fctr-okta
MCP server for Okta with agentic API discovery and guided code execution
claude mcp add --transport stdio fctr-identity-fctr-okta-mcp-server python -m fctr_okta_mcp.server --http-transport --i-understand-the-risks \ --env MCP_BASE_URL="http://127.0.0.1:8000" \ --env TOKEN_METHOD="API_TOKEN or OAUTH2" \ --env OKTA_API_TOKEN="your-api-token-if-API_TOKEN" \ --env ENABLE_AGENT_MODE="false" \ --env OKTA_CLIENT_ORGURL="https://your-okta-org.okta.com" \ --env OKTA_MCP_LOG_LEVEL="INFO" \ --env OKTA_OAUTH2_SCOPES="okta.users.read okta.groups.read okta.apps.read" \ --env OKTA_CONCURRENT_LIMIT="10" \ --env OKTA_OAUTH2_CLIENT_ID="your-client-id-if-OAUTH2" \ --env OKTA_OAUTH2_PRIVATE_KEY_PEM="-----BEGIN PRIVATE KEY-----\n...\n-----END PRIVATE KEY-----" \ --env OKTA_MCP_EXECUTION_TIMEOUT_SECONDS="300"
How to use
This MCP server provides a secure, dual-mode interface to Okta resources for AI-assisted querying. It supports standard MCP mode where tools are exposed directly to the language model (e.g., read_system_instructions, okta_* tools, and execute_code), as well as an agent mode where the AI discovers and composes operations dynamically. Transport is HTTP for remote deployments or STDIO for local desktop workflows. To start with HTTP, run the server in Python (via uv or directly) and point your MCP client to the base URL exposed by the server. The available tools include Okta-specific operations for users, groups, and apps, plus code-execution capabilities to produce rich results (CSV export is supported), all within a sandboxed environment for safety.
How to install
Prerequisites:
- Python 3.8+ installed
- Git installed
- Optional: uv (if you prefer running via uv) or Docker if you want containerized deployment
Step-by-step:
-
Clone the repository git clone https://github.com/fctr-id/fctr-okta-mcp-server.git cd fctr-okta-mcp-server
-
Create a virtual environment and activate it (recommended) python -m venv .venv source .venv/bin/activate # macOS/Linux ./.venv\Scripts\activate # Windows
-
Install the package in editable mode pip install -e .
-
Prepare configuration
- Copy the sample environment file if provided and edit as needed cp .env.sample .env
- Ensure Okta credentials and transport options are set in the environment
-
Run the server (HTTP transport) python -m fctr_okta_mcp.server --http-transport --i-understand-the-risks
Optional (Docker):
- Build and run a container for STDIO or HTTP modes as shown in the project docs. Ensure environment variables are provided to the container via -e flags or a mounted .env file.
Additional notes
Tips and common issues:
- Ensure ENABLE_AGENT_MODE is set according to your security needs; agent mode discovers APIs dynamically and may expose more surface area.
- For production, prefer OAuth2 with Private Key JWT (OKTA_OAUTH2_PRIVATE_KEY_PEM) and limit tokens appropriately.
- If you encounter transport binding errors, verify MCP_BASE_URL and network connectivity between client and server.
- CSV export can be used to generate reports from query results; confirm file write permissions for the server process.
- If running in Docker, remember to map volumes for logs and results to prevent data loss across restarts.
Related MCP Servers
Dive
Dive is an open-source MCP Host Desktop Application that seamlessly integrates with any LLMs supporting function calling capabilities. ✨
okta
The Okta MCP Server is a groundbreaking tool built by the team at Fctr that enables AI models to interact directly with your Okta environment using the Model Context Protocol (MCP). Built specifically for IAM engineers, security teams, and Okta administrators, it implements the MCP specification to help work with Okta enitities
codelogic
An MCP Server to utilize Codelogic's rich software dependency data in your AI programming assistant.
packt-netops-ai-workshop
🔧 Build Intelligent Networks with AI
muxi
An extensible AI agents framework
MCP-PST
渗透工具MCP Server,旨在让AI-Agent或AI客户端能够无缝地调用 Windows 环境中的各种渗透测试工具。A lightweight MCP server tool designed to let AI agents or clients seamlessly invoke various penetration testing tools in a Windows environment.