Skip to main content

Neo4j MCP server

Project description

Neo4j MCP

Official Model Context Protocol (MCP) server for Neo4j.

Links

Prerequisites

⚠️ Known Issue: Neo4j version 5.26.18 has a bug in APOC that causes the get-schema tool to fail. This issue is fixed in version 5.26.19 and above. If you're using 5.26.18, please upgrade to 5.26.19 or later. See #136 for details.

Startup Checks & Adaptive Operation

The server performs several pre-flight checks at startup to ensure your environment is correctly configured.

STDIO Mode - Mandatory Requirements In STDIO mode, the server verifies the following core requirements. If any of these checks fail (e.g., due to an invalid configuration, incorrect credentials, or a missing APOC installation), the server will not start:

  • A valid connection to your Neo4j instance.
  • The ability to execute queries.
  • The presence of the APOC plugin.

HTTP Mode - Verification Skipped In HTTP mode, startup verification checks are skipped because credentials come from per-request Basic Auth headers. The server starts immediately without connecting to Neo4j at startup.

Optional Requirements If an optional dependency is missing, the server will start in an adaptive mode. For instance, if the Graph Data Science (GDS) library is not detected in your Neo4j installation, the server will still launch but will automatically disable all GDS-related tools, such as list-gds-procedures. All other tools will remain available.

Installation (Binary)

Releases: https://github.com/neo4j/mcp/releases

  1. Download the archive for your OS/arch.
  2. Extract and place neo4j-mcp in a directory present in your PATH variables (see examples below).

Mac / Linux:

chmod +x neo4j-mcp
sudo mv neo4j-mcp /usr/local/bin/

Windows (PowerShell / cmd):

move neo4j-mcp.exe C:\Windows\System32

Verify the neo4j-mcp installation:

neo4j-mcp -v

Should print the installed version.

Transport Modes

The Neo4j MCP server supports two transport modes:

  • STDIO (default): Standard MCP communication via stdin/stdout for desktop clients (Claude Desktop, VSCode)
  • HTTP: RESTful HTTP server with per-request Bearer token or Basic Authentication for web-based clients and multi-tenant scenario. In case where the standard HTTP header "Authorization" can't be used, it's possible to configure a custom HTTP header for this scope.

Key Differences

Aspect STDIO HTTP
Startup Verification Required - server verifies APOC, connectivity, queries Skipped - server starts immediately
Credentials Set via environment variables Per-request via Bearer token or Basic Auth headers
Telemetry Collects Neo4j version, edition, Cypher version at startup Reports "unknown-http-mode" - actual version info not available at startup

See the Client Setup Guide for configuration instructions for both modes.

Unauthenticated MCP Ping

By default, the ping method is protected by standard authentication flows. However, because the MCP specification allows pings prior to initialization, some integrations (such as AWS AgentCore) rely on this optional method as an initial health check mechanism.

To improve integration compatibility with these platforms, you can exclude the ping method from authentication requirements via:

  • Environment Variable: NEO4J_HTTP_ALLOW_UNAUTHENTICATED_PING=true
  • or Command Line Flag: --neo4j-http-allow-unauthenticated-ping true

TLS/HTTPS Configuration

When using HTTP transport mode, you can enable TLS/HTTPS for secure communication:

Environment Variables

  • NEO4J_MCP_HTTP_TLS_ENABLED - Enable TLS/HTTPS: true or false (default: false)
  • NEO4J_MCP_HTTP_TLS_CERT_FILE - Path to TLS certificate file (required when TLS is enabled)
  • NEO4J_MCP_HTTP_TLS_KEY_FILE - Path to TLS private key file (required when TLS is enabled)
  • NEO4J_MCP_HTTP_PORT - HTTP server port (default: 443 when TLS enabled, 80 when TLS disabled)
  • NEO4J_HTTP_AUTH_HEADER_NAME - Name of the HTTP header to read auth credentials from (default: Authorization)
  • NEO4J_HTTP_ALLOW_UNAUTHENTICATED_PING - Allow unauthenticated ping health checks (default: false)

