4,000+ servers built on vurb.ts
Vinkius
Google ADKSDK
Google ADK
SuperTokens MCP Server

Bring Authentication
to Google ADK

Learn how to connect SuperTokens to Google ADK and start using 18 AI agent tools in minutes. Fully managed, enterprise secure, and ready to use without writing a single line of code.

MCP Inspector GDPR Free for Subscribers
Assign Role To UserBulk Import UsersCreate Or Update RoleCreate Or Update TenantCreate SessionDelete User MetadataGet TenantGet UserGet User MetadataLink AccountsList RolesList User RolesRefresh SessionRemove SessionSignin UserSignup UserUnlink AccountsUpdate User Metadata

Compatible with every major AI agent and IDE

ClaudeClaude
ChatGPTChatGPT
CursorCursor
GeminiGemini
WindsurfWindsurf
VS CodeVS Code
JetBrainsJetBrains
VercelVercel
+ other MCP clients
SuperTokens

What is the SuperTokens MCP Server?

Connect your SuperTokens Core instance to any AI agent to manage user lifecycles, session security, and Role-Based Access Control (RBAC) through natural language.

What you can do

  • User Management — Sign up new users, sign in existing ones, and retrieve detailed user profiles or link multiple accounts together.
  • Session Control — Create, refresh, and revoke sessions (JWT or database-backed) to maintain tight security over user access.
  • RBAC & Permissions — Create roles, define permissions, and assign them to users to manage authorization levels dynamically.
  • User Metadata — Store and update custom JSON metadata for users to track preferences or application-specific data.
  • Account Linking — Seamlessly link or unlink different recipe user IDs to a primary user identity.

How it works

  1. Subscribe to this server
  2. Enter your SuperTokens Core URL and API Key
  3. Start managing your authentication layer from Claude, Cursor, or any MCP-compatible client

Who is this for?

  • Backend Developers — quickly debug user sessions or update roles without writing manual scripts or using a CLI.
  • Support Teams — inspect user metadata and account status to resolve login issues or permission errors instantly.
  • Security Engineers — audit roles and revoke suspicious sessions directly through a conversational interface.

Built-in capabilities (18)

assign_role_to_user

Assign a role to a user

bulk_import_users

Bulk import users

create_or_update_role

Create or update a user role

create_or_update_tenant

Create or update a tenant

create_session

Create a new session for a user

delete_user_metadata

Delete metadata for a user

get_tenant

Get tenant details

get_user

Get user details by ID

get_user_metadata

Get metadata for a user

link_accounts

Link two user accounts together

list_roles

List all roles

list_user_roles

List roles assigned to a user

refresh_session

Refresh an existing session

remove_session

Remove/revoke a session

signin_user

Sign in a user

signup_user

Sign up a new user

unlink_accounts

Unlink a user account

update_user_metadata

Update metadata for a user

Why Google ADK?

Google ADK natively supports SuperTokens as an MCP tool provider. declare Vinkius Edge URL and the framework handles discovery, validation, and execution automatically. Combine 18 tools with Gemini's long-context reasoning for complex multi-tool workflows, with production-ready session management and evaluation built in.

  • Google ADK natively supports MCP tool servers. declare a tool provider and the framework handles discovery, validation, and execution

  • Built on Gemini models, ADK provides long-context reasoning ideal for complex multi-tool workflows with SuperTokens

  • Production-ready features like session management, evaluation, and deployment come built-in. not bolted on

  • Seamless integration with Google Cloud services means you can combine SuperTokens tools with BigQuery, Vertex AI, and Cloud Functions

G
See it in action

SuperTokens in Google ADK

AI AgentVinkius
High Security·Kill Switch·Plug and Play
Why Vinkius

SuperTokens and 4,000+ other MCP servers. One platform. One governance layer.

Teams that connect SuperTokens to Google ADK through Vinkius don't need to source, host, or maintain individual MCP servers. Every tool call runs inside a hardened runtime with credential isolation, DLP, and a signed audit chain.

4,000+MCP Servers ready
<40msCold start
60%Token savings
Raw MCP
Vinkius
Server catalogFind and host yourself4,000+ managed
InfrastructureSelf-hostedSandboxed V8 isolates
Credential handlingPlaintext in configVault + runtime injection
Data loss preventionNoneConfigurable DLP policies
Kill switchNoneGlobal instant shutdown
Financial circuit breakersNonePer-server limits + alerts
Audit trailNoneEd25519 signed logs
SIEM log streamingNoneSplunk, Datadog, Webhook
HoneytokensNoneCanary alerts on leak
Custom domainsNot applicableDNS challenge verified
GDPR complianceManual effortAutomated purge + export
Enterprise Security

Why teams choose Vinkius for SuperTokens in Google ADK

The SuperTokens MCP Server runs on Vinkius-managed infrastructure inside AWS — a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts. All 18 tools execute in hardened sandboxes optimized for native MCP execution.

Your AI agents in Google ADK only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure, zero maintenance.

SuperTokens
Fully ManagedVinkius Servers
60%Token savings
High SecurityEnterprise-grade
IAMAccess control
EU AI ActCompliant
DLPData protection
V8 IsolateSandboxed
Ed25519Audit chain
<40msKill switch
Stream every event to Splunk, Datadog, or your own webhook in real-time

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure

The Vinkius Advantage

How Vinkius secures SuperTokens for Google ADK

Every tool call from Google ADK to the SuperTokens MCP Server is protected by DLP redaction, cryptographic audit chains, V8 sandbox isolation, kill switch, and financial circuit breakers.

< 40msCold start
Ed25519Signed audit chain
60%Token savings
FAQ

Frequently asked questions

01

Can I retrieve specific user information using their ID?

Yes, by using the get_user tool with the specific User ID, you can fetch the full profile, including email and account linking status.

02

How do I assign a specific role like 'admin' to a user?

You can use the assign_role_to_user tool. Just provide the User ID and the role name to update their permissions immediately.

03

Is it possible to update custom user data or preferences?

Absolutely. The update_user_metadata tool allows you to pass a JSON object to store or update custom information for any user.

04

How does Google ADK connect to MCP servers?

Import the MCP toolset class and pass the server URL. ADK discovers and registers all tools automatically, making them available to your agent's tool-use loop.

05

Can ADK agents use multiple MCP servers?

Yes. Declare multiple MCP tool providers in your agent configuration. ADK merges all tool schemas and the agent can call tools from any server in a single turn.

06

Which Gemini models work best with MCP tools?

Gemini 2.0 Flash and Pro models both support function calling required for MCP tools. Flash is recommended for latency-sensitive use cases, Pro for complex reasoning.

07

McpToolset not found

Update: pip install --upgrade google-adk

Explore More MCP Servers

View all →