21 tools from the Auth0 MCP Server, categorised by risk level.
View the Auth0 policy →auth0_get_action Get Auth0 action details 2/5 auth0_get_application Get Auth0 application details 2/5 auth0_get_form Get Auth0 form details 2/5 auth0_get_log Get a specific Auth0 log entry by ID 2/5 auth0_get_resource_server Get resource server details 2/5 auth0_list_actions List all Auth0 actions 2/5 auth0_list_applications List all Auth0 applications 2/5 auth0_list_forms List all Auth0 forms 2/5 auth0_list_logs List logs from the Auth0 tenant 2/5 auth0_list_resource_servers List all Auth0 resource servers (APIs) 2/5 auth0_create_action Create a new Auth0 action 5/5 auth0_create_application Create a new Auth0 application 5/5 auth0_create_application_grant Create a client grant for API access 5/5 auth0_create_form Create a new Auth0 form 4/5 auth0_create_resource_server Create a new Auth0 resource server (API) 5/5 auth0_publish_form Publish an Auth0 form 4/5 auth0_update_action Update an Auth0 action 5/5 auth0_update_application Update an Auth0 application 5/5 auth0_update_form Update an Auth0 form 4/5 auth0_update_resource_server Update an Auth0 resource server 5/5 The Auth0 MCP server exposes 21 tools across 3 categories: Read, Write, Execute.
Use Intercept, the open-source MCP proxy. Write YAML rules for each tool — rate limits, argument validation, or deny rules — then run Intercept in front of the Auth0 server.
Auth0 tools are categorised as Read (10), Write (10), Execute (1). Each category has a recommended default policy.
Open source. One binary. Zero dependencies.
npx -y @policylayer/intercept