Multi-tenant MCP server wrapping the Bright MLS Remine Docs RPC API (transactions, forms, e-signing, MLS form fills). Each user enrolls with their own Bright SSO credentials.
https://remine.nlma.io/mcp163 tools registered, covering: deals/transactions, deal-versions (the fill-fields / signing core), folders, packages, source-forms, clauses, checklists, submissions, MLS listing lookup, contacts, comments, files (S3-backed PDF/upload), users, permissions, and a generic remine_request escape hatch.
Remine. Remote MCP server URL: https://remine.nlma.io/mcp.Remine. MCP Server URL: https://remine.nlma.io/mcp. Authentication: OAuth.claude mcp add --transport http remine https://remine.nlma.io/mcp
On first tool invocation, Claude Code opens the OAuth flow in your browser.
{
"mcpServers": {
"remine": {
"command": "npx",
"args": ["-y", "mcp-remote", "https://remine.nlma.io/mcp"]
}
}
}
mcp-remote bridges Streamable HTTP to Claude Desktop's stdio and handles OAuth. Restart after editing.
{
"servers": {
"remine": {
"type": "http",
"url": "https://remine.nlma.io/mcp"
}
}
}
{
"mcpServers": {
"remine": {
"url": "https://remine.nlma.io/mcp"
}
}
}
Click /enroll (or let the OAuth connector flow drop you there). Enter your Bright MLS email + password. A headless Chromium drives the Bright SSO portal, captures your docs JWT (49-day TTL), and stores your encrypted password so the server can auto-refresh the JWT without manual intervention.
No public Remine API — this is reverse-engineered from bright.remine.com/docs/. Endpoint catalog: 161 named tools + 2 helpers. Bright passwords are stored AES-256-GCM-encrypted at rest using a derived key (HKDF) from REMINE_ENCRYPTION_KEY. The encryption key never leaves the VPS.
/health · Enroll · OAuth metadata: authorization-server, protected-resource.