npx claudepluginhub mongodb/agent-skills --plugin mongodbThis skill uses the workspace's default tool permissions.
This skill guides users through configuring the MongoDB MCP server for use with an agentic client.
Guides configuration of MongoDB MCP server using connection string, Atlas API credentials, or local Docker. Checks existing env vars and provides tailored setup steps.
Handles Claude Code MCP integration: installs/manages servers (HTTP/SSE/stdio), scopes, enterprise configs, OAuth auth, resources/@mentions, prompts, limits, security; delegates to docs-management.
Guides configuration and usage of MCP (Model Context Protocol) servers in Claude Code via CLI commands and .mcp.json files, covering HTTP/SSE/stdio transports, scopes, env vars, and 300+ external tools.
Share bugs, ideas, or general feedback.
This skill guides users through configuring the MongoDB MCP server for use with an agentic client.
The MongoDB MCP server requires authentication. Users have three options:
Connection String (Option A): Direct connection to a specific cluster
MDB_MCP_CONNECTION_STRING environment variableService Account Credentials (Option B): MongoDB Atlas Admin API access
atlas-connect-clusterMDB_MCP_API_CLIENT_ID and MDB_MCP_API_CLIENT_SECRET environment variablesAtlas Local (Option C): Local development with Docker
This is an interactive step-by-step guide. The agent detects the user's environment and provides tailored instructions, but never asks for or handles credentials — users add those directly to their shell profile or agentic client config in Step 5. Make this clear to the user whenever credentials come up in Steps 3a and 3b.
Before anything else, determine which agentic client the user is running. This controls how credentials are configured in Step 1 and Step 5.
Run:
env | grep "^CODEX_"
CODEX_* variables are present → the user is running a shell-based client (Claude, Cursor, Gemini CLI, Copilot CLI, etc.). Credentials are configured via shell profile environment variables.CODEX_* variables are present → the user is running Codex. Credentials are stored in ~/.codex/config.toml (macOS/Linux) or %USERPROFILE%\.codex\config.toml (Windows), not in shell environment variables. The desktop app does not inherit shell env vars when launched from Finder, Launchpad, or the Windows Start menu.Carry this client type (Codex vs. shell-based) forward through every subsequent step.
Check whether credentials are already configured.
For shell-based clients — check the current environment:
env | grep "^MDB_MCP" | sed '/^MDB_MCP_READ_ONLY=/!s/=.*/=[set]/'
For Codex — search ~/.codex/config.toml (macOS/Linux) or %USERPROFILE%\.codex\config.toml (Windows):
grep -E 'MDB_MCP_(CONNECTION_STRING|API_CLIENT_ID|API_CLIENT_SECRET|READ_ONLY)' ~/.codex/config.toml 2>/dev/null | sed '/MDB_MCP_READ_ONLY/!s/[[:space:]]*=[[:space:]].*/ = "[set]"/'
Interpretation (both):
MDB_MCP_CONNECTION_STRING appears → connection string auth is configuredMDB_MCP_API_CLIENT_ID and MDB_MCP_API_CLIENT_SECRET appear → service account auth is configured. If only one is present, treat it as incomplete.MDB_MCP_READ_ONLY appears → read-only mode is enabledPartial Configuration Handling:
config.toml for Codex, from their shell profile for shell-based clients), then proceed with Steps 2–5Important: If the user wants an Atlas Admin API action (managing clusters, creating users, performance advisor) but only has MDB_MCP_CONNECTION_STRING, explain they need service account credentials and offer to walk through setup.
If no valid configuration exists, present the options:
Connection String (Option A) — Best for:
Service Account Credentials (Option B) — Best for:
Atlas Local (Option C) — Best for:
Ask the user which option they'd like to proceed with.
If the user chooses Option A:
Explain where and how to obtain their connection string:
For MongoDB Atlas:
<username> and <password> with your database user credentialsFor self-hosted MongoDB:
mongodb://username:password@host:port/databaseExpected formats:
mongodb://username:password@host:port/databasemongodb+srv://username:password@cluster.mongodb.net/databasemongodb://host:port (local, no auth)Proceed to Step 4 (Determine Read-Only Access).
If the user chooses Option B:
Direct the user to create a MongoDB Atlas Service Account:
Full documentation: https://www.mongodb.com/docs/mcp-server/prerequisites/
Walk them through the key steps:
⚠️ CRITICAL: The user MUST add their IP address to the service account's API Access List, or all Atlas Admin API operations will fail.
