Skip to content

This page documents the Aembit MCP Server API, including the service URL, authentication headers, available tools, and metadata resources. For a conceptual overview, see About the MCP Server.

Use the following URL pattern to connect to the Aembit MCP Server:

  • Production:
    Terminal window
    https://<tenantId>.mcp.useast2.aembit.io/mcp

Replace <tenantId> with your tenant identifier, visible in the Aembit Admin UI Profile screen.

All requests require bearer token authentication using your Aembit API Token.

HeaderRequiredDescription
AuthorizationRequiredBearer token for all requests.
X-Aembit-ResourceSetOptionalScope queries to a specific resource set. Omit to use your default resource set.

Authorization:

Terminal window
Authorization: Bearer <apiToken>

Resource set scoping:

Terminal window
X-Aembit-ResourceSet: <resourceSetId>

The following tools are the available MCP Server tools for querying Aembit event logs:

See also Audit Logs

Retrieve audit logs with filtering and pagination. By default, returns the last 30 days of audit logs, sorted by newest first.

Parameters

All parameters are optional.

ParameterTypeDefaultDescription
pageinteger1Page number for pagination.
perPageinteger100Results per page. Maximum and default value is 100.
orderBystring"CreatedAt"Sort field. Valid values: CreatedAt, Category, ActorDisplayName, Activity, Target, OutcomeResult, Severity.
descendingbooleantrueSort in descending order when true.
searchstring""Search text to filter audit logs by content.
startDatestring | nullnullStart of date range in ISO 8601 format. Requires endDate. Overrides spanLastMinutes and spanLastDays.
endDatestring | nullnullEnd of date range in ISO 8601 format. Requires startDate. The server clamps values beyond the current Coordinated Universal Time (UTC) to now.
spanLastMinutesinteger0Return logs from the last N minutes. Takes priority over spanLastDays. Ignored when you specify startDate/endDate.
spanLastDaysinteger30Return logs from the last N days. Only applies when you don’t specify startDate/endDate or spanLastMinutes.
categorystring | nullnullFilter by audit log category. See Audit log categories for valid values.
severitystring | nullnullFilter by severity. Valid values: Info, Warn, Alert.

Date range priority: startDate/endDate > spanLastMinutes > spanLastDays.

Example request:

{
"category": "Authentication",
"severity": "Warn",
"spanLastDays": 7,
"perPage": 10
}

See also Audit and Report

Retrieve authorization events with filtering and pagination. By default, returns the last 24 hours of authorization events, sorted by newest first.

Parameters

All parameters are optional.

ParameterTypeDefaultDescription
pageinteger1Page number for pagination.
perPageinteger100Results per page. Maximum and default value is 100.
orderBystring"Timestamp"Sort field. Valid values: Timestamp, ClientIp, ContextId, ClientWorkload, ServerWorkload, Severity.
descendingbooleantrueSort in descending order when true.
searchstring""Search text to filter authorization events by content.
startDatestring | nullnullStart of date range in ISO 8601 format. Requires endDate. Overrides spanLastMinutes and spanLastHours.
endDatestring | nullnullEnd of date range in ISO 8601 format. Requires startDate. The server clamps values beyond the current UTC to now.
spanLastMinutesinteger0Return events from the last N minutes. Takes priority over spanLastHours. Ignored when you specify startDate/endDate.
spanLastHoursinteger24Return events from the last N hours. Only applies when you don’t specify startDate/endDate or spanLastMinutes.
severitystring | nullnullFilter by severity. Valid values: Error, Alert, Warn, Info.
eventTypestring | nullnullFilter by event type. Valid values: Request, Authorization, Credential.

Date range priority: startDate/endDate > spanLastMinutes > spanLastHours.

Example request:

{
"eventType": "Request",
"severity": "Error",
"startDate": "2025-12-02T08:00:00Z",
"endDate": "2025-12-02T09:00:00Z",
"perPage": 50
}

See also Workload Events

Retrieve Workload: Any non-human entity (application, service, automation, etc.) that needs to access resources.Learn more events with filtering and pagination. By default, returns the last 24 hours of workload events, sorted by newest first.

Parameters

All parameters are optional.

