Asana

Live

OAUTH 2.0

PROJECT MANAGEMENT

Every task, project, and workflow your team manages lives in Asana. Asana MCP gives your agent authenticated access to projects scoped to the user who authorized it.

  • Acts as the user: Access and write actions stay tied to the Asana account that authorized the agent.
  • Credentials stay vaulted: AES-256, resolved at request time, never in LLM context.
  • Scoped before every call: User permissions enforced. 90-day audit trail.
Asana
agent · Acme Q3
Run
What tasks are due this week across my projects and who owns each?
S
asana_tasks_list
79ms
Project management agent
7 tasks due this week. Top 3: Q4 launch checklist (Sarah, Tue), pricing review (James, Wed), onboarding redesign (Maria, Fri).
Sources: 7 tasks, 3 projects
asanamcp
7 tasks
18:29
Message Claude...

Tools your project management agent reaches for on Asana, scoped per user.

CALL ANY TOOL
List tasks and projects, create and update tasks, add comments, and track due dates.
asana_tasks_list
List tasks
List tasks in a project, section, or assignee scope with optional filters.
Parameters
Name
Type
Required
Description
project
string
Optional
Project GID
assignee
string
Optional
User GID or 'me'
completed_since
string
Optional
ISO 8601 timestamp
limit
integer
Optional
Max tasks
asana_task_get
Get task
asana_task_create
Create task
asana_task_update
Update task
asana_projects_list
List projects
asana_comment_create
Add comment
Build your Agent
Drop the toolkit in, point it at the user, and your project management agent can use Asana from the first run.
import { ScalekitClient } from "@scalekit-sdk/node";
import { DynamicStructuredTool } from "@langchain/core/tools";
import { createReactAgent } from "@langchain/langgraph/prebuilt";
import { z } from "zod";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["asana"], toolNames: ["asana_tasks_list", "asana_task_get", "asana_task_create"] },
pageSize: 100,
});

const lcTools = tools.map((t) => new DynamicStructuredTool({
name: t.tool.definition.name,
description: t.tool.definition.description,
schema: z.object({}).passthrough(),
func: async (args) => {
const { data } = await sk.tools.executeTool({
toolName: t.tool.definition.name,
identifier: "user_123",
params: args,
});
return JSON.stringify(data);
},
}));

const agent = createReactAgent({ llm, tools: lcTools });
import { ScalekitClient } from "@scalekit-sdk/node";
import OpenAI from "openai";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);
const openai = new OpenAI();

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["asana"], toolNames: ["asana_tasks_list", "asana_task_get", "asana_task_create"] },
pageSize: 100,
});

const llmTools = tools.map((t) => ({
type: "function",
function: {
name: t.tool.definition.name,
description: t.tool.definition.description,
parameters: t.tool.definition.input_schema,
},
}));

const resp = await openai.responses.create({
model: "gpt-4o", input: prompt, tools: llmTools,
});
import { ScalekitClient } from "@scalekit-sdk/node";
import Anthropic from "@anthropic-ai/sdk";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);
const anthropic = new Anthropic();

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["asana"], toolNames: ["asana_tasks_list", "asana_task_get", "asana_task_create"] },
pageSize: 100,
});

const llmTools = tools.map((t) => ({
name: t.tool.definition.name,
description: t.tool.definition.description,
input_schema: t.tool.definition.input_schema,
}));

const msg = await anthropic.messages.create({
model: "claude-sonnet-4-6", max_tokens: 1024,
tools: llmTools,
messages: [{ role: "user", content: prompt }],
});
import { Agent } from "@google/adk/agents";
import {
MCPToolset, StreamableHTTPConnectionParams,
} from "@google/adk/tools/mcp";

const toolset = new MCPToolset({
connectionParams: new StreamableHTTPConnectionParams({
url: "https://mcp.scalekit.com/asana",
headers: { Authorization: `Bearer ${userScopedToken}` },
}),
});

