
AWS SSO MCP Server
Node.js/TypeScript MCP server for AWS Single Sign-On (SSO). Enables AI systems (LLMs) with tools to initiate SSO login (device auth flow), list accounts/roles, and securely execute AWS CLI commands using temporary credentials. Streamlines AI interaction with AWS resources.
What is AWS SSO MCP Server?
AWS SSO MCP Server is a Node.js/TypeScript server that enables AI systems to interact with AWS resources using Single Sign-On (SSO) authentication, streamlining the management of AWS services through AI assistants.
How to use AWS SSO MCP Server?
To use the server, configure AWS SSO in your AWS account, set up the server with the required environment variables, and connect your AI assistant to the server to perform AWS operations.
Key features of AWS SSO MCP Server?
- Seamless AWS SSO integration for AI assistants.
- Secure execution of AWS CLI commands using temporary credentials.
- Automatic browser authentication for SSO login.
- Tools for listing AWS accounts and executing commands.
Use cases of AWS SSO MCP Server?
- AI assistants managing AWS resources securely.
- Automating AWS CLI commands through conversational interfaces.
- Simplifying AWS SSO authentication for AI applications.
FAQ from AWS SSO MCP Server?
- Can this server be used with any AI assistant?
Yes, it is designed to work with any MCP-compatible AI assistant.
- Is there a cost associated with using AWS SSO MCP Server?
The server itself is free to use, but AWS service usage may incur costs.
- What are the prerequisites for using this server?
You need Node.js, an AWS account with SSO configured, and AWS CLI v2 installed.
AWS SSO MCP Server
This project provides a Model Context Protocol (MCP) server that connects AI assistants (like Anthropic's Claude, Cursor AI, or other MCP-compatible clients) to AWS services using Single Sign-On (SSO) authentication. It enables AI models to interact with and manage your AWS resources through structured tools with simplified authentication.
Overview
What is MCP?
Model Context Protocol (MCP) is an open standard that allows AI systems to securely and contextually connect with external tools and data sources.
This server implements MCP specifically for AWS SSO, bridging your AI assistants with AWS services using secure, temporary credentials.
Why Use This Server?
-
Seamless AWS SSO Integration: Connect to AWS with secure single sign-on, avoiding the need to manage or expose long-term credentials in your AI interactions.
-
Secure Credential Management: Uses temporary credentials acquired through AWS SSO, following AWS security best practices with automatic credential rotation.
-
Multi-Account Access: Easily discover and work with all AWS accounts and roles you have access to through your SSO configuration.
-
Full AWS CLI Support: Execute any AWS CLI command directly through your AI assistant with proper authentication and credential management.
-
Automated Authentication Flow: Handles browser launch and token polling automatically, making the authentication process simple and intuitive.
Getting Started
Prerequisites
- Node.js (>=18.x): Download
- AWS Account with SSO Configured: You need an AWS account with SSO enabled and appropriate permissions
- AWS CLI v2: For local SSO authentication setup
Step 1: Configure AWS SSO
If you haven't already, set up AWS SSO in your AWS organization:
- Enable AWS IAM Identity Center (successor to AWS SSO) in your AWS account
- Configure your identity source (AWS SSO directory, Active Directory, or external IdP)
- Set up permission sets and assign users to AWS accounts
- Note your AWS SSO start URL - you'll need this for configuration
Step 2: Configure Credentials
Method A: MCP Config File (Recommended)
Create or edit ~/.mcp/configs.json
:
{
"@aashari/mcp-server-aws-sso": {
"environments": {
"DEBUG": "true",
"AWS_REGION": "us-east-1",
"AWS_SSO_START_URL": "https://your-sso-portal.awsapps.com/start"
}
}
}
AWS_REGION
: Your primary AWS region (e.g.,us-east-1
)AWS_SSO_START_URL
: Your AWS SSO portal URL
Method B: Environment Variables
Pass credentials directly when running the server:
DEBUG=true \
AWS_REGION=us-east-1 \
AWS_SSO_START_URL=https://your-sso-portal.awsapps.com/start \
npx -y @aashari/mcp-server-aws-sso
Step 3: Connect Your AI Assistant
Configure your MCP-compatible client to launch this server.
Claude / Cursor Configuration:
{
"mcpServers": {
"aashari/mcp-server-aws-sso": {
"command": "npx",
"args": ["-y", "@aashari/mcp-server-aws-sso"]
}
}
}
This configuration launches the server automatically at runtime.
Tools
This section covers the MCP tools available when using this server with an AI assistant. Note that MCP tools use snake_case
for tool names and camelCase
for parameters.
login
Authenticate with AWS SSO via browser.
{}
or:
{ "launchBrowser": false }
"Login to AWS SSO so I can access my resources."
list_accounts
List all AWS accounts and roles available via SSO.
{}
"Show me all AWS accounts I have access to through SSO."
exec
Execute AWS CLI commands using temporary credentials from AWS SSO.
{
"accountId": "123456789012",
"roleName": "ReadOnly",
"command": "aws s3 ls"
}
or:
{
"accountId": "123456789012",
"roleName": "AdminRole",
"command": "aws ec2 describe-instances",
"region": "us-west-2"
}
"List my S3 buckets in account 123456789012 using the ReadOnly role."
Command-Line Interface (CLI)
The CLI uses kebab-case for commands (e.g., login
) and options (e.g., --account-id
).
npx
Quick Use with # Set required environment variables (replace with your values)
export AWS_SSO_START_URL=https://your-sso-portal.awsapps.com/start
export AWS_REGION=us-east-1
# Login to AWS SSO
npx -y @aashari/mcp-server-aws-sso login
# List available accounts and roles
npx -y @aashari/mcp-server-aws-sso list-accounts
# Execute AWS CLI command with SSO credentials
npx -y @aashari/mcp-server-aws-sso exec \
--account-id 123456789012 \
--role-name ReadOnly \
--command "aws s3 ls"
Install Globally
npm install -g @aashari/mcp-server-aws-sso
Then run directly:
mcp-aws-sso login
Discover More CLI Options
Use --help
to see flags and usage for all available commands:
mcp-aws-sso --help
Or get detailed help for a specific command:
mcp-aws-sso login --help
mcp-aws-sso exec --help
mcp-aws-sso list-accounts --help