4,000+ servers built on vurb.ts
Vinkius
LangChainFramework
Descope (Auth Platform) MCP Server

Bring Authentication
to LangChain

Learn how to connect Descope (Auth Platform) to LangChain and start using 33 AI agent tools in minutes. Fully managed, enterprise secure, and ready to use without writing a single line of code.

MCP Inspector GDPR Free for Subscribers
Auth Enchantedlink PollAuth Enchantedlink SignupAuth Enchantedlink VerifyAuth Exchange Access KeyAuth Get KeysAuth Magiclink Signup EmailAuth Magiclink VerifyAuth Oauth AuthorizeAuth Oauth ExchangeAuth Otp Signin EmailAuth Otp Signup EmailAuth Otp Signup SmsAuth Otp Signup VoiceAuth Otp Verify EmailAuth Otp Verify SmsAuth Otp Verify VoiceAuth Password ResetAuth Password SigninAuth Password SignupAuth Webauthn Signin FinishAuth Webauthn Signin StartAuth Webauthn Signup FinishAuth Webauthn Signup StartMgmt Create Access KeyMgmt Create PermissionMgmt Create RoleMgmt Create TenantMgmt Create UserMgmt Delete UserMgmt Get UserMgmt List TenantsMgmt Search UsersMgmt Update User

Compatible with every major AI agent and IDE

ClaudeClaude
ChatGPTChatGPT
CursorCursor
GeminiGemini
WindsurfWindsurf
VS CodeVS Code
JetBrainsJetBrains
VercelVercel
+ other MCP clients
Descope (Auth Platform)

What is the Descope (Auth Platform) MCP Server?

Connect Descope to your AI agent to manage and test user authentication flows through natural conversation. Descope is a drag-and-drop authentication and user management platform for any application.

What you can do

  • OTP Authentication — Initiate and verify One-Time Passwords via Email, SMS, or Voice using tools like auth_otp_signup_email and auth_otp_verify_email.
  • Magic & Enchanted Links — Send secure sign-up/sign-in links and poll for session completion with auth_magiclink_signup_email or auth_enchantedlink_poll.
  • OAuth Integration — Start OAuth flows with providers like Google and exchange codes for active sessions using auth_oauth_authorize.
  • Password Management — Handle traditional password-based sign-ups via auth_password_signup.
  • Session Verification — Verify tokens and manage the authentication lifecycle directly from your workspace.

How it works

  1. Subscribe to this server
  2. Enter your Descope Project ID and optional Management Key
  3. Start managing your auth flows from Claude, Cursor, or any MCP-compatible client

Who is this for?

  • Developers — Test authentication logic and verify OTP/Magic Link flows without leaving the terminal or IDE.
  • QA Engineers — Automate the verification of sign-up and sign-in processes through natural language queries.
  • Product Managers — Quickly inspect how different auth providers and methods are configured in your project.

Built-in capabilities (33)

auth_enchantedlink_poll

Poll for Enchanted Link session

auth_enchantedlink_signup

Sign up a user via Enchanted Link

auth_enchantedlink_verify

Verify an Enchanted Link token

auth_exchange_access_key

Exchange an access key for a session JWT

auth_get_keys

Get public keys for session validation

auth_magiclink_signup_email

Sign up or sign in a user via Magic Link

auth_magiclink_verify

Verify a Magic Link token

auth_oauth_authorize

Start OAuth flow

auth_oauth_exchange

Exchange OAuth code for session

auth_otp_signin_email

Sign in a user via Email OTP

auth_otp_signup_email

Sign up a user via Email OTP

auth_otp_signup_sms

Sign up a user via SMS OTP

auth_otp_signup_voice

Sign up a user via Voice OTP

auth_otp_verify_email

Verify an Email OTP

auth_otp_verify_sms

Verify an SMS OTP

auth_otp_verify_voice

Verify a Voice OTP

auth_password_reset

Reset a user password

auth_password_signin

Sign in a user with a password

auth_password_signup

Sign up a user with a password

auth_webauthn_signin_finish

Finish WebAuthn sign in

auth_webauthn_signin_start

Start WebAuthn sign in

auth_webauthn_signup_finish

Finish WebAuthn sign up

auth_webauthn_signup_start

Start WebAuthn sign up

mgmt_create_access_key

Create a new access key (M2M)

mgmt_create_permission

Create a new permission

mgmt_create_role

Create a new role

mgmt_create_tenant

Create a new tenant

mgmt_create_user

Create a new user

mgmt_delete_user

Delete a user

mgmt_get_user

Load a user by login ID

mgmt_list_tenants

Load all tenants

mgmt_search_users

Search for users

mgmt_update_user

Update an existing user

Why LangChain?

