Skip to content

Commit 02a2919

Browse files
Hyperlint Automation Fix
1 parent 9647578 commit 02a2919

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

src/content/docs/agents/model-context-protocol/authorization.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -130,10 +130,10 @@ You can use the auth provider to:
130130
- Allow users to authenticate to your MCP server through email, social logins, SSO (single sign-on), and MFA (multi-factor authentication).
131131
- Define scopes and permissions that directly map to your MCP tools.
132132
- Present users with a consent page corresponding with the requested permissions.
133-
- Enforce the permissions so that agents can only invoke permitted tools.
133+
- Enforce the permissions so that agents can only invoke permitted tools.
134134

135135
#### Stytch
136-
Get started with a [remote MCP server that uses Stytch](https://stytch.com/docs/guides/connected-apps/mcp-servers) to allow users to sign in with email, Google login or enterprise SSO and authorize their AI agent to view and manage their company’s OKRs on their behalf. Stytch will handle restricting the scopes granted to the AI agent based on the user’s role and permissions within their organization. When authorizing the MCP Client, each user will see a consent page that outlines the permissions that the agent is requesting that they are able to grant based on their role.
136+
Get started with a [remote MCP server that uses Stytch](https://stytch.com/docs/guides/connected-apps/mcp-servers) to allow users to sign in with email, Google login or enterprise SSO and authorize their AI agent to view and manage their companys OKRs on their behalf. Stytch will handle restricting the scopes granted to the AI agent based on the users role and permissions within their organization. When authorizing the MCP Client, each user will see a consent page that outlines the permissions that the agent is requesting that they are able to grant based on their role.
137137

138138
[![Deploy to Cloudflare](https://deploy.workers.cloudflare.com/button)](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/mcp-stytch-b2b-okr-manager)
139139

@@ -144,7 +144,7 @@ For more consumer use cases, deploy a remote MCP server for a To Do app that use
144144
#### Auth0
145145
Get started with a remote MCP server that uses Auth0 to authenticate users through email, social logins, or enterprise SSO to interact with their todos and personal data through AI agents. The MCP server securely connects to API endpoints on behalf of users, showing exactly which resources the agent will be able to access once it gets consent from the user. In this implementation, access tokens are automatically refreshed during long running interactions.
146146

147-
To set it up, first deploy the protected API endpoint:
147+
To set it up, first deploy the protected API endpoint:
148148

149149
[![Deploy to Cloudflare](https://deploy.workers.cloudflare.com/button)](https://deploy.workers.cloudflare.com/?url=https://github.com/cloudflare/ai/tree/main/demos/remote-mcp-auth0/todos-api)
150150

@@ -190,7 +190,7 @@ function requirePermission(permission, handler) {
190190
return async (request, context) => {
191191
// Check if user has the required permission
192192
const userPermissions = context.props.permissions || [];
193-
193+
const userPermissions = context.props.permissions || [];
194194
if (!userPermissions.includes(permission)) {
195195
return {
196196
content: [{ type: "text", text: `Permission denied: requires ${permission}` }],

0 commit comments

Comments
 (0)