Server data from the Official MCP Registry
Production-ready MCP server for Redmine with security, pagination, and enterprise features
Production-ready MCP server for Redmine with security, pagination, and enterprise features
Valid MCP server (0 strong, 2 medium validity signals). No known CVEs in dependencies. Package registry verified. Imported from the Official MCP Registry.
3 files analyzed · 1 issue found
Security scores are indicators to help you make informed decisions, not guarantees. Always review permissions before connecting any MCP server.
This plugin requests these system permissions. Most are normal for its category.
Set these up before or after installing:
Environment variable: REDMINE_URL
Environment variable: REDMINE_USERNAME
Environment variable: REDMINE_PASSWORD
Environment variable: REDMINE_API_KEY
Environment variable: SERVER_HOST
Environment variable: SERVER_PORT
Environment variable: PUBLIC_HOST
Environment variable: PUBLIC_PORT
Environment variable: ATTACHMENTS_DIR
Environment variable: AUTO_CLEANUP_ENABLED
Environment variable: CLEANUP_INTERVAL_MINUTES
Environment variable: ATTACHMENT_EXPIRES_MINUTES
Add this to your MCP configuration file:
{
"mcpServers": {
"io-github-jztan-redmine-mcp-server": {
"env": {
"PUBLIC_HOST": "your-public-host-here",
"PUBLIC_PORT": "your-public-port-here",
"REDMINE_URL": "your-redmine-url-here",
"SERVER_HOST": "your-server-host-here",
"SERVER_PORT": "your-server-port-here",
"ATTACHMENTS_DIR": "your-attachments-dir-here",
"REDMINE_API_KEY": "your-redmine-api-key-here",
"REDMINE_PASSWORD": "your-redmine-password-here",
"REDMINE_USERNAME": "your-redmine-username-here",
"AUTO_CLEANUP_ENABLED": "your-auto-cleanup-enabled-here",
"CLEANUP_INTERVAL_MINUTES": "your-cleanup-interval-minutes-here",
"ATTACHMENT_EXPIRES_MINUTES": "your-attachment-expires-minutes-here"
},
"args": [
"redmine-mcp-server"
],
"command": "uvx"
}
}
}From the project's GitHub README.
A Model Context Protocol (MCP) server that integrates with Redmine project management systems. This server provides seamless access to Redmine data through MCP tools, enabling AI assistants to interact with your Redmine instance.
mcp-name: io.github.jztan/redmine-mcp-server
REDMINE_MCP_READ_ONLY environment variablepip install redmine-mcp-server
.env file with your Redmine credentials (see Installation for template)redmine-mcp-server
Once running, the server listens on http://localhost:8000 with the MCP endpoint at /mcp, health check at /health, and file serving at /files/{file_id}.
# Install the package
pip install redmine-mcp-server
# Create configuration file .env
cat > .env << 'EOF'
# Redmine connection (required)
REDMINE_URL=https://your-redmine-server.com
# Authentication - Use either API key (recommended) or username/password
REDMINE_API_KEY=your_api_key
# OR use username/password:
# REDMINE_USERNAME=your_username
# REDMINE_PASSWORD=your_password
# Server configuration (optional, defaults shown)
SERVER_HOST=0.0.0.0
SERVER_PORT=8000
# Public URL for file serving (optional)
PUBLIC_HOST=localhost
PUBLIC_PORT=8000
# File management (optional)
ATTACHMENTS_DIR=./attachments
AUTO_CLEANUP_ENABLED=true
CLEANUP_INTERVAL_MINUTES=10
ATTACHMENT_EXPIRES_MINUTES=60
EOF
# Edit .env with your actual Redmine settings
nano .env # or use your preferred editor
# Run the server
redmine-mcp-server
# Or alternatively:
python -m redmine_mcp_server.main
The server runs on http://localhost:8000 with the MCP endpoint at /mcp, health check at /health, and file serving at /files/{file_id}.