Security Configuration

  • Minimum TLS Version: Hardcoded to TLS 1.2 (allows TLS 1.3 negotiation)
  • Cipher Suites: Uses Go's secure default cipher suites
  • Default Port: Automatically uses port 443 when TLS is enabled (standard HTTPS port)

Example Configuration

export NEO4J_URI="bolt://localhost:7687"
export NEO4J_TRANSPORT_MODE="http"
export NEO4J_MCP_HTTP_TLS_ENABLED="true"
export NEO4J_MCP_HTTP_TLS_CERT_FILE="/path/to/cert.pem"
export NEO4J_MCP_HTTP_TLS_KEY_FILE="/path/to/key.pem"

neo4j-mcp
# Server will listen on https://127.0.0.1:443 by default

Production Usage: Use certificates from a trusted Certificate Authority (e.g., Let's Encrypt, or your organisation) for production deployments.

For detailed instructions on certificate generation, testing TLS, and production deployment, see CONTRIBUTING.md.

Configuration Options

The neo4j-mcp server can be configured using environment variables or CLI flags. CLI flags take precedence over environment variables.

Environment Variables

See the Client Setup Guide for configuration examples.

CLI Flags

You can override any environment variable using CLI flags:

neo4j-mcp --neo4j-uri "bolt://localhost:7687" \
          --neo4j-username "neo4j" \
          --neo4j-password "password" \
          --neo4j-database "neo4j" \
          --neo4j-read-only false \
          --neo4j-telemetry true

Available flags:

  • --neo4j-uri - Neo4j connection URI (overrides NEO4J_URI)
  • --neo4j-username - Database username (overrides NEO4J_USERNAME)
  • --neo4j-password - Database password (overrides NEO4J_PASSWORD)
  • --neo4j-database - Database name (overrides NEO4J_DATABASE)
  • --neo4j-read-only - Enable read-only mode: true or false (overrides NEO4J_READ_ONLY)
  • --neo4j-telemetry - Enable telemetry: true or false (overrides NEO4J_TELEMETRY)
  • --neo4j-schema-sample-size - Modify the sample size used to infer the Neo4j schema
  • --neo4j-transport-mode - Transport mode: stdio or http (overrides NEO4J_TRANSPORT_MODE)
  • --neo4j-http-host - HTTP server host (overrides NEO4J_MCP_HTTP_HOST)
  • --neo4j-http-port - HTTP server port (overrides NEO4J_MCP_HTTP_PORT)
  • --neo4j-http-tls-enabled - Enable TLS/HTTPS: true or false (overrides NEO4J_MCP_HTTP_TLS_ENABLED)
  • --neo4j-http-tls-cert-file - Path to TLS certificate file (overrides NEO4J_MCP_HTTP_TLS_CERT_FILE)
  • --neo4j-http-tls-key-file - Path to TLS private key file (overrides NEO4J_MCP_HTTP_TLS_KEY_FILE)
  • --neo4j-http-auth-header-name - Name of the HTTP header to read auth credentials from (overrides NEO4J_AUTH_HEADER_NAME)
  • --neo4j-http-allow-unauthenticated-ping - Allow unauthenticated ping health checks: true or false (overrides NEO4J_HTTP_ALLOW_UNAUTHENTICATED_PING)

Use neo4j-mcp --help to see all available options.

Authentication Methods (HTTP Mode)

When using HTTP transport mode, the Neo4j MCP server supports two authentication methods to accommodate different deployment scenarios:

Bearer Token Authentication

Bearer token authentication enables seamless integration with Neo4j Enterprise Edition and Neo4j Aura environments that use SSO/OAuth/OIDC for identity management. This method is ideal for:

  • Enterprise deployments with centralized identity providers (Okta, Azure AD, etc.)
  • Neo4j Aura databases configured with SSO
  • Organizations requiring OAuth 2.0 compliance
  • Multi-factor authentication scenarios

Example:

curl -X POST http://localhost:8080/mcp \
  -H "Authorization: Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9..." \
  -H "Content-Type: application/json" \
  -d '{"jsonrpc":"2.0","method":"tools/list","id":1}'

The bearer token is obtained from your identity provider and passed to Neo4j for authentication. The MCP server acts as a pass-through, forwarding the token to Neo4j's authentication system.

