4,000+ servers built on vurb.ts
Vinkius
LangChainFramework
Hanko (Passkey Auth) MCP Server

Bring Authentication
to LangChain

Learn how to connect Hanko (Passkey Auth) to LangChain and start using 15 AI agent tools in minutes. Fully managed, enterprise secure, and ready to use without writing a single line of code.

MCP Inspector GDPR Free for Subscribers
Admin Create UserAdmin Get UserAdmin List User CredentialsAdmin List UsersFlow ExecutePasskey Delete CredentialPasskey List CredentialsPasskey Login FinalizePasskey Login InitPasskey Registration FinalizePasskey Registration InitPasskey Transaction FinalizePasskey Transaction InitPublic Get JwksPublic Validate Session

Compatible with every major AI agent and IDE

ClaudeClaude
ChatGPTChatGPT
CursorCursor
GeminiGemini
WindsurfWindsurf
VS CodeVS Code
JetBrainsJetBrains
VercelVercel
+ other MCP clients
Hanko (Passkey Auth)

What is the Hanko (Passkey Auth) MCP Server?

Connect your Hanko instance to any AI agent to streamline passkey-based authentication and user management. This server provides a comprehensive interface for WebAuthn flows and administrative user operations.

What you can do

  • Passkey Lifecycle — Initialize and finalize WebAuthn registration and login flows for secure, passwordless access.
  • Credential Management — List and delete registered WebAuthn credentials for specific users.
  • User Administration — Create, retrieve, and list users and their associated credentials via admin tools.
  • Transaction Security — Initialize and finalize passkey-signed transactions for sensitive operations like payments.
  • Session Validation — Publicly validate sessions and retrieve JWKS for token verification.

How it works

  1. Subscribe to this server
  2. Enter your Hanko Tenant ID and API Key
  3. Start managing identity flows from your MCP-compatible client

Who is this for?

  • Developers — quickly test and debug WebAuthn registration and login flows without manual API calls.
  • Security Engineers — audit user credentials and manage identity access policies through a conversational interface.
  • Product Teams — simulate and verify user onboarding and transaction signing workflows.

Built-in capabilities (15)

admin_create_user

Create a new user via Admin API

admin_get_user

Get a user by ID via Admin API

admin_list_user_credentials

List WebAuthn credentials for a user via Admin API

admin_list_users

List users via Admin API

flow_execute

Execute a Hanko Flow action

passkey_delete_credential

Delete a WebAuthn credential

passkey_list_credentials

List WebAuthn credentials for a user

passkey_login_finalize

Finalize a passkey login

passkey_login_init

Returns publicKey options for navigator.credentials.get(). Initialize a passkey login

passkey_registration_finalize

Finalize a passkey registration

passkey_registration_init

Returns publicKey options for navigator.credentials.create(). Initialize a passkey registration

passkey_transaction_finalize

Finalize a passkey transaction

passkey_transaction_init

g., payment confirmation) for an existing user. Initialize a passkey transaction

public_get_jwks

Get JSON Web Key Set (JWKS)

public_validate_session

Validate a Hanko session token

Why LangChain?

LangChain's ecosystem of 500+ components combines seamlessly with Hanko (Passkey Auth) through native MCP adapters. Connect 15 tools via Vinkius and use ReAct agents, Plan-and-Execute strategies, or custom agent architectures. with LangSmith tracing giving full visibility into every tool call, latency, and token cost.

  • The largest ecosystem of integrations, chains, and agents. combine Hanko (Passkey Auth) MCP tools with 500+ LangChain components

  • Agent architecture supports ReAct, Plan-and-Execute, and custom strategies with full MCP tool access at every step

  • LangSmith tracing gives you complete visibility into tool calls, latencies, and token usage for production debugging

  • Memory and conversation persistence let agents maintain context across Hanko (Passkey Auth) queries for multi-turn workflows

See it in action

Hanko (Passkey Auth) in LangChain

AI AgentVinkius
High Security·Kill Switch·Plug and Play
Why Vinkius

Hanko (Passkey Auth) and 4,000+ other MCP servers. One platform. One governance layer.

Teams that connect Hanko (Passkey Auth) to LangChain through Vinkius don't need to source, host, or maintain individual MCP servers. Every tool call runs inside a hardened runtime with credential isolation, DLP, and a signed audit chain.

4,000+MCP Servers ready
<40msCold start
60%Token savings
Raw MCP
Vinkius
Server catalogFind and host yourself4,000+ managed
InfrastructureSelf-hostedSandboxed V8 isolates
Credential handlingPlaintext in configVault + runtime injection
Data loss preventionNoneConfigurable DLP policies
Kill switchNoneGlobal instant shutdown
Financial circuit breakersNonePer-server limits + alerts
Audit trailNoneEd25519 signed logs
SIEM log streamingNoneSplunk, Datadog, Webhook
HoneytokensNoneCanary alerts on leak
Custom domainsNot applicableDNS challenge verified
GDPR complianceManual effortAutomated purge + export
Enterprise Security

Why teams choose Vinkius for Hanko (Passkey Auth) in LangChain

The Hanko (Passkey Auth) MCP Server runs on Vinkius-managed infrastructure inside AWS — a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts. All 15 tools execute in hardened sandboxes optimized for native MCP execution.

Your AI agents in LangChain only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure, zero maintenance.

Hanko (Passkey Auth)
Fully ManagedVinkius Servers
60%Token savings
High SecurityEnterprise-grade
IAMAccess control
EU AI ActCompliant
DLPData protection
V8 IsolateSandboxed
Ed25519Audit chain
<40msKill switch
Stream every event to Splunk, Datadog, or your own webhook in real-time

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure

The Vinkius Advantage

How Vinkius secures Hanko (Passkey Auth) for LangChain

Every tool call from LangChain to the Hanko (Passkey Auth) MCP Server is protected by DLP redaction, cryptographic audit chains, V8 sandbox isolation, kill switch, and financial circuit breakers.

< 40msCold start
Ed25519Signed audit chain
60%Token savings
FAQ

Frequently asked questions

01

How do I start a new passkey registration for a user?

Use the passkey_registration_init tool with the user's ID and username. This will return the necessary WebAuthn options to be used on the client side.

02

Can I view all WebAuthn credentials associated with a specific user?

Yes, you can use the passkey_list_credentials tool (or admin_list_user_credentials for admin access) to retrieve a list of all registered passkeys for any user ID.

03

Is it possible to create a user directly through the AI agent?

Absolutely. Use the admin_create_user tool to provision a new user in your Hanko project by providing a unique user ID.

04

How does LangChain connect to MCP servers?

Use langchain-mcp-adapters to create an MCP client. LangChain discovers all tools and wraps them as native LangChain tools compatible with any agent type.

05

Which LangChain agent types work with MCP?

All agent types including ReAct, OpenAI Functions, and custom agents work with MCP tools. The tools appear as standard LangChain tools after the adapter wraps them.

06

Can I trace MCP tool calls in LangSmith?

Yes. All MCP tool invocations appear as traced steps in LangSmith, showing input parameters, response payloads, latency, and token usage.

07

MultiServerMCPClient not found

Install: pip install langchain-mcp-adapters

Explore More MCP Servers

View all →