Compatible with every major AI agent and IDE
What is the Descope (Auth Platform) MCP Server?
Connect Descope to your AI agent to manage and test user authentication flows through natural conversation. Descope is a drag-and-drop authentication and user management platform for any application.
What you can do
- OTP Authentication — Initiate and verify One-Time Passwords via Email, SMS, or Voice using tools like
auth_otp_signup_emailandauth_otp_verify_email. - Magic & Enchanted Links — Send secure sign-up/sign-in links and poll for session completion with
auth_magiclink_signup_emailorauth_enchantedlink_poll. - OAuth Integration — Start OAuth flows with providers like Google and exchange codes for active sessions using
auth_oauth_authorize. - Password Management — Handle traditional password-based sign-ups via
auth_password_signup. - Session Verification — Verify tokens and manage the authentication lifecycle directly from your workspace.
How it works
- Subscribe to this server
- Enter your Descope Project ID and optional Management Key
- Start managing your auth flows from Claude, Cursor, or any MCP-compatible client
Who is this for?
- Developers — Test authentication logic and verify OTP/Magic Link flows without leaving the terminal or IDE.
- QA Engineers — Automate the verification of sign-up and sign-in processes through natural language queries.
- Product Managers — Quickly inspect how different auth providers and methods are configured in your project.
Built-in capabilities (33)
Poll for Enchanted Link session
Sign up a user via Enchanted Link
Verify an Enchanted Link token
Exchange an access key for a session JWT
Get public keys for session validation
Sign up or sign in a user via Magic Link
Verify a Magic Link token
Start OAuth flow
Exchange OAuth code for session
Sign in a user via Email OTP
Sign up a user via Email OTP
Sign up a user via SMS OTP
Sign up a user via Voice OTP
Verify an Email OTP
Verify an SMS OTP
Verify a Voice OTP
Reset a user password
Sign in a user with a password
Sign up a user with a password
Finish WebAuthn sign in
Start WebAuthn sign in
Finish WebAuthn sign up
Start WebAuthn sign up
Create a new access key (M2M)
Create a new permission
Create a new role
Create a new tenant
Create a new user
Delete a user
Load a user by login ID
Load all tenants
Search for users
Update an existing user
Why CrewAI?
When paired with CrewAI, Descope (Auth Platform) becomes a first-class tool in your multi-agent workflows. Each agent in the crew can call Descope (Auth Platform) tools autonomously, one agent queries data, another analyzes results, a third compiles reports, all orchestrated through Vinkius with zero configuration overhead.
- —
Multi-agent collaboration lets you decompose complex workflows into specialized roles, one agent researches, another analyzes, a third generates reports, each with access to MCP tools
- —
CrewAI's native MCP integration requires zero adapter code: pass Vinkius Edge URL directly in the
mcpsparameter and agents auto-discover every available tool at runtime - —
Built-in task delegation and shared memory mean agents can pass context between steps without manual state management, enabling multi-hop reasoning across tool calls
- —
Sequential and hierarchical crew patterns map naturally to real-world workflows: enumerate subdomains → analyze DNS history → check WHOIS records → compile findings into actionable reports
Descope (Auth Platform) in CrewAI
Descope (Auth Platform) and 4,000+ other MCP servers. One platform. One governance layer.
Teams that connect Descope (Auth Platform) to CrewAI through Vinkius don't need to source, host, or maintain individual MCP servers. Every tool call runs inside a hardened runtime with credential isolation, DLP, and a signed audit chain.
Raw MCP | Vinkius | |
|---|---|---|
| Server catalog | Find and host yourself | 4,000+ managed |
| Infrastructure | Self-hosted | Sandboxed V8 isolates |
| Credential handling | Plaintext in config | Vault + runtime injection |
| Data loss prevention | None | Configurable DLP policies |
| Kill switch | None | Global instant shutdown |
| Financial circuit breakers | None | Per-server limits + alerts |
| Audit trail | None | Ed25519 signed logs |
| SIEM log streaming | None | Splunk, Datadog, Webhook |
| Honeytokens | None | Canary alerts on leak |
| Custom domains | Not applicable | DNS challenge verified |
| GDPR compliance | Manual effort | Automated purge + export |
Why teams choose Vinkius for Descope (Auth Platform) in CrewAI
The Descope (Auth Platform) MCP Server runs on Vinkius-managed infrastructure inside AWS — a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts. All 33 tools execute in hardened sandboxes optimized for native MCP execution.
Your AI agents in CrewAI only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure, zero maintenance.

