- Home
- MCP servers
- Adobe Okta
Adobe Okta
- javascript
2
GitHub Stars
javascript
Language
2 months ago
First Indexed
3 weeks ago
Catalog Refreshed
Documentation & install
Readme and setup notes from the catalogue, plus a client-ready config you can copy for your MCP host.
Installation
Add the following to your MCP client configuration file.
Configuration
View docs{
"mcpServers": {
"adobe-rnd-mcp-remote-with-okta": {
"command": "npx",
"args": [
"mcp-remote-with-okta",
"https://your-mcp-server.com/mcp"
],
"env": {
"DEBUG_MODE": "false",
"OKTA_SCOPE": "openid profile email",
"ADOBE_SCOPE": "AdobeID,openid",
"AUTH_METHOD": "jwt",
"OKTA_DOMAIN": "your_okta_domain.okta.com",
"AUTO_REFRESH": "true",
"REDIRECT_URI": "http://localhost:8080/callback",
"ADOBE_IMS_ENV": "prod",
"AUTH_PROVIDER": "adobe",
"OKTA_CLIENT_ID": "your_okta_client_id",
"ADOBE_CLIENT_ID": "your_client_id_here",
"REFRESH_THRESHOLD": "10"
}
}
}
}You can securely access protected MCP servers by using a wrapper that handles Adobe IMS or Okta authentication via OAuth, then launches your MCP client with the proper authorization token. This makes it easy to authenticate once and reuse tokens across sessions while keeping your credentials and tokens safely managed on your machine.
How to use
Set up your environment and start using your MCP by running the wrapper with the MCP URL you want to reach. The wrapper automatically handles the authentication flow for Adobe or Okta, stores tokens securely, and launches the MCP client with the required Authorization header.
How to install
Prerequisites: you need Node.js and npm installed on your system.
Install and run using the recommended method:
npx mcp-remote-with-okta <mcp-url>
Configuration and usage notes
The wrapper supports multiple providers and token management options. You can configure which provider to use and various OAuth parameters through environment variables.
Use the provided environment variable examples to configure either the Adobe or Okta flow. The Adobe path requires a client ID and IMS environment, while the Okta path requires a client ID and your Okta domain.
Example configurations for your MCP setup:
{
"mcpServers": {
"adobe_mcp": {
"command": "npx",
"args": [
"mcp-remote-with-okta",
"https://your-mcp-server.com/mcp"
],
"env": {
"AUTH_PROVIDER": "adobe",
"ADOBE_CLIENT_ID": "your_client_id_here",
"ADOBE_IMS_ENV": "prod"
}
},
"okta_mcp": {
"command": "npx",
"args": [
"mcp-remote-with-okta",
"https://your-mcp-server.com/mcp"
],
"env": {
"AUTH_PROVIDER": "okta",
"OKTA_CLIENT_ID": "your_okta_client_id",
"OKTA_DOMAIN": "your_okta_domain.okta.com"
}
}
}
}
Troubleshooting and tips
If you encounter issues, you can check token status, view the current token, or trigger authentication again using the CLI. Enable debug mode to gather detailed logs for troubleshooting.
Common actions include authenticating, checking status, viewing tokens, and clearing stored tokens before re-authenticating.
npx mcp-remote-with-okta <mcp-url> authenticate
npx mcp-remote-with-okta <mcp-url> status
npx mcp-remote-with-okta <mcp-url> token
npx mcp-remote-with-okta <mcp-url> clear
Security and token handling
Tokens are stored securely on your local machine and are managed with automatic refresh to minimize interruptions. You can adjust refresh behavior and debug output through environment variables as needed.
Available tools
authenticate
Authenticate the user and obtain an access token for use with MCP servers.
status
Check the current token status, including expiration and validity.
token
Display the current stored token details.
clear
Clear all stored tokens from secure local storage.
help
Show usage information and available commands for the MCP wrapper.