Skip to content

Commit 500c79b

Browse files
committed
update slug
1 parent e961485 commit 500c79b

File tree

39 files changed

+39
-39
lines changed

39 files changed

+39
-39
lines changed

exercises/01.discovery/01.problem.cors/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# CORS
22

3-
<EpicVideo url="https://www.epicai.pro/workshops/day-7-8-mcp-auth/cors-fibqe" />
3+
<EpicVideo url="https://www.epicai.pro/workshops/mcp-auth-ddk2h/cors-fibqe" />
44

55
👨‍💼 In our MCP server's case, users will always be accessing us from either a different domain or a desktop application. This means every single request is cross-origin by nature, making CORS headers absolutely essential for our server to function at all.
66

exercises/01.discovery/01.solution.cors/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# CORS
22

3-
<EpicVideo url="https://www.epicai.pro/workshops/day-7-8-mcp-auth/cors-fibqe/solution" />
3+
<EpicVideo url="https://www.epicai.pro/workshops/mcp-auth-ddk2h/cors-fibqe/solution" />
44

55
👨‍💼 Excellent work! Now our users can connect to our server from any domain without encountering frustrating CORS policy errors.
66

exercises/01.discovery/02.problem.as/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Auth Server Metadata
22

3-
<EpicVideo url="https://www.epicai.pro/workshops/day-7-8-mcp-auth/auth-server-metadata-g2r2y" />
3+
<EpicVideo url="https://www.epicai.pro/workshops/mcp-auth-ddk2h/auth-server-metadata-g2r2y" />
44

55
👨‍💼 Now that clients can connect to our MCP server from any domain, they need to be able to discover how to authenticate with our system. When clients want to access protected resources or perform actions that require authentication, they need to know where to go and what methods are available.
66

exercises/01.discovery/02.solution.as/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Auth Server Metadata
22

3-
<EpicVideo url="https://www.epicai.pro/workshops/day-7-8-mcp-auth/auth-server-metadata-g2r2y/solution" />
3+
<EpicVideo url="https://www.epicai.pro/workshops/mcp-auth-ddk2h/auth-server-metadata-g2r2y/solution" />
44

55
👨‍💼 Fantastic progress! Now, clients can seamlessly discover how to authenticate with our system by accessing the standardized `/.well-known/oauth-authorization-server` endpoint. This means any MCP-compliant client can automatically find out where to register, authorize, and obtain tokens—removing guesswork and enabling smooth, standards-based integration.
66

exercises/01.discovery/03.problem.pr/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Protected Resource
22

3-
<EpicVideo url="https://www.epicai.pro/workshops/day-7-8-mcp-auth/protected-resource-8kue7" />
3+
<EpicVideo url="https://www.epicai.pro/workshops/mcp-auth-ddk2h/protected-resource-8kue7" />
44

55
👨‍💼 For our journaling app it's crucial that clients can discover how to interact with our resource server in a standards-compliant way. The Model Context Protocol (MCP) and OAuth require that we expose a public metadata endpoint so that any client can learn how to authenticate and what endpoints are available. This endpoint must be accessible to everyone, without requiring authentication, because it's the first step in the OAuth discovery process.
66

exercises/01.discovery/03.solution.pr/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Protected Resource
22

3-
<EpicVideo url="https://www.epicai.pro/workshops/day-7-8-mcp-auth/protected-resource-8kue7/solution" />
3+
<EpicVideo url="https://www.epicai.pro/workshops/mcp-auth-ddk2h/protected-resource-8kue7/solution" />
44

55
👨‍💼 Outstanding achievement! Now, any client can discover how to interact with our journaling resource server in a standards-compliant way. By exposing the public `/.well-known/oauth-protected-resource/mcp` metadata endpoint, we've made it possible for clients to programmatically learn how to authenticate and which authorization servers to use—without any guesswork or manual configuration.
66

exercises/01.discovery/FINISHED.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Metadata Discovery
22

3-
<EpicVideo url="https://www.epicai.pro/workshops/day-7-8-mcp-auth/outro-to-metadata-discovery-vmqxq" />
3+
<EpicVideo url="https://www.epicai.pro/workshops/mcp-auth-ddk2h/outro-to-metadata-discovery-vmqxq" />
44

55
Congratulations! You've completed the first step in making your MCP server discoverable and accessible to any standards-compliant client.
66

exercises/01.discovery/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Metadata Discovery
22

3-
<EpicVideo url="https://www.epicai.pro/workshops/day-7-8-mcp-auth/intro-to-metadata-discovery-7idpi" />
3+
<EpicVideo url="https://www.epicai.pro/workshops/mcp-auth-ddk2h/intro-to-metadata-discovery-7idpi" />
44

55
Modern applications need a way for clients to discover how to authenticate and interact with servers securely. In the Model Context Protocol (MCP), this is achieved through standardized metadata endpoints that describe both the resource server (your MCP server) and its associated authorization server.
66

exercises/02.init/01.problem.authenticate/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Authenticate Header
22

3-
<EpicVideo url="https://www.epicai.pro/workshops/day-7-8-mcp-auth/authenticate-header-0n13b" />
3+
<EpicVideo url="https://www.epicai.pro/workshops/mcp-auth-ddk2h/authenticate-header-0n13b" />
44

55
👨‍💼 In EpicMe, the `Authorization` header is the gatekeeper for every journal entry. Its job is simple but critical: make sure that only requests with valid credentials can access or change journal data. If a request doesn't include this header, it shouldn't get through—no exceptions. Once the client has an auth token, it'll send that token in the `Authorization` header. If that header doesn't exist, then we know they don't have a token and shouldn't be able to access our server.
66

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
# Authenticate Header
22

3-
<EpicVideo url="https://www.epicai.pro/workshops/day-7-8-mcp-auth/authenticate-header-0n13b/solution" />
3+
<EpicVideo url="https://www.epicai.pro/workshops/mcp-auth-ddk2h/authenticate-header-0n13b/solution" />
44

55
👨‍💼 Fantastic progress! We've just ensured that every request to our journal app is properly challenged for credentials. Now, if a client tries to access protected resources without an Authorization header, the server responds with a `401 Unauthorized` and a clear `WWW-Authenticate` header. This makes it obvious to clients what they need to do next, improving both security and user experience (while keeping us complient with the OAuth and MCP Authorization spec). Only authenticated users can move forward, keeping journal data safe and access predictable for everyone.

0 commit comments

Comments
 (0)