edycutjong/autharmor
Citation-driven prior authorization appeals MCP server for healthcare AI agents
Platform-specific configuration:
{
"mcpServers": {
"autharmor": {
"command": "npx",
"args": [
"-y",
"autharmor"
]
}
}
}Add the config above to .claude/settings.json under the mcpServers key.
Citation-driven prior authorization appeals MCP server for healthcare AI agents.
AuthArmor is a SHARP-on-MCP server that helps clinicians and care coordinators fight denied prior authorizations. It reads patient FHIR records, searches payer policies, and generates appeal letters backed by citations to specific clinical data — no hallucinations, no guesswork.
| Tool | Description | |---|---| | CheckAuthStatus | Reads FHIR MedicationRequest + ClaimResponse to find denial details | | GenerateAppeal | Drafts a citation-driven appeal letter using Gemini AI | | GetAppealPdf | Returns the appeal text for download/export |
Prompt Opinion Platform
↓ POST /mcp (with SHARP headers)
AuthArmor MCP Server
├── FHIR Client → reads patient data from workspace FHIR server
├── Gemini AI → generates appeal with inline FHIR citations
└── Returns structured appeal text to agent# Install dependencies
npm install
# Configure environment
cp .env.example .env
# Edit .env and add your GEMINI_API_KEY
# Start the server
npm run startThe server runs on http://localhost:3050/mcp.
# 1. Install ngrok
brew install ngrok
# 2. Add your authtoken (one-time setup — get it from https://dashboard.ngrok.com/get-started/your-authtoken)
ngrok config add-authtoken YOUR_TOKEN_HERE
# 3. Expose your server
ngrok http 3050{ngrok_url}/mcp → check "Streamable HTTP" → check "FHIR context"AuthArmor receives FHIR context via SHARP HTTP headers:
| Header | Purpose | |---|---| | x-fhir-server-url
Loading reviews...