loading…
Search for a command to run...
loading…
Enables AI assistants to perform real-time SAP security audits and risk assessments by analyzing user roles, system parameters, and segregation of duties via RF
Enables AI assistants to perform real-time SAP security audits and risk assessments by analyzing user roles, system parameters, and segregation of duties via RFC integration. It provides 17 specialized tools for monitoring security compliance and generating comprehensive audit reports directly from SAP systems.
AI-powered security analysis for SAP systems via the Model Context Protocol (MCP).
Server URL: https://mcp.syntaai.com/mcp
User prompt: "Are there any users with SAP_ALL profile?"
What happens:
Tool used: check_critical_authorizations
User prompt: "Generate a SOX compliance report"
What happens:
Tool used: generate_compliance_report
User prompt: "Find all users who haven't logged in for 90 days and check if any have critical roles"
What happens:
Tools used: find_inactive_users, list_privileged_users
| Tool | Description | Annotations |
|---|---|---|
list_users |
List SAP users with status/type filtering | Read-only |
get_user_details |
Get detailed user info including roles and login history | Read-only |
list_user_roles |
List roles and profiles for a user | Read-only |
find_inactive_users |
Find users inactive for N days | Read-only |
| Tool | Description | Annotations |
|---|---|---|
get_security_parameters |
SAP security parameters vs best practices | Read-only |
check_critical_authorizations |
Find users with SAP_ALL/SAP_NEW/S_A.SYSTEM | Read-only |
get_audit_log |
Retrieve security audit log entries | Read-only |
check_default_passwords |
Check for default/initial passwords | Read-only |
get_rfc_connections |
Analyze RFC destinations for credential risks | Read-only |
| Tool | Description | Annotations |
|---|---|---|
run_sod_check |
Check Segregation of Duties violations | Read-only |
generate_compliance_report |
Generate SOX/GDPR/ISO27001/NIST report | Read-only |
list_privileged_users |
List users with elevated privileges | Read-only |
check_password_policy |
Analyze password policy vs best practices | Read-only |
get_transport_log |
Transport request log for change management | Read-only |
| Tool | Description | Annotations |
|---|---|---|
list_roles |
List security roles with search | Read-only |
get_role_details |
Get role details including authorizations | Read-only |
compare_user_access |
Compare access rights between two users | Read-only |
find_users_with_role |
Find all users assigned a specific role | Read-only |
get_authorization_trace |
Get authorization check trace entries | Read-only |
OAuth 2.0 with PKCE. Discovery endpoints:
GET /.well-known/oauth-authorization-server (RFC 8414)GET /.well-known/oauth-protected-resource (RFC 9728)Supports Dynamic Client Registration (RFC 7591) and token revocation (RFC 7009).
# Install
cd /opt/mcp-server
python -m venv venv
source venv/bin/activate
pip install -r requirements.txt
# Run
python server.py # with OAuth (production)
MCP_NO_AUTH=1 python server.py # without OAuth (development)
Apache License 2.0 — see LICENSE for details.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"syntaai-sap-security-mcp-server": {
"command": "npx",
"args": []
}
}
}