keycloak-mcp-server

M0-AR/keycloak-mcp-server

3.2

If you are the rightful owner of keycloak-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.

The Keycloak Model Context Protocol Server is a comprehensive tool for managing Keycloak instances through AI assistants, offering over 30 tools for efficient administration.

Tools
  1. create-user

    Creates a new user in a specified realm.

  2. update-user

    Updates user information such as email and names.

  3. delete-user

    Deletes a user from a realm.

  4. list-users

    Lists all users in a realm.

  5. search-users

    Searches for users with specific filters.

Keycloak Model Context Protocol Server

A comprehensive Model Context Protocol (MCP) server for Keycloak administration, providing 80+ tools to manage users, realms, clients, roles, groups, sessions, events, organizations, protocol mappers, user attributes, client scopes, and identity providers directly from AI assistants like Claude Desktop or Cursor AI.

๐Ÿš€ Features

๐Ÿ‘ค User Management

  • โœ… Create, update, and delete users
  • โœ… List, search, and get user details
  • โœ… Reset user passwords
  • โœ… Logout user sessions
  • โœ… Manage user roles and groups
  • โœ… NEW: User attributes management (critical for organization data)

๐Ÿ›๏ธ Realm Management

  • โœ… List, create, update, and delete realms
  • โœ… Get detailed realm settings and configurations
  • โœ… Manage realm-level security policies

๐Ÿ”ง Client Management

  • โœ… Register, update, and delete clients/applications
  • โœ… List all clients in realms
  • โœ… Configure client settings and redirect URIs
  • โœ… NEW: Protocol mappers management (critical for JWT claims)

๐ŸŽญ Role Management

  • โœ… Create, update, and delete roles (realm and client-level)
  • โœ… Assign and remove roles from users and groups
  • โœ… List all roles and user role assignments
  • โœ… NEW: Composite roles and role hierarchies
  • โœ… NEW: Advanced role operations by ID
  • โœ… NEW: Find users with specific roles

๐Ÿ‘ฅ Group Management

  • โœ… Create, update, and delete user groups
  • โœ… Add and remove users from groups
  • โœ… Manage hierarchical group structures
  • โœ… NEW: Group attributes management
  • โœ… NEW: Child groups and subgroup management
  • โœ… NEW: Group member listing and management

๐Ÿข Organization Management โญ NEW

  • โœ… Create, update, and delete organizations
  • โœ… Add and remove organization members
  • โœ… List organizations and members
  • โœ… Organization attributes management

๐Ÿ”— Identity Provider Management โญ NEW

  • โœ… Create, update, and delete identity providers (SSO)
  • โœ… Identity provider mapper management
  • โœ… SAML and OIDC provider configuration
  • โœ… External user attribute mapping

๐ŸŽฏ Client Scopes Management โญ NEW

  • โœ… Create, update, and delete client scopes
  • โœ… Protocol mappers for client scopes
  • โœ… Token scope management

๐Ÿ“Š Session & Event Management

  • โœ… List active user sessions
  • โœ… Monitor authentication and admin events
  • โœ… Clear event logs and manage session lifecycles

๐Ÿ›ก๏ธ Advanced Features

  • โœ… Bulletproof authentication with fresh client instances
  • โœ… Comprehensive error handling with detailed logging
  • โœ… Cross-platform support (Windows, macOS, Linux)
  • โœ… Production-ready with TypeScript and robust architecture
  • โœ… Organization JWT Claims - Solve organization visibility in tokens
  • โœ… 80+ Tools - Complete Keycloak administration coverage

๐Ÿ“‹ Prerequisites

  • Node.js 18 or higher
  • Running Keycloak instance (local or remote)
  • Keycloak admin credentials with appropriate permissions
  • AI Assistant that supports MCP (Claude Desktop, Cursor AI, etc.)

๐Ÿ“ฆ Installation

Global Installation (Recommended)

npm install -g keycloak-mcp-server

Using NPX (No Installation Required)

npx keycloak-mcp-server

Local Project Installation

npm install keycloak-mcp-server

Local Development

git clone https://github.com/M0-AR/keycloak-mcp-server.git
cd keycloak-mcp-server
npm install
npm run build

โš™๏ธ Configuration

For Cursor AI

Add to your Cursor MCP configuration file (~/.cursor/mcp.json):

Option 1: Using NPX (Recommended)
{
  "mcpServers": {
    "keycloak": {
      "command": "npx",
      "args": ["keycloak-mcp-server"],
      "env": {
        "KEYCLOAK_URL": "https://your-keycloak-instance.com",
        "KEYCLOAK_ADMIN": "your-admin-username",
        "KEYCLOAK_ADMIN_PASSWORD": "your-admin-password"
      }
    }
  }
}
Option 2: If Installed Globally
{
  "mcpServers": {
    "keycloak": {
      "command": "keycloak-mcp-server",
      "env": {
        "KEYCLOAK_URL": "https://your-keycloak-instance.com", 
        "KEYCLOAK_ADMIN": "your-admin-username",
        "KEYCLOAK_ADMIN_PASSWORD": "your-admin-password"
      }
    }
  }
}

