Confluence

Live

OAUTH 2.0

DOCS

Every runbook, RFC, and team wiki page your team writes in Confluence. Confluence MCP gives your agent authenticated access to your knowledge base scoped to the user who authorized it.

  • Acts as the user: Access and write actions stay tied to the Confluence account that authorized the agent.
  • Credentials stay vaulted: AES-256, resolved at request time, never in LLM context.
  • Scoped before every call: User permissions enforced. 90-day audit trail.
Confluence
agent · Acme Q3
Run
Find all runbooks tagged 'on-call' updated in the last 30 days.
S
confluence_search
82ms
Knowledge agent
7 runbooks updated. Top hits: incident response playbook (Oct 28), database failover (Oct 25), webhook retry policy (Oct 22), auth outage runbook (Oct 19), payment gateway escalation (Oct 18).
Sources: 7 pages, on-call space, last 30 days
confluencemcp
7 pages
18:29
Message Claude...

Tools your knowledge agent reaches for on Confluence, scoped per user.

CALL ANY TOOL
Search spaces and pages, retrieve content, create runbooks, and update wiki entries.
confluence_search
Search pages
Search Confluence pages and spaces with CQL or simple text query.
Parameters
Name
Type
Required
Description
cql
string
Optional
Confluence Query Language
text
string
Optional
Plain text search
limit
integer
Optional
Max results
confluence_page_get
Get page
confluence_page_create
Create page
confluence_page_update
Update page
confluence_spaces_list
List spaces
confluence_comments_list
List comments
Build your Agent
Drop the toolkit in, point it at the user, and your knowledge agent can use Confluence from the first run.
import { ScalekitClient } from "@scalekit-sdk/node";
import { DynamicStructuredTool } from "@langchain/core/tools";
import { createReactAgent } from "@langchain/langgraph/prebuilt";
import { z } from "zod";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["confluence"], toolNames: ["confluence_search", "confluence_page_get", "confluence_page_create"] },
pageSize: 100,
});

const lcTools = tools.map((t) => new DynamicStructuredTool({
name: t.tool.definition.name,
description: t.tool.definition.description,
schema: z.object({}).passthrough(),
func: async (args) => {
const { data } = await sk.tools.executeTool({
toolName: t.tool.definition.name,
identifier: "user_123",
params: args,
});
return JSON.stringify(data);
},
}));

const agent = createReactAgent({ llm, tools: lcTools });
import { ScalekitClient } from "@scalekit-sdk/node";
import OpenAI from "openai";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);
const openai = new OpenAI();

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["confluence"], toolNames: ["confluence_search", "confluence_page_get", "confluence_page_create"] },
pageSize: 100,
});

const llmTools = tools.map((t) => ({
type: "function",
function: {
name: t.tool.definition.name,
description: t.tool.definition.description,
parameters: t.tool.definition.input_schema,
},
}));

const resp = await openai.responses.create({
model: "gpt-4o", input: prompt, tools: llmTools,
});
import { ScalekitClient } from "@scalekit-sdk/node";
import Anthropic from "@anthropic-ai/sdk";

const sk = new ScalekitClient(envUrl, clientId, clientSecret);
const anthropic = new Anthropic();

const { tools } = await sk.tools.listScopedTools("user_123", {
filter: { connectionNames: ["confluence"], toolNames: ["confluence_search", "confluence_page_get", "confluence_page_create"] },
pageSize: 100,
});

const llmTools = tools.map((t) => ({
name: t.tool.definition.name,
description: t.tool.definition.description,
input_schema: t.tool.definition.input_schema,
}));

const msg = await anthropic.messages.create({
model: "claude-sonnet-4-6", max_tokens: 1024,
tools: llmTools,
messages: [{ role: "user", content: prompt }],
});
import { Agent } from "@google/adk/agents";
import {
MCPToolset, StreamableHTTPConnectionParams,
} from "@google/adk/tools/mcp";

const toolset = new MCPToolset({
connectionParams: new StreamableHTTPConnectionParams({
url: "https://mcp.scalekit.com/confluence",
headers: { Authorization: `Bearer ${userScopedToken}` },
}),
});

