variable: LOG_LEVEL
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-wyre-technology-connectwise-manage-mcp": {
"env": {
"AUTH_MODE": "your-auth-mode-here",
"LOG_LEVEL": "your-log-level-here",
"CW_MANAGE_URL": "your-cw-manage-url-here",
"MCP_TRANSPORT": "your-mcp-transport-here",
"CW_MANAGE_CLIENT_ID": "your-cw-manage-client-id-here",
"CW_MANAGE_COMPANY_ID": "your-cw-manage-company-id-here",
"CW_MANAGE_PUBLIC_KEY": "your-cw-manage-public-key-here",
"CW_MANAGE_PRIVATE_KEY": "your-cw-manage-private-key-here"
},
"args": [
"-y",
"@wyre-technology/connectwise-manage-mcp"
],
"command": "npx"
}
}
}From the project's GitHub README.
Let your AI assistant work directly with ConnectWise Manage. Search tickets, log time, look up companies and contacts, manage projects — through natural conversation instead of clicking through the CWM interface.
This is a Model Context Protocol (MCP) server that gives Claude (or any MCP-compatible AI) 34 tools covering the daily operations ConnectWise Manage shops depend on. Works with both cloud-hosted and self-hosted CWM instances — just point it at your server.
Part of the MSP Claude Plugins ecosystem — a growing suite of AI integrations for the MSP stack including Autotask, Datto RMM, IT Glue, HaloPSA, NinjaOne, Huntress, and more. Built by MSPs, for MSPs.
For deploying to Azure Container Apps with Entra ID OAuth 2.1, see AZURE_ACA_DEPLOYMENT.md.
| Variable | Required | Description |
|---|---|---|
CW_MANAGE_COMPANY_ID | Yes | Your ConnectWise company identifier |
CW_MANAGE_PUBLIC_KEY | Yes | API member public key |
CW_MANAGE_PRIVATE_KEY | Yes | API member private key |
CW_MANAGE_CLIENT_ID | Yes | Client ID from ConnectWise Developer Portal |
CW_MANAGE_URL | No | API base URL (see below) |
CW_MANAGE_REJECT_UNAUTHORIZED | No | Set to false for self-signed certs (default: true) |
MCP_TRANSPORT | No | stdio (default) or http |
MCP_HTTP_PORT | No | HTTP port (default: 8080) |
AUTH_MODE | No | env (default) or gateway for header-based auth |
CW_MANAGE_URL)| Instance Type | URL |
|---|---|
| Cloud (North America) | https://api-na.myconnectwise.net (default) |
| Cloud (Europe) | https://api-eu.myconnectwise.net |
| Cloud (Australia) | https://api-au.myconnectwise.net |
| Self-hosted | https://cwm.yourcompany.com |
For self-hosted instances, set CW_MANAGE_URL to your server's base URL. The server automatically appends /v4_6_release/apis/3.0 unless the URL already contains that path.
If your self-hosted instance uses a self-signed certificate, also set CW_MANAGE_REJECT_UNAUTHORIZED=false.
cw_search_tickets — Search service tickets with conditionscw_get_ticket — Get a ticket by IDcw_create_ticket — Create a new service ticketcw_update_ticket — Update a ticket (JSON Patch)cw_get_ticket_notes — Get all notes on a ticket (including child ticket notes)cw_add_ticket_note — Add a note to a ticket (discussion, internal, or resolution)cw_search_companies — Search companiescw_get_company — Get a company by IDcw_create_company — Create a new companycw_update_company — Update a company (JSON Patch)cw_search_contacts — Search contactscw_get_contact — Get a contact by IDcw_create_contact — Create a new contactcw_search_projects — Search projectscw_get_project — Get a project by IDcw_create_project — Create a new projectcw_search_project_tickets — Search tickets under a projectcw_get_project_ticket — Get a specific project ticket by IDcw_get_project_ticket_notes — Get all notes on a project ticket (including child ticket notes)cw_add_project_ticket_note — Add a note to a project ticket (discussion, internal, or resolution)cw_search_time_entries — Search time entriescw_get_time_entry — Get a time entry by IDcw_create_time_entry — Create a new time entrycw_search_members — Search members/technicianscw_get_member — Get a member by IDcw_search_configurations — Search configuration items (assets)cw_get_configuration — Get a configuration item by IDcw_list_boards — List service boardscw_list_priorities — List ticket prioritiescw_list_statuses — List statuses for a boardcw_search_activities — Search activitiescw_get_activity — Get an activity by IDcw_create_activity — Create a new activitycw_test_connection — Test connection (hits /system/info)Add to your claude_desktop_config.json:
{
"mcpServers": {
"connectwise-manage": {
"command": "npx",
"args": ["@wyre-technology/connectwise-manage-mcp"],
"env": {
"CW_MANAGE_COMPANY_ID": "your-company-id",
"CW_MANAGE_PUBLIC_KEY": "your-public-key",
"CW_MANAGE_PRIVATE_KEY": "your-private-key",
"CW_MANAGE_CLIENT_ID": "your-client-id"
}
}
}
}
For a self-hosted instance:
{
"mcpServers": {
"connectwise-manage": {
"command": "npx",
"args": ["@wyre-technology/connectwise-manage-mcp"],
"env": {
"CW_MANAGE_URL": "https://cwm.yourcompany.com",
"CW_MANAGE_COMPANY_ID": "your-company-id",
"CW_MANAGE_PUBLIC_KEY": "your-public-key",
"CW_MANAGE_PRIVATE_KEY": "your-private-key",
"CW_MANAGE_CLIENT_ID": "your-client-id",
"CW_MANAGE_REJECT_UNAUTHORIZED": "false"
}
}
}
}
docker compose up -d
Run with HTTP transport for multi-tenant gateway deployments:
MCP_TRANSPORT=http AUTH_MODE=gateway node dist/index.js
Pass credentials per-request via headers: X-CW-Company-Id, X-CW-Public-Key, X-CW-Private-Key, X-CW-Client-Id, and optionally X-CW-URL.
# Install dependencies
npm install
# Build
npm run build
# Run in development
npm run dev
# Type check
npm run typecheck
# Run tests
npm test
git checkout -b feature/amazing-feature)git commit -m 'Add amazing feature')git push origin feature/amazing-feature)Apache-2.0
Built by WYRE Technology — part of the MSP Claude Plugins ecosystem
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.
by Microsoft · Content & Media
Convert files (PDF, Word, Excel, images, audio) to Markdown for LLM consumption
by mcp-marketplace · Developer Tools
Scaffold, build, and publish TypeScript MCP servers to npm — conversationally
by Taylorwilsdon · Productivity
Control Gmail, Calendar, Docs, Sheets, Drive, and more from your AI