Google Antigravity Directory

The #1 directory for Google Antigravity prompts, rules, workflows & MCP servers. Optimized for Gemini 3 agentic development.

Resources

PromptsMCP ServersAntigravity RulesGEMINI.md GuideBest Practices

Company

Submit PromptAntigravityAI.directory

Popular Prompts

Next.js 14 App RouterReact TypeScriptTypeScript AdvancedFastAPI GuideDocker Best Practices

Legal

Privacy PolicyTerms of ServiceContact Us
Featured on FazierVerified on Verified ToolsFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowFeatured on FazierVerified on Verified ToolsFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App Show

© 2026 Antigravity AI Directory. All rights reserved.

The #1 directory for Google Antigravity IDE

This website is not affiliated with, endorsed by, or associated with Google LLC. "Google" and "Gemini" are trademarks of Google LLC.

Antigravity AI Directory
PromptsMCPBest PracticesUse CasesLearn
Home
MCP Servers
Okta MCP
🔐

Okta MCP MCP Server

Identity and access management platform.

oktaidentityssoauth

About

## Okta MCP Server: Enterprise Identity Management The **Okta MCP Server** integrates the leading identity platform into Google Antigravity, enabling administrators to manage users, applications, and authentication policies for enterprise single sign-on and identity governance. ### Why Okta MCP? - **User lifecycle** - Automate user provisioning and deprovisioning - **Application management** - Configure SSO for thousands of applications - **Authentication policies** - Define adaptive MFA and access policies - **Directory integration** - Sync with Active Directory and LDAP - **API access management** - Secure APIs with OAuth 2.0 and OIDC ### Key Features #### 1. User Management ```python # Create new user with profile user = await mcp.call("okta", "create_user", { "profile": { "firstName": "Jane", "lastName": "Smith", "email": "jsmith@company.com", "login": "jsmith@company.com", "department": "Engineering", "title": "Senior Developer" }, "credentials": { "password": {"value": "TempP@ss123!"} }, "groupIds": ["eng_group_id"] }) # Activate user await mcp.call("okta", "activate_user", { "user_id": user["id"], "send_email": True }) ``` #### 2. Application Assignment ```python # List available applications apps = await mcp.call("okta", "list_applications", { "filter": "status eq \"ACTIVE\"", "limit": 50 }) # Assign user to applications for app_id in ["slack_app", "github_app", "jira_app"]: await mcp.call("okta", "assign_user_to_app", { "app_id": app_id, "user_id": user["id"], "profile": {"role": "developer"} }) ``` #### 3. Group Management ```python # Create group with rules group = await mcp.call("okta", "create_group", { "profile": { "name": "Engineering Team", "description": "All engineering department members" } }) # Add group rule for auto-assignment await mcp.call("okta", "create_group_rule", { "name": "Auto-add engineers", "conditions": { "expression": { "value": "user.department==\"Engineering\"" } }, "actions": { "assignUserToGroups": {"groupIds": [group["id"]]} } }) ``` #### 4. Authentication Policies ```python # Create MFA policy policy = await mcp.call("okta", "create_policy", { "name": "Require MFA for Admins", "type": "MFA_ENROLL", "conditions": { "people": { "groups": {"include": ["admin_group"]} } }, "settings": { "factors": { "okta_otp": {"enroll": {"self": "REQUIRED"}}, "okta_push": {"enroll": {"self": "OPTIONAL"}} } } }) # Add authentication rule await mcp.call("okta", "create_auth_rule", { "policy_id": policy["id"], "name": "Always require MFA", "conditions": {"network": {"connection": "ANYWHERE"}}, "actions": {"signon": {"requireFactor": True}} }) ``` ### Configuration ```json { "mcpServers": { "okta": { "command": "npx", "args": ["-y", "@anthropic/mcp-okta"], "env": { "OKTA_ORG_URL": "https://your-org.okta.com", "OKTA_API_TOKEN": "your-api-token" } } } } ``` ### Use Cases **Employee Onboarding**: Automate user creation and app assignments for new hires. **Access Reviews**: Audit user permissions and group memberships regularly. **SSO Deployment**: Configure single sign-on for enterprise applications. **Security Policies**: Enforce MFA and conditional access based on risk. The Okta MCP Server brings enterprise identity management into your development workflow.

Installation

Configuration
{
  "mcpServers": {
    "okta": {}
  }
}

How to Use

    Related MCP Servers

    🧰

    Toolhouse MCP

    Universal AI tool platform that equips your AI with production-ready capabilities. Execute code, browse the web, manage files, send emails, and more through a unified MCP interface.

    🔨

    Smithery Registry MCP

    The MCP server registry and discovery platform. Browse, search, and install MCP servers from the community. Find the perfect integrations for your AI development workflow.

    🔍

    MCP Inspector

    Official debugging and testing tool for MCP servers. Inspect server capabilities, test tool calls, validate responses, and debug protocol communication in real-time.

    ← Back to All MCP Servers