EntraID MCP Server (Microsoft Graph FastMCP)
A modular FastMCP server for managing Microsoft Graph resources with advanced context and security.
Key Features
Use Cases
README
EntraID MCP Server (Microsoft Graph FastMCP)
This project provides a modular, resource-oriented FastMCP server for interacting with Microsoft Graph API. It is designed for extensibility, maintainability, and security, supporting advanced queries for users, sign-in logs, MFA status, and privileged users.
Features
- Modular Resource Structure:
- Each resource (users, sign-in logs, MFA, etc.) is implemented in its own module under
src/msgraph_mcp_server/resources/. - Easy to extend with new resources (e.g., groups, devices).
- Each resource (users, sign-in logs, MFA, etc.) is implemented in its own module under
- Centralized Graph Client:
- Handles authentication and client initialization.
- Shared by all resource modules.
- Comprehensive User Operations:
- Search users by name/email.
- Get user by ID.
- List all privileged users (directory role members).
- Full Group Lifecycle & Membership Management:
- Create, read, update, and delete groups.
- Add/remove group members and owners.
- Search and list groups and group members.
- Application & Service Principal Management:
- List, create, update, and delete applications (app registrations).
- List, create, update, and delete service principals.
- View app role assignments and delegated permissions for both applications and service principals.
- Sign-in Log Operations:
- Query sign-in logs for a user for the last X days.
- MFA Operations:
- Get MFA status for a user.
- Get MFA status for all members of a group.
- Password Management:
- Reset user passwords directly with custom or auto-generated secure passwords.
- Option to require password change on next sign-in.
- Permissions Helper:
- Suggest appropriate Microsoft Graph permissions for common tasks.
- Search and explore available Graph permissions.
- Helps implement the principle of least privilege by recommending only necessary permissions.
- Error Handling & Logging:
- Consistent error handling and progress reporting via FastMCP context.
- Detailed logging for troubleshooting.
- Security:
.envand secret files are excluded from version control.- Uses Microsoft best practices for authentication.
Project Structure
src/msgraph_mcp_server/
├── auth/ # Authentication logic (GraphAuthManager)
├── resources/ # Resource modules (users, signin_logs, mfa, ...)
│ ├── users.py # User operations (search, get by ID, etc.)
│ ├── signin_logs.py # Sign-in log operations
│ ├── mfa.py # MFA status operations
│ ├── permissions_helper.py # Graph permissions utilities and suggestions
│ ├── applications.py # Application (app registration) operations
│ ├── service_principals.py # Service principal operations
│ └── ... # Other resource modules
├── utils/ # Core GraphClient and other ultilities tool, such as password generator..
├── server.py # FastMCP server entry point (registers tools/resources)
├── __init__.py # Package marker
Usage
1. Setup
- Clone the repo.
- Create a
config/.envfile with your Azure AD credentials:TENANT_ID=your-tenant-id CLIENT_ID=your-client-id CLIENT_SECRET=your-client-secret - (Optional) Set up certificate-based auth if needed.
2. Testing & Development
You can test and develop your MCP server directly using the FastMCP CLI:
fastmcp dev '/path/to/src/msgraph_mcp_server/server.py'
This launches an interactive development environment with the MCP Inspector. For more information and advanced usage, see the FastMCP documentation.
3. Available Tools
User Tools
search_users(query, ctx, limit=10)— Search users by name/emailget_user_by_id(user_id, ctx)— Get user details by IDget_privileged_users(ctx)— List all users in privileged directory rolesget_user_roles(user_id, ctx)— Get all directory roles assigned to a userget_user_groups(user_id, ctx)— Get all groups (including transitive memberships) for a user
Group Tools
get_all_groups(ctx, limit=100)— Get all groups (with paging)get_group_by_id(group_id, ctx)— Get a specific group by its IDsearch_groups_by_name(name, ctx, limit=50)— Search for groups by display nameget_group_members(group_id, ctx, limit=100)— Get members of a group by group IDcreate_group(ctx, group_data)— Create a new group (see below for group_data fields)update_group(group_id, ctx, group_data)— Update an existing group (fields: displayName, mailNickname, description, visibility)delete_group(group_id, ctx)— Delete a group by its IDadd_group_member(group_id, member_id, ctx)— Add a member (user, group, device, etc.) to a groupremove_group_member(group_id, member_id, ctx)— Remove a member from a groupadd_group_owner(group_id, owner_id, ctx)— Add an owner to a groupremove_group_owner(group_id, owner_id, ctx)— Remove an owner from a group
Group Creation/Update Example:
group_dataforcreate_groupandupdate_groupshould be a dictionary with keys such as:displayName(required for create)mailNickname(required for create)description(optional)groupTypes(optional, e.g.,["Unified"])mailEnabled(optional)securityEnabled(optional)visibility(optional, "Private" or "Public")owners(optional, list of user IDs)members(optional, list of IDs)membershipRule(required for dynamic groups)membershipRuleProcessingState(optional, "On" or "Paused")
See the groups.py docstrings for more details on supported fields and behaviors.
Sign-in Log Tools
get_user_sign_ins(user_id, ctx, days=7)— Get sign-in logs for a user
MFA Tools
get_user_mfa_status(user_id, ctx)— Get MFA status for a userget_group_mfa_status(group_id, ctx)— Get MFA status for all group members
Device Tools
get_all_managed_devices(filter_os=None)— Get all managed devices (optionally filter by OS)get_managed_devices_by_user(user_id)— Get all managed devices for a specific user
Conditional Access Policy Tools
get_conditional_access_policies(ctx)— Get all conditional access policiesget_conditional_access_policy_by_id(policy_id, ctx)— Get a single conditional access policy by its ID
Audit Log Tools
get_user_audit_logs(user_id, days=30)— Get all relevant directory audit logs for a user by user_id within the last N days
Password Management Tools
reset_user_password_direct(user_id, password=None, require_change_on_next_sign_in=True, generate_password=False, password_length=12)— Reset a user's password with a specific password value or generate a secure random password
Permissions Helper Tools
suggest_permissions_for_task(task_category, task_name)— Suggest Microsoft Graph permissions for a specific task based on common mappingslist_permission_categories_and_tasks()— List all available categories and tasks for permission suggestionsget_all_graph_permissions()— Get all Microsoft Graph permissions directly from the Microsoft Graph APIsearch_permissions(search_term, permission_type=None)— Search for Microsoft Graph permissions by keyword
Application Tools
list_applications(ctx, limit=100)— List all applications (app registrations) in the tenant, with pagingget_application_by_id(app_id, ctx)— Get a specific application by its object ID (includes app role assignments and delegated permissions)create_application(ctx, app_data)— Create a new application (see below for app_data fields)update_application(app_id, ctx, app_data)— Update an existing application (fields: displayName, signInAudience, tags, identifierUris, web, api, requiredResourceAccess)delete_application(app_id, ctx)— Delete an application by its object ID
Application Creation/Update Example:
app_dataforcreate_applicationandupdate_applicationshould be a dictionary with keys such as:displayName(required for create)signInAudience(optional)tags(optional)identifierUris(optional)web(optional)api(optional)requiredResourceAccess(optional)
Service Principal Tools
list_service_principals(ctx, limit=100)— List all service principals in the tenant, with pagingget_service_principal_by_id(sp_id, ctx)— Get a specific service principal by its object ID (includes app role assignments and delegated permissions)create_service_principal(ctx, sp_data)— Create a new service principal (see below for sp_data fields)update_service_principal(sp_id, ctx, sp_data)— Update an existing service principal (fields: displayName, accountEnabled, tags, appRoleAssignmentRequired)delete_service_principal(sp_id, ctx)— Delete a service principal by its object ID
Service Principal Creation/Update Example:
sp_dataforcreate_service_principalandupdate_service_principalshould be a dictionary with keys such as:appId(required for create)accountEnabled(optional)tags(optional)appRoleAssignmentRequired(optional)displayName(optional)
Example Resource
greeting://{name}— Returns a personalized greeting
Extending the Server
- Add new resource modules under
resources/(e.g.,groups.py,devices.py). - Register new tools in
server.pyusing the FastMCP@mcp.tool()decorator. - Use the shared
GraphClientfor all API calls.
Security & Best Practices
- Never commit secrets:
.envand other sensitive files are gitignored. - Use least privilege: Grant only the necessary Microsoft Graph permissions to your Azure AD app.
- Audit & monitor: Use the logging output for troubleshooting and monitoring.
Required Graph API Permissions
| API / Permission | Type | Description |
|---|---|---|
| AuditLog.Read.All | Application | Read all audit log data |
| AuthenticationContext.Read.All | Application | Read all authentication context information |
| DeviceManagementManagedDevices.Read.All | Application | Read Microsoft Intune devices |
| Directory.Read.All | Application | Read directory data |
| Group.Read.All | Application | Read all groups |
| GroupMember.Read.All | Application | Read all group memberships |
| Group.ReadWrite.All | Application | Create, update, delete groups; manage group members and owners |
| Policy.Read.All | Application | Read your organization's policies |
| RoleManagement.Read.Directory | Application | Read all directory RBAC settings |
| User.Read.All | Application | Read all users' full profiles |
| User-PasswordProfile.ReadWrite.All | Application | Least privileged permission to update the passwordProfile property |
| UserAuthenticationMethod.Read.All | Application | Read all users' authentication methods |
| Application.ReadWrite.All | Application | Create, update, and delete applications (app registrations) and service principals |
Note: Group.ReadWrite.All is required for group creation, update, deletion, and for adding/removing group members or owners. Group.Read.All and GroupMember.Read.All are sufficient for read-only group and membership queries.
