An MCP server that connects AI assistants to Zammad, providing tools for managing tickets, users, organizations, and attachments.
Disclaimer: This project is not affiliated with or endorsed by Zammad GmbH or the Zammad Foundation. This is an independent integration that uses the Zammad API.
-
Ticket Management
zammad_search_tickets- Search tickets with multiple filterszammad_get_ticket- Get detailed ticket information with articles (supports pagination)zammad_create_ticket- Create new ticketszammad_update_ticket- Update ticket propertieszammad_add_article- Add comments/notes to ticketszammad_add_ticket_tag/zammad_remove_ticket_tag- Manage ticket tags
-
Attachment Support
zammad_get_article_attachments- List attachments for a ticket articlezammad_download_attachment- Download attachment content (base64-encoded)zammad_delete_attachment- Delete attachments from ticket articles
-
User & Organization Management
zammad_get_user/zammad_search_users- User information and searchzammad_get_organization/zammad_search_organizations- Organization datazammad_get_current_user- Get authenticated user info
-
System Information
zammad_list_groups- Get all available groups (cached for performance)zammad_list_ticket_states- Get all ticket states (cached for performance)zammad_list_ticket_priorities- Get all priority levels (cached for performance)zammad_get_ticket_stats- Get ticket statistics (optimized with pagination)
Access Zammad data directly:
zammad://ticket/{id}- Individual ticket detailszammad://user/{id}- User profile informationzammad://organization/{id}- Organization detailszammad://queue/{group}- Ticket queue for a group
Pre-configured prompts:
analyze_ticket- Comprehensive ticket analysisdraft_response- Generate ticket responsesescalation_summary- Summarize escalated tickets
Run without installation:
# Install uv if you haven't already
# macOS/Linux:
curl -LsSf https://astral.sh/uv/install.sh | sh
# Windows:
powershell -c "irm https://astral.sh/uv/install.ps1 | iex"
# Run directly from GitHub
uvx --from git+https://github.com/basher83/zammad-mcp.git mcp-zammad
# Or with environment variables
ZAMMAD_URL=https://your-instance.zammad.com/api/v1 \
ZAMMAD_HTTP_TOKEN=your-api-token \
uvx --from git+https://github.com/basher83/zammad-mcp.git mcp-zammadFor production or containerized deployments:
# Basic usage with environment variables
docker run --rm -i \
-e ZAMMAD_URL=https://your-instance.zammad.com/api/v1 \
-e ZAMMAD_HTTP_TOKEN=your-api-token \
ghcr.io/basher83/zammad-mcp:latest
# Using Docker secrets for better security
docker run --rm -i \
-e ZAMMAD_URL=https://your-instance.zammad.com/api/v1 \
-e ZAMMAD_HTTP_TOKEN_FILE=/run/secrets/token \
-v ./secrets/zammad_http_token.txt:/run/secrets/token:ro \
ghcr.io/basher83/zammad-mcp:latest
# With .env file
docker run --rm -i \
--env-file .env \
ghcr.io/basher83/zammad-mcp:latestThe project publishes Docker images with semantic versioning:
latest- Most recent stable release1.2.3- Specific version (recommended for production)1.2- Latest patch of 1.2 minor release1- Latest minor/patch of 1.x major releasemain- Latest main branch (may be unstable)
# Recommended for production - pin to specific version
docker pull ghcr.io/basher83/zammad-mcp:1.0.0View all versions on GitHub Container Registry.
To contribute or modify the code:
# Clone the repository
git clone https://github.com/basher83/zammad-mcp.git
cd zammad-mcp
# Run the setup script
# On macOS/Linux:
./setup.sh
# On Windows (PowerShell):
.\setup.ps1For manual setup, see the Development section below.
The server requires Zammad API credentials. Use a .env file:
-
Copy the example configuration:
cp .env.example .env
-
Edit
.envwith your Zammad credentials:# Required: Zammad instance URL (include /api/v1) ZAMMAD_URL=https://your-instance.zammad.com/api/v1 # Authentication (choose one method): # Option 1: API Token (recommended) ZAMMAD_HTTP_TOKEN=your-api-token # Option 2: OAuth2 Token # ZAMMAD_OAUTH2_TOKEN=your-oauth2-token # Option 3: Username/Password # ZAMMAD_USERNAME=your-username # ZAMMAD_PASSWORD=your-password # Optional: Logging level (default: INFO) # Valid values: DEBUG, INFO, WARNING, ERROR, CRITICAL # LOG_LEVEL=INFO # Optional: Transport Configuration # MCP_TRANSPORT=stdio # Transport type: stdio (default) or http # MCP_HOST=127.0.0.1 # Host address for HTTP transport # MCP_PORT=8000 # Port number for HTTP transport
-
The server will automatically load the
.envfile on startup.
| Variable | Default | Description |
|---|---|---|
MCP_TRANSPORT |
stdio |
Transport type: stdio or http |
MCP_HOST |
127.0.0.1 |
Host address for HTTP transport |
MCP_PORT |
- | Port number for HTTP transport (required if MCP_TRANSPORT=http) |
Important: Keep your .env file out of version control (already in .gitignore).
