Connect
Optimize
Secure
Announcing StackOne Defender: leading open-source prompt injection guard for your agent • Read More →
Production-ready JumpCloud MCP server with 53 extensible actions — plus built-in authentication, security, and optimized execution.
Coverage
Create, read, update, and delete across JumpCloud — and extend your agent's capabilities with custom actions.
Authentication
Per-user OAuth in one call. Your JumpCloud MCP server gets session-scoped tokens with zero credentials stored on your infra.
Agent Auth →Security
Every JumpCloud tool response scanned for prompt injection in milliseconds — 88.7% accuracy, all running on CPU.
Prompt Injection Defense →Performance
Free up to 96% of your agent's context window to enhance reasoning and reduce cost, on every JumpCloud call.
Tools Discovery →A JumpCloud MCP server lets AI agents read and write JumpCloud data through the Model Context Protocol — Anthropic's open standard for connecting LLMs to external tools. StackOne's JumpCloud MCP server ships with 53 pre-built actions, fully extensible via the Connector Builder — plus managed authentication, prompt injection defense, and optimized agent context. Connect it from MCP clients like Claude Desktop, Cursor, and VS Code, or from agent frameworks like OpenAI Agents SDK, LangChain, and Vercel AI SDK.
Every action from JumpCloud's API, ready for your agent. Create, read, update, and delete — scoped to exactly what you need.
Create a new system user with profile details and access settings via POST /systemusers
Retrieve a paginated list of all system users (end users) in the organization via GET /systemusers
Retrieve full profile details for a specific system user by their unique ID via GET /systemusers/{id}
Update an existing system user's profile and access settings via PUT /systemusers/{id}
Permanently delete a system user and revoke all their access via DELETE /systemusers/{id}
Create a new user group for organizing users and managing bulk access via POST /v2/usergroups
Retrieve a paginated list of all user groups in the organization via GET /v2/usergroups
Retrieve full details for a specific user group by its unique ID via GET /v2/usergroups/{id}
Partially update an existing user group's attributes via PATCH /v2/usergroups/{id}
Permanently delete a user group and remove all its memberships and associations via DELETE /v2/usergroups/{id}
Retrieve a paginated list of all device policies configured in the organization via GET /v2/policies
Create a new device policy from a template with configuration values via POST /v2/policies
Retrieve full details for a specific device policy by its ObjectID via GET /v2/policies/{id}
Fully replace an existing device policy's name, notes, and configuration values via PUT /v2/policies/{id}
Permanently delete a device policy and unbind it from all associated systems via DELETE /v2/policies/{id}
Retrieve a paginated list of all Cloud LDAP server configurations in the organization via GET /v2/ldapservers
Retrieve full details for a specific Cloud LDAP server by its unique ID via GET /v2/ldapservers/{id}
Partially update a Cloud LDAP server's name and user action settings via PATCH /v2/ldapservers/{id}
Create a new IP address list for use in conditional access policies via POST /v2/iplists
Retrieve a paginated list of all IP address lists configured for conditional access via GET /v2/iplists
Retrieve full details for a specific IP address list by its unique ID via GET /v2/iplists/{id}
Partially update an existing IP address list's name, description, or IP entries via PATCH /v2/iplists/{id}
Permanently delete an IP address list and affect any referencing conditional access policies via DELETE /v2/iplists/{id}
Create a new managed software application configuration for deployment via POST /v2/softwareapps
Retrieve a paginated list of all managed software applications in the organization via GET /v2/softwareapps
Retrieve full details for a specific managed software application by its unique ID via GET /v2/softwareapps/{id}
Fully replace a software application's display name and settings via PUT /v2/softwareapps/{id}
Permanently delete a software application configuration and unmanage it on all systems via DELETE /v2/softwareapps/{id}
Retrieve a paginated list of all managed systems (devices) in the organization via GET /systems
Retrieve full details for a specific managed system by its unique ID via GET /systems/{id}
Update a system's display name, SSH settings, MFA configuration, and tags via PUT /systems/{id}
Remove a system from JumpCloud management and trigger agent uninstall via DELETE /systems/{id}
Create a new system group for organizing devices and managing bulk configurations via POST /v2/systemgroups
Retrieve a paginated list of all system (device) groups in the organization via GET /v2/systemgroups
Retrieve full details for a specific system group by its unique ID via GET /v2/systemgroups/{id}
Fully replace a system group's configuration via PUT /v2/systemgroups/{id}
Permanently delete a system group and remove all its memberships and associations via DELETE /v2/systemgroups/{id}
Create a new SSO/SAML application with SAML configuration via POST /applications
Retrieve a paginated list of all SSO/SAML applications configured in the organization via GET /applications
Retrieve full details for a specific SSO/SAML application by its unique ID via GET /applications/{id}
Fully replace an existing SSO/SAML application's configuration via PUT /applications/{id}
Permanently delete an SSO/SAML application and remove all user access via DELETE /applications/{id}
Create a new command with script content and execution settings via POST /commands
Retrieve a paginated list of all commands configured in the organization via GET /commands
Retrieve full details for a specific command by its unique ID via GET /commands/{id}
Fully replace an existing command's configuration via PUT /commands/{id}
Permanently delete a command and cancel all its scheduled executions via DELETE /commands/{id}
Retrieve paginated execution results for a specific command via GET /commands/{id}/results
Retrieve uploaded files attached to a command via GET /files/command/{id}
Trigger immediate execution of a command on specified or all bound systems via POST /runCommand
Retrieve a paginated list of all organizations accessible to the current API key via GET /organizations
Retrieve full details for a specific organization by its unique ID via GET /organizations/{id}
Update an organization's settings, policies, and feature configuration via PUT /organizations/{id}
One endpoint. Any framework. Your agent is talking to JumpCloud in under 10 lines of code.
MCP Clients
Agent Frameworks
{
"mcpServers": {
"stackone": {
"command": "npx",
"args": [
"-y",
"mcp-remote@latest",
"https://api.stackone.com/mcp?x-account-id=<account_id>",
"--header",
"Authorization: Basic <YOUR_BASE64_TOKEN>"
]
}
}
}137+ actions
109+ actions
69+ actions
67+ actions
57+ actions
37+ actions
32+ actions
Anthropic's code_execution processes data already in context. Custom MCP code mode keeps raw tool responses in a sandbox. 14K tokens vs 500.
11 min
Benchmarking BM25, TF-IDF, and hybrid search for MCP tool discovery across 916 tools. The 80/20 TF-IDF/BM25 hybrid hits 21% Top-1 accuracy in under 1ms.
10 min
MCP tools that read emails, CRM records, and tickets are indirect prompt injection vectors. Here's how we built a two-tier defense that scans tool results in ~11ms.
12 min
origin_owner_id.All the tools you need to build and scale AI agent integrations, with best-in-class connectivity, execution, and security.