For Claude Desktop

Add to your Claude Desktop configuration:

macOS: ~/Library/Application Support/Claude/claude_desktop_config.json Windows: %APPDATA%\Claude\claude_desktop_config.json

{
  "mcpServers": {
    "keycloak": {
      "command": "npx",
      "args": ["keycloak-mcp-server"],
      "env": {
        "KEYCLOAK_URL": "https://your-keycloak-instance.com",
        "KEYCLOAK_ADMIN": "your-admin-username",
        "KEYCLOAK_ADMIN_PASSWORD": "your-admin-password"
      }
    }
  }
}

๐ŸŒ Environment Variables

VariableDescriptionDefaultRequired
KEYCLOAK_URLThe base URL of your Keycloak instancehttp://localhost:8080โœ…
KEYCLOAK_ADMINAdmin usernameadminโœ…
KEYCLOAK_ADMIN_PASSWORDAdmin passwordadminโœ…

๏ฟฝ๏ฟฝ๏ธ Available Tools (80+ Tools)

๐Ÿ‘ค User Management Tools

create-user

Creates a new user in a specified realm.

Create a user in "master" realm: username "john.doe", email "john@example.com", first name "John", last name "Doe"
update-user

Updates user information (email, names, enabled status).

Update user "user-id-123" in "master" realm to change email to "newemail@example.com"
delete-user

Deletes a user from a realm.

Delete user with ID "user-id-123" from "master" realm
list-users

Lists all users in a realm.

List all users in the "master" realm
search-users

Search users with filters (username, email, firstName, lastName).

Search for users with email containing "wateen.io" in "master" realm, limit 10 results
get-user

Get detailed information about a specific user.

Get details for user ID "user-id-123" in "master" realm
reset-user-password

Reset a user's password.

Reset password for user "user-id-123" in "master" realm to "newPassword123", make it temporary
logout-user

Logout all sessions for a specific user.

Logout all sessions for user "user-id-123" in "master" realm
set-user-attributes โญ NEW

Set user attributes (critical for organization data storage).

Set organization attribute for user "user-id-123" in "master" realm: {"organization": ["wateen-corp"]}
get-user-attributes โญ NEW

Get user attributes including unmanaged attributes.

Get all attributes for user "user-id-123" in "master" realm

๐Ÿ›๏ธ Realm Management Tools

list-realms

Lists all available realms.

Show me all available realms in Keycloak
create-realm

Creates a new realm with configurable settings.

Create a new realm called "company" with display name "Company Realm", enabled
update-realm

Updates realm settings and configurations.

Update realm "company" to change display name to "Updated Company"
delete-realm

Deletes an existing realm.

Delete the realm "test-realm"
get-realm-settings

Retrieves detailed settings of a realm.

Get detailed settings for the "master" realm

๐Ÿ”ง Client Management Tools

create-client

Registers a new client/application in a realm.

Create client "my-app" in "master" realm with redirect URIs ["http://localhost:3000/*"]
update-client

Updates client settings (redirect URIs, protocol mappers, etc.).

Update client "my-app" in "master" realm to add new redirect URI "https://app.example.com/*"
delete-client

Removes a client from a realm.

Delete client "old-app" from "master" realm
list-clients

Lists all clients in a realm.

List all clients in the "master" realm
create-protocol-mapper โญ NEW

Create protocol mappers for clients (critical for JWT organization claims).

Create organization group mapper for client "my-app" in "master" realm to include "organization" claim in JWT
update-protocol-mapper โญ NEW

Update existing protocol mappers.

Update protocol mapper "mapper-id-123" for client "my-app" in "master" realm
delete-protocol-mapper โญ NEW

Delete protocol mappers from clients.

Delete protocol mapper "mapper-id-123" from client "my-app" in "master" realm
list-protocol-mappers โญ NEW

List all protocol mappers for a client.

List all protocol mappers for client "my-app" in "master" realm

๐ŸŽฏ Client Scopes Management Tools โญ NEW

create-client-scope

Create a new client scope for managing token scopes.

Create client scope "organization-scope" in "master" realm for organization claims
update-client-scope

Update existing client scope.

Update client scope "scope-id-123" in "master" realm to change description
delete-client-scope

Delete a client scope.

Delete client scope "scope-id-123" from "master" realm
list-client-scopes

List all client scopes in a realm.

