
Okta
STDIOMCP server enabling AI models to interact with Okta identity environment.
MCP server enabling AI models to interact with Okta identity environment.
The Okta MCP Server is a groundbreaking tool that enables AI models to interact directly with your Okta environment using the Model Context Protocol (MCP). Built specifically for IAM engineers, security teams, and Okta administrators, it implements the MCP specification to transform how AI assistants can help manage and analyze Okta resources.
The Model Context Protocol (MCP) is an open standard that enables AI models to interact with external tools and services in a structured, secure way. It provides a consistent interface for AI systems to discover and use capabilities exposed by servers, allowing AI assistants to extend their functionality beyond their training data.
Think of MCP as the "USB-C of AI integration" - just as USB-C provides a universal standard that allows various devices to connect and communicate regardless of manufacturer, MCP creates a standardized way for AI models to discover and interact with different services without custom integration for each one. This "plug-and-play" approach means developers can build tools once and have them work across multiple AI assistants, while users benefit from seamless integration without worrying about compatibility issues.
Example: "Find all locked users in our Okta tenant, and create a spreadsheet in our IT Operations folder on Google Drive with their names, email addresses, and last login dates." The AI uses Okta MCP Server to query locked users, then passes this data to Google Drive MCP Server to create the spreadsheet - all without custom coding.
Please read this section carefully before using Okta MCP Server.
When you make a request, the interaction happens directly between the LLM and the Okta MCP tools - the client application is no longer in the middle. All data returned by these tools (including complete user profiles, group memberships, etc.) is sent to and stored in the LLM's context during the entire transaction for that conversation.
Key Privacy Considerations:
MCP is designed for lightweight workflows similar to Zapier, not bulk data operations.
Recommendation: Limit requests to fewer than 100 entities per transaction. Avoid operations that require fetching large datasets or multiple API calls.
Examples:
❌ Avoid these types of requests:
✅ Better approaches:
💡 For larger data sets and complex queries: Consider using the Okta AI Agent for larger queries and data sets, The agent is being enhanced with similar "actionable" features to handle larger datasets and more complex scenarios in the very near future.
The SSE over HTTP transport mode has significant security risks:
Best Practice: Only use the STDIO transport method (default mode) unless you have specific security controls in place.
The Okta MCP Server currently provides the following tools:
User Management
list_okta_users
- Retrieve users with filtering, search, and pagination optionsget_okta_user
- Get detailed information about a specific user by ID or loginlist_okta_user_groups
- List all groups that a specific user belongs tolist_okta_user_applications
- List all application links (assigned applications) for a specific userlist_okta_user_factors
- List all authentication factors enrolled for a specific userGroup Operations
list_okta_groups
- Retrieve groups with filtering, search, and pagination optionsget_okta_group
- Get detailed information about a specific grouplist_okta_group_members
- List all members of a specific grouplist_okta_assigned_applications_for_group
- List all applications assigned to a specific groupApplication Management
list_okta_applications
- Retrieve applications with filtering, search, and pagination optionslist_okta_application_users
- List all users assigned to a specific applicationlist_okta_application_group_assignments
- List all groups assigned to a specific applicationPolicy & Network Management
list_okta_policy_rules
- List all rules for a specific policy with detailed conditions and actionsget_okta_policy_rule
- Get detailed information about a specific policy rulelist_okta_network_zones
- List all network zones with IP ranges and configuration detailsSystem Log Events
get_okta_event_logs
- Retrieve Okta system log events with time-based filtering and search optionsDate & Time Utilities
get_current_time
- Get current UTC time in ISO 8601 formatparse_relative_time
- Convert natural language time expressions to ISO 8601 formatAdditional tools for applications, factors, policies, and more advanced operations are on the roadmap and will be added in future releases.
✅ Python 3.8+ installed on your machine
✅ Okta tenant with appropriate API access
✅ An MCP-compatible AI client (Claude Desktop, Microsoft Copilot Studio, etc.)
⚠️ Important Model Compatibility Note:
Not all AI models work with this MCP server. Testing has only been performed with:
- GPT-4.0
- Claude 3.7 Sonnet
- Google-2.5-pro
You must use latest model versions that explicitly support tool calling/function calling capabilities. Older models or models without tool calling support will not be able to interact with the Okta MCP Server.
