4,000+ servers built on vurb.ts
Vinkius

Descope (Auth Platform) MCP Server for Google ADKGive Google ADK instant access to 33 tools to Auth Enchantedlink Poll, Auth Enchantedlink Signup, Auth Enchantedlink Verify, and more

MCP Inspector GDPR Free for Subscribers

Google Agent Development Kit (ADK) is Google's framework for building production AI agents. Add Descope (Auth Platform) as an MCP tool provider through Vinkius and your ADK agents can call every tool with full schema introspection.

Ask AI about this MCP Server for Google ADK

The Descope (Auth Platform) MCP Server for Google ADK is a standout in the Developer Tools category — giving your AI agent 33 tools to work with, ready to go from day one.

Built for AI Agents by Vinkius

Vinkius delivers Streamable HTTP and SSE to any MCP client

ClaudeClaude
ChatGPTChatGPT
CursorCursor
GeminiGemini
WindsurfWindsurf
VS CodeVS Code
JetBrainsJetBrains
VercelVercel
+ other MCP clients
python
from google.adk.agents import Agent
from google.adk.tools.mcp_tool import McpToolset
from google.adk.tools.mcp_tool.mcp_session_manager import (
    StreamableHTTPConnectionParams,
)

# Your Vinkius token. get it at cloud.vinkius.com
mcp_tools = McpToolset(
    connection_params=StreamableHTTPConnectionParams(
        url="https://edge.vinkius.com/[YOUR_TOKEN_HERE]/mcp",
    )
)

agent = Agent(
    model="gemini-2.5-pro",
    name="descope_auth_platform_agent",
    instruction=(
        "You help users interact with Descope (Auth Platform) "
        "using 33 available tools."
    ),
    tools=[mcp_tools],
)
Descope (Auth Platform)
Fully ManagedVinkius Servers
60%Token savings
High SecurityEnterprise-grade
IAMAccess control
EU AI ActCompliant
DLPData protection
V8 IsolateSandboxed
Ed25519Audit chain
<40msKill switch
Stream every event to Splunk, Datadog, or your own webhook in real-time

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure

About Descope (Auth Platform) MCP Server

Connect Descope to your AI agent to manage and test user authentication flows through natural conversation. Descope is a drag-and-drop authentication and user management platform for any application.

Google ADK natively supports Descope (Auth Platform) as an MCP tool provider. declare Vinkius Edge URL and the framework handles discovery, validation, and execution automatically. Combine 33 tools with Gemini's long-context reasoning for complex multi-tool workflows, with production-ready session management and evaluation built in.

What you can do

  • OTP Authentication — Initiate and verify One-Time Passwords via Email, SMS, or Voice using tools like auth_otp_signup_email and auth_otp_verify_email.
  • Magic & Enchanted Links — Send secure sign-up/sign-in links and poll for session completion with auth_magiclink_signup_email or auth_enchantedlink_poll.
  • OAuth Integration — Start OAuth flows with providers like Google and exchange codes for active sessions using auth_oauth_authorize.
  • Password Management — Handle traditional password-based sign-ups via auth_password_signup.
  • Session Verification — Verify tokens and manage the authentication lifecycle directly from your workspace.

The Descope (Auth Platform) MCP Server exposes 33 tools through the Vinkius. Connect it to Google ADK in under two minutes — credentials fully managed, no infrastructure to provision, no vendor lock-in. Your configuration, your data, your control.

All 33 Descope (Auth Platform) tools available for Google ADK

When Google ADK connects to Descope (Auth Platform) through Vinkius, your AI agent gets direct access to every tool listed below — spanning authentication, otp, oauth, and more. Every call runs in a secure, isolated environment with full audit visibility. Beyond a simple connection, you get real-time monitoring of agent activity, enterprise governance, and optimized token usage.

auth

Auth enchantedlink poll on Descope (Auth Platform)

Poll for Enchanted Link session

auth

Auth enchantedlink signup on Descope (Auth Platform)

Sign up a user via Enchanted Link

auth

Auth enchantedlink verify on Descope (Auth Platform)

Verify an Enchanted Link token

auth

Auth exchange access key on Descope (Auth Platform)

Exchange an access key for a session JWT

auth

Auth get keys on Descope (Auth Platform)

Get public keys for session validation

auth

Auth magiclink signup email on Descope (Auth Platform)

Sign up or sign in a user via Magic Link

auth

Auth magiclink verify on Descope (Auth Platform)

Verify a Magic Link token

auth

Auth oauth authorize on Descope (Auth Platform)

Start OAuth flow

auth

Auth oauth exchange on Descope (Auth Platform)

Exchange OAuth code for session

auth

Auth otp signin email on Descope (Auth Platform)

Sign in a user via Email OTP

auth

Auth otp signup email on Descope (Auth Platform)

Sign up a user via Email OTP

auth

Auth otp signup sms on Descope (Auth Platform)