const agent = new Agent({
name: "agent", model: "gemini-2.0-flash",
tools: await toolset.getTools(),
});
Try these prompts
Paste any prompt into your agent to start using Asana.
Search & recall
Copy the prompt
Copied
List all tasks assigned to me this week.
Copy the prompt
Copied
Show me overdue tasks in [project name].
Copy the prompt
Copied
Find tasks with [tag] across all projects.
Copy the prompt
Copied
What sub-tasks does [task name] have?
Action & creation
Copy the prompt
Copied
Create a task in [project]: [name] due [date].
Copy the prompt
Copied
Assign task [name] to [person] and set due to [date].
Copy the prompt
Copied
Mark task [name] as complete.
Copy the prompt
Copied
Add a comment to [task]: [text].
Projects & reporting
Copy the prompt
Copied
List all active projects in [workspace].
Copy the prompt
Copied
How many tasks are open by status in [project]?
Copy the prompt
Copied
Show project completion progress for [project].
Copy the prompt
Copied
What tasks were closed in the last 7 days?
SEE HOW AUTH WORKS
Users authorize Asana once. Their credentials stay vaulted, every call is checked, and every action is logged.
1
Authorize
Your user connects
Asana
once. We tie it to their identity and the meetings they approved — no shared bot account, no org-wide access
Who:
user ‘A’
when:
Once per user
access:
Limited to user
2
Store
Their
Asana
token lives in a vault scoped to them. User A's meetings are never reachable by an agent acting for user B, even on the same connection
vault:
encrypted
scope:
per-user
tokens:
auto-refreshed
3
Resolve
When your agent calls a
Asana
tool, we fetch the right token server-side. It never touches your agent, never appears in the LLM context, never shows up in your logs
speed:
~40ms
check:
before every call
seen by:
nobody
4
Audit
Every
Asana
tool call is logged — who triggered it, which meeting was fetched, what came back. 90 days of history, tied to the user who authorized it
history:
90 days
export:
SIEM-ready
logged:
every call
Test other agents
Same per-user auth pattern across other project management agents and MCP connectors. Working code, live demos, fork what fits.
ENGINEERING
DevOps assistant agent
Triage GitHub incidents, open Linear tickets, and notify the on-call channel in Slack with context already attached.
ENGINEERING
Engineering standup agent
Aggregate GitHub and GitLab activity, link to Jira, and post a daily standup digest to Slack. No async updates.
Why Scalekit
Secure your agent's access. Connectors ship in minutes
Other connector libraries treat auth as a demo afterthought. Scalekit starts with user identity, scope enforcement, and audit.
01.
Task updates lose team attribution
A shared Asana token looks fine in a demo. In production, every task update and project write logs as the integration. Task ownership breaks. Workspace attribution breaks. Scalekit resolves the actual user's token so every Asana action is attributed to the right person.
// shared token
audit → bot_service_account
user_filter → broken

// scalekit
audit → user_abc
scope → enforced ✓
02.
Authentication is not authorization
03.
Multi-tenancy is architectural
04.
Asana today. Linear, Jira, ClickUp tomorrow.
“Our agents act across Salesforce, Gong, Google Drive, and more, on behalf of every customer. Scalekit behind the scenes meant we can keep adding tools without ever rebuilding how credentials or tool calling work.”
Venu Madhav Kattagoni
Head of Engineering / Von
Frequently Asked Questions
Does the agent access Asana as the user or as a shared key?
As the user. Each workspace member authorizes once and Scalekit resolves their credential at request time. Audit logs attribute every action to that user, not a shared service account.
Where is the Asana oauth 2.0 stored?
Can I limit what the agent is allowed to do in Asana?
What happens when a user revokes Asana access?
Can the agent work across multiple Asana workspaces?
Start in your coding agent
Up and running in one command
Install the Scalekit skill in your editor of choice. Connector, auth, tools, prompt, all wired up
Claude Code REPL
/plugin marketplace add scalekit-inc/claude-code-authstack
/plugin install agentkit@scalekit-auth-stack
Cursor Code REPL
# ~/.cursor/mcp.json
{
""mcpServers"": {
""asana"": {
""url"": ""https://mcp.scalekit.com/asana"",
""headers"": { ""Authorization"": ""Bearer $SCALEKIT_TOKEN"" }
}
}
}
Codex Code REPL
# ~/.codex/config.toml
[mcp_servers.asana]
url = ""https://mcp.scalekit.com/asana""
auth_env = ""SCALEKIT_TOKEN""
Copilot Code REPL
# .vscode/mcp.json
{
""servers"": {
""asana"": {
""url"": ""https://mcp.scalekit.com/asana"",
""type"": ""http""
}
}
}