| Variable | Required | Default | Description |
|---|---|---|---|
REDMINE_URL | Yes | – | Base URL of your Redmine instance |
REDMINE_AUTH_MODE | No | legacy | Authentication mode: legacy or oauth (see Authentication) |
REDMINE_API_KEY | Yes† | – | API key (legacy mode only) |
REDMINE_USERNAME | Yes† | – | Username for basic auth (legacy mode only) |
REDMINE_PASSWORD | Yes† | – | Password for basic auth (legacy mode only) |
REDMINE_MCP_BASE_URL | Yes‡ | http://localhost:3040 | Public base URL of this server, no trailing slash (OAuth mode only) |
SERVER_HOST | No | 0.0.0.0 | Host/IP the MCP server binds to |
SERVER_PORT | No | 8000 | Port the MCP server listens on |
PUBLIC_HOST | No | localhost | Hostname used when generating download URLs |
PUBLIC_PORT | No | 8000 | Public port used for download URLs |
ATTACHMENTS_DIR | No | ./attachments | Directory for downloaded attachments |
AUTO_CLEANUP_ENABLED | No | true | Toggle automatic cleanup of expired attachments |
CLEANUP_INTERVAL_MINUTES | No | 10 | Interval for cleanup task |
ATTACHMENT_EXPIRES_MINUTES | No | 60 | Expiry window for generated download URLs |
REDMINE_SSL_VERIFY | No | true | Enable/disable SSL certificate verification |
REDMINE_SSL_CERT | No | – | Path to custom CA certificate file |
REDMINE_SSL_CLIENT_CERT | No | – | Path to client certificate for mutual TLS |
REDMINE_MCP_READ_ONLY | No | false | Block all write operations (create/update/delete) when set to true |
REDMINE_AGILE_ENABLED | No | false | Enable RedmineUP Agile plugin support: get_redmine_issue returns story_points, agile_sprint_id, agile_position; update_redmine_issue accepts story_points |
REDMINE_CHECKLISTS_ENABLED | No | false | Enable RedmineUP Checklists plugin support: get_checklist, update_checklist_item, mark_checklist_done (requires Checklists Pro plugin) |
REDMINE_AUTOFILL_REQUIRED_CUSTOM_FIELDS | No | false | Enable one retry for issue creation by filling missing required custom fields |
REDMINE_REQUIRED_CUSTOM_FIELD_DEFAULTS | No | {} | JSON object mapping required custom field names to fallback values used when creating issues |
REDMINE_ALLOW_PRIVATE_FETCH_URLS | No | false | Warning: disables all SSRF protection for attachment fetching. Never set to true in production. |
† Required when REDMINE_AUTH_MODE=legacy. Either REDMINE_API_KEY or REDMINE_USERNAME+REDMINE_PASSWORD must be set. API key is recommended.
‡ Required when REDMINE_AUTH_MODE=oauth.
When REDMINE_AUTOFILL_REQUIRED_CUSTOM_FIELDS=true, create_redmine_issue retries once on relevant custom-field validation errors (for example <Field Name> cannot be blank or <Field Name> is not included in the list) and fills values only from:
default_value, orREDMINE_REQUIRED_CUSTOM_FIELD_DEFAULTSExample:
REDMINE_AUTOFILL_REQUIRED_CUSTOM_FIELDS=true
REDMINE_REQUIRED_CUSTOM_FIELD_DEFAULTS='{"Required Field A":"Value A","Required Field B":"Value B"}'
Configure SSL certificate handling for Redmine servers with self-signed certificates or internal CA infrastructure.
If your Redmine server uses a self-signed certificate or internal CA:
# In .env file
REDMINE_URL=https://redmine.company.com
REDMINE_API_KEY=your_api_key
REDMINE_SSL_CERT=/path/to/ca-certificate.crt
Supported certificate formats: .pem, .crt, .cer
For environments requiring client certificate authentication:
# In .env file
REDMINE_URL=https://secure.redmine.com
REDMINE_API_KEY=your_api_key
REDMINE_SSL_CERT=/path/to/ca-bundle.pem
REDMINE_SSL_CLIENT_CERT=/path/to/cert.pem,/path/to/key.pem
Note: Private keys must be unencrypted (Python requests library requirement).
⚠️ WARNING: Only use in development/testing environments!
# In .env file
REDMINE_SSL_VERIFY=false
Disabling SSL verification makes your connection vulnerable to man-in-the-middle attacks.
For SSL troubleshooting, see the Troubleshooting Guide.
The server supports two authentication modes, selected via REDMINE_AUTH_MODE.
Backward compatibility:
REDMINE_AUTH_MODEdefaults tolegacy, so all existing deployments continue to work without any configuration changes. OAuth2 support is purely additive — nothing breaks if you never set the variable.
Uses a single shared credential — either an API key or a username/password pair — configured once in .env. Every request to Redmine uses the same identity.
REDMINE_AUTH_MODE=legacy # or omit entirely — this is the default
REDMINE_URL=https://redmine.example.com
REDMINE_API_KEY=your_api_key
# OR:
# REDMINE_USERNAME=your_username
# REDMINE_PASSWORD=your_password
Requires Redmine 6.1 or newer. OAuth2 support (via the Doorkeeper gem) was introduced in Redmine 6.1.
Each MCP request carries its own Authorization: Bearer <token> header. The server validates the token against GET /users/current.json on Redmine before forwarding it. This enables multi-user deployments where each user authenticates with their own Redmine account.
REDMINE_AUTH_MODE=oauth
REDMINE_URL=https://redmine.example.com
REDMINE_MCP_BASE_URL=https://redmine-mcp.example.com # public URL of this server
In OAuth mode the server also exposes OAuth2 discovery and token management endpoints:
| Endpoint | Standard | Purpose |
|---|---|---|
/.well-known/oauth-protected-resource | RFC 8707 | Tells clients where to find the authorization server |
/.well-known/oauth-authorization-server | RFC 8414 | Advertises Redmine's Doorkeeper OAuth endpoints |
POST /revoke | RFC 7009 | Revokes an OAuth2 token (proxies to Redmine's /oauth/revoke) |
Redmine uses the Doorkeeper gem for OAuth2 but does not serve the RFC 8414 discovery document itself. This server serves it on Redmine's behalf, pointing to Redmine's real /oauth/authorize, /oauth/token, and /oauth/revoke endpoints.
Prerequisites for OAuth mode:
Authorization: Bearer <token> on every MCP requestFor step-by-step setup instructions, see the OAuth2 Setup Guide.
The server exposes an HTTP endpoint at http://127.0.0.1:8000/mcp. Register it with your preferred MCP-compatible agent using the instructions below.
VS Code has built-in MCP support via GitHub Copilot (requires VS Code 1.102+).
Using CLI (Quickest):
code --add-mcp '{"name":"redmine","type":"http","url":"http://127.0.0.1:8000/mcp"}'
Using Command Palette:
Cmd/Ctrl+Shift+P)MCP: Open User Configuration (for global) or MCP: Open Workspace Folder Configuration (for project-specific){
"servers": {
"redmine": {
"type": "http",
"url": "http://127.0.0.1:8000/mcp"
}
}
}
Manual Configuration:
Create .vscode/mcp.json in your workspace (or mcp.json in your user profile directory):
{
"servers": {
"redmine": {
"type": "http",
"url": "http://127.0.0.1:8000/mcp"
}
}
}
Add to Claude Code using the CLI command:
claude mcp add --transport http redmine http://127.0.0.1:8000/mcp
Or configure manually in your Claude Code settings file (~/.claude.json):
{
"mcpServers": {
"redmine": {
"type": "http",
"url": "http://127.0.0.1:8000/mcp"
}
}
}
Claude Desktop's config file supports stdio transport only. Use FastMCP's proxy via uv to bridge to this HTTP server.
Setup:
{
"mcpServers": {
"redmine": {
"command": "uv",
"args": [
"run",
"--with", "fastmcp",
"fastmcp",
"run",
"http://127.0.0.1:8000/mcp"
]
}
}
}
Config file locations:
~/Library/Application Support/Claude/claude_desktop_config.json%APPDATA%\Claude\claude_desktop_config.jsonNote: The Redmine MCP server must be running before starting Claude Desktop.
Add to Codex CLI using the command:
codex mcp add redmine -- npx -y mcp-client-http http://127.0.0.1:8000/mcp
Or configure manually in ~/.codex/config.toml:
[mcp_servers.redmine]
command = "npx"
args = ["-y", "mcp-client-http", "http://127.0.0.1:8000/mcp"]
Note: Codex CLI primarily supports stdio-based MCP servers. The above uses mcp-client-http as a bridge for HTTP transport.
Kiro primarily supports stdio-based MCP servers. For HTTP servers, use an HTTP-to-stdio bridge:
.kiro/settings/mcp.json in your workspace:
{
"mcpServers": {
"redmine": {
"command": "npx",
"args": [
"-y",
"mcp-client-http",
"http://127.0.0.1:8000/mcp"
],
"disabled": false
}
}
}
Note: Direct HTTP transport support in Kiro is limited. The above configuration uses mcp-client-http as a bridge to connect to HTTP MCP servers.
Most MCP clients use a standard configuration format. For HTTP servers:
{
"mcpServers": {
"redmine": {
"type": "http",
"url": "http://127.0.0.1:8000/mcp"
}
}
}
For clients that require a command-based approach with HTTP bridge:
{
"mcpServers": {
"redmine": {
"command": "npx",
"args": ["-y", "mcp-client-http", "http://127.0.0.1:8000/mcp"]
}
}
}
# Test connection by checking health endpoint
curl http://localhost:8000/health
This MCP server provides 54 tools for interacting with Redmine. For detailed documentation, see Tool Reference.
