4,000+ servers built on vurb.ts
Vinkius

Descope (Auth Platform) MCP Server for CrewAIGive CrewAI instant access to 33 tools to Auth Enchantedlink Poll, Auth Enchantedlink Signup, Auth Enchantedlink Verify, and more

MCP Inspector GDPR Free for Subscribers

Connect your CrewAI agents to Descope (Auth Platform) through Vinkius, pass the Edge URL in the `mcps` parameter and every Descope (Auth Platform) tool is auto-discovered at runtime. No credentials to manage, no infrastructure to maintain.

Ask AI about this MCP Server for CrewAI

The Descope (Auth Platform) MCP Server for CrewAI is a standout in the Developer Tools category — giving your AI agent 33 tools to work with, ready to go from day one.

Built for AI Agents by Vinkius

Vinkius delivers Streamable HTTP and SSE to any MCP client

ClaudeClaude
ChatGPTChatGPT
CursorCursor
GeminiGemini
WindsurfWindsurf
VS CodeVS Code
JetBrainsJetBrains
VercelVercel
+ other MCP clients
python
from crewai import Agent, Task, Crew

agent = Agent(
    role="Descope (Auth Platform) Specialist",
    goal="Help users interact with Descope (Auth Platform) effectively",
    backstory=(
        "You are an expert at leveraging Descope (Auth Platform) tools "
        "for automation and data analysis."
    ),
    # Your Vinkius token. get it at cloud.vinkius.com
    mcps=["https://edge.vinkius.com/[YOUR_TOKEN_HERE]/mcp"],
)

task = Task(
    description=(
        "Explore all available tools in Descope (Auth Platform) "
        "and summarize their capabilities."
    ),
    agent=agent,
    expected_output=(
        "A detailed summary of 33 available tools "
        "and what they can do."
    ),
)

crew = Crew(agents=[agent], tasks=[task])
result = crew.kickoff()
print(result)
Descope (Auth Platform)
Fully ManagedVinkius Servers
60%Token savings
High SecurityEnterprise-grade
IAMAccess control
EU AI ActCompliant
DLPData protection
V8 IsolateSandboxed
Ed25519Audit chain
<40msKill switch
Stream every event to Splunk, Datadog, or your own webhook in real-time

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure

About Descope (Auth Platform) MCP Server

Connect Descope to your AI agent to manage and test user authentication flows through natural conversation. Descope is a drag-and-drop authentication and user management platform for any application.

When paired with CrewAI, Descope (Auth Platform) becomes a first-class tool in your multi-agent workflows. Each agent in the crew can call Descope (Auth Platform) tools autonomously, one agent queries data, another analyzes results, a third compiles reports, all orchestrated through Vinkius with zero configuration overhead.

What you can do

  • OTP Authentication — Initiate and verify One-Time Passwords via Email, SMS, or Voice using tools like auth_otp_signup_email and auth_otp_verify_email.
  • Magic & Enchanted Links — Send secure sign-up/sign-in links and poll for session completion with auth_magiclink_signup_email or auth_enchantedlink_poll.
  • OAuth Integration — Start OAuth flows with providers like Google and exchange codes for active sessions using auth_oauth_authorize.
  • Password Management — Handle traditional password-based sign-ups via auth_password_signup.
  • Session Verification — Verify tokens and manage the authentication lifecycle directly from your workspace.

The Descope (Auth Platform) MCP Server exposes 33 tools through the Vinkius. Connect it to CrewAI in under two minutes — credentials fully managed, no infrastructure to provision, no vendor lock-in. Your configuration, your data, your control.

