id = "azure-mcp" name = "Microsoft Azure" description = "Manage Azure resources including VMs, Storage, and App Services through the MCP server" category = "cloud" icon = "🔷" tags = ["cloud", "microsoft", "infrastructure", "azure", "devops", "enterprise"] [transport] type = "stdio" command = "npx" args = ["@modelcontextprotocol/server-azure"] [[required_env]] name = "AZURE_SUBSCRIPTION_ID" label = "Azure Subscription ID" help = "Your Azure subscription ID (found in the Azure Portal under Subscriptions)" is_secret = false get_url = "https://portal.azure.com/#blade/Microsoft_Azure_Billing/SubscriptionsBlade" [[required_env]] name = "AZURE_TENANT_ID" label = "Azure Tenant ID" help = "Your Azure Active Directory tenant ID" is_secret = false get_url = "https://portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Overview" [[required_env]] name = "AZURE_CLIENT_ID" label = "Azure Client ID" help = "The application (client) ID of your Azure AD app registration" is_secret = false get_url = "https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade" [[required_env]] name = "AZURE_CLIENT_SECRET" label = "Azure Client Secret" help = "A client secret generated for your Azure AD app registration" is_secret = true get_url = "https://portal.azure.com/#blade/Microsoft_AAD_RegisteredApps/ApplicationsListBlade" [health_check] interval_secs = 60 unhealthy_threshold = 3 setup_instructions = """ 1. In the Azure Portal, register an application under Azure Active Directory > App registrations and note the Client ID and Tenant ID. 2. Create a client secret under Certificates & Secrets for the registered application. 3. Assign the appropriate RBAC roles to the application on your subscription, then paste all four values into the fields above. """