Sign up a user via SMS OTP

auth

Auth otp signup voice on Descope (Auth Platform)

Sign up a user via Voice OTP

auth

Auth otp verify email on Descope (Auth Platform)

Verify an Email OTP

auth

Auth otp verify sms on Descope (Auth Platform)

Verify an SMS OTP

auth

Auth otp verify voice on Descope (Auth Platform)

Verify a Voice OTP

auth

Auth password reset on Descope (Auth Platform)

Reset a user password

auth

Auth password signin on Descope (Auth Platform)

Sign in a user with a password

auth

Auth password signup on Descope (Auth Platform)

Sign up a user with a password

auth

Auth webauthn signin finish on Descope (Auth Platform)

Finish WebAuthn sign in

auth

Auth webauthn signin start on Descope (Auth Platform)

Start WebAuthn sign in

auth

Auth webauthn signup finish on Descope (Auth Platform)

Finish WebAuthn sign up

auth

Auth webauthn signup start on Descope (Auth Platform)

Start WebAuthn sign up

mgmt

Mgmt create access key on Descope (Auth Platform)

Create a new access key (M2M)

mgmt

Mgmt create permission on Descope (Auth Platform)

Create a new permission

mgmt

Mgmt create role on Descope (Auth Platform)

Create a new role

mgmt

Mgmt create tenant on Descope (Auth Platform)

Create a new tenant

mgmt

Mgmt create user on Descope (Auth Platform)

Create a new user

mgmt

Mgmt delete user on Descope (Auth Platform)

Delete a user

mgmt

Mgmt get user on Descope (Auth Platform)

Load a user by login ID

mgmt

Mgmt list tenants on Descope (Auth Platform)

Load all tenants

mgmt

Mgmt search users on Descope (Auth Platform)

Search for users

mgmt

Mgmt update user on Descope (Auth Platform)

Update an existing user

Connect Descope (Auth Platform) to Google ADK via MCP

Follow these steps to wire Descope (Auth Platform) into Google ADK. The entire setup takes under two minutes — your credentials stay safe behind Vinkius.

01

Install Google ADK

Run pip install google-adk
02

Replace the token

Replace [YOUR_TOKEN_HERE] with your Vinkius token
03

Create the agent

Save the code above and integrate into your ADK workflow
04

Explore tools

The agent will discover 33 tools from Descope (Auth Platform) via MCP

Why Use Google ADK with the Descope (Auth Platform) MCP Server

Google ADK provides unique advantages when paired with Descope (Auth Platform) through the Model Context Protocol.

01

Google ADK natively supports MCP tool servers. declare a tool provider and the framework handles discovery, validation, and execution

02

Built on Gemini models, ADK provides long-context reasoning ideal for complex multi-tool workflows with Descope (Auth Platform)

03

Production-ready features like session management, evaluation, and deployment come built-in. not bolted on

04

Seamless integration with Google Cloud services means you can combine Descope (Auth Platform) tools with BigQuery, Vertex AI, and Cloud Functions

Descope (Auth Platform) + Google ADK Use Cases

Practical scenarios where Google ADK combined with the Descope (Auth Platform) MCP Server delivers measurable value.

01

Enterprise data agents: ADK agents query Descope (Auth Platform) and cross-reference results with internal databases for comprehensive analysis

02

Multi-modal workflows: combine Descope (Auth Platform) tool responses with Gemini's vision and language capabilities in a single agent

03

Automated compliance checks: schedule ADK agents to query Descope (Auth Platform) regularly and flag policy violations or configuration drift

04

Internal tool platforms: build self-service agent platforms where teams connect their own MCP servers including Descope (Auth Platform)

Example Prompts for Descope (Auth Platform) in Google ADK

Ready-to-use prompts you can give your Google ADK agent to start working with Descope (Auth Platform) immediately.

01

"Sign up a new user with email dev-test@example.com using OTP."

02

"Verify the OTP code 998877 for user dev-test@example.com."

03

"Start a Google OAuth flow with redirect URL https://example.com/callback."

Troubleshooting Descope (Auth Platform) MCP Server with Google ADK

Common issues when connecting Descope (Auth Platform) to Google ADK through Vinkius, and how to resolve them.

01

McpToolset not found

Update: pip install --upgrade google-adk

Descope (Auth Platform) + Google ADK FAQ

Common questions about integrating Descope (Auth Platform) MCP Server with Google ADK.

01

How does Google ADK connect to MCP servers?

Import the MCP toolset class and pass the server URL. ADK discovers and registers all tools automatically, making them available to your agent's tool-use loop.
02

Can ADK agents use multiple MCP servers?

Yes. Declare multiple MCP tool providers in your agent configuration. ADK merges all tool schemas and the agent can call tools from any server in a single turn.
03

Which Gemini models work best with MCP tools?

Gemini 2.0 Flash and Pro models both support function calling required for MCP tools. Flash is recommended for latency-sensitive use cases, Pro for complex reasoning.

Explore More MCP Servers

View all →