Navigation
Calendar AutoAuth MCP Server: Auto-Auth & Secure Calendar Sync - MCP Implementation

Calendar AutoAuth MCP Server: Auto-Auth & Secure Calendar Sync

Streamline access with Calendar AutoAuth MCP Server – seamless auto-authentication, secure calendar mirroring, and enterprise-grade reliability. Your teams work smarter, not harder. 🗓️🔒

Calendar Management
4.1(142 reviews)
213 saves
99 comments

56% of users reported increased productivity after just one week

About Calendar AutoAuth MCP Server

What is Calendar AutoAuth MCP Server: Auto-Auth & Secure Calendar Sync?

Calendar AutoAuth MCP Server is a dedicated middleware solution designed to streamline calendar integration for applications built on Claude Desktop. It provides automated authentication workflows and secure synchronization with Google Calendar APIs, ensuring seamless event management while maintaining robust security protocols. The server abstracts complex OAuth2.0 authentication flows, enabling developers to focus on application logic without manual credential handling.

How to Use Calendar AutoAuth MCP Server: Auto-Auth & Secure Calendar Sync?

Implementing the server involves three core steps:

  1. Authentication Setup: Configure OAuth credentials via Google Cloud Console and place the JSON key file in the designated directory
  2. Server Initialization: Run the authentication process to generate secure access tokens that persist across sessions
  3. API Integration: Use standardized JSON payloads to create/update/delete events or query schedules through well-defined endpoints

For Docker environments, volume mapping ensures credential persistence while maintaining port-forwarding configurations for secure API communication.

Calendar AutoAuth MCP Server Features

Key Features of Calendar AutoAuth MCP Server: Auto-Auth & Secure Calendar Sync?

  • Automatic token refresh using offline access tokens
  • Role-based access control through Google API scopes
  • Granular event filtering capabilities with time range queries
  • Multi-environment support (local development/Docker)
  • Comprehensive error handling with structured response formats
  • Read-only and full-access mode configurations

Use Cases of Calendar AutoAuth MCP Server: Auto-Auth & Secure Calendar Sync?

Common implementation scenarios include:

  • Enterprise scheduling systems requiring automated meeting creation
  • Project management tools needing real-time resource availability checks
  • Event management platforms with recurring event templates
  • Personal productivity applications for cross-device calendar sync
  • Time-tracking solutions integrating with calendar event timestamps

Calendar AutoAuth MCP Server FAQ

Frequently Asked Questions

Q: How do I resolve "Invalid Credentials" errors?

A: Verify OAuth scopes in Google Cloud Console match application requirements. Regenerate credentials if key file access was shared.

Q: Why are event updates not reflecting in Google Calendar?

A: Check for proper scope permissions (calendar.events.write), confirm event ID format in requests, and validate timezone configurations.

Q: Can this server handle multiple user accounts?

A: Yes, through separate credential directories and session-based authentication contexts.

Q: What security measures are in place?

A: Uses encrypted token storage, rate limiting, IP whitelisting, and strict scope restrictions to prevent unauthorized access.

Content

Calendar AutoAuth MCP Server

A Model Context Protocol (MCP) server for Google Calendar integration in Cluade Desktop with auto authentication support. This server enables AI assistants to manage Google Calendar events through natural language interactions.

smithery badge npm version License: ISC

Features

  • Create calendar events with title, time, description, and location
  • Retrieve event details by event ID
  • Update existing events (title, time, description, location)
  • Delete events
  • List events within a specified time range
  • Full integration with Google Calendar API
  • Simple OAuth2 authentication flow with auto browser launch
  • Support for both Desktop and Web application credentials
  • Global credential storage for convenience

Installation & Authentication

Installing via Smithery

To install Calendar AutoAuth Server for Claude Desktop automatically via Smithery:

npx -y @smithery/cli install @gongrzhe/server-calendar-autoauth-mcp --client claude
  1. Create a Google Cloud Project and obtain credentials:

a. Create a Google Cloud Project:

* Go to [Google Cloud Console](https://console.cloud.google.com/)
* Create a new project or select an existing one
* Enable the Google Calendar API for your project

b. Create OAuth 2.0 Credentials:

* Go to "APIs & Services" > "Credentials"
* Click "Create Credentials" > "OAuth client ID"
* Choose either "Desktop app" or "Web application" as application type
* Give it a name and click "Create"
* For Web application, add `http://localhost:3000/oauth2callback` to the authorized redirect URIs
* Download the JSON file of your client's OAuth keys
* Rename the key file to `gcp-oauth.keys.json`
  1. Run Authentication:

You can authenticate in two ways:

a. Global Authentication (Recommended):

    # First time: Place gcp-oauth.keys.json in your home directory's .calendar-mcp folder
mkdir -p ~/.calendar-mcp
mv gcp-oauth.keys.json ~/.calendar-mcp/

# Run authentication from anywhere
npx @gongrzhe/server-calendar-autoauth-mcp auth

b. Local Authentication:

    # Place gcp-oauth.keys.json in your current directory
# The file will be automatically copied to global config
npx @gongrzhe/server-calendar-autoauth-mcp auth

The authentication process will:

* Look for `gcp-oauth.keys.json` in the current directory or `~/.calendar-mcp/`
* If found in current directory, copy it to `~/.calendar-mcp/`
* Open your default browser for Google authentication
* Save credentials as `~/.calendar-mcp/credentials.json`

Note :

* After successful authentication, credentials are stored globally in `~/.calendar-mcp/` and can be used from any directory
* Both Desktop app and Web application credentials are supported
* For Web application credentials, make sure to add `http://localhost:3000/oauth2callback` to your authorized redirect URIs
  1. Configure in Claude Desktop:
{
  "mcpServers": {
    "calendar": {
      "command": "npx",
      "args": [
        "@gongrzhe/server-calendar-autoauth-mcp"
      ]
    }
  }
}

Docker Support

If you prefer using Docker:

  1. Authentication:
docker run -i --rm \
  --mount type=bind,source=/path/to/gcp-oauth.keys.json,target=/gcp-oauth.keys.json \
  -v mcp-calendar:/calendar-server \
  -e CALENDAR_OAUTH_PATH=/gcp-oauth.keys.json \
  -e "CALENDAR_CREDENTIALS_PATH=/calendar-server/credentials.json" \
  -p 3000:3000 \
  mcp/calendar auth
  1. Usage:
{
  "mcpServers": {
    "calendar": {
      "command": "docker",
      "args": [
        "run",
        "-i",
        "--rm",
        "-v",
        "mcp-calendar:/calendar-server",
        "-e",
        "CALENDAR_CREDENTIALS_PATH=/calendar-server/credentials.json",
        "mcp/calendar"
      ]
    }
  }
}

Usage Examples

The server provides several tools that can be used through the Claude Desktop:

Create Event

{
  "summary": "Team Meeting",
  "start": {
    "dateTime": "2024-01-20T10:00:00Z"
  },
  "end": {
    "dateTime": "2024-01-20T11:00:00Z"
  },
  "description": "Weekly team sync",
  "location": "Conference Room A"
}

List Events

{
  "timeMin": "2024-01-01T00:00:00Z",
  "timeMax": "2024-12-31T23:59:59Z",
  "maxResults": 10,
  "orderBy": "startTime"
}

Update Event

{
  "eventId": "event123",
  "summary": "Updated Meeting Title",
  "start": {
    "dateTime": "2024-01-20T11:00:00Z"
  },
  "end": {
    "dateTime": "2024-01-20T12:00:00Z"
  }
}

Delete Event

{
  "eventId": "event123"
}

Security Notes

  • OAuth credentials are stored securely in your local environment (~/.calendar-mcp/)
  • The server uses offline access to maintain persistent authentication
  • Never share or commit your credentials to version control
  • Regularly review and revoke unused access in your Google Account settings
  • Credentials are stored globally but are only accessible by the current user

Troubleshooting

  1. OAuth Keys Not Found
* Make sure `gcp-oauth.keys.json` is in either your current directory or `~/.calendar-mcp/`
* Check file permissions
  1. Invalid Credentials Format
* Ensure your OAuth keys file contains either `web` or `installed` credentials
* For web applications, verify the redirect URI is correctly configured
  1. Port Already in Use
* If port 3000 is already in use, please free it up before running authentication
* You can find and stop the process using that port

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

License

This project is licensed under the ISC License.

Author

gongrzhe

Support

If you encounter any issues or have questions, please file an issue on the GitHub repository.

Related MCP Servers & Clients