Skip to content

Connecting AI services to Coro

Coro provides a standard MCP (Model Context Protocol) server to enable organizations to connect their AI services to Coro's secure data repositories. This means that AI agents can query and act on security data and configuration in connected workspaces.

This article describes Coro's MCP server and explains what functionality it provides.

MCP server overview

An MCP server is an industry-standard, secure intermediary between an organization's AI tools and Coro's workspace security data. It provides a consistent, controlled way for AI agents to query and interact with workspace data without requiring direct access or custom integration.

You link your AI tools directly to a single MCP server endpoint that manages request validation, authentication, and routing. This guarantees that all interactions are secure, auditable, and subject to established policies for data access.

This approach abstracts the complexity of Coro's internal systems and provides a stable interface for external AI integrations.

How it works

Admin users create a connection between their AI client and Coro's MCP server as a Connector or App (depending on AI client vendor terminology), enabling requests and instructions made through the client to be directed at the Coro MCP server.

Requests can be based against a series of published tools. For example, if Coro publishes a tool called list_workspaces, a request prompt can include an instruction like show me a list of my workspaces. The AI client recognizes that this request matches one or more available tools and can send the request to the MCP server.

When an AI agent sends a request:

  1. The request is sent to the Coro's MCP server endpoint.
  2. The MCP server authenticates and validates the request.
  3. The server translates the request into one or more calls to Coro's underlying public REST API.
  4. The response is normalized and returned to the AI agent as a structured JSON response object.

Your AI agent should be configured to translate the JSON response into a human readable format. This is outside the scope of Coro's MCP server.

Authenticating with Coro

Coro authenticates connection requests from an AI client against an existing user account in the Coro console. To establish a connection to the MCP server, your account must be an applicable admin user role.

Applicable roles are:

  • Workspace administrator
  • Workspace super admin
  • MSP administrator
  • MSP super admin

To connect to Coro's MCP server, use the following endpoint URLs depending on your workspace region:

  • https://api.secure-ca.coro.net/mcp - Canada
  • https://api.secure-eu.coro.net/mcp - Europe
  • https://api.secure.coro.net/mcp - United States

Connecting a client to Coro

Coro's supports connections from all AI clients that have the capability to connect to standard MCP endpoints.

Important

Before you start, make sure you are signed-in to the Coro console in your web browser as as admin user with an applicable role.

This section offers two examples of app or browser-based connections, one from ChatGPT and another from Claude AI, along with an example of connecting through a command-line tool.

Connecting from ChatGPT

To connect via ChatGPT:

Make sure your ChatGPT subscription allows Developer mode and connections to custom unverified apps.

  1. Sign into ChatGPT in a web browser or through the desktop app.

  2. Select your user account, then select Settings:

    Selecting Settings from the account menu
  3. Select Apps, then select Advanced settings:

    Selecting Advanced settings from the Apps page

    If Advanced settings is not an available option, you may not have permissions to perform this operation. Contact your account administrator.

  4. Make sure that Developer mode is enabled, then select Create app:

    Selecting the Create app button
  5. ChatGPT shows the New App dialog:

    ChatGPT's New App dialog
  6. Enter the following details:

    • Name: Enter a name for the MCP Server app.
    • Description: (Optional) Enter a description for the app.
    • MCP Server URL: Enter the Coro MCP Server URL that corresponds to the region containing your workspaces.
    • Authentication: Select OAuth.
  7. Read and accept the notice about custom apps, then select Create.

    ChatGPT creates the new custom app and redirects you to Coro to authenticate the access request for your Coro account.

  8. Coro displays the access confirmation dialog:

    Coro's ChatGPT access request dialog
  9. Review the access request, then select ALLOW. Coro redirects you back to ChatGPT, showing the app as successfully connected:

    Your Coro MCP server app is now connected

Connecting from Claude AI

To connect via Claude AI:

Make sure your Claude AI subscription allows you to create custom connectors.

  1. Sign into Claude AI in a web browser or through the desktop app.

  2. From the menu bar, select your user avatar. From the menu, select Settings:

    Claude Settings
  3. Select Connectors, then locate and select Add custom connector:

    Adding a new custom connector

    If Add custom connectors is not an available option, you may not have permissions to perform this operation. Contact your account administrator.

    Claude displays the Add custom connector dialog:

    Adding a custom connector
  4. Enter the following details:

    • Name: Enter a name for the connector.
    • Remote MCP server URL: Enter the Coro MCP Server URL that corresponds to the region containing your workspaces.
  5. Select Add.

    Claude creates the connector and shows it in your list of defined connectors.

  6. Locate the Coro connector and select Connect:

    Connecting to the Coro connector

    Claude redirects you to Coro to authenticate the access request for your Coro account.

  7. Coro displays the access confirmation dialog:

    Coro's Claude access request dialog
  8. Review the access request, then select ALLOW. Coro redirects you back to Claude, showing the connection as successful:

    Your Coro MCP server is now connected

Connecting from command-line AI tools

Configure your AI command-line tool with the following MCP server definition:

"coro": {
  "url": "https://api.<region>.coro.net/mcp",
  "type": "http",
}

Use the URL that corresponds to your workspace region. For details, see Authenticating with Coro.

After you have saved this definition to your MCP server list file, instruct the tool to authenticate the connection. The process for this varies by tool.

For example, using Claude Code:

  1. Enter /mcp at the prompt to manage your MCP servers:

    Typing mcp at the Claude Code prompt
  2. Select the Coro MCP server:

    Selecting the Coro MCP server at the Claude Code prompt
  3. Select Authenticate:

    Authenticating the Coro MCP server at the Claude Code prompt

    Claude Code redirects you to Coro to authenticate the access request for your Coro account.

  4. Coro displays the access confirmation dialog:

    Coro's Claude Code access request dialog
  5. Review the access request, then select ALLOW. Coro redirects you back to Claude Code, showing the connection as successful:

    Your Coro MCP server is now connected

Tools available through the Coro MCP server

Coro's MCP server supports the following tools for connected AI clients:

Workspaces

ToolDescription
list_workspacesList all accessible workspaces.
get_workspaceGet full workspace details.
create_workspaceCreate a new child workspace.
search_workspacesSearch workspaces by name/domain/ID.

Subscriptions and billing

ToolDescription
get_subscriptionGet subscription state and active modules.
start_subscriptionActivate a workspace subscription.
stop_subscriptionFreeze a workspace subscription.
get_bundle_infoGet details of specific bundles.
get_usageGet billing usage data for a time range.

Tickets

ToolDescription
list_ticketsList security tickets with filters.
get_ticketGet detailed ticket information.
get_ticket_actionsGet available actions for a ticket.
perform_ticket_actionExecute an action on a ticket.
get_tickets_summary_devicesAggregate device ticket summary.
get_tickets_summary_usersAggregate user ticket summary.
get_tickets_summary_emailsAggregate email ticket summary.
get_tickets_summary_cloud_appsAggregate cloud application ticket summary.
get_tickets_summary_dataAggregate data governance ticket summary.

Devices

ToolDescription
list_devicesList protected devices.
get_device_actionsGet available actions for a device.
perform_device_actionExecute an action on a device.
get_latest_agent_versionsGet latest agent versions per platform.

Protected Users

ToolDescription
list_usersList protected end-users.
get_userGet protected user details.
add_usersAdd users for protection (up to 200).
update_userUpdate user details/protection status.
delete_userRemove a user from protection.

Portal Users (Admins)

ToolDescription
list_portal_usersList admin console users.
get_portal_userGet admin user details.
add_portal_userAdd a new admin portal user.

Audit

ToolDescription
search_audit_logsSearch audit logs with filters.