ParameterTypeDefaultDescription
pageinteger1Page number for pagination.
perPageinteger100Results per page. Maximum and default value is 100.
orderBystring"Timestamp"Sort field. Valid values: Timestamp, ConnectionId, EventType, ClientWorkload, ServerWorkload, Severity.
descendingbooleantrueSort in descending order when true.
searchstring""Search text to filter workload events by content.
startDatestring | nullnullStart of date range in ISO 8601 format. Requires endDate. Overrides spanLastMinutes and spanLastHours.
endDatestring | nullnullEnd of date range in ISO 8601 format. Requires startDate. The server clamps values beyond the current UTC to now.
spanLastMinutesinteger0Return events from the last N minutes. Takes priority over spanLastHours. Ignored when you specify startDate/endDate.
spanLastHoursinteger24Return events from the last N hours. Only applies when you don’t specify startDate/endDate or spanLastMinutes.
severitystring | nullnullFilter by severity. Valid values: Error, Alert, Warn, Info.
appProtocolstring | nullnullFilter by application protocol. See Workload event types for valid values.
sourceWorkloadarray of UUIDs | nullnullFilter by client workload IDs.
targetWorkloadarray of UUIDs | nullnullFilter by server workload IDs.

Date range priority: startDate/endDate > spanLastMinutes > spanLastHours.

Example request:

{
"appProtocol": "Postgres",
"severity": "Error",
"spanLastHours": 6
}

The MCP Server exposes the following resources as machine-readable metadata. AI agents use these resources to discover valid filter values for each tool.

Severity values for the severity filter in get_audit_logs.

ValueDescription
InfoRoutine administrative activity.
WarnEvents that may indicate a configuration issue or unusual activity.
AlertHigh-importance events requiring attention.

Valid values for the category filter in get_audit_logs. Each category corresponds to a type of activity logged in the Aembit Admin UI. See Audit Logs for descriptions of each category.

Unknown, Tenant, Users, Authentication, Workloads, AccessPolicies, Agents, CredentialProvider, TrustProvider, AgentControllers, LogStreams, Integrations, AccessConditions, Roles, IdentityProviders, ResourceSets, Analysis, Routing, SignOnPolicies, PkiSettings, StandaloneCertificateAuthorities, CredentialProviderIntegrations, DiscoveryIntegration, GlobalPolicyCompliance

Valid values for the eventType filter in get_auth_events. Each type represents a step in Aembit’s access authorization flow. See Access Authorization Events for the full event schema.

ValueDescription
RequestCaptures the incoming access request and associated metadata.
AuthorizationRecords the outcome of Access Policy evaluation, including Trust Provider and Access Condition results.
CredentialRecords the result of credential retrieval from the Credential Provider.

Severity values for the severity filter in get_auth_events.

ValueDescription
ErrorAuthorization failed due to an internal error.
AlertHigh-priority authorization event requiring attention.
WarnConcerning authorization activity.
InfoStandard, expected authorization activity.

Application protocol values used with the appProtocol filter parameter:

Redshift, HTTP, MySQL, Postgres, Redis, Snowflake, TCP, OracleDatabase, MCP

Severity values for the severity filter in get_workload_events.

ValueDescription
ErrorWorkload connection failed or encountered an error.
AlertHigh-priority workload event requiring attention.
WarnConcerning workload activity.
InfoStandard, expected workload activity.

The following tools work with the Aembit MCP Server:

For example prompts and prompt engineering best practices, see the Prompt Library.

  • Drilldown: Tools and integrations such as MCP Inspector allow you to drill into event details for each result.
  • Filtering: Each tool accepts optional filter parameters for time range, severity, and tool-specific fields. See the preceding parameter tables for available filters per tool.

Aembit logs all queries to the MCP Server in the audit trail, including the identity of the requesting agent.

The MCP Server doesn’t enforce application-level rate limiting. The maximum page size (perPage) is 100. Requests that exceed this value cap to 100.

  • Only the tools and resources listed in the preceding sections are available in beta.
  • Your Aembit administrator must enable the MCP Server for your Aembit Tenant: Aembit Tenants serve as isolated, dedicated environments within Aembit that provide complete separation of administrative domains and security configurations.Learn more.