Basic Authentication

Traditional username/password authentication suitable for:

  • Neo4j Community Edition
  • Development and testing environments
  • Direct database credentials without SSO

Example:

curl -X POST http://localhost:8080/mcp \
  -u neo4j:password \
  -H "Content-Type: application/json" \
  -d '{"jsonrpc":"2.0","method":"tools/list","id":1}'

Client Configuration

To configure MCP clients (VSCode, Claude Desktop, etc.) to use the Neo4j MCP server, see:

📘 Client Setup Guide – Complete configuration for STDIO and HTTP modes

Tools & Usage

Provided tools:

Tool ReadOnly Purpose Notes
get-schema true Introspect labels, relationship types, property keys Provide valuable context to the client LLMs.
read-cypher true Execute arbitrary Cypher (read mode) Rejects writes, schema/admin operations, and PROFILE queries. Use write-cypher instead.
write-cypher false Execute arbitrary Cypher (write mode) Caution: LLM-generated queries could cause harm. Use only in development environments. Disabled if NEO4J_READ_ONLY=true.
list-gds-procedures true List GDS procedures available in the Neo4j instance Help the client LLM to have a better visibility on the GDS procedures available

Readonly mode flag

Enable readonly mode by setting the NEO4J_READ_ONLY environment variable to true (for example, "NEO4J_READ_ONLY": "true"). Accepted values are true or false (default: false).

You can also override this setting using the --neo4j-read-only CLI flag:

neo4j-mcp --neo4j-uri "bolt://localhost:7687" --neo4j-username "neo4j" --neo4j-password "password" --neo4j-read-only true

When enabled, write tools (for example, write-cypher) are not exposed to clients.

Query Classification

The read-cypher tool performs an extra round-trip to the Neo4j database to guarantee read-only operations.

Important notes:

  • Write operations: CREATE, MERGE, DELETE, SET, etc., are treated as non-read queries.
  • Admin queries: Commands like SHOW USERS, SHOW DATABASES, etc., are treated as non-read queries and must use write-cypher instead.
  • Profile queries: EXPLAIN PROFILE queries are treated as non-read queries, even if the underlying statement is read-only.
  • Schema operations: CREATE INDEX, DROP CONSTRAINT, etc., are treated as non-read queries.

Example Natural Language Prompts

Below are some example prompts you can try in Copilot or any other MCP client:

  • "What does my Neo4j instance contain? List all node labels, relationship types, and property keys."
  • "Find all Person nodes and their relationships in my Neo4j instance."
  • "Create a new User node with a name 'John' in my Neo4j instance."

Security tips:

  • Use a restricted Neo4j user for exploration.
  • Review generated Cypher before executing in production databases.

Logging

The server uses structured logging with support for multiple log levels and output formats.

Configuration

Log Level (NEO4J_LOG_LEVEL, default: info)

Controls the verbosity of log output. Supports all MCP log levels: debug, info, notice, warning, error, critical, alert, emergency.

Log Format (NEO4J_LOG_FORMAT, default: text)

Controls the output format:

  • text - Human-readable text format (default)
  • json - Structured JSON format (useful for log aggregation)

Telemetry

By default, neo4j-mcp collects anonymous usage data to help us improve the product. This includes information like the tools being used, the operating system, and CPU architecture. We do not collect any personal or sensitive information.

To disable telemetry, set the NEO4J_TELEMETRY environment variable to "false". Accepted values are true or false (default: true).

You can also use the --neo4j-telemetry CLI flag to override this setting.

Documentation

📘 Client Setup Guide – Configure VSCode, Claude Desktop, and other MCP clients (STDIO and HTTP modes) 📚 Contributing Guide – Contribution workflow, development environment, mocks & testing

Issues / feedback: open a GitHub issue with reproduction details (omit sensitive data).

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distributions

If you're not sure about the file name format, learn more about wheel file names.

neo4j_mcp_server-1.4.70-py3-none-win_arm64.whl (8.5 MB view details)

Uploaded Python 3Windows ARM64

neo4j_mcp_server-1.4.70-py3-none-win_amd64.whl (9.4 MB view details)

Uploaded Python 3Windows x86-64

neo4j_mcp_server-1.4.70-py3-none-manylinux_2_17_x86_64.whl (9.1 MB view details)

Uploaded Python 3manylinux: glibc 2.17+ x86-64

neo4j_mcp_server-1.4.70-py3-none-manylinux_2_17_aarch64.whl (8.4 MB view details)

Uploaded Python 3manylinux: glibc 2.17+ ARM64

neo4j_mcp_server-1.4.70-py3-none-macosx_11_0_arm64.whl (8.7 MB view details)

Uploaded Python 3macOS 11.0+ ARM64

neo4j_mcp_server-1.4.70-py3-none-macosx_10_9_x86_64.whl (9.3 MB view details)

Uploaded Python 3macOS 10.9+ x86-64

File details

Details for the file neo4j_mcp_server-1.4.70-py3-none-win_arm64.whl.

File metadata

File hashes

Hashes for neo4j_mcp_server-1.4.70-py3-none-win_arm64.whl
Algorithm Hash digest
SHA256 d1600e1dfcc10cd9935d9292d251e3a1699c35be23f406f547d95c2ad2078daf
MD5 5ca9abfb35cc1fcaeab78b3a4c936508
BLAKE2b-256 3723975c087191053f7264ec20c282f233584dd8a9ff5ba8caf20375cb5a9f5c

See more details on using hashes here.

File details

Details for the file neo4j_mcp_server-1.4.70-py3-none-win_amd64.whl.

File metadata

File hashes

Hashes for neo4j_mcp_server-1.4.70-py3-none-win_amd64.whl
Algorithm Hash digest
SHA256 55876f698fa3b8d0aa87c46f16492a01ca80b81df49acbc363a09396032e3900
MD5 956c60714c226ceee540753ae9781294
BLAKE2b-256 40f22749a3d68143c07723f720752a7f2699646cb61cfa41bd4db092ef21b9e8

See more details on using hashes here.

File details

Details for the file neo4j_mcp_server-1.4.70-py3-none-manylinux_2_17_x86_64.whl.

File metadata

File hashes

Hashes for neo4j_mcp_server-1.4.70-py3-none-manylinux_2_17_x86_64.whl
Algorithm Hash digest
SHA256 f18085f8dc1c9b25781238539480ec57fffd37139ab686fe7b083ef926c43326
MD5 6ccadeaa465734d1b7133b4adc5d8322
BLAKE2b-256 55977e532cbd68281757c9c2047af8388dd07d69793780939466e08a9c207a74

See more details on using hashes here.

File details

Details for the file neo4j_mcp_server-1.4.70-py3-none-manylinux_2_17_aarch64.whl.

File metadata

File hashes

Hashes for neo4j_mcp_server-1.4.70-py3-none-manylinux_2_17_aarch64.whl
Algorithm Hash digest
SHA256 3f8c2d1c199d6535cceb2c3141b674b79b6de2e6b58b83138f5c9c605b05695e
MD5 5f3d4156574a64193cccd1b0b96354a5
BLAKE2b-256 461c2b1c517e3b544d2ba267c35331b30b6628db5a3ad595750d357d9edc755b

See more details on using hashes here.

File details

Details for the file neo4j_mcp_server-1.4.70-py3-none-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for neo4j_mcp_server-1.4.70-py3-none-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 3e72eb2575a0a5066f2b5317236a4c9b6b1f5f8b7333222a6d8141b8955a0547
MD5 827853d7f492267805bccb91040476da
BLAKE2b-256 fb9199ede676da6cdde92b7de464ddf73795776c5dfb2007716d527b98b0eef1

See more details on using hashes here.

File details

Details for the file neo4j_mcp_server-1.4.70-py3-none-macosx_10_9_x86_64.whl.

File metadata

File hashes

Hashes for neo4j_mcp_server-1.4.70-py3-none-macosx_10_9_x86_64.whl
Algorithm Hash digest
SHA256 1c314da8619e625fde917043bfec4457d4fa727a10129abdb4a8f0e7fa9ec85c
MD5 3d866d3a83627c016ef37678b62d0c15
BLAKE2b-256 7da98777395693acb339998a0d0154997f9bc64f4eb007a7294d977d0ac6ccc7

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page