mcp-activedirectory
Provides AI assistants with unified access to on-prem Active Directory via LDAP and Azure AD / Entra ID through the Microsoft Graph API. It enables comprehensive management and search of users, groups, computers, and cloud devices using 18 specialized tools.
README
mcp-activedirectory
A Model Context Protocol (MCP) server for Microsoft Active Directory, providing AI assistants with access to on-prem AD (via LDAP) and Azure AD / Entra ID (via Microsoft Graph API).
Features
Supports two modes simultaneously:
- On-prem Active Directory — connects to a domain controller via LDAP/LDAPS using the
ldaptslibrary - Azure AD / Entra ID — connects via the Microsoft Graph API using OAuth2 Client Credentials
18 tools across five categories:
User Management
| Tool | Description |
|---|---|
list_users |
List users with optional name, email, or department filter |
get_user |
Get full user details including decoded UAC flags (on-prem) or full profile (Azure AD) |
get_user_groups |
List all groups a user is a member of |
search_users |
Advanced search by name, email, department, title, phone, or UPN |
Group Management
| Tool | Description |
|---|---|
list_groups |
List groups with optional name filter |
get_group |
Get group details including member count and decoded group type |
get_group_members |
List all group members; supports recursive nested group expansion (on-prem) |
search_groups |
Search groups by name or description |
Computer Accounts (On-prem AD only)
| Tool | Description |
|---|---|
list_computers |
List computer accounts with OS, last logon (human-readable), and OU |
get_computer |
Get full computer account details |
search_computers |
Search by name, OS, OU path, DNS hostname, or description |
Organizational Units (On-prem AD only)
| Tool | Description |
|---|---|
list_ous |
List OUs with full path, sorted by depth |
get_ou |
Get OU details |
search_ous |
Search OUs by name, description, or parent path |
Azure AD / Entra ID (Azure AD only)
| Tool | Description |
|---|---|
list_devices |
List Entra ID registered/joined devices with OS and compliance status |
get_device |
Get full device details by object ID |
list_service_principals |
List app registrations and service principals |
get_user_sign_in_activity |
Get last sign-in information for a user |
Installation
git clone git@github.com:fredriksknese/mcp-activedirectory.git
cd mcp-activedirectory
npm install
npm run build
Configuration
The server is configured via environment variables. At least one of AD_HOST or AZURE_TENANT_ID must be set.
On-prem Active Directory (LDAP)
| Variable | Required | Default | Description |
|---|---|---|---|
AD_HOST |
Yes | — | Domain controller hostname or IP address |
AD_PORT |
No | 389 |
LDAP port (636 for LDAPS) |
AD_USE_SSL |
No | false |
Use LDAPS (true/false) |
AD_BIND_DN |
Yes | — | Bind DN, e.g. CN=svc-mcp,OU=Service Accounts,DC=corp,DC=example,DC=com |
AD_BIND_PASSWORD |
Yes | — | Bind account password |
AD_BASE_DN |
Yes | — | Base DN for all searches, e.g. DC=corp,DC=example,DC=com |
AD_ALLOW_SELF_SIGNED |
No | true |
Accept self-signed TLS certificates |
Azure AD / Entra ID (Microsoft Graph API)
| Variable | Required | Default | Description |
|---|---|---|---|
AZURE_TENANT_ID |
Yes | — | Azure AD tenant ID (GUID) |
AZURE_CLIENT_ID |
Yes | — | App registration (client) ID |
AZURE_CLIENT_SECRET |
Yes | — | App registration client secret |
Required Permissions
On-prem Active Directory
The service account (AD_BIND_DN) needs read access to the directory. The minimum required permissions are:
- Read on User objects (all attributes listed below)
- Read on Group objects
- Read on Computer objects
- Read on OrganizationalUnit objects
Recommended: add the service account to the built-in Domain Users group and grant Read delegated permissions on the domain root, or use the built-in Read-only Domain Controllers access pattern.
Attributes read for users: cn, sAMAccountName, displayName, mail, userPrincipalName, department, title, telephoneNumber, mobile, manager, memberOf, userAccountControl, lastLogon, whenCreated, whenChanged, description, distinguishedName, objectGUID
Azure AD / Entra ID (Microsoft Graph)
Create an App Registration in Azure AD and grant the following Application permissions (not Delegated):
| Permission | Scope | Required for |
|---|---|---|
User.Read.All |
Microsoft Graph | Reading user profiles and group memberships |
Group.Read.All |
Microsoft Graph | Reading groups and group members |
Device.Read.All |
Microsoft Graph | Reading Entra ID registered/joined devices |
AuditLog.Read.All |
Microsoft Graph | Reading sign-in activity (signInActivity field) |
Grant Admin Consent for all permissions in the Azure portal.
