UniFi Access MCP Server
Project description
UniFi Access MCP Server
MCP server exposing UniFi Access tools for LLMs, agents, and automation platforms. Manage doors, credentials, access policies, visitors, events, and devices -- with safe-by-default permissions and preview-before-confirm for all mutations.
Install
Claude Code (recommended)
The plugin installs the MCP server, an agent skill for tool discovery, and a guided setup command:
/plugin marketplace add sirkirby/unifi-mcp
/plugin install unifi-access@unifi-plugins
Then run the interactive setup to configure your controller connection:
/unifi-access:setup
This walks you through connecting to your Access controller, explains the dual-auth system (API key for reads, username/password for mutations), and configures permissions — then writes everything to .claude/settings.json. If you already have other UniFi plugins configured on the same controller, the setup will detect and reuse those credentials. Restart Claude Code after setup to connect.
PyPI / Docker
# PyPI
uvx unifi-access-mcp@latest
# or: pip install unifi-access-mcp
# Docker
docker pull ghcr.io/sirkirby/unifi-access-mcp:latest
# From source
git clone https://github.com/sirkirby/unifi-mcp.git
cd unifi-mcp && uv sync
Usage Examples
Once connected, just ask your AI agent in natural language:
"Who badged into the office today? Show me a timeline of all door access events"
"List all access credentials that expire in the next 30 days"
"Show me failed badge attempts at the server room this week — any patterns?"
"Which doors had the most access events today?"
"Create a visitor pass for John Smith with access to the main entrance from 9 AM to 5 PM tomorrow"
"Audit door policies — which doors allow access outside business hours?"
All queries are read-only by default. Mutations (visitor passes, credential changes, door controls) use a preview-then-confirm flow.
Configure
Set these environment variables (or create a .env file). If you used /unifi-access:setup, this is already done.
# Server-specific variables (recommended)
UNIFI_ACCESS_HOST=192.168.1.1 # Controller IP or hostname
UNIFI_ACCESS_USERNAME=admin # Local admin username
UNIFI_ACCESS_PASSWORD=your-password # Admin password
# Optional:
# UNIFI_ACCESS_API_KEY= # Official UniFi API key (dual auth)
# UNIFI_ACCESS_PORT=443 # Controller HTTPS port
# UNIFI_ACCESS_VERIFY_SSL=false # SSL certificate verification
Fallback: The shared UNIFI_* variables (e.g., UNIFI_HOST) also work. The server checks for UNIFI_ACCESS_* first and falls back to UNIFI_* if the server-specific variable is not set. For single-controller setups, the shared variables are all you need.
Dual Authentication
The Access server supports two independent auth paths:
- API key -- Uses
py-unifi-accesson the dedicated Access API port (default 12445). Best for read-only queries and device listing. - Local proxy session -- Logs in via
/api/auth/loginon the UniFi OS Console (port 443) and proxies requests through/proxy/access/api/v2/.... Required for door lock/unlock, credential management, policies, visitors, and events.
At least one path must be configured. When both are available, each tool selects the most appropriate path. Most mutating tools require the local proxy session.
Run
# stdio transport (default -- for Claude Desktop, LM Studio, etc.)
unifi-access-mcp
# Docker
docker run -i --rm \
-e UNIFI_ACCESS_HOST=192.168.1.1 \
-e UNIFI_ACCESS_USERNAME=admin \
-e UNIFI_ACCESS_PASSWORD=secret \
ghcr.io/sirkirby/unifi-access-mcp:latest
Claude Desktop
Add to claude_desktop_config.json:
{
"mcpServers": {
"unifi-access": {
"command": "uvx",
"args": ["unifi-access-mcp"],
"env": {
"UNIFI_ACCESS_HOST": "192.168.1.1",
"UNIFI_ACCESS_USERNAME": "admin",
"UNIFI_ACCESS_PASSWORD": "your-password"
}
}
}
}
Features
- Doors -- list, inspect, lock/unlock, door groups, real-time status
- Policies -- list, inspect, update access policies and schedules
- Credentials -- list, inspect, create, revoke NFC cards, PINs, mobile credentials
- Visitors -- list, inspect, create, delete visitor passes with time-bounded access
- Events -- query historical events, real-time websocket buffer, activity summaries
- Devices -- list, inspect, reboot access hubs, readers, relays, intercoms
- System -- controller info, health metrics, user listing
Agent Skills
The Claude Code plugin ships with agent skills that teach AI assistants how to work with Access effectively:
- UniFi Access — core skill for door control, credentials, visitors, access policies, and event monitoring. Includes guidance on the dual-auth system, real-time event streaming via WebSocket buffer, and the preview-confirm flow for physical door operations.
