Find users with high-privilege roles in Azure AD
Analyze MFA deployment across users in the tenant
Find applications with secrets or certificates
Analyze group types and membership
Find accounts that haven't logged in or changed password within a specified period
Assess Privileged Identity Management implementation
Find over-permissioned service principals with long-lived credentials
Identify risks from legacy authentication protocols that bypass MFA
Analyze conditional access policies from an HTML file
The ROADrecon Azure AD Analyzer provides AI assistants with access to Azure AD data collected by the ROADtools suite for comprehensive security analysis. This MCP server enables detailed examination of user accounts, applications, service principals, directory roles, and other critical Azure AD components to identify security risks and compliance issues. With this tool, security professionals can leverage AI to quickly analyze MFA status, privileged access, application secrets, conditional access policies, and more. The server bridges the gap between ROADrecon's powerful data collection capabilities and AI-assisted security analysis.
This MCP server provides AI assistants like Claude with access to your ROADRecon Azure AD data for comprehensive security analysis.
Before installing the ROADrecon Azure AD Analyzer, ensure you have:
git clone https://github.com/atomicchonk/roadrecon_mcp_server.git
cd roadrecon_mcp_server
pip install -r requirements.txt
Ensure your ROADRecon GUI is running (default: http://localhost:5000)
Start the MCP server:
python roadrecon_mcp_server.py
ROADRECON_URL=http://localhost:8080 python roadrecon_mcp_server.py
For more detailed instructions on connecting MCP servers, visit: https://modelcontextprotocol.io/quickstart/server
The server provides access to various Azure AD resources:
roadrecon://stats
- Summary statisticsroadrecon://users
- All usersroadrecon://users/{id}
- User detailsroadrecon://groups
- All groupsroadrecon://groups/{id}
- Group detailsroadrecon://applications
- All applicationsroadrecon://applications/{id}
- Application detailsroadrecon://serviceprincipals
- All service principalsroadrecon://serviceprincipals/{id}
- Service principal detailsroadrecon://devices
- All devicesroadrecon://mfa
- MFA status for all usersroadrecon://directoryroles
- All directory rolesroadrecon://roledefinitions
- All role definitionsroadrecon://approles
- All app role assignmentsroadrecon://oauth2permissions
- All OAuth2 permission grantsroadrecon://tenantdetails
- Tenant detailsOnce connected, you can ask Claude to perform various security analyses:
For conditional access policy analysis, the server looks for a file at "C:\Temp\caps.html" by default. You can specify a different file path when using the analyze_conditional_access_policies
tool.
If you encounter issues: