QueryPie SAC
Securely access servers through QueryPie platform’s SAC (Security Access Control).
Key Features
- Server access through QueryPie SAC (Security Access Control)
- Permission-based server management
- Secure server command execution
Basic Information
Authentication Method
Authenticate using QueryPie platform username and password.
Input Parameters
- Server URL (Required): QueryPie API server URL
- Username (Required): QueryPie username
- Password (Required): QueryPie password
Supported MCP Tools
SAC (Security Access Control) Tools
Manage server access through QueryPie’s security access control functionality.
QueryPie SAC MCP only works with Linux-based servers.
list_accessible_server_roles
Retrieve a list of all accessible server roles. You must select a role to use in subsequent commands.
list_accessible_server_groups
Retrieve a list of all accessible server groups.
Input Parameters:
roleUuid
(Required): Role UUID
list_accessible_servers
Retrieve a list of all accessible servers.
Input Parameters:
roleUuid
(Required): Role UUIDserverGroupUuid
(Required): Server group UUID
list_server_accounts
Retrieve a list of server accounts. This is a list of all accounts that can be used to connect to the server.
Input Parameters:
roleUuid
(Required): Role UUIDserverUuid
(Required): Server UUID
run_server_command
Execute commands on the server.
Input Parameters:
roleUuid
(Required): Role UUIDhost
(Required): Server hostport
(Required): Server portusername
(Required): Usernamecommand
(Required): Command to execute
Usage Examples
For example,
- When you input the prompt “Show me the list of servers accessible through QueryPie”,
- The LLM will sequentially call
list_accessible_server_roles
,list_accessible_server_groups
, andlist_accessible_servers
tools through QueryPie SAC MCP, then respond based on the results.
Precautions
- Keep your QueryPie username and password secure.
- Maintain security through proper permission settings.
- Follow your organization’s security policies when accessing servers.
- Regularly review access logs.
Last updated on