Usage with Claude Desktop
Add to your claude_desktop_config.json:
On-prem AD only
{
"mcpServers": {
"activedirectory": {
"command": "node",
"args": ["/absolute/path/to/mcp-activedirectory/dist/index.js"],
"env": {
"AD_HOST": "dc01.corp.example.com",
"AD_BIND_DN": "CN=svc-mcp,OU=Service Accounts,DC=corp,DC=example,DC=com",
"AD_BIND_PASSWORD": "your-service-account-password",
"AD_BASE_DN": "DC=corp,DC=example,DC=com"
}
}
}
}
Azure AD / Entra ID only
{
"mcpServers": {
"activedirectory": {
"command": "node",
"args": ["/absolute/path/to/mcp-activedirectory/dist/index.js"],
"env": {
"AZURE_TENANT_ID": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"AZURE_CLIENT_ID": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"AZURE_CLIENT_SECRET": "your-client-secret"
}
}
}
}
Both simultaneously
{
"mcpServers": {
"activedirectory": {
"command": "node",
"args": ["/absolute/path/to/mcp-activedirectory/dist/index.js"],
"env": {
"AD_HOST": "dc01.corp.example.com",
"AD_BIND_DN": "CN=svc-mcp,OU=Service Accounts,DC=corp,DC=example,DC=com",
"AD_BIND_PASSWORD": "your-service-account-password",
"AD_BASE_DN": "DC=corp,DC=example,DC=com",
"AZURE_TENANT_ID": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"AZURE_CLIENT_ID": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"AZURE_CLIENT_SECRET": "your-client-secret"
}
}
}
}
Usage with Claude Code
claude mcp add activedirectory -- node /absolute/path/to/mcp-activedirectory/dist/index.js
LDAPS / SSL Configuration
To use LDAPS (port 636):
"env": {
"AD_HOST": "dc01.corp.example.com",
"AD_PORT": "636",
"AD_USE_SSL": "true",
"AD_ALLOW_SELF_SIGNED": "true"
}
Set AD_ALLOW_SELF_SIGNED to "false" if your domain controller uses a certificate from a trusted CA.
Example Prompts
Once connected, you can ask your AI assistant things like:
- "List all users in the IT department"
- "Get details for user jdoe including their group memberships"
- "Which groups does john.doe@company.com belong to?"
- "Show me all members of the Domain Admins group"
- "List all Windows Server 2022 computers in the Servers OU"
- "Which computer accounts haven't logged in since 2024?"
- "Show me the top-level OUs in the domain"
- "List all Azure AD joined devices"
- "When did user@company.com last sign in?"
- "List all service principals of type ManagedIdentity"
Architecture
src/
├── index.ts # Entry point — creates MCP server + STDIO transport
├── ad-client.ts # LDAP client wrapping ldapts for on-prem AD
├── graph-client.ts # Microsoft Graph API client with OAuth2 token caching
└── tools/
├── users.ts # User tools (list, get, search, groups) — AD + Azure
├── groups.ts # Group tools (list, get, members, search) — AD + Azure
├── computers.ts # Computer account tools — on-prem AD only
├── ous.ts # Organizational unit tools — on-prem AD only
└── azure.ts # Azure-specific tools (devices, service principals, sign-in)
Development
npm run dev # Run with tsx (no compilation needed)
npm run build # Compile TypeScript to dist/
npm start # Run compiled output
Requirements
- Node.js 18+
- For on-prem AD: network access to a domain controller on port 389 (LDAP) or 636 (LDAPS)
- For Azure AD: an App Registration with the required Graph API permissions
License
SEE LICENSE IN LICENSE
推荐服务器
Baidu Map
百度地图核心API现已全面兼容MCP协议,是国内首家兼容MCP协议的地图服务商。
Playwright MCP Server
一个模型上下文协议服务器,它使大型语言模型能够通过结构化的可访问性快照与网页进行交互,而无需视觉模型或屏幕截图。
Magic Component Platform (MCP)
一个由人工智能驱动的工具,可以从自然语言描述生成现代化的用户界面组件,并与流行的集成开发环境(IDE)集成,从而简化用户界面开发流程。
Audiense Insights MCP Server
通过模型上下文协议启用与 Audiense Insights 账户的交互,从而促进营销洞察和受众数据的提取和分析,包括人口统计信息、行为和影响者互动。
VeyraX
一个单一的 MCP 工具,连接你所有喜爱的工具:Gmail、日历以及其他 40 多个工具。
graphlit-mcp-server
模型上下文协议 (MCP) 服务器实现了 MCP 客户端与 Graphlit 服务之间的集成。 除了网络爬取之外,还可以将任何内容(从 Slack 到 Gmail 再到播客订阅源)导入到 Graphlit 项目中,然后从 MCP 客户端检索相关内容。
Kagi MCP Server
一个 MCP 服务器,集成了 Kagi 搜索功能和 Claude AI,使 Claude 能够在回答需要最新信息的问题时执行实时网络搜索。
e2b-mcp-server
使用 MCP 通过 e2b 运行代码。
Neon MCP Server
用于与 Neon 管理 API 和数据库交互的 MCP 服务器
Exa MCP Server
模型上下文协议(MCP)服务器允许像 Claude 这样的 AI 助手使用 Exa AI 搜索 API 进行网络搜索。这种设置允许 AI 模型以安全和受控的方式获取实时的网络信息。