Steps:
0.0.0.0/0 allows access from any IP — this is a significant security risk. Only use it as a last resort for temporary testing and remove it immediately afterward. It should never be used in production.This is more secure than global Network Access settings as it only affects API access, not database connections.
Proceed to Step 4 (Determine Read-Only Access).
If the user chooses Option C:
Verify Docker is installed:
docker info
If not installed, direct them to: https://www.docker.com/get-started
Atlas Local requires no credentials — the user is ready to go:
atlas-local-create-deploymentatlas-local-list-deploymentsSkip Steps 4 and 5 (no configuration needed) and proceed to Step 6 (Next Steps).
Only applies to Options A and B. Skip to Step 6 for Option C.
Ask whether they want read-only or read-write access:
Read-Write (default): Full data access, modifications allowed
Read-Only: Data reads only, no modifications
If read-only: include the read-only flag in the credential snippet in Step 5. If read-write: omit it (defaults to read-write).
Proceed to Step 5 (Configure Credentials).
Do not ask for or handle credentials — provide exact instructions so the user can add them directly.
For shell-based clients — store credentials in a dedicated ~/.mcp-env file (not directly in the shell profile), then source it from the profile. This keeps credentials out of files that are often group/world readable by default and prevents accidentally committing them to git.
For Codex — add to ~/.codex/config.toml (macOS/Linux) or %USERPROFILE%\.codex\config.toml (Windows).
Show the user the appropriate snippet:
For Connection String (Option A):
Shell-based clients (~/.mcp-env):
export MDB_MCP_CONNECTION_STRING="<paste-your-connection-string-here>"
Codex (config.toml):
[mcp_servers.mongodb.env]
MDB_MCP_CONNECTION_STRING = "<paste-your-connection-string-here>"
For Service Account (Option B):
Shell-based clients (~/.mcp-env):
export MDB_MCP_API_CLIENT_ID="<paste-your-client-id-here>"
export MDB_MCP_API_CLIENT_SECRET="<paste-your-client-secret-here>"
Codex (config.toml):
[mcp_servers.mongodb.env]
MDB_MCP_API_CLIENT_ID = "<paste-your-client-id-here>"
MDB_MCP_API_CLIENT_SECRET = "<paste-your-client-secret-here>"
If read-only was chosen (Step 4), also add:
Shell-based: export MDB_MCP_READ_ONLY="true" in ~/.mcp-env.
Codex: MDB_MCP_READ_ONLY = "true" under the same [mcp_servers.mongodb.env] section.
⚠️ Both config.toml and ~/.mcp-env are stored in plaintext. Do not commit them to version control.
Restrict permissions on ~/.mcp-env:
# adjust for windows if needed
chmod 600 ~/.mcp-env
Add source ~/.mcp-env to the shell profile (e.g. ~/.zshrc). Adjust for the detected shell (e.g. for fish: bass source ~/.mcp-env or set -x; for PowerShell: dot-source a .ps1 file instead).
Detect the shell and profile file by running echo $SHELL if needed.
Shell-based clients — reload the profile first, then verify:
source ~/.zshrc # adjust to match the profile file
env | grep "^MDB_MCP" | sed '/^MDB_MCP_READ_ONLY=/!s/=.*/=[set]/'
Codex:
# adjust path if on Windows
grep -E 'MDB_MCP_(CONNECTION_STRING|API_CLIENT_ID|API_CLIENT_SECRET|READ_ONLY)' ~/.codex/config.toml 2>/dev/null | sed '/MDB_MCP_READ_ONLY/!s/[[:space:]]*=[[:space:]].*/ = "[set]"/'
Expected output shows the configured key(s) with values redacted to [set]. If nothing appears, check that credentials were saved and (for shell-based clients) that the profile was reloaded.
Proceed to Step 6 (Next Steps).
Restart the agentic client:
source <profile-file> to load the new variables, and reopen the client from that same terminal session so it inherits the environment.config.toml.Verify MCP Server: After restart, test by performing a MongoDB operation.
Using the Tools:
atlas-connect-clusterReady to use: No restart or configuration needed!
Next steps:
atlas-local-create-deploymentatlas-local-list-deploymentssource (shell-based clients): Check the profile file path and confirm the file was saved.zshrc/.zprofile/PowerShell profiles. Use ~/.codex/config.toml (macOS/Linux) or %USERPROFILE%\.codex\config.toml (Windows) instead (see Step 5)mongodb:// or mongodb+srv://MDB_MCP_READ_ONLY is set — in config.toml under [mcp_servers.mongodb.env] for Codex, or via env | grep ^MDB_MCP_READ_ONLY for shell-based clientsset -x (fish) or $env: (PowerShell) instead of export