https://app.lucenthq.com/api/mcp and uses static
bearer tokens minted from your org settings. Read-only: agents can list and
fetch data, never write or mutate.
1. Create a token
Open Organization settings
Sign in to the Lucent dashboard, then open
Organization settings → MCP.
Click Create token
Give the token a name so you can identify it later (e.g.
my laptop,
cursor-prod). Names are free text up to 64 characters.2. Configure your client
The UI auto-fills the snippets below with your real token until you navigate away — copy whichever one matches your client.- Claude Code CLI
- Cursor
- Claude Desktop
- Smoke test (curl)
Register the server once for the current project:Claude Code stores this in
~/.claude.json and sends the bearer header
on every request. Run /mcp inside Claude Code to confirm the connection
and list the tools.3. Try a tool
Once the client is connected, ask your agent a question that needs your Lucent data. A few prompts that exercise each tool:- “What are my most critical unresolved issues right now?” →
list_issues - “Show me issue 87b3a6b6-5af5-438b-a39c-eff148a68ccb.” →
get_issue - “What signals have I configured and which are matching most?” →
list_signals - “Summarize the last week of insights.” →
list_insights
Security model
- 192-bit token entropy. Generated from a CSPRNG, encoded with
base64url. Prefixed withluc_mcp_so you can spot them in configs. - SHA-256 hashed at rest. The plaintext is never stored on disk or in logs — only the hex digest.
- Organization-scoped. Every tool query compiles to
WHERE org_id = ?where theorg_idcomes exclusively from your token’s auth context. There is no way for a client to override it. - Instant revocation. Revoking a token in the dashboard sets
revoked_at; the next request returns401immediately. - Read-only. The MCP server exposes no write tools. Agents cannot create, update, or delete data in your org.
- Per-token usage timestamps. The
Last usedcolumn in the dashboard shows when each token was most recently active. If you see unexpected activity, revoke and rotate.
Troubleshooting
Failed to parse JSON / SDK auth failed
Failed to parse JSON / SDK auth failed
Your client likely couldn’t reach the OAuth discovery endpoint. Confirm
you can
GET https://app.lucenthq.com/.well-known/oauth-protected-resource
and it returns valid JSON (not an HTML page). If it’s blocked by a
corporate proxy, add an exception.401 Unauthorized on every request
401 Unauthorized on every request
500 Internal Server Error
500 Internal Server Error
The streamable HTTP transport is the only supported transport. If your
client is trying to fall back to legacy SSE (
/api/sse or
/api/message), upgrade to a client that supports streamable HTTP or
use mcp-remote as a proxy.I lost my plaintext token
I lost my plaintext token
The plaintext is only visible once, at creation time. Revoke the token
in Organization settings → MCP and create a new one.