Google Antigravity Directory

The #1 directory for Google Antigravity prompts, rules, workflows & MCP servers. Optimized for Gemini 3 agentic development.

Resources

PromptsMCP ServersAntigravity RulesGEMINI.md GuideBest Practices

Company

Submit PromptAntigravityAI.directory

Popular Prompts

Next.js 14 App RouterReact TypeScriptTypeScript AdvancedFastAPI GuideDocker Best Practices

Legal

Privacy PolicyTerms of ServiceContact Us
Featured on FazierFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowAI ToolzShinyLaunchMillion Dot HomepageSolver ToolsFeatured on FazierFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowAI ToolzShinyLaunchMillion Dot HomepageSolver Tools

© 2026 Antigravity AI Directory. All rights reserved.

The #1 directory for Google Antigravity IDE

This website is not affiliated with, endorsed by, or associated with Google LLC. "Google" and "Gemini" are trademarks of Google LLC.

Antigravity AI Directory
PromptsMCPBest PracticesUse CasesLearn
Home
MCP Servers
JumpCloud MCP
☁️

JumpCloud MCP MCP Server

Directory platform for identity and device management.

jumpclouddirectoryidentitydevices

About

## JumpCloud MCP Server: Unified Identity and Access Management The **JumpCloud MCP Server** integrates cloud directory services into Google Antigravity, enabling administrators to manage users, devices, and access policies across cloud and on-premise resources from a single platform. ### Why JumpCloud MCP? - **User management** - Create and manage user identities across all systems - **Device management** - Control endpoints including Mac, Windows, and Linux - **SSO configuration** - Set up single sign-on for cloud applications - **Policy enforcement** - Deploy security policies across the organization - **MFA management** - Configure and enforce multi-factor authentication ### Key Features #### 1. User Administration ```python # Create new user user = await mcp.call("jumpcloud", "create_user", { "email": "newuser@company.com", "username": "newuser", "firstname": "New", "lastname": "User", "department": "Engineering", "job_title": "Software Engineer" }) # Add to groups await mcp.call("jumpcloud", "add_to_group", { "user_id": user["id"], "groups": ["engineering", "developers"] }) # Enable MFA await mcp.call("jumpcloud", "configure_mfa", { "user_id": user["id"], "require_mfa": True, "mfa_methods": ["totp", "push"] }) ``` #### 2. Device Management ```python # List managed devices devices = await mcp.call("jumpcloud", "list_devices", { "os_family": ["Mac OS X", "Windows"], "active": True }) for device in devices: print(f"{device[\"displayName\"]} - {device[\"os\"]} {device[\"version\"]}") print(f" User: {device[\"primaryUser\"]}") print(f" Compliant: {device[\"compliant\"]}") # Apply device policy await mcp.call("jumpcloud", "apply_policy", { "device_id": "device_xxx", "policies": ["disk-encryption", "firewall-enabled"] }) ``` #### 3. SSO Application Management ```python # Configure SSO application app = await mcp.call("jumpcloud", "create_sso_app", { "name": "Slack", "type": "saml", "sso_url": "https://slack.com/sso/saml", "entity_id": "https://slack.com", "acs_url": "https://company.slack.com/sso/saml" }) # Assign users to application await mcp.call("jumpcloud", "assign_app_users", { "app_id": app["id"], "user_groups": ["all-employees"] }) ``` #### 4. Security Policies ```python # Create password policy await mcp.call("jumpcloud", "create_policy", { "name": "Strong Password Policy", "type": "password", "settings": { "min_length": 12, "require_uppercase": True, "require_numbers": True, "require_symbols": True, "max_age_days": 90, "prevent_reuse": 12 } }) # Get compliance report report = await mcp.call("jumpcloud", "compliance_report", { "policies": ["disk-encryption", "password-policy"], "include_non_compliant": True }) ``` ### Configuration ```json { "mcpServers": { "jumpcloud": { "command": "npx", "args": ["-y", "@anthropic/mcp-jumpcloud"], "env": { "JUMPCLOUD_API_KEY": "your-api-key", "JUMPCLOUD_ORG_ID": "your-org-id" } } } } ``` ### Use Cases **Employee Onboarding**: Automate user creation with group assignments and device provisioning. **Access Reviews**: Audit user permissions and group memberships for compliance. **Device Security**: Enforce encryption, firewall, and security policies across all endpoints. **SSO Deployment**: Configure single sign-on for cloud applications organization-wide. The JumpCloud MCP Server centralizes identity and access management in your development workflow.

Installation

Configuration
{
  "mcpServers": {
    "jumpcloud": {}
  }
}

How to Use

    Related MCP Servers

    🧰

    Toolhouse MCP

    Universal AI tool platform that equips your AI with production-ready capabilities. Execute code, browse the web, manage files, send emails, and more through a unified MCP interface.

    🔨

    Smithery Registry MCP

    The MCP server registry and discovery platform. Browse, search, and install MCP servers from the community. Find the perfect integrations for your AI development workflow.

    🔍

    MCP Inspector

    Official debugging and testing tool for MCP servers. Inspect server capabilities, test tool calls, validate responses, and debug protocol communication in real-time.

    ← Back to All MCP Servers