File tree Expand file tree Collapse file tree 1 file changed +3
-15
lines changed
docs/specification/draft/basic Expand file tree Collapse file tree 1 file changed +3
-15
lines changed Original file line number Diff line number Diff line change @@ -242,14 +242,8 @@ own resources.
242
242
243
243
MCP servers ** MUST NOT** accept or transit any other tokens.
244
244
245
- ### 2.8 Security Considerations
246
245
247
- The following security requirements ** MUST** be implemented:
248
-
249
- MCP servers ** MUST** only issue tokens that are valid for use with their own resources.
250
- MCP servers ** MUST NOT** accept or transit any other tokens.
251
-
252
- ### 2.9 Error Handling
246
+ ### 2.8 Error Handling
253
247
254
248
Servers ** MUST** return appropriate HTTP status codes for authorization errors:
255
249
@@ -259,16 +253,10 @@ Servers **MUST** return appropriate HTTP status codes for authorization errors:
259
253
| 403 | Forbidden | Invalid scopes or insufficient permissions |
260
254
| 400 | Bad Request | Malformed authorization request |
261
255
262
- ### 2.10 Implementation Requirements
263
-
264
- 1 . Implementations ** MUST** follow OAuth 2.1 security best practices
265
- 1 . PKCE is ** REQUIRED** for all MCP clients and authorization servers
266
- 1 . MCP servers that also act as an AS:
267
- 1 . ** SHOULD** implement token rotation for enhanced security
268
- 1 . ** SHOULD** restrict token lifetimes based on security requirements
269
-
270
256
## 3. Security Considerations
271
257
258
+ Implementations ** MUST** follow OAuth 2.1 security best practices.
259
+
272
260
### 3.1 Token Theft
273
261
Attackers who obtain tokens stored by the client, by accessing tokens cached or logged on the server can access protected resources with
274
262
requests that appear legitimate to resource servers.
You can’t perform that action at this time.
0 commit comments