Commvault MCP Server
A Model Context Protocol (MCP) server for interacting with Commvault software.
Install / Use
/learn @Commvault/Commvault MCP ServerQuality Score
Category
Development & EngineeringSupported Platforms
README
Commvault MCP Server
A Model Context Protocol (MCP) server for seamless integration with Commvault environments. This server enables AI agents to securely access and manage job details, commcell metrics, client and storage information, user permissions, plan configurations, and backup schedules.
Features
The Commvault MCP Server enables seamless integration with Commvault environments, offering the following:
| Category | Features | |----------|----------| | Job Management | • View job details and history<br>• Control jobs (suspend, resume, resubmit, kill)<br>• Monitor job status and performance | | Commcell Management | • Retrieve SLA status and compliance<br>• View security posture and scores<br>• Access storage space utilization metrics<br>• Get commcell details and entity counts | | Client Management | • Access client groups and client information<br>• Manage subclients and client properties<br>• View client associations | | Storage Management | • View storage policies and configurations<br>• Access storage pool information<br>• Monitor storage resources | | User Management | • List users and user groups<br>• Access security associations | | Plan Management | • View plan configurations and details<br>• Access plan components and settings | | Schedule Management | • Access backup schedules<br>• View schedule configurations<br>• Monitor schedule performance | | DocuSign Integration | • Setup Docusign Vault & Workflow<br>• Backup envelopes to Commvault S3 vault<br>• List & restore DocuSign envelope backups | | Salesforce Integration | • Resolve Salesforce org ID to Commvault client<br>• Browse backed-up Salesforce object records from latest snapshot<br>• Filter records with optional WHERE-clause queries<br>• Paginated access to large record sets |
Prerequisites
Before running the Commvault MCP Server, ensure the following requirements are met:
1. Python Environment
- Python 3.11 or higher
uvpackage manager (used for dependency management and running the server)
2. Authentication & Security Configuration
The Commvault MCP Server supports two authentication methods:
<details> <summary>Option 1: OAuth Authentication</summary> <br/>Note: OAuth authentication is only supported for Commvault environments running SP42 CU 27 and above. OAuth must be properly configured in the CommServe before using this option.
When using OAuth authentication, you'll need:
- Discovery Endpoint URL: The OAuth discovery/metadata endpoint
- Client ID: Your OAuth application's client identifier
- Client Secret: Your OAuth application's client secret
- Required Scopes: Required OAuth scopes
- Base URL: Base URL of the MCP Server
</details> <details> <summary>Option 2: Traditional Token-Based Authentication</summary> <br/>Important: The redirect URI must be set to
OAUTH_BASE_URL/auth/callbackin your OAuth provider's app/client configuration.
The following values will be collected during the setup process:
-
Commvault Access Credentials: You need a valid
access_tokenandrefresh_tokento authenticate with the Commvault API. Learn how to generate these tokens here: Creating an Access Token – Commvault Docs -
Secret Key: This secret must be included by the MCP Client in the
Authorizationheader of all tool requests. It acts as a security layer for tool access in remote server. You can set your own.
Important: When using traditional token-based authentication, the setup script requires a secure, OS-native keyring backend to store sensitive credentials securely. Only secure backends are allowed for security reasons.
Supported Secure Backends by Platform
| Platform | Supported Backends | Description |
|----------|-------------------|-------------|
| Windows | WinVaultKeyring, WinCredentialStore | Uses Windows Credential Manager (Windows Vault) for secure storage |
| macOS | macOS Keyring | Uses the native macOS Keychain for secure storage |
| Linux | SecretService (GNOME), KWallet (KDE) | Uses Freedesktop Secret Service API (GNOME) or KWallet (KDE) for secure storage |
Setup
1. Clone the repository
git clone https://github.com/Commvault/commvault-mcp-server.git
cd commvault-mcp-server
2. Run the Setup Script
The setup script will guide you through configuration options including:
- Transport mode (stdio, streamable-http, or sse)
- Server connection details (for remote modes)
- Authentication method (traditional tokens or OAuth)
- OAuth configuration (if selected)
- Secure token storage
uv run setup.py
3. Start the MCP Server
uv run -m src.server
<details>
<summary>Secure Production Deployment</summary>
<br/>
For production deployments, it is recommended to use a reverse proxy with TLS/HTTPS and security headers. The MCP server should bind to 127.0.0.1 (localhost only) to prevent direct public access.
