II.
ToolServer JSON
Structured · livetool-server:mcp-onelogin-candidate
OneLogin MCP candidate json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "tool-server:mcp-onelogin-candidate",
"_kind": "ToolServer",
"_file": "extensions/tool-servers/ora-operations-mcp-candidates.yaml",
"_cluster": "extensions",
"attributes": {
"displayName": "OneLogin MCP candidate",
"description": "Candidate MCP server for OneLogin users, apps, groups, SSO configuration, and access governance. Recorded from Ora discovery as a missing MCP/tool-server coverage point.\n",
"protocol": "mcp-stdio",
"provenance": "custom",
"category": "security",
"maintainer": "Candidate",
"sourceRef": "source-ref:ora-discover-api",
"candidateStatus": "needs-source-verification",
"ora": {
"domain": "onelogin.com",
"score": 0,
"grade": "F"
}
},
"outgoingEdges": [
{
"from": "tool-server:mcp-onelogin-candidate",
"to": "tool:onelogin",
"kind": "integrates_with",
"attributes": {}
},
{
"from": "tool-server:mcp-onelogin-candidate",
"to": "source-ref:ora-discover-api",
"kind": "sourced_from",
"attributes": {}
},
{
"from": "tool-server:mcp-onelogin-candidate",
"to": "role:security-reviewer",
"kind": "supports_work",
"attributes": {
"confidence": "medium",
"evidence": "Identity metadata supports access-review and security review."
}
},
{
"from": "tool-server:mcp-onelogin-candidate",
"to": "workflow:access-control-audit",
"kind": "supports_work",
"attributes": {
"confidence": "high",
"evidence": "SSO and directory data are direct access-control audit evidence."
}
}
],
"incomingEdges": []
}