- Setup — interactive configuration wizard that walks through controller connection, credential setup, and permission configuration.
Skills are automatically available when the plugin is installed.
Cross-Product Skills
When the Access plugin is installed alongside the Protect plugin, the security-digest skill can incorporate door events into its analysis. Badge-ins, access-denied events, and after-hours access are correlated with camera motion and alerts from Protect to produce a richer security summary across your full UniFi deployment.
No additional configuration is required — if both plugins are active, the skill automatically pulls from both servers.
Documentation
- Configuration -- Full env var reference, YAML config, Access-specific options
- Permissions -- Permission system, category defaults, how to enable mutations
- Tool Catalog -- All 29 tools organized by category
- Event Streaming -- Real-time event architecture, WebSocket buffer, polling
- Troubleshooting -- Connection issues, dual auth debugging, missing tools
Development
cd apps/access
make test # Run tests
make lint # Lint
make format # Format
make manifest # Regenerate tools_manifest.json
make console # Start interactive dev console
make pre-commit # All of the above
See the root CONTRIBUTING.md for the full monorepo workflow.
License
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file unifi_access_mcp-0.2.2.tar.gz.
File metadata
- Download URL: unifi_access_mcp-0.2.2.tar.gz
- Upload date:
- Size: 36.9 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
ceb4ee71c0b10cbb4000b5fd7468d5d8b098fb89ec531acf80abe587d317c51a
|
|
| MD5 |
5dc3e583ecae8b35d6405f3ce9be056f
|
|
| BLAKE2b-256 |
4244b3adce823495e725590aebbd54910aeaad644da7e886445e8d7cb1a872d9
|
Provenance
The following attestation bundles were made for unifi_access_mcp-0.2.2.tar.gz:
Publisher:
publish-access.yml on sirkirby/unifi-mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
unifi_access_mcp-0.2.2.tar.gz -
Subject digest:
ceb4ee71c0b10cbb4000b5fd7468d5d8b098fb89ec531acf80abe587d317c51a - Sigstore transparency entry: 1397257462
- Sigstore integration time:
-
Permalink:
sirkirby/unifi-mcp@16df89740ded988e8818b9a5d1d521b2dc00a553 -
Branch / Tag:
refs/tags/access/v0.2.2 - Owner: https://github.com/sirkirby
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-access.yml@16df89740ded988e8818b9a5d1d521b2dc00a553 -
Trigger Event:
push
-
Statement type:
File details
Details for the file unifi_access_mcp-0.2.2-py3-none-any.whl.
File metadata
- Download URL: unifi_access_mcp-0.2.2-py3-none-any.whl
- Upload date:
- Size: 55.2 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4f92e77d241cc584d07162b8c468891c7b2579b3a96f230a318949a03e51b4d2
|
|
| MD5 |
db3a0604f60101438c2278a439f025f3
|
|
| BLAKE2b-256 |
a3d2f682ebd9aca20b174fc469a903ef21912a3ece4dcaa313eed7833e868683
|
Provenance
The following attestation bundles were made for unifi_access_mcp-0.2.2-py3-none-any.whl:
Publisher:
publish-access.yml on sirkirby/unifi-mcp
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
unifi_access_mcp-0.2.2-py3-none-any.whl -
Subject digest:
4f92e77d241cc584d07162b8c468891c7b2579b3a96f230a318949a03e51b4d2 - Sigstore transparency entry: 1397257466
- Sigstore integration time:
-
Permalink:
sirkirby/unifi-mcp@16df89740ded988e8818b9a5d1d521b2dc00a553 -
Branch / Tag:
refs/tags/access/v0.2.2 - Owner: https://github.com/sirkirby
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish-access.yml@16df89740ded988e8818b9a5d1d521b2dc00a553 -
Trigger Event:
push
-
Statement type: