Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 3 additions & 1 deletion src/mcp/server/auth/provider.py
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
from dataclasses import dataclass
from typing import Generic, Literal, Protocol, TypeVar
from typing import Any, Generic, Literal, Protocol, TypeVar
from urllib.parse import parse_qs, urlencode, urlparse, urlunparse

from pydantic import AnyUrl, BaseModel
Expand Down Expand Up @@ -40,6 +40,8 @@ class AccessToken(BaseModel):
scopes: list[str]
expires_at: int | None = None
resource: str | None = None # RFC 8707 resource indicator
subject: str | None = None # JWT sub claim — identifies the end-user
claims: dict[str, Any] | None = None # arbitrary JWT claims from the token


RegistrationErrorCode = Literal[
Expand Down
12 changes: 12 additions & 0 deletions src/mcp/server/mcpserver/context.py
Original file line number Diff line number Diff line change
Expand Up @@ -218,6 +218,18 @@ def client_id(self) -> str | None:
"""Get the client ID if available."""
return self.request_context.meta.get("client_id") if self.request_context.meta else None # pragma: no cover

@property
def subject(self) -> str | None:
"""Get the authenticated user's subject (JWT sub claim) if available.

This returns the subject claim from the OAuth access token, identifying
the end-user on whose behalf the request is made.
"""
from mcp.server.auth.middleware.auth_context import get_access_token

token = get_access_token()
return token.subject if token else None

@property
def request_id(self) -> str:
"""Get the unique ID for this request."""
Expand Down
22 changes: 22 additions & 0 deletions tests/server/auth/middleware/test_auth_context.py
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,7 @@ def valid_access_token() -> AccessToken:
client_id="test_client",
scopes=["read", "write"],
expires_at=int(time.time()) + 3600, # 1 hour from now
subject="user_123",
)


Expand Down Expand Up @@ -83,6 +84,27 @@ async def send(message: Message) -> None: # pragma: no cover
assert get_access_token() is None


@pytest.mark.anyio
async def test_auth_context_middleware_subject_preserved(valid_access_token: AccessToken):
"""Test that subject field on AccessToken is available via get_access_token()."""
app = MockApp()
middleware = AuthContextMiddleware(app)

user = AuthenticatedUser(valid_access_token)
scope: Scope = {"type": "http", "user": user}

async def receive() -> Message: # pragma: no cover
return {"type": "http.request"}

async def send(message: Message) -> None: # pragma: no cover
pass

await middleware(scope, receive, send)

assert app.access_token_during_call is not None
assert app.access_token_during_call.subject == "user_123"


@pytest.mark.anyio
async def test_auth_context_middleware_with_no_user():
"""Test middleware with no user in scope."""
Expand Down
1 change: 1 addition & 0 deletions tests/server/auth/middleware/test_bearer_auth.py
Original file line number Diff line number Diff line change
Expand Up @@ -77,6 +77,7 @@ def valid_access_token() -> AccessToken:
client_id="test_client",
scopes=["read", "write"],
expires_at=int(time.time()) + 3600, # 1 hour from now
subject="user_123",
)


Expand Down
Loading