List all client scopes in the "master" realm
get-client-scope

Get details of a specific client scope.

Get details for client scope "scope-id-123" in "master" realm
create-client-scope-protocol-mapper โญ NEW

Create protocol mappers for client scopes.

Create organization mapper for client scope "organization-scope" in "master" realm
update-client-scope-protocol-mapper โญ NEW

Update protocol mappers in client scopes.

Update protocol mapper "mapper-id-123" in client scope "scope-id-456" in "master" realm
delete-client-scope-protocol-mapper โญ NEW

Delete protocol mappers from client scopes.

Delete protocol mapper "mapper-id-123" from client scope "scope-id-456" in "master" realm
list-client-scope-protocol-mappers โญ NEW

List protocol mappers for a client scope.

List all protocol mappers for client scope "scope-id-123" in "master" realm

๐Ÿข Organization Management Tools โญ NEW

create-organization

Create a new organization.

Create organization "wateen-corp" with description "Wateen Corporation" in "master" realm
update-organization

Update existing organization.

Update organization "org-id-123" in "master" realm to change name to "Updated Corp"
delete-organization

Delete an organization.

Delete organization "org-id-123" from "master" realm
list-organizations

List all organizations in a realm.

List all organizations in "master" realm with search "wateen", limit 10
get-organization

Get details of a specific organization.

Get details for organization "org-id-123" in "master" realm
add-organization-member

Add a user to an organization.

Add user "user-id-123" to organization "org-id-456" in "master" realm
remove-organization-member

Remove a user from an organization.

Remove user "user-id-123" from organization "org-id-456" in "master" realm
list-organization-members

List all members of an organization.

List all members of organization "org-id-123" in "master" realm, limit 20

๐ŸŽญ Role Management Tools

create-role

Creates roles at realm or client level.

Create a realm role "manager" with description "Manager role" in "master" realm
update-role

Modifies role attributes.

Update role "manager" in "master" realm to change description to "Updated manager role"
delete-role

Deletes roles.

Delete role "old-role" from "master" realm
list-roles

Lists all roles in a realm.

List all roles in the "master" realm
assign-role-to-user

Assigns a role to a user.

Assign role "manager" to user "user-id-123" in "master" realm
remove-role-from-user

Removes a role from a user.

Remove role "manager" from user "user-id-123" in "master" realm
get-user-roles

Gets all roles assigned to a user.

Get all roles for user "user-id-123" in "master" realm
create-composite-role โญ NEW

Create composite roles (role hierarchies).

Create composite role from "parent-role-id" with child roles ["child-role-1", "child-role-2"] in "master" realm
get-composite-roles โญ NEW

Get composite roles for a role.

Get composite roles for role "role-id-123" in "master" realm, limit 10
delete-composite-roles โญ NEW

Delete composite roles from a role.

Remove composite roles ["child-role-1", "child-role-2"] from role "parent-role-id" in "master" realm
get-role-by-id โญ NEW

Get role details by ID.

Get role details for role ID "role-id-123" in "master" realm
update-role-by-id โญ NEW

Update role by ID.

Update role "role-id-123" in "master" realm to change name to "new-role-name"
delete-role-by-id โญ NEW

Delete role by ID.

Delete role with ID "role-id-123" from "master" realm
find-users-with-role โญ NEW

Find users with a specific role.

Find all users with role "manager" in "master" realm, limit 20
assign-role-to-group โญ NEW

Assign a role to a group.

Assign role "developer" to group "group-id-123" in "master" realm
remove-role-from-group โญ NEW

Remove a role from a group.

Remove role "developer" from group "group-id-123" in "master" realm
get-group-roles โญ NEW

Get roles assigned to a group.

Get all roles for group "group-id-123" in "master" realm
list-available-group-roles โญ NEW

List available roles for a group.

List available roles for group "group-id-123" in "master" realm
list-composite-group-roles โญ NEW

List composite roles for a group.

List composite roles for group "group-id-123" in "master" realm

๐Ÿ‘ฅ Group Management Tools

create-group

Creates user groups.

Create a group called "developers" in "master" realm
update-group

Updates group attributes.

Update group "group-id-123" in "master" realm to change name to "senior-developers"
delete-group

Deletes groups.

Delete group "group-id-123" from "master" realm
list-groups

Lists all groups in a realm.

List all groups in the "master" realm
manage-user-groups

Adds or removes users from groups.

Add user "user-id-123" to group "group-id-456" in "master" realm
set-group-attributes โญ NEW

Set group attributes (organization metadata).

Set organization attributes for group "group-id-123" in "master" realm: {"department": ["engineering"]}
get-group-attributes โญ NEW

Get group attributes.

Get all attributes for group "group-id-123" in "master" realm
create-child-group โญ NEW

Create a child group (subgroup).

