MCP Server Integration

The AIdenID MCP (Model Context Protocol) server lets LLMs use supporting identity, extraction, and lifecycle tools. MCP is useful for issuer and demo workflows; it does not sit on the per-request clearance hot path.

What is MCP?

The Model Context Protocol is a standard for giving LLMs access to external tools. When you configure an MCP server, the LLM can call AIdenID functions as part of its reasoning loop — no custom integration code required.

Setup

Add the AIdenID MCP server to your LLM configuration. The exact configuration depends on your client, but the pattern is the same:

Claude Desktop / Claude Code

{
  "mcpServers": {
    "aidenid": {
      "command": "npx",
      "args": ["-y", "@aidenid/mcp-server"],
      "env": {
        "AIDENID_API_KEY": "aid_your_api_key",
        "AIDENID_ORG_ID": "org_abc123",
        "AIDENID_PROJECT_ID": "proj_def456"
      }
    }
  }
}

Environment variables

VariableRequiredDescription
AIDENID_API_KEYYesYour AIdenID API key
AIDENID_ORG_IDYesYour organization identifier
AIDENID_PROJECT_IDYesThe project to scope operations to
AIDENID_API_BASENoAPI base URL (defaults to https://api.aidenid.com)

Available tools

Once configured, the LLM has access to the following tools:

create_identity

Provision a new disposable email identity.

ParameterTypeRequiredDescription
labelstringYesHuman-readable label
ttl_hoursintegerNoTime-to-live in hours (default: 24)
domainstringNoCustom domain for the inbox

get_identity

Retrieve identity details including status, email, and metadata.

ParameterTypeRequiredDescription
identity_idstringYesThe identity ID to retrieve

list_identities

List identities in the current project with optional filtering.

ParameterTypeRequiredDescription
statusstringNoFilter by status
limitintegerNoMax results (default: 20)

get_latest_extraction

Get the most recent extraction result for an identity.

ParameterTypeRequiredDescription
identity_idstringYesThe identity to check for extractions

extend_identity

Extend the TTL of an active identity.

ParameterTypeRequiredDescription
identity_idstringYesThe identity to extend
additional_hoursintegerYesHours to add

squash_identity

Revoke an identity and deactivate its inbox.

ParameterTypeRequiredDescription
identity_idstringYesThe identity to squash

create_webhook

Register a webhook endpoint for event delivery.

ParameterTypeRequiredDescription
urlstringYesHTTPS endpoint URL
eventsstring[]YesEvent types to subscribe to

test_auth_flow

Run an auth flow reliability test against a target URL.

ParameterTypeRequiredDescription
flow_typestringYespassword_reset or invite
target_urlstringYesURL to test
identity_idstringYesIdentity to use for the test

Example conversation

Here is how an LLM might use AIdenID tools in a conversation:

User: Run the authorized signup test on example.com using a disposable email.

LLM: I'll create a disposable identity for the authorized test flow.

[Tool call: create_identity]
  label: "example-signup"
  ttl_hours: 1

[Tool result]
  id: "ident_a1b2c3d4e5"
  email: "a1b2c3d4e5@inbox.aidenid.com"

LLM: I've created the identity. Let me use the email in the test flow...
     Now I'll check whether extraction evidence is ready.

[Tool call: get_latest_extraction]
  identity_id: "ident_a1b2c3d4e5"

[Tool result]
  type: "otp"
  has_secret: true
  redacted_value: "***"
  confidence: 0.99

LLM: Extraction evidence is ready. The raw secret must stay in the secure
     server-side runtime path. Let me clean up the identity.

[Tool call: squash_identity]
  identity_id: "ident_a1b2c3d4e5"

Security considerations

  • API key access. The MCP server has full access to your API key scopes. Use a key with minimal permissions.
  • Environment isolation. Use a separate project for MCP-driven operations so they do not interfere with production identities.
  • TTL hygiene. Set short TTLs when using MCP tools to minimize active identity window.
  • No token passthrough. Do not pass raw OTPs, magic links, or upstream bearer credentials through LLM-visible context.

Related