Google Antigravity Directory

The #1 directory for Google Antigravity prompts, rules, workflows & MCP servers. Optimized for Gemini 3 agentic development.

Resources

PromptsMCP ServersAntigravity RulesGEMINI.md GuideBest Practices

Company

Submit PromptAntigravityAI.directory

Popular Prompts

Next.js 14 App RouterReact TypeScriptTypeScript AdvancedFastAPI GuideDocker Best Practices

Legal

Privacy PolicyTerms of ServiceContact Us
Featured on FazierFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowAI ToolzShinyLaunchMillion Dot HomepageSolver ToolsFeatured on FazierFeatured on WayfindioAntigravity AI - Featured on Startup FameFeatured on Wired BusinessFeatured on Twelve ToolsListed on Turbo0Featured on findly.toolsFeatured on Aura++That App ShowAI ToolzShinyLaunchMillion Dot HomepageSolver Tools

© 2026 Antigravity AI Directory. All rights reserved.

The #1 directory for Google Antigravity IDE

This website is not affiliated with, endorsed by, or associated with Google LLC. "Google" and "Gemini" are trademarks of Google LLC.

Antigravity AI Directory
PromptsMCPBest PracticesUse CasesLearn
Home
MCP Servers
OneLogin MCP
1️⃣

OneLogin MCP MCP Server

Unified access management for enterprises.

oneloginssoidentityenterprise

About

## OneLogin MCP Server: Unified Access Management The **OneLogin MCP Server** integrates cloud identity management into Google Antigravity, enabling secure single sign-on, user provisioning, and adaptive authentication across enterprise applications. ### Why OneLogin MCP? - **SSO management** - Configure single sign-on for cloud and on-prem apps - **User provisioning** - Automate user lifecycle across connected apps - **SmartFactor Auth** - Adaptive MFA based on user and device context - **Directory sync** - Integrate with AD, LDAP, and HR systems - **Access reporting** - Audit user access and authentication events ### Key Features #### 1. User Provisioning ```python # Create user with mappings user = await mcp.call("onelogin", "create_user", { "email": "developer@company.com", "firstname": "Dev", "lastname": "User", "department": "Engineering", "title": "Software Engineer", "custom_attributes": { "team": "Platform", "manager_id": "mgr_123" } }) # Provision to connected apps await mcp.call("onelogin", "provision_user", { "user_id": user["id"], "apps": ["slack", "github", "aws"] }) ``` #### 2. Application Configuration ```python # Create SAML application app = await mcp.call("onelogin", "create_app", { "name": "Internal Dashboard", "connector_id": 110016, # SAML 2.0 connector "configuration": { "acs_url": "https://dashboard.company.com/saml/acs", "recipient": "https://dashboard.company.com/saml/acs", "audience": "https://dashboard.company.com" } }) # Assign roles to application await mcp.call("onelogin", "assign_role", { "app_id": app["id"], "role_id": "developers_role" }) ``` #### 3. SmartFactor Authentication ```python # Configure adaptive MFA await mcp.call("onelogin", "configure_smartfactor", { "policy_name": "High Security Apps", "conditions": { "risk_threshold": "medium", "new_device": True, "new_location": True }, "actions": { "require_mfa": True, "allowed_factors": ["OneLogin Protect", "OTP", "WebAuthn"] } }) # Get user risk score risk = await mcp.call("onelogin", "get_user_risk", { "user_id": user["id"], "include_factors": True }) print(f"Risk Score: {risk[\"score\"]}/100") ``` #### 4. Access Reporting ```python # Get authentication events events = await mcp.call("onelogin", "get_events", { "event_type_id": [5, 6], # Login success/failure "since": "2024-01-01T00:00:00Z", "user_id": user["id"] }) for event in events: print(f"{event[\"created_at\"]}: {event[\"event_type\"]}") print(f" App: {event[\"app_name\"]}, IP: {event[\"ip\"]}") # Generate access report report = await mcp.call("onelogin", "access_report", { "users": ["user_123", "user_456"], "include_apps": True, "include_roles": True }) ``` ### Configuration ```json { "mcpServers": { "onelogin": { "command": "npx", "args": ["-y", "@anthropic/mcp-onelogin"], "env": { "ONELOGIN_CLIENT_ID": "your-client-id", "ONELOGIN_CLIENT_SECRET": "your-client-secret", "ONELOGIN_REGION": "us" } } } } ``` ### Use Cases **Identity Automation**: Automate user provisioning from HR system events. **Application SSO**: Deploy single sign-on across all enterprise applications. **Adaptive Security**: Implement risk-based authentication policies. **Compliance Auditing**: Generate access reports for regulatory requirements. The OneLogin MCP Server streamlines identity management through intelligent automation.

Installation

Configuration
{
  "mcpServers": {
    "onelogin": {}
  }
}

How to Use

    Related MCP Servers

    🧰

    Toolhouse MCP

    Universal AI tool platform that equips your AI with production-ready capabilities. Execute code, browse the web, manage files, send emails, and more through a unified MCP interface.

    🔨

    Smithery Registry MCP

    The MCP server registry and discovery platform. Browse, search, and install MCP servers from the community. Find the perfect integrations for your AI development workflow.

    🔍

    MCP Inspector

    Official debugging and testing tool for MCP servers. Inspect server capabilities, test tool calls, validate responses, and debug protocol communication in real-time.

    ← Back to All MCP Servers