All 33 Descope (Auth Platform) tools available for CrewAI

When CrewAI connects to Descope (Auth Platform) through Vinkius, your AI agent gets direct access to every tool listed below — spanning authentication, otp, oauth, and more. Every call runs in a secure, isolated environment with full audit visibility. Beyond a simple connection, you get real-time monitoring of agent activity, enterprise governance, and optimized token usage.

auth

Auth enchantedlink poll on Descope (Auth Platform)

Poll for Enchanted Link session

auth

Auth enchantedlink signup on Descope (Auth Platform)

Sign up a user via Enchanted Link

auth

Auth enchantedlink verify on Descope (Auth Platform)

Verify an Enchanted Link token

auth

Auth exchange access key on Descope (Auth Platform)

Exchange an access key for a session JWT

auth

Auth get keys on Descope (Auth Platform)

Get public keys for session validation

auth

Auth magiclink signup email on Descope (Auth Platform)

Sign up or sign in a user via Magic Link

auth

Auth magiclink verify on Descope (Auth Platform)

Verify a Magic Link token

auth

Auth oauth authorize on Descope (Auth Platform)

Start OAuth flow

auth

Auth oauth exchange on Descope (Auth Platform)

Exchange OAuth code for session

auth

Auth otp signin email on Descope (Auth Platform)

Sign in a user via Email OTP

auth

Auth otp signup email on Descope (Auth Platform)

Sign up a user via Email OTP

auth

Auth otp signup sms on Descope (Auth Platform)

Sign up a user via SMS OTP

auth

Auth otp signup voice on Descope (Auth Platform)

Sign up a user via Voice OTP

auth

Auth otp verify email on Descope (Auth Platform)

Verify an Email OTP

auth

Auth otp verify sms on Descope (Auth Platform)

Verify an SMS OTP

auth

Auth otp verify voice on Descope (Auth Platform)

Verify a Voice OTP

auth

Auth password reset on Descope (Auth Platform)

Reset a user password

auth

Auth password signin on Descope (Auth Platform)

Sign in a user with a password

auth

Auth password signup on Descope (Auth Platform)

Sign up a user with a password

auth

Auth webauthn signin finish on Descope (Auth Platform)

Finish WebAuthn sign in

auth

Auth webauthn signin start on Descope (Auth Platform)

Start WebAuthn sign in

auth

Auth webauthn signup finish on Descope (Auth Platform)

Finish WebAuthn sign up

auth

Auth webauthn signup start on Descope (Auth Platform)

Start WebAuthn sign up

mgmt

Mgmt create access key on Descope (Auth Platform)

Create a new access key (M2M)

mgmt

Mgmt create permission on Descope (Auth Platform)

Create a new permission

mgmt

Mgmt create role on Descope (Auth Platform)

Create a new role

mgmt

Mgmt create tenant on Descope (Auth Platform)

Create a new tenant

mgmt

Mgmt create user on Descope (Auth Platform)

Create a new user

mgmt

Mgmt delete user on Descope (Auth Platform)

Delete a user

mgmt

Mgmt get user on Descope (Auth Platform)

Load a user by login ID

mgmt

Mgmt list tenants on Descope (Auth Platform)

Load all tenants

mgmt

Mgmt search users on Descope (Auth Platform)

Search for users

mgmt

Mgmt update user on Descope (Auth Platform)

Update an existing user

Connect Descope (Auth Platform) to CrewAI via MCP

Follow these steps to wire Descope (Auth Platform) into CrewAI. The entire setup takes under two minutes — your credentials stay safe behind Vinkius.

01

Install CrewAI

Run pip install crewai
02

Replace the token

Replace [YOUR_TOKEN_HERE] with your Vinkius token from cloud.vinkius.com
03

Customize the agent

Adjust the role, goal, and backstory to fit your use case
04

Run the crew

Run python crew.py. CrewAI auto-discovers 33 tools from Descope (Auth Platform)

Why Use CrewAI with the Descope (Auth Platform) MCP Server

CrewAI Multi-Agent Orchestration Framework provides unique advantages when paired with Descope (Auth Platform) through the Model Context Protocol.

