Add your description here
Project description
unique_mcp
Shared auth and context wiring for FastMCP servers in the Unique platform. Used as a dependency by MCP servers in this repo to handle per-request authentication against Zitadel.
Problem → Solution
MCP tools must call Unique APIs on behalf of the requesting user — every tool invocation needs a UniqueSettings with the correct user_id and company_id. Hard-coding a single identity in env vars breaks multi-tenant deployments and leaks credentials.
The MCP server acts as an OAuth proxy: clients receive a FastMCP-issued JWT, which the server swaps server-side for the stored Zitadel token on every request. The Zitadel token should contain sub and the company claim, but this depends on token configuration and can't be assumed.
UniqueContextProvider solves this: created once at startup and injected via Depends() into each tool, it resolves the right identity per request using a three-priority strategy:
| Priority | Source | Fields | When it wins |
|---|---|---|---|
| 1 (highest) | _meta keys in the MCP request |
unique.app/user-id, unique.app/company-id |
Trusted internal callers overriding identity |
| 2 | Zitadel JWT claims (server-side token swap) | sub, urn:zitadel:iam:user:resourceowner:id |
Normal OAuth flow with fully-configured token |
| 3 (fallback) | Zitadel /userinfo endpoint |
same as JWT | JWT present but claims incomplete |
Both fields must be present in whichever source wins. If only one is found the provider falls through to the next priority level.
flowchart TD
A([Tool call arrives]) --> B{_meta contains\nuser-id + company-id?}
B -- yes --> C[Use _meta identity]
B -- no --> D{Zitadel JWT has sub\n+ company claim?}
D -- yes --> E[Use Zitadel JWT claims]
D -- no --> F[GET /oidc/v1/userinfo]
F --> G{userinfo\ncomplete?}
G -- yes --> H[Use userinfo]
G -- no --> I([Raise error])
C & E & H --> J([Build UniqueSettings → tool executes])
OAuth scopes
The OAuthProxy advertises these valid scopes:
| Scope | Purpose |
|---|---|
openid |
Base OIDC scope |
profile |
Name and basic profile claims |
email |
Email claim |
urn:zitadel:iam:user:resourceowner |
Embeds company/org ID in the token |
mcp:tools |
Access to MCP tools |
mcp:prompts |
Access to MCP prompts |
mcp:resources |
Access to MCP resources |
mcp:resource-templates |
Access to MCP resource templates |
Usage
from fastmcp.server.dependencies import Depends
from unique_mcp.server import create_unique_mcp_server
bundle = create_unique_mcp_server("my-server")
mcp = bundle.mcp
provider = bundle.context_provider
@mcp.tool()
async def search(query: str, settings=Depends(provider.get_settings)) -> str:
# `settings` carries the correct user_id + company_id for this request
return await some_unique_api_call(settings, query)
if __name__ == "__main__":
s = bundle.server_settings
mcp.run(
transport=s.transport_scheme,
host=s.local_base_url.host,
port=s.local_base_url.port,
)
create_unique_mcp_server() returns an UniqueMCPServerBundle:
| Field | Type | Purpose |
|---|---|---|
mcp |
FastMCP |
Server instance — register tools here |
context_provider |
UniqueContextProvider |
Per-request auth resolver |
server_settings |
ServerSettings |
Transport/URL config |
UniqueContextProvider exposes three async methods:
settings = await provider.get_settings() # UniqueSettings (app + api config + auth)
context = await provider.get_context() # UniqueContext (auth only, lighter weight)
info = await provider.get_userinfo() # Raw Zitadel userinfo (email, name, etc.)
Scenarios
1 — Normal OAuth flow (JWT with full claims)
The common case. The MCP server acts as an OAuth Authorization Server and proxies the login to Zitadel using the token swap pattern:
- The client authenticates against the MCP server's OAuth endpoints (not Zitadel directly).
- The MCP server proxies to Zitadel, obtains a Zitadel token, and stores it server-side.
- The MCP server issues its own short-lived FastMCP JWT to the client.
- On every tool call, the MCP server swaps the FastMCP JWT for the stored Zitadel token, validates it against Zitadel's JWKS, and extracts claims — no extra network call needed when the Zitadel JWT contains
sub+urn:zitadel:iam:user:resourceowner:id.
