A Model Context Protocol (MCP) server that enables AI assistants to interact with Microsoft Outlook email and calendar through the Microsoft Graph API.
- Email Operations: Read, search, send, reply to emails and download attachments
- SharePoint Integration: Access SharePoint files via sharing links or direct file IDs. Download files shared to you via emails.
- Calendar Management: View and manage calendar events and appointments
- Office Document Processing: Parse PDF, Word, PowerPoint, and Excel files with extracted text content
- Large File Support: Automatic handling of files that exceed MCP response size limits
Choose your installation method:
| Method | Best For |
|---|---|
| DXT Extension | Claude Desktop users |
| CLI Configuration | Claude Code, mcp CLI, other MCP clients |
Prerequisites: Before installing, you'll need to set up an Azure application to get your Client ID and Tenant ID.
For Claude Desktop users, DXT extensions provide the simplest installation experience.
Option 1: Download Pre-built Extension
- Download
outlook-mcp.dxtfrom the Releases page - In Claude Desktop, go to Settings → Extensions
- Click Install from file and select the
.dxtfile - Enter your Azure Client ID, Tenant ID, and optional download directory when prompted
Option 2: Build from Source
- Clone and install dependencies:
git clone https://github.com/XenoXilus/outlook-mcp.git cd outlook-mcp npm install - Install the DXT CLI:
npm install -g @anthropic-ai/dxt - Pack the extension:
dxt pack . outlook-mcp.dxt - Install the generated
.dxtfile in Claude Desktop as above
For CLI-based MCP clients (Claude Code, mcp CLI, etc.), configure the server directly.
1. Clone and Install:
git clone https://github.com/XenoXilus/outlook-mcp.git
cd outlook-mcp
npm install2. Configure your MCP client:
Add the following to your MCP servers configuration (location varies by client):
{
"outlook-mcp": {
"command": "node",
"args": ["/absolute/path/to/outlook-mcp/server/index.js"],
"env": {
"AZURE_CLIENT_ID": "your-azure-client-id",
"AZURE_TENANT_ID": "your-azure-tenant-id",
"MCP_OUTLOOK_WORK_DIR": "/optional/download/directory"
}
}
}Common config file locations:
- Claude Code:
~/.claude.jsonor project-level.mcp.json - mcp CLI:
~/.config/mcp/servers.json
3. Alternative: Use environment variables
Instead of specifying env in the config, you can export the variables in your shell:
export AZURE_CLIENT_ID="your-azure-client-id"
export AZURE_TENANT_ID="your-azure-tenant-id"
export MCP_OUTLOOK_WORK_DIR="/optional/download/directory"To use this MCP server, you need to register an application in Microsoft Azure.
- Go to the Azure Portal and search for "App registrations".
- Click New registration.
- Name:
Outlook MCP(or similar) - Supported account types: Accounts in this organizational directory only (Single tenant)
- Redirect URI: Select Web and enter
http://localhost/callback
- Name:
- Click Register.
- Go to Authentication in the sidebar.
- Under "Advanced settings", set Allow public client flows to Yes.
- Click Save.
- On the Overview page, copy:
- Application (client) ID → This is your
AZURE_CLIENT_ID - Directory (tenant) ID → This is your
AZURE_TENANT_ID
- Application (client) ID → This is your
- Go to API permissions in the sidebar.
- Click Add a permission -> Microsoft Graph -> Delegated permissions.
- Add these permissions:
Mail.Read,Mail.ReadWrite,Mail.SendCalendars.Read,Calendars.ReadWriteUser.Read,MailboxSettings.ReadFiles.Read.All,Files.ReadWrite.AllSites.Read.All,Sites.ReadWrite.Alloffline_access
- Click Add permissions.
- (Optional) If you are an admin, click Grant admin consent to suppress consent prompts for users.
Note: No client secret is required (PKCE auth flow).
