Identity and access management platform.
## Okta MCP Server: Enterprise Identity Management The **Okta MCP Server** integrates the leading identity platform into Google Antigravity, enabling administrators to manage users, applications, and authentication policies for enterprise single sign-on and identity governance. ### Why Okta MCP? - **User lifecycle** - Automate user provisioning and deprovisioning - **Application management** - Configure SSO for thousands of applications - **Authentication policies** - Define adaptive MFA and access policies - **Directory integration** - Sync with Active Directory and LDAP - **API access management** - Secure APIs with OAuth 2.0 and OIDC ### Key Features #### 1. User Management ```python # Create new user with profile user = await mcp.call("okta", "create_user", { "profile": { "firstName": "Jane", "lastName": "Smith", "email": "jsmith@company.com", "login": "jsmith@company.com", "department": "Engineering", "title": "Senior Developer" }, "credentials": { "password": {"value": "TempP@ss123!"} }, "groupIds": ["eng_group_id"] }) # Activate user await mcp.call("okta", "activate_user", { "user_id": user["id"], "send_email": True }) ``` #### 2. Application Assignment ```python # List available applications apps = await mcp.call("okta", "list_applications", { "filter": "status eq \"ACTIVE\"", "limit": 50 }) # Assign user to applications for app_id in ["slack_app", "github_app", "jira_app"]: await mcp.call("okta", "assign_user_to_app", { "app_id": app_id, "user_id": user["id"], "profile": {"role": "developer"} }) ``` #### 3. Group Management ```python # Create group with rules group = await mcp.call("okta", "create_group", { "profile": { "name": "Engineering Team", "description": "All engineering department members" } }) # Add group rule for auto-assignment await mcp.call("okta", "create_group_rule", { "name": "Auto-add engineers", "conditions": { "expression": { "value": "user.department==\"Engineering\"" } }, "actions": { "assignUserToGroups": {"groupIds": [group["id"]]} } }) ``` #### 4. Authentication Policies ```python # Create MFA policy policy = await mcp.call("okta", "create_policy", { "name": "Require MFA for Admins", "type": "MFA_ENROLL", "conditions": { "people": { "groups": {"include": ["admin_group"]} } }, "settings": { "factors": { "okta_otp": {"enroll": {"self": "REQUIRED"}}, "okta_push": {"enroll": {"self": "OPTIONAL"}} } } }) # Add authentication rule await mcp.call("okta", "create_auth_rule", { "policy_id": policy["id"], "name": "Always require MFA", "conditions": {"network": {"connection": "ANYWHERE"}}, "actions": {"signon": {"requireFactor": True}} }) ``` ### Configuration ```json { "mcpServers": { "okta": { "command": "npx", "args": ["-y", "@anthropic/mcp-okta"], "env": { "OKTA_ORG_URL": "https://your-org.okta.com", "OKTA_API_TOKEN": "your-api-token" } } } } ``` ### Use Cases **Employee Onboarding**: Automate user creation and app assignments for new hires. **Access Reviews**: Audit user permissions and group memberships regularly. **SSO Deployment**: Configure single sign-on for enterprise applications. **Security Policies**: Enforce MFA and conditional access based on risk. The Okta MCP Server brings enterprise identity management into your development workflow.
{
"mcpServers": {
"okta": {}
}
}