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure
How Vinkius secures
Descope (Auth Platform) for CrewAI
Every tool call from CrewAI to the Descope (Auth Platform) MCP Server is protected by DLP redaction, cryptographic audit chains, V8 sandbox isolation, kill switch, and financial circuit breakers.
Frequently asked questions
How do I verify an email OTP code sent to a user?
Use the auth_otp_verify_email tool by providing the user's loginId (email) and the code they received. The agent will return the session details if the verification is successful.
Can I start a Google OAuth login flow using this server?
Yes. Use the auth_oauth_authorize tool with 'google' as the provider and specify your redirectURL. The agent will initiate the OAuth flow for you.
What is the purpose of the enchanted link polling tool?
The auth_enchantedlink_poll tool allows the agent to check the status of a pending enchanted link authentication using a pendingRef. It helps determine if the user has clicked the link and completed the session.
How does CrewAI discover and connect to MCP tools?
CrewAI connects to MCP servers lazily. when the crew starts, each agent resolves its MCP URLs and fetches the tool catalog via the standard tools/list method. This means tools are always fresh and reflect the server's current capabilities. No tool schemas need to be hardcoded.
Can different agents in the same crew use different MCP servers?
Yes. Each agent has its own mcps list, so you can assign specific servers to specific roles. For example, a reconnaissance agent might use a domain intelligence server while an analysis agent uses a vulnerability database server.
What happens when an MCP tool call fails during a crew run?
CrewAI wraps tool failures as context for the agent. The LLM receives the error message and can decide to retry with different parameters, fall back to a different tool, or mark the task as partially complete. This resilience is critical for production workflows.
Can CrewAI agents call multiple MCP tools in parallel?
CrewAI agents execute tool calls sequentially within a single reasoning step. However, you can run multiple agents in parallel using process=Process.parallel, each calling different MCP tools concurrently. This is ideal for workflows where separate data sources need to be queried simultaneously.
Can I run CrewAI crews on a schedule (cron)?
Yes. CrewAI crews are standard Python scripts, so you can invoke them via cron, Airflow, Celery, or any task scheduler. The crew.kickoff() method runs synchronously by default, making it straightforward to integrate into existing pipelines.
MCP tools not discovered
Ensure the Edge URL is correct. CrewAI connects lazily when the crew starts. check console output.
Agent not using tools
Make the task description specific. Instead of "do something", say "Use the available tools to list contacts".
Timeout errors
CrewAI has a 10s connection timeout by default. Ensure your network can reach the Edge URL.
Rate limiting or 429 errors
Vinkius enforces per-token rate limits. Check your subscription tier and request quota in the dashboard. Upgrade if you need higher throughput.
Explore More MCP Servers
View all →
CData Connect Cloud
8 toolsUniversal Data Gateway mapping explicitly proxy structures parsing SQL schemas dynamically connecting APIs natively.

Pipedrive Deals
12 toolsDeep deal management — search, create, update, delete deals with pipeline tracking, timeline analysis, and participant management.

AI Receptionist
10 toolsLet AI answer your business calls, book appointments, and handle customer inquiries around the clock without missing a beat.

U.S. Treasury Budget — Federal Revenue, Spending & Deficit
5 toolsTrack the U.S. Federal Government's wallet. Access daily Treasury cash balances, monthly and yearly federal revenue/spending, and track the ongoing multi-trillion dollar budget deficit.