sequenceDiagram
participant Client
participant MCP as MCP Server
participant Zitadel
Client->>MCP: GET /.well-known/oauth-authorization-server
MCP-->>Client: OAuth metadata (authorize/token endpoints)
Client->>MCP: GET /authorize
MCP->>Zitadel: redirect (proxy OAuth flow)
Zitadel-->>Client: login page
Client->>Zitadel: authenticate
Zitadel-->>MCP: authorization code (callback)
MCP->>Zitadel: POST /oauth/v2/token (exchange code)
Zitadel-->>MCP: Zitadel JWT (stored server-side, never sent to client)
MCP-->>Client: FastMCP JWT (reference token)
Client->>MCP: tools/call + Authorization: Bearer <FastMCP JWT>
MCP->>MCP: verify FastMCP JWT signature → look up JTI → retrieve stored Zitadel JWT
MCP->>MCP: validate Zitadel JWT via JWKS, extract sub + company_id claims
MCP->>MCP: build UniqueSettings
MCP-->>Client: tool result
2 — JWT without company claim (userinfo fallback)
The default for newly registered Zitadel apps until the JWT action is configured. The Zitadel JWT carries sub but no company claim, so the provider falls back to /userinfo. This adds one HTTP round-trip per request; avoid it by configuring Zitadel to embed the urn:zitadel:iam:user:resourceowner scope in the JWT — see docs/zitadel/README.md.
sequenceDiagram
participant Client
participant MCP as MCP Server
participant Zitadel
Client->>MCP: tools/call + Authorization: Bearer <FastMCP JWT>
MCP->>MCP: token swap → retrieve Zitadel JWT
Note over MCP: Zitadel JWT has sub but no company_id claim
MCP->>Zitadel: GET /oidc/v1/userinfo (Bearer Zitadel JWT)
Zitadel-->>MCP: sub, urn:zitadel:...:id, email, ...
MCP->>MCP: extract sub + company_id, build UniqueSettings
MCP-->>Client: tool result
3 — Trusted internal caller with _meta override
An internal service calls the tool on behalf of a known user by passing identity directly in the MCP _meta field. This takes highest priority — but only works if both unique.app/user-id and unique.app/company-id are present. If either is missing, the provider falls through to JWT/userinfo resolution, which will fail if no valid Bearer token is present.
Security: The server takes
_metavalues as-is without further validation. Only use this from callers you fully trust — never expose it to external users.
{
"method": "tools/call",
"params": {
"name": "search",
"arguments": { "query": "hello" },
"_meta": {
"unique.app/user-id": "user-abc123",
"unique.app/company-id": "company-xyz456"
}
}
}
sequenceDiagram
participant InternalSvc as Internal Service
participant MCP as MCP Server
InternalSvc->>MCP: tools/call + Bearer <token> + _meta
MCP->>MCP: verify Bearer token (transport-level auth)
alt _meta has both user-id + company-id
MCP->>MCP: build UniqueSettings from _meta (skip JWT/userinfo)
MCP->>MCP: call Unique API with provided identity
alt identity is valid
MCP-->>InternalSvc: tool result
else user-id or company-id not recognised by Unique
MCP-->>InternalSvc: error (API rejects identity)
end
else _meta incomplete or absent
MCP->>MCP: fall through to JWT claims / userinfo
Note over MCP: fails if token missing or claims incomplete
MCP-->>InternalSvc: error
end
Configuration
UNIQUE_MCP_* — server settings:
| Variable | Default | Purpose |
|---|---|---|
UNIQUE_MCP_PUBLIC_BASE_URL |
(none) | Public URL advertised in OAuth metadata |
UNIQUE_MCP_LOCAL_BASE_URL |
http://localhost:8003 |
Bind address |
ZITADEL_* — OAuth proxy settings:
| Variable | Default | Purpose |
|---|---|---|
ZITADEL_BASE_URL |
http://localhost:10116 |
Zitadel instance URL |
ZITADEL_CLIENT_ID |
(required in prod) | OAuth client ID |
ZITADEL_CLIENT_SECRET |
(required in prod) | OAuth client secret |
Zitadel setup
See docs/zitadel/README.md for step-by-step instructions: creating the OAuth app, enabling JWT token type with embedded org claims, configuring redirect URIs (including ngrok for local dev), and required scopes.
Development
cd unique_mcp && uv run pytest tests/ -q
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file unique_mcp-0.2.6.tar.gz.
File metadata
- Download URL: unique_mcp-0.2.6.tar.gz
- Upload date:
- Size: 9.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.11 {"installer":{"name":"uv","version":"0.10.11","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7d3fd876aa781a790316cd43aa0639395688bb185c00aab25c7e8d9ad4334132
|
|
| MD5 |
b3a0cf5720a25f1d8682f0a60c895eac
|
|
| BLAKE2b-256 |
f365fc861f33dcdcad7970ac3881a5444c7003aeb14e9798d2c1c47547b5c6c9
|
File details
Details for the file unique_mcp-0.2.6-py3-none-any.whl.
File metadata
- Download URL: unique_mcp-0.2.6-py3-none-any.whl
- Upload date:
- Size: 12.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.10.11 {"installer":{"name":"uv","version":"0.10.11","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
551d50569810a3b0eb442e61e65f055305602b4d9f0e010e43c873e2d6d2387c
|
|
| MD5 |
541eb328cf2a6866056883e61bfd8de5
|
|
| BLAKE2b-256 |
11aa2ab570d97af444d761167c6e314440622b295cd80814ccad8b514b93471a
|