Personal Microsoft accounts can also register apps in Azure:
- Sign in to the Azure Portal with your personal Microsoft account (outlook.com, hotmail.com, etc.).
- If prompted to create a directory, follow the steps to create a free Azure directory.
- Follow the same steps as above for Business accounts.
- When configuring, use Accounts in any organizational directory and personal Microsoft accounts for supported account types.
| Variable | Required | Description |
|---|---|---|
AZURE_CLIENT_ID |
Yes | Your Azure AD application client ID |
AZURE_TENANT_ID |
Yes | Your Azure AD directory (tenant) ID |
MCP_OUTLOOK_WORK_DIR |
No | Directory for saving large files (defaults to system temp) |
When downloading large attachments or SharePoint files, the server automatically detects when the response would exceed the MCP 1MB limit and saves the content to local files instead.
- If
MCP_OUTLOOK_WORK_DIRis set, large files are saved to this directory - If not set, files are saved to the system temp directory
- Files are automatically named with timestamps to avoid conflicts
- Old files are periodically cleaned up to manage disk space
Once installed, you can ask the AI assistant things like:
Email Management
- "Show me my unread emails from this week"
- "Find all emails from John about the project proposal"
- "Send a reply to the last email from Sarah thanking her for the update"
- "Draft an email to the team summarizing today's meeting"
Calendar
- "What meetings do I have tomorrow?"
- "Schedule a 30-minute call with Alex next Tuesday afternoon"
- "Show me my availability for the rest of the week"
Attachments & SharePoint
- "Download and summarize the PDF attachment from the latest email from Finance"
- "Get the contents of this SharePoint link: [paste link]"
- "What files were attached to emails from Legal this month?"
Office Document Processing
The server automatically parses:
- PDF files: Extracts text content
- Word documents (.docx): Extracts text content
- PowerPoint (.pptx): Extracts slide text
- Excel (.xlsx): Parses data into structured format
The server uses OAuth 2.0 with PKCE for secure authentication:
- First run will open a browser for Microsoft authentication
- Tokens are encrypted and stored locally (uses OS keychain if available, otherwise encrypted file storage)
- Automatic token refresh for long-term usage
- No sensitive data stored in plain text
The app requests these Microsoft Graph permissions:
Mail.Read,Mail.ReadWrite,Mail.Send- Email accessCalendars.Read,Calendars.ReadWrite- Calendar accessUser.Read,MailboxSettings.Read- User profileFiles.Read.All,Files.ReadWrite.All- OneDrive/SharePoint filesSites.Read.All,Sites.ReadWrite.All- SharePoint sitesoffline_access- Refresh tokens
- Problem: "Result exceeds maximum length" error
- Solution: Ensure
MCP_OUTLOOK_WORK_DIRis set and writable - Alternative: Files automatically save to system temp if work dir not configured
- Problem: Authentication failures
- Solution: Verify Azure AD app permissions and client ID
- Reset: Clear stored tokens and re-authenticate
- Problem: Cannot access SharePoint files
- Solution: Ensure sharing links are valid and user has access permissions
- Alternative: Use direct file ID access if available
outlook-mcp/
├── server/
│ ├── index.js # Main MCP server
│ ├── auth/ # Authentication management
│ ├── graph/ # Microsoft Graph API client
│ ├── schemas/ # MCP tool schemas
│ ├── tools/ # MCP tool implementations
│ │ ├── attachments/ # Attachment tools
│ │ ├── calendar/ # Calendar tools
│ │ ├── email/ # Email tools
│ │ ├── folders/ # Folder management
│ │ └── sharepoint/ # SharePoint tools
│ └── utils/ # Utility modules
└── package.json
npm test # Run all tests
npm run test:watch # Watch mode
npm run test:benchmark # Performance benchmarksnpm run test:graph # Test Graph API connectionIf this tool saved you time, consider supporting the development!
MIT License
- Fork the repository
- Create a feature branch
- Make changes with tests
- Submit a pull request