const agent = new Agent({
name: "agent", model: "gemini-2.0-flash",
tools: await toolset.getTools(),
});
Try these prompts
Paste any prompt into your agent to start using Confluence.
Search & recall
Copy the prompt
Copied
Find pages tagged [label] in [space].
Copy the prompt
Copied
Get the latest runbook for [topic].
Copy the prompt
Copied
Show me pages updated this week.
Copy the prompt
Copied
List pages in [space name].
Action & creation
Copy the prompt
Copied
Create a runbook in [space]: [title] with [body].
Copy the prompt
Copied
Update [page name] to add [section].
Copy the prompt
Copied
Comment on [page]: [text].
Copy the prompt
Copied
Move [page] under [parent page].
Reporting & audits
Copy the prompt
Copied
Which pages are outdated (no edit in 90 days)?
Copy the prompt
Copied
List page owners in [space].
Copy the prompt
Copied
Find duplicate pages on [topic].
Copy the prompt
Copied
Compare [page A] and [page B] versions.
SEE HOW AUTH WORKS
Users authorize Confluence once. Their credentials stay vaulted, every call is checked, and every action is logged.
1
Authorize
Your user connects
Confluence
once. We tie it to their identity and the meetings they approved — no shared bot account, no org-wide access
Who:
user ‘A’
when:
Once per user
access:
Limited to user
2
Store
Their
Confluence
token lives in a vault scoped to them. User A's meetings are never reachable by an agent acting for user B, even on the same connection
vault:
encrypted
scope:
per-user
tokens:
auto-refreshed
3
Resolve
When your agent calls a
Confluence
tool, we fetch the right token server-side. It never touches your agent, never appears in the LLM context, never shows up in your logs
speed:
~40ms
check:
before every call
seen by:
nobody
4
Audit
Every
Confluence
tool call is logged — who triggered it, which meeting was fetched, what came back. 90 days of history, tied to the user who authorized it
history:
90 days
export:
SIEM-ready
logged:
every call
Test other agents
Same per-user auth pattern across other knowledge agents and MCP connectors. Working code, live demos, fork what fits.
SUPPORT
Support triage agent
Read Zendesk tickets, fetch runbooks from Notion, and route to the right Slack channel with a drafted response.
SUPPORT
Support ticket automation (Google ADK)
Google ADK agent that classifies Zendesk tickets, pulls Notion context, and posts to Slack. End-to-end ticket handoff.
Why Scalekit
Secure your agent's access. Connectors ship in minutes
Other connector libraries treat auth as a demo afterthought. Scalekit starts with user identity, scope enforcement, and audit.
01.
Page edits lose workspace attribution
A shared Confluence integration token looks fine in a demo. In production, every page update and space write logs as the integration, not the user. Page ownership breaks. Space permission scoping breaks. Scalekit resolves the actual user's token so every Confluence action is attributed to the right person.
// shared token
audit → bot_service_account
user_filter → broken

// scalekit
audit → user_abc
scope → enforced ✓
02.
Authentication is not authorization
03.
Multi-tenancy is architectural
04.
Confluence today. Notion, Google Docs, SharePoint tomorrow.
“Our agents act across Salesforce, Gong, Google Drive, and more, on behalf of every customer. Scalekit behind the scenes meant we can keep adding tools without ever rebuilding how credentials or tool calling work.”
Venu Madhav Kattagoni
Head of Engineering / Von
Frequently Asked Questions
Does the agent access Confluence as the user or as a shared key?
As the user. Each workspace member authorizes once and Scalekit resolves their credential at request time. Audit logs attribute every action to that user, not a shared service account.
Where is the Confluence oauth 2.0 stored?
Can I limit what the agent is allowed to do in Confluence?
What happens when a user revokes Confluence access?
Which Confluence spaces can the agent search?
Start in your coding agent
Up and running in one command
Install the Scalekit skill in your editor of choice. Connector, auth, tools, prompt, all wired up
Claude Code REPL
/plugin marketplace add scalekit-inc/claude-code-authstack
/plugin install agentkit@scalekit-auth-stack
Cursor Code REPL
# ~/.cursor/mcp.json
{
""mcpServers"": {
""confluence"": {
""url"": ""https://mcp.scalekit.com/confluence"",
""headers"": { ""Authorization"": ""Bearer $SCALEKIT_TOKEN"" }
}
}
}
Codex Code REPL
# ~/.codex/config.toml
[mcp_servers.confluence]
url = ""https://mcp.scalekit.com/confluence""
auth_env = ""SCALEKIT_TOKEN""
Copilot Code REPL
# .vscode/mcp.json
{
""servers"": {
""confluence"": {
""url"": ""https://mcp.scalekit.com/confluence"",
""type"": ""http""
}
}
}