MCP Integration Guide
This guide covers integrating ID Wispera with Model Context Protocol (MCP) compatible AI agents.Overview
The ID Wispera MCP server enables AI agents like Claude to access governed credentials through standardized MCP tools and resources.Quick Setup
1. Install the MCP Server
2. Initialize Your Vault
3. Configure Your MCP Client
For Claude Desktop, add to your config:Available Tools
list_passports
List available credential passports.
Input:
get_credential
Retrieve a credential value.
Input:
request_access
Request access to a credential (for policy checking).
Input:
check_policy
Check if access would be allowed without retrieving the credential.
Input:
revoke_passport
Revoke a credential.
Input:
Available Resources
passport://{id}
Access passport metadata. Returns passport details without the credential value.
audit://{passport_id}
Access audit trail for a passport. Returns recent audit entries.
Security Considerations
Passphrase Security
- Stored in a secure secrets manager
- Not committed to version control
- Rotated periodically
Audit Trail
Every credential access through MCP is logged with actor, purpose, and timestamp. See the Audit log page for details.Policy Enforcement
MCP requests go through the same policy evaluation as CLI access:- Expired and revoked passports are blocked
- Privilege visas may require approval
- Delegation limits are enforced
The MCP server applies identical policy rules as the CLI. There is no way to bypass policy enforcement through the MCP interface.
Custom MCP Server
You can build a custom MCP server on top of the ID Wispera core library:Troubleshooting
| Problem | What to check |
|---|---|
| Server not starting | Verify IDW_PASSPHRASE is set, vault file exists, Node.js 18+ installed |
| Credentials not found | Check passport status, platform filter, and expiration date |
| Policy denials | Review visa type, delegation depth, expiration, and human owner requirement |
Next steps
Framework integrations
OpenAI Agents, Google A2A, Slack, and more — governed credentials for AI frameworks.
Policy engine
Configure declarative rules that govern credential access.
Security architecture
Understand the encryption model and threat model behind ID Wispera.
Audit log
Review credential access history and compliance reporting.