by firstorderai
Provides seamless access to two‑factor authentication codes and passwords for AI agents, enabling automated login while maintaining security.
Enables AI agents to retrieve 2FA codes and passwords from the Authenticator App, allowing automated login flows without exposing credentials.
AUTHENTICATOR_ACCESS_TOKEN environment variable.npx command.Q: Do I need to install any server-side software?
A: No. The server runs as a lightweight Node.js process triggered via npx.
Q: How is the access token protected? A: It is generated once in the Authenticator App and should be stored securely (environment variable or config file). The server never logs the token.
Q: Can I run the server on a remote machine? A: The server is intended to run locally alongside the Authenticator App, as it needs direct access to the app’s credential store.
Q: What happens if the token expires? A: Generate a new token from the app’s Settings → MCP Server section and update your configuration.
Q: Is this compatible with other 2FA apps? A: The MCP server is specific to the Authenticator App · 2FA provided by FirstOrder AI.
A secure MCP (Model Context Protocol) server that enables AI agents to interact with the Authenticator App. It provides seamless access to 2FA codes and passwords, allowing AI agents to assist with automated login processes while maintaining security. This tool bridges the gap between AI assistants and secure authentication, making it easier to manage your credentials across different platforms and websites.
This MCP server is specifically designed for use with Authenticator App · 2FA.
Many AI clients use a configuration file to manage MCP servers.
The authenticator-mcp tool can be configured by adding the following to your configuration file.
NOTE: You will need to create a Authenticator App access token to use this server. Instructions on how to create a Authenticator App access token can be found here.
{
"mcpServers": {
"Authenticator App MCP": {
"command": "npx",
"args": ["-y", "authenticator-mcp", "--access-token=YOUR-KEY"]
}
}
}
{
"mcpServers": {
"Authenticator App MCP": {
"command": "cmd",
"args": ["/c", "npx", "-y", "authenticator-mcp", "--access-token=YOUR-KEY"]
}
}
}
Or you can set AUTHENTICATOR_ACCESS_TOKEN in the env field.
Authenticator App · 2FA.Settings and locate the MCP Server section.ON, then proceed to generate your access token.Please note that the access token will only be displayed once. Be sure to copy it immediately and add it to your MCP client configuration.
Please log in to share your review and rating for this MCP.
Explore related MCPs that share similar capabilities and solve comparable challenges
by chaitin
A self‑hosted web application firewall and reverse proxy that protects web applications from attacks and exploits by filtering, monitoring, and blocking malicious HTTP/S traffic.
by safedep
Provides enterprise‑grade open source software supply chain security by scanning source code, dependencies, containers and SBOMs, detecting vulnerabilities and malicious packages, and enforcing policy as code.
by semgrep
Offers an MCP server that lets LLMs, agents, and IDEs run Semgrep scans to detect security vulnerabilities in source code.
by PortSwigger
Enables Burp Suite to communicate with AI clients via the Model Context Protocol, providing an MCP server and bundled stdio proxy.
by cycodehq
Boost security in the development lifecycle via SAST, SCA, secrets, and IaC scanning.
by mobb-dev
Provides automatic security vulnerability remediation for code via a command‑line interface and an MCP server, leveraging findings from popular SAST tools such as Checkmarx, CodeQL, Fortify, and Snyk.
by ChristophEnglisch
Provides AI‑powered administration of Keycloak users and realms through the Model Context Protocol, enabling automated creation, deletion, and listing of users and realms from MCP clients such as Claude Desktop.
by Spathodea-Network
Provides a Model Context Protocol server that enables querying and retrieving threat intelligence data from OpenCTI through a standardized interface.
by vespo92
Manage OPNsense firewalls through conversational AI, providing network configuration, device discovery, DNS filtering, HAProxy setup, and backup/restore via simple commands.
{
"mcpServers": {
"Authenticator App MCP Server": {
"command": "npx",
"args": [
"-y",
"authenticator-mcp",
"--access-token=YOUR-KEY"
],
"env": {
"AUTHENTICATOR_ACCESS_TOKEN": "<YOUR_ACCESS_TOKEN>"
}
}
}
}claude mcp add Authenticator App MCP Server npx -y authenticator-mcp --access-token=YOUR-KEY