LangChain's ecosystem of 500+ components combines seamlessly with Descope (Auth Platform) through native MCP adapters. Connect 33 tools via Vinkius and use ReAct agents, Plan-and-Execute strategies, or custom agent architectures. with LangSmith tracing giving full visibility into every tool call, latency, and token cost.

  • The largest ecosystem of integrations, chains, and agents. combine Descope (Auth Platform) MCP tools with 500+ LangChain components

  • Agent architecture supports ReAct, Plan-and-Execute, and custom strategies with full MCP tool access at every step

  • LangSmith tracing gives you complete visibility into tool calls, latencies, and token usage for production debugging

  • Memory and conversation persistence let agents maintain context across Descope (Auth Platform) queries for multi-turn workflows

See it in action

Descope (Auth Platform) in LangChain

AI AgentVinkius
High Security·Kill Switch·Plug and Play
Why Vinkius

Descope (Auth Platform) and 4,000+ other MCP servers. One platform. One governance layer.

Teams that connect Descope (Auth Platform) to LangChain through Vinkius don't need to source, host, or maintain individual MCP servers. Every tool call runs inside a hardened runtime with credential isolation, DLP, and a signed audit chain.

4,000+MCP Servers ready
<40msCold start
60%Token savings
Raw MCP
Vinkius
Server catalogFind and host yourself4,000+ managed
InfrastructureSelf-hostedSandboxed V8 isolates
Credential handlingPlaintext in configVault + runtime injection
Data loss preventionNoneConfigurable DLP policies
Kill switchNoneGlobal instant shutdown
Financial circuit breakersNonePer-server limits + alerts
Audit trailNoneEd25519 signed logs
SIEM log streamingNoneSplunk, Datadog, Webhook
HoneytokensNoneCanary alerts on leak
Custom domainsNot applicableDNS challenge verified
GDPR complianceManual effortAutomated purge + export
Enterprise Security

Why teams choose Vinkius for Descope (Auth Platform) in LangChain

The Descope (Auth Platform) MCP Server runs on Vinkius-managed infrastructure inside AWS — a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts. All 33 tools execute in hardened sandboxes optimized for native MCP execution.

Your AI agents in LangChain only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure, zero maintenance.

Descope (Auth Platform)
Fully ManagedVinkius Servers
60%Token savings
High SecurityEnterprise-grade
IAMAccess control
EU AI ActCompliant
DLPData protection
V8 IsolateSandboxed
Ed25519Audit chain
<40msKill switch
Stream every event to Splunk, Datadog, or your own webhook in real-time

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure

The Vinkius Advantage

How Vinkius secures Descope (Auth Platform) for LangChain

Every tool call from LangChain to the Descope (Auth Platform) MCP Server is protected by DLP redaction, cryptographic audit chains, V8 sandbox isolation, kill switch, and financial circuit breakers.

< 40msCold start
Ed25519Signed audit chain
60%Token savings
FAQ

Frequently asked questions

01

How do I verify an email OTP code sent to a user?

Use the auth_otp_verify_email tool by providing the user's loginId (email) and the code they received. The agent will return the session details if the verification is successful.

02

Can I start a Google OAuth login flow using this server?

Yes. Use the auth_oauth_authorize tool with 'google' as the provider and specify your redirectURL. The agent will initiate the OAuth flow for you.

03

What is the purpose of the enchanted link polling tool?

The auth_enchantedlink_poll tool allows the agent to check the status of a pending enchanted link authentication using a pendingRef. It helps determine if the user has clicked the link and completed the session.

04

How does LangChain connect to MCP servers?

Use langchain-mcp-adapters to create an MCP client. LangChain discovers all tools and wraps them as native LangChain tools compatible with any agent type.

05

Which LangChain agent types work with MCP?

All agent types including ReAct, OpenAI Functions, and custom agents work with MCP tools. The tools appear as standard LangChain tools after the adapter wraps them.

06

Can I trace MCP tool calls in LangSmith?

Yes. All MCP tool invocations appear as traced steps in LangSmith, showing input parameters, response payloads, latency, and token usage.

07

MultiServerMCPClient not found

Install: pip install langchain-mcp-adapters

Explore More MCP Servers

View all →