01

Multi-agent collaboration lets you decompose complex workflows into specialized roles, one agent researches, another analyzes, a third generates reports, each with access to MCP tools

02

CrewAI's native MCP integration requires zero adapter code: pass Vinkius Edge URL directly in the `mcps` parameter and agents auto-discover every available tool at runtime

03

Built-in task delegation and shared memory mean agents can pass context between steps without manual state management, enabling multi-hop reasoning across tool calls

04

Sequential and hierarchical crew patterns map naturally to real-world workflows: enumerate subdomains → analyze DNS history → check WHOIS records → compile findings into actionable reports

Descope (Auth Platform) + CrewAI Use Cases

Practical scenarios where CrewAI combined with the Descope (Auth Platform) MCP Server delivers measurable value.

01

Automated multi-step research: a reconnaissance agent queries Descope (Auth Platform) for raw data, then a second analyst agent cross-references findings and flags anomalies. all without human handoff

02

Scheduled intelligence reports: set up a crew that periodically queries Descope (Auth Platform), analyzes trends over time, and generates executive briefings in markdown or PDF format

03

Multi-source enrichment pipelines: chain Descope (Auth Platform) tools with other MCP servers in the same crew, letting agents correlate data across multiple providers in a single workflow

04

Compliance and audit automation: a compliance agent queries Descope (Auth Platform) against predefined policy rules, generates deviation reports, and routes findings to the appropriate team

Example Prompts for Descope (Auth Platform) in CrewAI

Ready-to-use prompts you can give your CrewAI agent to start working with Descope (Auth Platform) immediately.

01

"Sign up a new user with email dev-test@example.com using OTP."

02

"Verify the OTP code 998877 for user dev-test@example.com."

03

"Start a Google OAuth flow with redirect URL https://example.com/callback."

Troubleshooting Descope (Auth Platform) MCP Server with CrewAI

Common issues when connecting Descope (Auth Platform) to CrewAI through Vinkius, and how to resolve them.

01

MCP tools not discovered

Ensure the Edge URL is correct. CrewAI connects lazily when the crew starts. check console output.
02

Agent not using tools

Make the task description specific. Instead of "do something", say "Use the available tools to list contacts".
03

Timeout errors

CrewAI has a 10s connection timeout by default. Ensure your network can reach the Edge URL.
04

Rate limiting or 429 errors

Vinkius enforces per-token rate limits. Check your subscription tier and request quota in the dashboard. Upgrade if you need higher throughput.

Descope (Auth Platform) + CrewAI FAQ

Common questions about integrating Descope (Auth Platform) MCP Server with CrewAI.

01

How does CrewAI discover and connect to MCP tools?

CrewAI connects to MCP servers lazily. when the crew starts, each agent resolves its MCP URLs and fetches the tool catalog via the standard tools/list method. This means tools are always fresh and reflect the server's current capabilities. No tool schemas need to be hardcoded.
02

Can different agents in the same crew use different MCP servers?

Yes. Each agent has its own mcps list, so you can assign specific servers to specific roles. For example, a reconnaissance agent might use a domain intelligence server while an analysis agent uses a vulnerability database server.
03

What happens when an MCP tool call fails during a crew run?

CrewAI wraps tool failures as context for the agent. The LLM receives the error message and can decide to retry with different parameters, fall back to a different tool, or mark the task as partially complete. This resilience is critical for production workflows.
04

Can CrewAI agents call multiple MCP tools in parallel?

CrewAI agents execute tool calls sequentially within a single reasoning step. However, you can run multiple agents in parallel using process=Process.parallel, each calling different MCP tools concurrently. This is ideal for workflows where separate data sources need to be queried simultaneously.
05

Can I run CrewAI crews on a schedule (cron)?

Yes. CrewAI crews are standard Python scripts, so you can invoke them via cron, Airflow, Celery, or any task scheduler. The crew.kickoff() method runs synchronously by default, making it straightforward to integrate into existing pipelines.

Explore More MCP Servers

View all →