Compatible with every major AI agent and IDE
What is the Logto (Auth Platform) MCP Server?
Connect your Logto authentication platform to any AI agent and take full control of your identity management and access control workflows.
What you can do
- User Management — List, fetch, update, or delete users from your tenant with full metadata access.
- RBAC & Permissions — Create and list global roles and API resources to manage granular access control.
- Organizations — Handle multi-tenant structures by creating organizations and managing their memberships.
- Security & Verification — Verify user passwords and manage account-level security settings.
- Account API — Access and update the current user's profile and MFA settings using end-user tokens.
How it works
- Subscribe to this server
- Provide your Logto Management API credentials (Endpoint, App ID, and App Secret)
- Start managing your auth infrastructure from Claude, Cursor, or any MCP-compatible client
Who is this for?
- DevOps & Security Engineers — Quickly audit user lists, roles, and resource permissions without leaving the terminal.
- Full-stack Developers — Manage test users and organization structures directly from the code editor.
- Support Teams — Inspect user metadata and account statuses to resolve identity-related tickets faster.
Built-in capabilities (23)
Bind a new MFA factor (TOTP, WebAuthn)
Create a new organization
Create a new API resource
Create a new role
Delete a Logto user
Retrieve current user profile (Account API)
Get details for a specific Logto user
List registered MFA factors for the current user
List members of an organization
List organizations in Logto
List API resources in Logto
List global roles in Logto
List roles assigned to a user
List Logto users
Remove an MFA factor
Send email/SMS code for verification
Update basic profile (username, name, avatar)
Update user password
Update or link primary email
Update extended profile (address, etc.)
Update an existing Logto user
Verify password to get a verification ID
Verify a user password (Management API)
Why Pydantic AI?
Pydantic AI validates every Logto (Auth Platform) tool response against typed schemas, catching data inconsistencies at build time. Connect 23 tools through Vinkius and switch between OpenAI, Anthropic, or Gemini without changing your integration code. full type safety, structured output guarantees, and dependency injection for testable agents.
- —
Full type safety: every MCP tool response is validated against Pydantic models, catching data inconsistencies before they reach your application
- —
Model-agnostic architecture. switch between OpenAI, Anthropic, or Gemini without changing your Logto (Auth Platform) integration code
- —
Structured output guarantee: Pydantic AI ensures tool results conform to defined schemas, eliminating runtime type errors
- —
Dependency injection system cleanly separates your Logto (Auth Platform) connection logic from agent behavior for testable, maintainable code
Logto (Auth Platform) in Pydantic AI
Logto (Auth Platform) and 4,000+ other MCP servers. One platform. One governance layer.
Teams that connect Logto (Auth Platform) to Pydantic AI through Vinkius don't need to source, host, or maintain individual MCP servers. Every tool call runs inside a hardened runtime with credential isolation, DLP, and a signed audit chain.
Raw MCP | Vinkius | |
|---|---|---|
| Server catalog | Find and host yourself | 4,000+ managed |
| Infrastructure | Self-hosted | Sandboxed V8 isolates |
| Credential handling | Plaintext in config | Vault + runtime injection |
| Data loss prevention | None | Configurable DLP policies |
| Kill switch | None | Global instant shutdown |
| Financial circuit breakers | None | Per-server limits + alerts |
| Audit trail | None | Ed25519 signed logs |
| SIEM log streaming | None | Splunk, Datadog, Webhook |
| Honeytokens | None | Canary alerts on leak |
| Custom domains | Not applicable | DNS challenge verified |
| GDPR compliance | Manual effort | Automated purge + export |
Why teams choose Vinkius for Logto (Auth Platform) in Pydantic AI
The Logto (Auth Platform) MCP Server runs on Vinkius-managed infrastructure inside AWS — a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts. All 23 tools execute in hardened sandboxes optimized for native MCP execution.
Your AI agents in Pydantic AI only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure, zero maintenance.

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure
How Vinkius secures
Logto (Auth Platform) for Pydantic AI
Every tool call from Pydantic AI to the Logto (Auth Platform) MCP Server is protected by DLP redaction, cryptographic audit chains, V8 sandbox isolation, kill switch, and financial circuit breakers.
Frequently asked questions
Can I see which roles are assigned to a specific user?
Yes! Use the list_user_roles tool with the target User ID to retrieve all global roles associated with that account.
Is it possible to manage multi-tenant organizations through this server?
Absolutely. You can use list_organizations to see existing ones, create_organization to add new ones, and list_organization_users to audit membership.
Can I update user profiles or suspend accounts?
Yes, the update_user tool allows you to modify the username, name, avatar, and the isSuspended status of any user.
How does Pydantic AI discover MCP tools?
Create an MCPServerHTTP instance with the server URL. Pydantic AI connects, discovers all tools, and generates typed Python interfaces automatically.
Does Pydantic AI validate MCP tool responses?
Yes. When you define result types as Pydantic models, every tool response is validated against the schema. Invalid data raises a clear error instead of silently corrupting your pipeline.
Can I switch LLM providers without changing MCP code?
Absolutely. Pydantic AI abstracts the model layer. your Logto (Auth Platform) MCP integration works identically with OpenAI, Anthropic, Google, or any supported provider.
MCPServerHTTP not found
Update: pip install --upgrade pydantic-ai
Explore More MCP Servers
View all →
Surfer SEO
10 toolsConnect your AI to Surfer SEO. Generate Content Editors, perform NLP SERP audits, and extract high-ranking keyword guidelines directly from the terminal.

Kentico (CMS & DXP)
10 toolsManage content and system objects via Kentico Xperience — retrieve documents, manage users, and audit custom tables.

Cohere
6 toolsAccess Cohere AI models via API — chat with Command models, generate embeddings, rerank documents and tokenize text from any AI agent.

Avalara (AvaTax)
10 toolsAutomate tax calculation and compliance with Avalara AvaTax — calculate rates and resolve addresses via AI.
