Model Context Protocol (MCP)
Early Access
Try our newest feature! Only available through reach out. Contact us to join the early access program and get priority support.
Unizo offers an MCP server that integrates identity management platforms with any LLM provider supporting the MCP protocol. This enables your AI agent to perform user management operations, analyze access patterns, and automate security workflows across Okta, Auth0, Azure AD, and other identity providers via a single MCP server.
Supported Tools & Use Cases
The following tools are available in the Identity MCP Server:
Tool Name | Description |
---|---|
list_users | Browse and search users across identity systems with advanced filtering |
get_user_details | Retrieve comprehensive user information including permissions and group memberships |
list_groups | Explore groups, roles, and their associated permissions |
manage_group_members | Add or remove users from groups with change tracking |
check_permissions | Analyze and validate user access rights across resources |
audit_access | Review authentication logs, access patterns, and security events |
list_users
Browse and search users across identity systems with advanced filtering
Parameters:
integration
: Target identity provider integration (required)status
: Filter by user status (active, inactive, suspended)department
: Filter by organizational departmentrole
: Filter by assigned rolespage
: Pagination controllimit
: Number of results per page
get_user_details
Retrieve comprehensive user information including permissions and group memberships
Parameters:
integration
: Target identity provider integration (required)user_id
: Unique user identifier (required)include_permissions
: Include detailed permission mappingsinclude_groups
: Include group membershipsinclude_audit_logs
: Include recent activity logs
list_groups
Explore groups, roles, and their associated permissions
Parameters:
integration
: Target identity provider integration (required)type
: Filter by group type (security, distribution, role)name_pattern
: Search groups by name patterninclude_members
: Include member count and detailspage
: Pagination controllimit
: Number of results per page
manage_group_members
Add or remove users from groups with change tracking
Parameters:
integration
: Target identity provider integration (required)group_id
: Target group identifier (required)action
: Operation type (add, remove, replace)user_ids
: List of user identifiers (required)reason
: Justification for change (for audit trail)
check_permissions
Analyze and validate user access rights across resources
Parameters:
integration
: Target identity provider integration (required)user_id
: User to analyze (required)resource
: Specific resource to check (optional)permission_type
: Type of permission to verifyinclude_inherited
: Include permissions from group memberships
audit_access
Review authentication logs, access patterns, and security events
Parameters:
integration
: Target identity provider integration (required)user_id
: Filter by specific userevent_type
: Filter by event type (login, permission_change, failed_auth)start_date
: Beginning of audit periodend_date
: End of audit periodrisk_level
: Filter by risk score
Installation
Prerequisites
- A Unizo API key
- An active Identity integration (Office 365, Google Workspace, OKTA, Microsoft Entra ID, Ping, Auth0)
- Node.js v20 or higher
MCP Configuration
Here is an example configuration for setting up the Unizo Identity MCP server:
{
"mcpServers": {
"unizo-identity": {
"command": "npx",
"args": [
"mcp-remote",
"http://api.unizo.ai/mcp/identity",
"--allow-http",
"--header",
"apikey:${UNIZO_API_KEY}"
],
"env": {
"UNIZO_API_KEY": "your_api_key"
}
}
}
}
Client Setup
For detailed setup instructions with specific AI clients:
Environment Variables
The following environment variables are required:
UNIZO_API_KEY
: Your Unizo API key Your Unizo API key
Error Handling
All tools return errors in a consistent format:
{
"error": {
"code": "USER_NOT_FOUND",
"message": "User 'john.doe@example.com' not found"
}
}
Common error codes:
INTEGRATION_NOT_FOUND
: Invalid identity provider integration IDUSER_NOT_FOUND
: User not found or inaccessibleGROUP_NOT_FOUND
: Group ID not foundPERMISSION_DENIED
: Access to the requested resource is deniedRATE_LIMIT_EXCEEDED
: API quota exceededUNAUTHORIZED
: Invalid API key or insufficient permissions