Project Management (10 tools)
list_redmine_projects - List all accessible projectslist_project_issue_custom_fields - List issue custom fields configured for a projectlist_redmine_versions - List versions/milestones for a projectlist_project_members - List members and roles of a projectsummarize_project_status - Get comprehensive project status summarylist_redmine_roles - List all roles defined in the Redmine instance (for discovering valid role_ids)get_project_modules - Retrieve the enabled modules for a projectadd_project_member - Add a user or group as a member with rolesupdate_project_member - Update the roles of an existing membershipremove_project_member - Remove a membership from a projectIssue Operations (19 tools)
get_redmine_issue - Retrieve detailed issue information (supports journal pagination, watchers, relations, children)list_redmine_issues - List issues with flexible filtering (project, status, assignee, etc.)search_redmine_issues - Search issues by text querycreate_redmine_issue - Create new issuesupdate_redmine_issue - Update existing issuescopy_issue - Duplicate an existing issue with optional field overrideslist_issue_relations - List all relations for an issuecreate_issue_relation - Create a relation between two issues (blocks, duplicates, relates, etc.)delete_issue_relation - Delete an existing issue relationlist_subtasks - List subtasks (child issues) of a given parentadd_watcher - Add a user to the watcher list of an issueremove_watcher - Remove a user from the watcher listedit_note - Edit an existing journal note's text and/or privacyget_private_notes - Retrieve private notes on an issueset_note_private - Toggle the private/public state of a journal notelist_issue_categories - List issue categories for a projectcreate_issue_category - Create a new issue categoryupdate_issue_category - Update an existing issue categorydelete_issue_category - Delete an issue category (with optional reassignment)get_redmine_issue can include custom_fields and update_redmine_issue can update custom fields by name (for example {"size": "S"}).Time Tracking (6 tools)
list_time_entries - List time entries with filtering by project, issue, user, and date rangecreate_time_entry - Log time against projects or issuesupdate_time_entry - Modify existing time entrieslist_time_entry_activities - Discover available activity types for time entrieslog_time_for_user - Create a time entry on behalf of another user (requires log_time_for_other_users permission)import_time_entries - Bulk import time entries via sequential API calls with per-entry error reportingDiscovery / Enumeration (6 tools): help LLMs find valid IDs before calling create/update tools
list_redmine_trackers - List all trackers (Bug, Feature, Support, etc.)list_redmine_issue_statuses - List all issue statuses with their is_closed flaglist_redmine_issue_priorities - List all priority levelslist_redmine_users - Filter/list users (admin-only; supports name and group filters)get_current_user - Get the authenticated user's profile (works for non-admins)list_redmine_queries - List saved custom queries (read-only)Search & Wiki (5 tools)
search_entire_redmine - Global search across issues and wiki pages (Redmine 3.3.0+)get_redmine_wiki_page - Retrieve wiki page contentcreate_redmine_wiki_page - Create new wiki pagesupdate_redmine_wiki_page - Update existing wiki pagesdelete_redmine_wiki_page - Delete wiki pagesFile Operations (5 tools)
list_files - List files uploaded to a project's Files sectionupload_file - Upload a new file (base64 content) to a project, optionally tied to a versiondelete_file - Delete a file from a projectget_redmine_attachment_download_url - Get secure download URLs for attachmentscleanup_attachment_files - Clean up expired attachment filesChecklists (3 tools, requires REDMINE_CHECKLISTS_ENABLED=true + RedmineUP Checklists Pro plugin)
get_checklist - Retrieve all checklist items for an issueupdate_checklist_item - Update a checklist item's text, done state, or positionmark_checklist_done - Toggle the done/undone state of a checklist item# Configure environment
cp .env.example .env.docker
# Edit .env.docker with your Redmine settings
# Run with docker-compose
docker-compose up --build
# Or run directly
docker build -t redmine-mcp-server .
docker run -p 8000:8000 --env-file .env.docker redmine-mcp-server
Use the automated deployment script:
chmod +x deploy.sh
./deploy.sh
If you run into any issues, checkout our troubleshooting guide.
Contributions are welcome! Please see our contributing guide for details.
This project is licensed under the MIT License - see the LICENSE file for details.
Be the first to review this server!
by Modelcontextprotocol · Developer Tools
Read, search, and manipulate Git repositories programmatically
by Toleno · Developer Tools
Toleno Network MCP Server — Manage your Toleno mining account with Claude AI using natural language.
by mcp-marketplace · Developer Tools
Create, build, and publish Python MCP servers to PyPI — conversationally.