ciphertrust-manager-mcp-server
by sanyambassi·★ 8·Score 38
MCP Server for Thales CipherTrust Manager enabling AI assistants to interact with cryptographic key management operations through the ksctl CLI.
Overview
This is an independently-developed MCP server that bridges AI assistants like Claude and Cursor with Thales CipherTrust Manager, a cryptographic key management platform. The server exposes tools for key management, CTE client management, user management, and connection management through JSON-RPC communication over stdin/stdout. It supports both manual JSON-RPC testing and interactive UI testing using the Model Context Protocol Inspector. The server is designed to be run as a subprocess by MCP clients and uses the ksctl CLI to interact with CipherTrust resources. It's important to note that this is an unofficial, open-source project not officially supported by Thales.
Try asking AI
After installing, here are 6 things you can ask your AI assistant:
When to choose this
Choose this server if you need to integrate AI assistants with Thales CipherTrust Manager for cryptographic key management operations.
When NOT to choose this
Avoid this server if you need support for non-Thales cryptographic solutions or if you require official vendor support.
Tools this server exposes
8 tools extracted from the READMEkey_managementManage cryptographic keys in CipherTrust Manager
user_managementManage user accounts and access in CipherTrust Manager
cte_client_managementManage CipherTrust Transparent Encryption clients
connection_managementManage connections to external systems
cluster_managementManage CipherTrust Manager cluster configuration
license_managementManage CipherTrust Manager licenses
crypto_operationsPerform cryptographic operations using CipherTrust Manager
system_informationGet system and service information from CipherTrust Manager
Note: Tool names were inferred from the Features section and test examples. The README doesn't have a dedicated tools section, but mentions supported operations in the Features section and provides some tool examples in the Testing section.
Comparable tools
Installation
Installation
Prerequisites
- Git
- Python 3.11 or higher
- uv for dependency management
- Access to a CipherTrust Manager instance
Installation Steps
- Clone the repository:
git clone https://github.com/sanyambassi/ciphertrust-manager-mcp-server.git
cd ciphertrust-manager-mcp-server- Create a virtual environment and install dependencies:
uv venv
.venv\Scripts\activate (Windows) or .venv/bin/activate (Unix)
uv pip install -e .- Configure environment variables (create .env file):
CIPHERTRUST_URL=https://your-ciphertrust-manager.example.com
CIPHERTRUST_USER=admin
CIPHERTRUST_PASSWORD=your-password-here
CIPHERTRUST_NOSSLVERIFY=trueIntegration with Claude Desktop
Add the following to your Claude Desktop configuration file:
{
"mcpServers": {
"ciphertrust": {
"command": "/absolute/path/to/ciphertrust-manager-mcp-server/.venv/bin/ciphertrust-mcp-server",
"env": {
"CIPHERTRUST_URL": "https://your-ciphertrust.example.com",
"CIPHERTRUST_USER": "admin",
"CIPHERTRUST_PASSWORD": "your-password-here"
}
}
}
}FAQ
- Is this project officially supported by Thales?
- No, this is an independently-developed open-source project. It uses public APIs and documented interfaces but is not officially supported by Thales.
- What AI assistants are compatible with this MCP server?
- The server is designed to work with AI assistants that support the MCP protocol, including Claude Desktop and Cursor.
- Can I use this server in production environments?
- The project states it should be thoroughly tested in your environment as it is provided 'as-is' with no warranty. It's recommended to evaluate its suitability for your specific production needs.
Compare ciphertrust-manager-mcp-server with
Last updated · Auto-generated from public README + GitHub signals.