Skip to content

Commit 27d0f75

Browse files
committed
- Removed Unicode characters from the example snippet file.
- Removed FastAPI dependency as it is no longer required.
1 parent e41cadf commit 27d0f75

File tree

4 files changed

+6
-33
lines changed

4 files changed

+6
-33
lines changed

README.v2.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2405,8 +2405,8 @@ For a complete working example, see [`examples/clients/simple-auth-client/`](exa
24052405

24062406
The SDK includes support for Enterprise Managed Authorization (SEP-990), which enables MCP clients to connect to protected servers using enterprise Single Sign-On (SSO) systems. This implementation supports:
24072407

2408-
- **RFC 8693**: OAuth 2.0 Token Exchange (ID Token ID-JAG)
2409-
- **RFC 7523**: JSON Web Token (JWT) Profile for OAuth 2.0 Authorization Grants (ID-JAG Access Token)
2408+
- **RFC 8693**: OAuth 2.0 Token Exchange (ID Token -> ID-JAG)
2409+
- **RFC 7523**: JSON Web Token (JWT) Profile for OAuth 2.0 Authorization Grants (ID-JAG -> Access Token)
24102410
- Integration with enterprise identity providers (Okta, Azure AD, etc.)
24112411

24122412
**Key Components:**
@@ -2517,8 +2517,8 @@ async def main() -> None:
25172517

25182518
# Step 4: Create authenticated HTTP client
25192519
# The auth provider automatically handles the two-step token exchange:
2520-
# 1. ID Token ID-JAG (via IDP)
2521-
# 2. ID-JAG Access Token (via MCP server)
2520+
# 1. ID Token -> ID-JAG (via IDP)
2521+
# 2. ID-JAG -> Access Token (via MCP server)
25222522
client = httpx.AsyncClient(auth=enterprise_auth, timeout=30.0)
25232523

25242524
# Step 5: Connect to MCP server with authenticated client

examples/snippets/clients/enterprise_managed_auth_client.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,8 @@ async def main() -> None:
7070

7171
# Step 4: Create authenticated HTTP client
7272
# The auth provider automatically handles the two-step token exchange:
73-
# 1. ID Token ID-JAG (via IDP)
74-
# 2. ID-JAG Access Token (via MCP server)
73+
# 1. ID Token -> ID-JAG (via IDP)
74+
# 2. ID-JAG -> Access Token (via MCP server)
7575
client = httpx.AsyncClient(auth=enterprise_auth, timeout=30.0)
7676

7777
# Step 5: Connect to MCP server with authenticated client

pyproject.toml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,6 @@ dev = [
7070
"dirty-equals>=0.9.0",
7171
"coverage[toml]>=7.10.7,<=7.13",
7272
"pillow>=12.0",
73-
"fastapi>=0.115.0", # For enterprise auth conformance test mock server
7473
"strict-no-cover",
7574
]
7675
docs = [

uv.lock

Lines changed: 0 additions & 26 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)