All data-returning tools support two output formats:
- Markdown (default): Human-readable format optimized for LLM consumption
- JSON: Machine-readable format with complete metadata
Example:
# Markdown (default)
zammad_search_tickets(query="network", response_format="markdown")
# JSON
zammad_search_tickets(query="network", response_format="json")Add to your Claude Desktop configuration:
{
"mcpServers": {
"zammad": {
"command": "uvx",
"args": ["--from", "git+https://github.com/basher83/zammad-mcp.git", "mcp-zammad"],
"env": {
"ZAMMAD_URL": "https://your-instance.zammad.com/api/v1",
"ZAMMAD_HTTP_TOKEN": "your-api-token"
}
}
}
}Or using Docker:
{
"mcpServers": {
"zammad": {
"command": "docker",
"args": ["run", "--rm", "-i",
"-e", "ZAMMAD_URL=https://your-instance.zammad.com/api/v1",
"-e", "ZAMMAD_HTTP_TOKEN=your-api-token",
"ghcr.io/basher83/zammad-mcp:latest"]
}
}
}Note: The server supports stdio (default) and HTTP transports. Stdio mode requires the -i flag for Docker. See the HTTP Transport section below for remote deployments.
Important: The -i flag is required—without it, the MCP server cannot receive stdin. Preserve this flag in wrapper scripts or shell aliases.
Or if you have it installed locally:
{
"mcpServers": {
"zammad": {
"command": "python",
"args": ["-m", "mcp_zammad"],
"env": {
"ZAMMAD_URL": "https://your-instance.zammad.com/api/v1",
"ZAMMAD_HTTP_TOKEN": "your-api-token"
}
}
}
}# Run the server
python -m mcp_zammad
# Or with environment variables
ZAMMAD_URL=https://instance.zammad.com/api/v1 ZAMMAD_HTTP_TOKEN=token python -m mcp_zammadThe server supports Streamable HTTP transport for remote deployments.
Set these environment variables to enable HTTP transport:
export MCP_TRANSPORT=http # Enable HTTP transport
export MCP_HOST=127.0.0.1 # Host to bind (default: 127.0.0.1)
export MCP_PORT=8000 # Port to listen onDirect Python:
MCP_TRANSPORT=http \
MCP_HOST=127.0.0.1 \
MCP_PORT=8000 \
ZAMMAD_URL=https://your-instance.zammad.com/api/v1 \
ZAMMAD_HTTP_TOKEN=your-api-token \
uvx --from git+https://github.com/basher83/zammad-mcp.git mcp-zammadDocker:
docker run -d \
--name zammad-mcp-http \
-p 8000:8000 \
-e MCP_TRANSPORT=http \
-e MCP_HOST=0.0.0.0 \
-e MCP_PORT=8000 \
-e ZAMMAD_URL=https://your-instance.zammad.com/api/v1 \
-e ZAMMAD_HTTP_TOKEN=your-api-token \
ghcr.io/basher83/zammad-mcp:latestAccess the MCP endpoint at http://localhost:8000/mcp/.
0.0.0.0 only behind a reverse proxy with TLS.
