Skip to content

Commit b501f4c

Browse files
committed
Update authorization.mdx
1 parent 65eff53 commit b501f4c

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

docs/docs/tutorials/security/authorization.mdx

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ and retrieve another set of metadata properties that will allow it to know the e
7979
<Step title="Client Registration">
8080
With all the metadata out of the way, the client now needs to make sure that it's registered with the authorization server. This can be done in two ways.
8181

82-
First, the client can be **pre-registered** with a given authorization server, in which case it can have embedded client registration information that it uses to complete the authorization flow.
82+
First, the client can be **pre-registered** with a given authorization server, in which case it can have embedded client registration information that it uses to complete the authorization flow.
8383

8484
Alternatively, the client can use **Dynamic Client Registration** (DCR) to dynamically register itself with the authorization server. The latter scenario requires the authorization server to support DCR. If the authorization server does support DCR, the client will send a request to the `registration_endpoint` with its information:
8585

@@ -243,7 +243,6 @@ When you open the client details, go to **Credentials** and take note of the **C
243243
**Handling Secrets**
244244

245245
Never embed client credentials directly in your code. We recommend using environment variables or specialized solutions for secret storage.
246-
247246
</Warning>
248247

249248
With Keycloak configured, every time the authorization flow is triggered, your MCP server will receive a token like this:

0 commit comments

Comments
 (0)