Auth0 is a Security MCP server that lets Claude Code, Cursor, Windsurf and any MCP-compatible AI agent manage Auth0 tenants, users, roles, and applications from AI agents via MCP. Install in 1 minute with mcpizy install auth0.
Security
Manage Auth0 tenants, users, roles, and applications from AI agents via MCP.
Official homepagemcpizy install auth0npx -y @auth0/mcp-serverlist_usersList users in the tenant
Inputs
per_pagenumberoptionalget_userGet a user by ID
Inputs
idstringrequiredlist_applicationsList applications (clients) in the tenant
list_connectionsList identity connections
list_logsQuery tenant logs
Inputs
qstringoptionallist_rolesList roles defined in the tenant
Works identically across clients. Only the config file path differs.
~/.claude.json{
"mcpServers": {
"auth0": {
"command": "npx",
"args": [
"-y",
"@auth0/auth0-mcp-server"
],
"env": {
"AUTH0_DOMAIN": "your-tenant.auth0.com",
"AUTH0_MANAGEMENT_API_TOKEN": "eyJ..."
}
}
}
}.cursor/mcp.json{
"mcpServers": {
"auth0": {
"command": "npx",
"args": [
"-y",
"@auth0/auth0-mcp-server"
],
"env": {
"AUTH0_DOMAIN": "your-tenant.auth0.com",
"AUTH0_MANAGEMENT_API_TOKEN": "eyJ..."
}
}
}
}~/.codeium/windsurf/mcp_config.json{
"mcpServers": {
"auth0": {
"command": "npx",
"args": [
"-y",
"@auth0/auth0-mcp-server"
],
"env": {
"AUTH0_DOMAIN": "your-tenant.auth0.com",
"AUTH0_MANAGEMENT_API_TOKEN": "eyJ..."
}
}
}
}Paste any of these prompts into Claude Code, Cursor or another MCP-compatible client.
“List recent failed logins in my tenant”
Uses: list_logs
“Show me every user created this week”
Uses: list_users
“What roles are defined in my tenant?”
Uses: list_roles
Boost security in dev lifecycle via SAST, SCA, secrets scanning, and supply chain security.
AI-powered security insights for Kubernetes and cloud workloads. Threat detection.
Manage 1Password vaults, items, and secrets from AI agents via the Model Context Protocol.
Manage Okta users, groups, and application assignments for identity from AI agents.
If Auth0 doesn't fit your stack, these Security MCP servers solve similar problems.
The Auth0 MCP server is an Security Model Context Protocol server that lets Claude Code, Cursor, Windsurf, VS Code with Copilot, and other MCP-compatible AI agents manage Auth0 tenants, users, roles, and applications from AI agents via MCP. It exposes Auth0's capabilities as tools the AI can call directly from your editor or CLI.
The fastest way is the MCPizy CLI: run `mcpizy install auth0` and MCPizy will add the server to your `.claude.json` automatically. You can also install it manually by adding an entry under `mcpServers` in `.claude.json` with the command `npx -y @auth0/mcp-server` and restarting Claude Code.
Yes. The Auth0 MCP server is free and open source (see the GitHub repository linked on this page). You may still need a Auth0 account or API key to connect the server to the underlying service, but the MCP layer itself has no MCPizy subscription cost.
Yes. Any MCP-compatible client works — including Claude Code, Claude Desktop, Cursor (via `.cursor/mcp.json`), Windsurf, VS Code with Copilot Chat, and custom agents built on the MCP SDK. The same install command targets all of them; only the config file path differs.
Once installed, your AI agent can manage Auth0 tenants, users, roles, and applications from AI agents via MCP directly inside your conversation. Typical use cases include asking Claude Code or Cursor to run Auth0 operations, inspect results, chain Auth0 with other MCP servers (see our Workflow Recipes), and automate repetitive security tasks without leaving your editor.