Create child group "junior-devs" under parent group "group-id-123" in "master" realm
list-sub-groups โญ NEW

List subgroups of a parent group.

List subgroups of parent group "group-id-123" in "master" realm, limit 10
list-group-members โญ NEW

List members of a group.

List all members of group "group-id-123" in "master" realm, limit 20

๐Ÿ”— Identity Provider Management Tools โญ NEW

create-identity-provider

Create a new identity provider for SSO integration.

Create SAML identity provider "company-saml" in "master" realm with SSO URL and certificate
update-identity-provider

Update an existing identity provider.

Update identity provider "company-saml" in "master" realm to change display name
delete-identity-provider

Delete an identity provider.

Delete identity provider "old-saml" from "master" realm
list-identity-providers

List all identity providers in a realm.

List all identity providers in "master" realm
get-identity-provider

Get details of a specific identity provider.

Get details for identity provider "company-saml" in "master" realm
create-identity-provider-mapper

Create a mapper for identity provider (external user mapping).

Create user attribute mapper for identity provider "company-saml" in "master" realm
update-identity-provider-mapper

Update an identity provider mapper.

Update mapper "mapper-id-123" for identity provider "company-saml" in "master" realm

๐Ÿ“Š Session & Event Management Tools

list-sessions

Lists all active sessions in a realm.

List all active sessions in "master" realm
get-user-sessions

Lists active sessions for a specific user.

Get active sessions for user "user-id-123" in "master" realm
list-events

Retrieves authentication and admin events.

List last 10 events in "master" realm
clear-events

Clears event logs.

Clear all events in "master" realm

๐Ÿงช Testing & Development

Testing with MCP Inspector

npx @modelcontextprotocol/inspector npx keycloak-mcp-server

Visit http://localhost:6274 to test all 80+ tools interactively.

Local Development

npm run watch    # Auto-rebuild on changes
npm run dev     # Test server directly

Stress Testing

The server has been stress-tested with 80+ consecutive operations without authentication failures, demonstrating production-level reliability.

๐Ÿ”ง Architecture

Bulletproof Authentication System

  • Fresh Client Instances: Creates new KcAdminClient for every request
  • Retry Logic: Exponential backoff with 2 attempts maximum
  • Connection Management: 15-second timeout with proper cleanup
  • Error Handling: Comprehensive error messages for all scenarios

TypeScript Implementation

  • Type Safety: Full TypeScript coverage with proper interfaces
  • Error Handling: Detailed error messages and logging
  • Modular Design: Clean separation of concerns

๐Ÿ“ˆ Production Ready

This package has been extensively tested and validated:

  • โœ… 80+ consecutive operations without authentication failures
  • โœ… Cross-realm operations working seamlessly
  • โœ… Parallel tool execution supported
  • โœ… Complex search queries with multiple filters
  • โœ… Error recovery and detailed logging
  • โœ… TypeScript compilation with zero errors
  • โœ… Complete Keycloak API coverage with organization management

๐ŸŽฏ JWT Organization Problem Solved

This package specifically addresses the common JWT organization problem:

  • โœ… User Attributes: Store organization data in user attributes
  • โœ… Protocol Mappers: Create mappers to include organization in JWT tokens
  • โœ… Client Scopes: Manage token scopes for organization claims
  • โœ… Organizations: Full organization lifecycle management
  • โœ… Group Attributes: Store organization metadata in groups

Example workflow:

  1. Create organization using create-organization
  2. Set user organization attribute using set-user-attributes
  3. Create protocol mapper using create-protocol-mapper to include organization in JWT
  4. Add user to organization using add-organization-member

๐Ÿ”’ Security Best Practices

  • Use environment variables for credentials
  • Enable HTTPS for production Keycloak instances
  • Use strong admin passwords
  • Regularly rotate credentials
  • Monitor admin events and sessions

๐Ÿค Contributing

  1. Fork the repository
  2. Create a feature branch: git checkout -b feature/amazing-feature
  3. Commit changes: git commit -m 'Add amazing feature'
  4. Push to branch: git push origin feature/amazing-feature
  5. Open a Pull Request

๐Ÿ“„ License

MIT License - see file for details.

๐Ÿ†˜ Support

๐Ÿ”— Related Projects

๐Ÿ“Š Package Stats

  • 80+ Tools: Complete Keycloak administration coverage
  • Production Ready: Extensively tested and validated
  • TypeScript: Full type safety and modern development experience
  • Cross-Platform: Windows, macOS, and Linux support
  • Zero Dependencies Issues: Robust dependency management
  • Organization Management: Solve JWT organization visibility problems
  • Advanced Features: Protocol mappers, client scopes, identity providers

Made with โค๏ธ for the Keycloak and AI community