← Back to TAKO MCP Server for Okta
Install TAKO MCP Server for Okta
Pick your client, copy the command, done.
1
Add it to Claude Code
claude mcp add -e "OKTA_ORG_URL=${OKTA_ORG_URL}" -e "OKTA_API_TOKEN=${OKTA_API_TOKEN}" tako-okta -- docker run -i --rm -e OKTA_ORG_URL -e OKTA_API_TOKEN tako-mcp-server:stdioRequired:
OKTA_ORG_URLOKTA_API_TOKEN+ 1 optionalEnvironment Variables
Set these before running TAKO MCP Server for Okta.
VariableDescriptionRequired
OKTA_ORG_URLThe base URL of your Okta organization.YesOKTA_API_TOKENOkta API token for authentication.YesENABLE_AGENT_MODEToggle between standard MCP mode (false) and autonomous agent mode (true).NoAvailable Tools (5)
Once configured, TAKO MCP Server for Okta gives your AI agent access to:
read_system_instructionsRetrieves system instructions for the MCP server.get_code_generation_promptProvides a prompt for generating code to interact with Okta.execute_codeExecutes code in a sandboxed environment to perform Okta operations.codeget_available_operationsLists available Okta API operations for agent discovery.get_operation_detailsRetrieves detailed information about a specific Okta operation.operation_nameTry It Out
After setup, try these prompts with your AI agent:
→List all users in the 'Engineering' group using the Okta tools.
→Find all inactive users who haven't logged in for the last 90 days.
→Generate a report of all assigned applications for the user with email 'jdoe@example.com'.
→Check for any security policy violations in the current Okta configuration.
→Export the list of all active groups to a CSV file.
Prerequisites & system requirements
- An MCP-compatible client (Claude Code, Cursor, Windsurf, Claude Desktop, or Codex)
- Docker installed and running
OKTA_ORG_URL— The base URL of your Okta organization.OKTA_API_TOKEN— Okta API token for authentication.
Keep this setup from going cold
Save the docs, env vars, and workflow around TAKO MCP Server for Okta in Conare so Claude Code, Codex, and Cursor remember it next time.