A secure Model Context Protocol (MCP) server that lets AI agents retrieve 2-factor codes and passwords from the Authenticator App.
https://github.com/firstorderai/authenticator_mcpYou know the drill: you've built a slick automation workflow, everything's running smoothly, then BAM—2FA code required. Your beautiful automation grinds to a halt while you manually fish out your phone, open your authenticator app, type in the code, and pray it hasn't expired.
The Authenticator MCP server changes that game entirely. It connects your AI agents directly to your desktop 2FA app, letting them grab codes and passwords on demand. No more automation bottlenecks. No more context switching to your phone every few minutes.
Authentication automation sucks. You can automate the login flow, handle form filling, manage session persistence—but the moment 2FA enters the picture, your workflow breaks. You're stuck choosing between:
None of these options scale when you're running multiple automation workflows across different services.
This MCP server creates a secure bridge between your AI agents and the Authenticator desktop app. Here's the flow:
The entire handoff happens in seconds, and your agent can handle the complete authentication process autonomously.
DevOps Automation: Deploy scripts that need to authenticate with multiple services (AWS, GitHub, Docker registries) without stopping for 2FA prompts.
CI/CD Pipeline Integration: Automated testing flows that need to log into staging environments with 2FA enabled—no more failed builds waiting for manual intervention.
Data Collection Workflows: Scripts that scrape or sync data from 2FA-protected APIs can run continuously without human intervention.
Multi-Account Management: AI agents managing social media, analytics, or business accounts across platforms can authenticate seamlessly across all services.
Development Environment Setup: Onboarding scripts that configure development environments can authenticate with package managers, private repos, and internal tools automatically.
Install the desktop Authenticator app for your platform (Mac App Store, Microsoft Store, or .deb for Linux), generate an access token, and add one configuration block to your MCP client:
{
"mcpServers": {
"Authenticator App MCP": {
"command": "npx",
"args": ["-y", "authenticator-mcp", "--access-token=YOUR-KEY"]
}
}
}
Your AI agents immediately gain access to all your 2FA codes and stored passwords. No complex API integrations, no security compromises, no workflow redesigns.
This slots directly into your current automation stack. Whether you're using Cursor's agent mode, custom MCP clients, or building automation workflows, your agents can now handle the full authentication lifecycle.
The server exposes simple methods—request codes, verify codes, retrieve passwords—that work exactly how you'd expect. Your existing automation logic stays the same; you just remove the manual 2FA bottlenecks.
The desktop app generates access tokens locally—no credentials travel across networks unnecessarily. The MCP server uses these tokens to fetch codes securely from your local authenticator instance. Your 2FA secrets never leave your machine; the server just provides a controlled interface for your agents to access them.
This is authentication automation done right: secure, local, and designed for developers who need their workflows to actually work without constant intervention.
Stop letting 2FA break your automation. Give your AI agents the authentication capabilities they need to handle complete workflows autonomously.