Advanced: Using with Claude or Cursor
Using with Claude (Anthropic)
To install and run this server as a Claude MCP tool, use:
fastmcp install '/path/to/src/msgraph_mcp_server/server.py' \
--with msgraph-sdk --with azure-identity --with azure-core --with msgraph-core \
-f /path/to/.env
- Replace
/path/to/with your actual project path. - The
-fflag points to your.envfile (never commit secrets!).
Using with Cursor
Add the following to your .cursor/mcp.json (do not include actual secrets in version control):
{
"EntraID MCP Server": {
"command": "uv",
"args": [
"run",
"--with", "azure-core",
"--with", "azure-identity",
"--with", "fastmcp",
"--with", "msgraph-core",
"--with", "msgraph-sdk",
"fastmcp",
"run",
"/path/to/src/msgraph_mcp_server/server.py"
],
"env": {
"TENANT_ID": "<your-tenant-id>",
"CLIENT_ID": "<your-client-id>",
"CLIENT_SECRET": "<your-client-secret>"
}
}
}
- Replace
/path/to/and the environment variables with your actual values. - Never commit real secrets to your repository!
License
MIT
Star History
Repository Owner
User
Repository Details
Programming Languages
Tags
Join Our Newsletter
Stay updated with the latest AI tools, news, and offers by subscribing to our weekly newsletter.
Related MCPs
Discover similar Model Context Protocol servers
mcp-graphql-forge
Configuration-driven MCP server exposing modular GraphQL queries as tools.
mcp-graphql-forge provides a lightweight, easily configurable Model Context Protocol (MCP) server that transforms any GraphQL endpoint into a set of modular API tools. Tools, defined in YAML, specify GraphQL queries and parameters to enable curated interactions via a standardized protocol. Written in Go, it emphasizes modularity, security, and extensibility without requiring code changes, and offers ready-to-run binaries for all major platforms.
- ⭐ 3
- MCP
- UnitVectorY-Labs/mcp-graphql-forge
GhidrAssistMCP
Bringing Model Context Protocol server connectivity to Ghidra for AI-assisted reverse engineering.
GhidrAssistMCP is a Ghidra extension providing a Model Context Protocol (MCP) server that allows AI assistants and other tools to interact programmatically with Ghidra's reverse engineering platform. It offers a standardized API for querying program data, managing tool interactions, and enabling real-time analysis features. The extension features a configurable UI, built-in logging, and dynamic management of 31 specialized analysis tools.
- ⭐ 337
- MCP
- jtang613/GhidrAssistMCP
GitHub Enterprise MCP Server
Expose GitHub Enterprise data through a Model Context Protocol server.
GitHub Enterprise MCP Server provides an MCP (Model Context Protocol) interface to integrate with GitHub Enterprise APIs, enabling standardized access to repository data, issues, pull requests, workflows, and user management. It is compatible with both GitHub Enterprise Server and GitHub.com environments and supports features like repository management, file browsing, and enterprise statistics. The platform is designed for seamless integration with tools such as Cursor, making it simple to interact with GitHub data programmatically or via MCP-compliant clients.
- ⭐ 25
- MCP
- ddukbg/github-enterprise-mcp
Azure DevOps MCP Server
Standardized AI access to Azure DevOps via Model Context Protocol.
Implements the Model Context Protocol (MCP) to enable AI assistants to securely and efficiently interact with Azure DevOps resources. Provides a standardized bridge for managing projects, work items, repositories, pull requests, and pipelines through natural language interfaces. Supports modular authentication and a feature-based architecture for scalability and integration. Facilitates seamless integration with AI tools such as Claude Desktop and Cursor AI.
- ⭐ 306
- MCP
- Tiberriver256/mcp-server-azure-devops
IDA Pro MCP
Enabling Model Context Protocol server integration with IDA Pro for collaborative reverse engineering.
IDA Pro MCP provides a Model Context Protocol (MCP) server that connects the IDA Pro reverse engineering platform to clients supporting the MCP standard. It exposes a wide array of program analysis and manipulation functionalities such as querying metadata, accessing functions, globals, imports, and strings, decompiling code, disassembling, renaming variables, and more, in a standardized way. This enables seamless integration of AI-powered or remote tools with IDA Pro to enhance the reverse engineering workflow.
- ⭐ 4,214
- MCP
- mrexodia/ida-pro-mcp
RAD Security MCP Server
AI-powered security insights for Kubernetes and cloud environments via the Model Context Protocol.
RAD Security MCP Server is an implementation of the Model Context Protocol designed to deliver AI-powered security insights and operations for Kubernetes and cloud platforms. It serves as an MCP server for RAD Security, providing a range of toolkits for container, cluster, identity, audit, and threat management. The server is easily configurable via environment variables, allowing for flexible toolkit activation and authentication options. Multiple deployment options are supported, including Node.js, Docker, and integration with development environments like Cursor IDE and Claude Desktop.
- ⭐ 5
- MCP
- rad-security/mcp-server
Didn't find tool you were looking for?