Quick Setup
- Configure MCP Server for localhost: Set
MCP_HOST=127.0.0.1in your.envfile - Install reverse proxy: Choose nginx or Caddy
- Configure TLS: Use Let's Encrypt for automatic certificate management
- Add security headers: Configure OWASP-recommended headers (HSTS, X-Frame-Options, CSP, etc.)
- Update client config: Use
https://your-domain.com/mcpinstead ofhttp://HOST:PORT/mcp
Configuring Clients
<details> <summary>While using OAuth</summary> <br/>Note:
npxis required while using Token-Based Authentication. You can get it by installing Node.js which includesnpxby default.
Refer to your AI client’s documentation for integration steps. For example, Claude requires specifying a server name and the MCP server URL in its connector configuration.
</details> <details> <summary>Remote MCP Server (Streamable HTTP / SSE)</summary>{
"mcpServers": {
"Commvault": {
"command": "npx",
"args": ["mcp-remote", "HOST:PORT/mcp", "--header", "Authorization: <secret stored in server keyring>"]
}
}
}
</details>
<details>
<summary>Remote MCP Server (Client on Windows)</summary>
{
"mcpServers": {
"Commvault": {
"command": "cmd",
"args": ["/c", "npx", "mcp-remote", "HOST:PORT/mcp", "--header", "Authorization: <secret stored in server keyring>"]
}
}
}
</details>
<details>
<summary>Remote MCP Server (HTTP)</summary>
{
"mcpServers": {
"Commvault": {
"command": "npx",
"args": ["mcp-remote", "HOST:PORT/mcp", "--header", "Authorization: <secret stored in server keyring>", "--allow-http"]
}
}
}
</details>
<details>
<summary>Local MCP Server (STDIO) - Unix</summary>
{
"mcpServers": {
"Commvault": {
"command": "C:\\YOUR\\PATH\\TO\\commvault-mcp-server\\.venv\\bin\\python",
"args": [
"C:\\YOUR\\PATH\\TO\\commvault-mcp-server\\src\\server.py"
]
}
}
}
</details>
<details>
<summary>Local MCP Server (STDIO) - Windows</summary>
{
"mcpServers": {
"Commvault": {
"command": "C:\\YOUR\\PATH\\TO\\commvault-mcp-server\\.venv\\Scripts\\python.exe",
"args": [
"C:\\YOUR\\PATH\\TO\\commvault-mcp-server\\src\\server.py"
]
}
}
}
</details>
Additional Configuration
<details> <summary>Trusted Proxy Configuration</summary> <br/>Note: These are optional configurations that extend the MCP server's capabilities.
When deployed behind a reverse proxy or load balancer, configure TRUSTED_PROXY_IPS environment variable with comma-separated proxy IP addresses to enable per-client rate limiting using the X-Forwarded-For header. For example:
export TRUSTED_PROXY_IPS="10.0.0.1,10.0.0.2,192.168.1.100"
</details>
<details>
<summary>Salesforce Backup Integration</summary>
<br/>
The Salesforce integration enables browsing of backed-up Salesforce records stored in Commvault. It provides two tools:
| Tool | Description |
|------|-------------|
| get_salesforce_client | Resolves a Salesforce Organisation ID (15- or 18-character) to the corresponding Commvault clientId |
| get_salesforce_records | Fetches backed-up records for a Salesforce object (e.g. Account, Contact, Opportunity) from the latest backup snapshot |
Prerequisites
- Environment Variable: Set
ENABLE_SALESFORCE_TOOLS=truein your environment - Commvault Salesforce Backup: At least one Salesforce organisation must be configured and backed up in Commvault
Usage Example
To browse backed-up Account records for a Salesforce org:
Get all backed-up Account records for Salesforce org 00D2w000005mBCpEAM
The tool will automatically resolve the org ID to a Commvault client and return the latest backed-up records.
Parameters for get_salesforce_records
| Parameter | Required | Description |
|-----------|----------|-------------|
| salesforce_org_id | Yes | Salesforce Organisation ID (15 or 18 characters) |
| object_name | Yes | Salesforce API object name (e.g. Account, Contact) |
| limit | No | Max records to return (default 50, max 1000) |
| offset | No | Pagination offset (default 0) |
| free_query | No | Optional WHERE-clause filter (e.g. "Name = 'Acme'") |
The DocuSign backup integration enables backup of comp