The Okta MCP Server supports multiple AI providers through its flexible configuration system. This allows you to connect to various large language models based on your specific needs and existing access.
Provider | Environment Variable | Description |
---|---|---|
OpenAI | AI_PROVIDER=openai | Connect to OpenAI API with models like GPT-4o. Requires an OpenAI API key. |
Azure OpenAI | AI_PROVIDER=azure_openai | Use Azure-hosted OpenAI models with enhanced security and compliance features. |
Anthropic | AI_PROVIDER=anthropic | Connect to Anthropic's Claude models (primarily tested with Claude 3.7 Sonnet). |
Google Vertex AI | AI_PROVIDER=vertex_ai | Use Google's Gemini models via Vertex AI. Requires Google Cloud service account. |
OpenAI Compatible | AI_PROVIDER=openai_compatible | Connect to any OpenAI API-compatible endpoint, such as Fireworks.ai, Ollama, or other providers that implement the OpenAI API specification. |
# Clone the repository git clone https://github.com/fctr-id/okta-mcp-server.git cd okta-mcp-server # Create and activate a virtual environment python -m venv venv source venv/bin/activate # On Windows use: venv\Scripts\activate # Install dependencies pip install -r requirements.txt
⚠️ NOTICE: If you clone this repository anew or pull updates, always make sure to re-run
pip install -r requirements.txt
to ensure all dependencies are up-to-date.
Create a config file with your Okta settings:
To use the command line client (no memory), use the instructions below
# Copy the sample config cp .env.sample .env # Edit the env with your settings # Required: Okta domain and API token and LLM settings cd clients python mcp-cli-stdio-client.py
To use MCP hosts like Claude Code, vsCode ...etc find the json config below
The Okta MCP Server supports two transport protocols:
claude_desktop_config.json
:
Replace{ "mcpServers": { "okta-mcp-server": { "command": "DIR/okta-mcp-server/venv/Scripts/python", "args": [ "DIR/okta-mcp-server/main.py" ], "env": { "OKTA_CLIENT_ORGURL": "https://dev-1606.okta.com", "OKTA_API_TOKEN": "OKTA_API_TOKEN" } } } }
DIR
with your absolute directory path and OKTA_API_TOKEN
with your actual token# Run in SSE mode (requires explicit risk acknowledgment) python main.py --sse --iunderstandtherisks
⚠️ WARNING: SSE transport exposes your server via a web endpoint accessible to anyone who can reach your network. Use only in secure environments with proper network protections.
The Okta MCP Server provides Docker images for both transport types, offering containerized deployment options.
STDIO Transport (Recommended): For Claude Desktop or other MCP clients, configure to use the Docker container:
{ "mcpServers": { "okta-mcp-server": { "command": "docker", "args": [ "run", "-i", "--rm", "-e", "OKTA_CLIENT_ORGURL", "-e", "OKTA_API_TOKEN", "fctrid/okta-mcp-server-stdio:latest" ], "env": { "OKTA_CLIENT_ORGURL": "https://your-org.okta.com", "OKTA_API_TOKEN": "your_api_token" } } } }
SSE Transport (Advanced Use Only):
docker run -d --name okta-mcp-sse \
-p 3000:3000 \
-e OKTA_API_TOKEN=your_api_token \
-e OKTA_CLIENT_ORGURL=https://your-org.okta.com \
fctrid/okta-mcp-server-sse:latest
⚠️ Important Security Notes for Docker SSE:
- SSE transport in Docker exposes an unauthenticated HTTP endpoint with full Okta access
- Never expose the SSE port (3000) to the public internet
- Use only in secure, controlled network environments
- Claude Desktop and many other MCP clients do not support SSE transport - they require STDIO
- Consider using container orchestration platforms with proper network policies for production use
Current progress:
Future plans include:
Before raising an issue, check:
Still having problems? Open an issue on GitHub or email [email protected] (response times may vary)
Have an idea or suggestion? Open a feature request on GitHub!
Interested in contributing? We'd love to have you! Contact [email protected] for collaboration opportunities.
Check out License.md
for the fine print.
🌟 © 2025 Fctr Identity. All rights reserved. Made with ❤️ for the Okta and AI communities.