MCP Hub
Back to servers

Zitadel MCP

Enables faster, cleaner integration with Zitadel for user authentication.

glama
Forks
1
Updated
Feb 17, 2026

Zitadel MCP Server

An MCP (Model Context Protocol) server for Zitadel identity management. Manage users, projects, applications, roles, and service accounts through natural language from AI tools like Claude Code.

"Create a user for jane@example.com, assign her the app:finance role, and give me the auth config." — That's three tool calls the AI handles for you.

Tools (25)

CategoryToolDescription
Userszitadel_list_usersList/search users
zitadel_get_userGet user details
zitadel_create_userCreate user (sends invite email)
zitadel_deactivate_userDeactivate user
zitadel_reactivate_userReactivate user
Projectszitadel_list_projectsList projects
zitadel_get_projectGet project details
zitadel_create_projectCreate project
Applicationszitadel_list_appsList apps in a project
zitadel_get_appGet app details + Client ID
zitadel_create_oidc_appCreate OIDC application
zitadel_update_appUpdate app (redirect URIs, etc.)
Roleszitadel_list_project_rolesList roles in a project
zitadel_create_project_roleCreate a role (e.g., app:finance)
zitadel_list_user_grantsList user's role grants
zitadel_create_user_grantAssign roles to user
zitadel_remove_user_grantRemove role grant
Service Accountszitadel_create_service_userCreate machine user
zitadel_create_service_user_keyGenerate key pair
zitadel_list_service_user_keysList keys (metadata only)
Organizationszitadel_get_orgGet current org details
zitadel_list_orgsList organizations
Utilityzitadel_get_auth_configGet .env.local template for an app
Portalportal_register_appRegister app in portal DB
portal_setup_full_appOne-click: Zitadel + portal setup

Portal tools (portal_*) are only available when PORTAL_DATABASE_URL is configured.

Prerequisites

  1. A Zitadel instance (Cloud or self-hosted)
  2. A service account with Org Owner or IAM Admin role
  3. A JSON key for the service account

Creating a Service Account

  1. In the Zitadel Console, go to Users > Service Users > New
  2. Give it a name (e.g., mcp-admin) and select Bearer token type
  3. Go to the service user's Keys tab > New > JSON
  4. Save the downloaded key file — you'll need the userId, keyId, and base64-encoded key
  5. Grant the service account the Org Owner role under Organization > Authorizations

Setup

git clone https://github.com/takleb3rry/zitadel-mcp.git
cd zitadel-mcp
npm install
npm run build

Configuration

Add the server to your MCP client config. The JSON block below works for both options:

  • Global (all projects): ~/.claude.json under the "mcpServers" key
  • Per-project: .mcp.json in the project root
{
  "mcpServers": {
    "zitadel": {
      "command": "node",
      "args": ["/path/to/zitadel-mcp/build/index.js"],
      "env": {
        "ZITADEL_ISSUER": "https://your-instance.zitadel.cloud",
        "ZITADEL_SERVICE_ACCOUNT_USER_ID": "...",
        "ZITADEL_SERVICE_ACCOUNT_KEY_ID": "...",
        "ZITADEL_SERVICE_ACCOUNT_PRIVATE_KEY": "...",
        "ZITADEL_ORG_ID": "...",
        "ZITADEL_PROJECT_ID": "..."
      }
    }
  }
}

Restart Claude Code after adding the config. The Zitadel tools will appear automatically.

Environment Variables

VariableRequiredDescription
ZITADEL_ISSUERYesZitadel instance URL
ZITADEL_SERVICE_ACCOUNT_USER_IDYesService account user ID
ZITADEL_SERVICE_ACCOUNT_KEY_IDYesKey ID from the JSON key file
ZITADEL_SERVICE_ACCOUNT_PRIVATE_KEYYesBase64-encoded RSA private key (the key field from the downloaded JSON)
ZITADEL_ORG_IDYesOrganization ID
ZITADEL_PROJECT_IDNoDefault project ID for role operations
PORTAL_DATABASE_URLNoPostgres connection string (enables portal tools)
LOG_LEVELNoDEBUG, INFO, WARN, ERROR (default: INFO)

Security

This server has admin-level access to your Zitadel instance. Understand what that means before using it:

  • The service account needs Org Owner (or IAM Admin for zitadel_list_orgs). It can create users, modify roles, and manage applications in your organization.
  • When you create an OIDC app (zitadel_create_oidc_app), the client secret is returned in the tool response. It is only available at creation time. The AI assistant (and its conversation history) will see it — save it immediately and treat it as sensitive.
  • When you generate a service account key (zitadel_create_service_user_key), the full private key is returned in the tool response. Same caveat: save it, and be aware it's visible in your MCP client's conversation.
  • All tool arguments containing PII (email, name, URLs) are redacted from debug logs. IDs and tool names are still logged.
  • All Zitadel IDs are validated against an alphanumeric format before being used in API paths.

Note for new users: I've scanned all source files in this repo and found nothing notable, but I always recommend you have your own AI or tooling audit the code before installing any MCP server that gets access to your infrastructure. The full source is ~800 lines of TypeScript — a quick review shouldn't take long.

Development

npm run dev    # Run with tsx (hot reload)
npm run build  # Compile TypeScript
npm start      # Run compiled version
npm test       # Run tests

License

MIT

Reviews

No reviews yet

Sign in to write a review