Use a reverse proxy (nginx/Caddy) for HTTPS and security:
Example with Caddy:
# Start the MCP server (binds to all interfaces for reverse proxy)
MCP_TRANSPORT=http \
MCP_HOST=0.0.0.0 \
MCP_PORT=8000 \
ZAMMAD_URL=https://your-instance.zammad.com/api/v1 \
ZAMMAD_HTTP_TOKEN=your-api-token \
uvx --from git+https://github.com/basher83/zammad-mcp.git mcp-zammadCaddyfile configuration:
mcp.yourdomain.com {
reverse_proxy localhost:8000
# Caddy automatically handles HTTPS/TLS
}Production checklist:
- Use
MCP_HOST=0.0.0.0only behind a reverse proxy - Enable HTTPS/TLS via reverse proxy
- Implement authentication at the proxy or application layer
- Restrict access with firewall rules
Configure your MCP client to use HTTP transport:
{
"mcpServers": {
"zammad": {
"url": "http://localhost:8000/mcp/"
}
}
}- Local Development: Use
MCP_HOST=127.0.0.1(localhost only) - Production: Implement authentication (see Security)
- HTTPS: Use reverse proxy for TLS
- Firewall: Restrict access to trusted networks
- DNS Rebinding: Built-in origin validation protects against these attacks
Use search_tickets with state="open" to find all open tickets
Use create_ticket with:
- title: "Customer needs help with login"
- group: "Support"
- customer: "customer@example.com"
- article_body: "Customer reported unable to login..."
1. Use get_ticket with ticket_id=123 to see the full conversation
2. Use add_article to add your response
3. Use update_ticket to change state to "pending reminder"
Use the escalation_summary prompt to get a report of all tickets approaching escalation
Use add_article with attachments parameter:
- ticket_id: 123
- body: "See attached documentation"
- attachments: [
{
"filename": "guide.pdf",
"data": "JVBERi0xLjQKJ...", # base64-encoded content
"mime_type": "application/pdf"
}
]
Use delete_attachment with:
- ticket_id: 123
- article_id: 456
- attachment_id: 789
# Clone the repository
git clone https://github.com/basher83/zammad-mcp.git
cd zammad-mcp
# Run the setup script
# On macOS/Linux:
./setup.sh
# On Windows (PowerShell):
.\setup.ps1# Clone the repository
git clone https://github.com/basher83/zammad-mcp.git
cd zammad-mcp
# Create a virtual environment with uv
uv venv
# Activate the virtual environment
# On macOS/Linux:
source .venv/bin/activate
# On Windows:
# .venv\Scripts\activate
# Install in development mode
uv pip install -e ".[dev]"zammad-mcp/
├── mcp_zammad/
│ ├── __init__.py
│ ├── __main__.py
│ ├── server.py # MCP server implementation
│ ├── client.py # Zammad API client wrapper
│ └── models.py # Pydantic models
├── tests/
├── scripts/
│ └── uv/ # UV single-file scripts
├── pyproject.toml
├── README.md
├── Dockerfile
└── .env.example
# Install development dependencies
uv pip install -e ".[dev]"
# Run tests
uv run pytest
# Run with coverage
uv run pytest --cov=mcp_zammad# Format code
uv run ruff format mcp_zammad tests
# Lint
uv run ruff check mcp_zammad tests
# Type checking
uv run mypy mcp_zammad
# Run all quality checks
./scripts/quality-check.shTo generate an API token in Zammad:
- Log into your Zammad instance
- Click on your avatar → Profile
- Navigate to "Token Access"
- Click "Create"
- Name your token (e.g., "MCP Server")
- Select appropriate permissions
- Copy the generated token
- Verify your Zammad URL includes the protocol (https://)
- Check that your API token has the necessary permissions
- Ensure your Zammad instance is accessible from your network
- Use API tokens over username/password
- Ensure tokens have permissions for the operations
- Check token expiration in Zammad settings
The server respects Zammad's rate limits. If you hit rate limits:
- Reduce request frequency
- Paginate large result sets
- Cache frequently accessed data
The server implements multiple layers of protection following industry best practices.
Report via GitHub Security Advisories (preferred) or see SECURITY.md.
- ✅ Input Validation: Validates and sanitizes all user inputs (models.py)
- ✅ SSRF Protection: URL validation prevents server-side request forgery (client.py)
- ✅ XSS Prevention: Sanitizes HTML in all text fields (models.py)
- ✅ Secure Authentication: Prefers API tokens over passwords (client.py)
- ✅ Dependency Scanning: Dependabot detects vulnerabilities automatically
- ✅ Security Testing: CI runs Bandit, Safety, and pip-audit (security-scan.yml)
See SECURITY.md for complete documentation.
See CONTRIBUTING.md for development setup, code standards, testing, and pull request guidelines.
AGPL-3.0-or-later — matches the Zammad project license.
- ARCHITECTURE.md — Technical design
- SECURITY.md — Security policy
- CONTRIBUTING.md — Development guidelines
- CHANGELOG.md — Version history
"Zammad" is a trademark of Zammad GmbH. This independent integration is not affiliated with or endorsed by Zammad GmbH or the Zammad Foundation. The name "Zammad" indicates compatibility with the Zammad ticket system.