@@ -172,7 +172,7 @@ Clients **MUST** first attempt to discover endpoints via the metadata document b
172
172
falling back to default paths. When using default paths, all other protocol requirements
173
173
remain unchanged.
174
174
175
- ### 2.3 Dynamic Client Registration
175
+ ### 2.4 Dynamic Client Registration
176
176
177
177
MCP clients and servers ** SHOULD** support the
178
178
[ OAuth 2.0 Dynamic Client Registration Protocol] ( https://datatracker.ietf.org/doc/html/rfc7591 )
@@ -195,7 +195,7 @@ these servers, MCP clients will have to either:
195
195
OAuth client themselves (e.g., through a configuration interface hosted by the
196
196
server).
197
197
198
- ### 2.4 Authorization Flow Steps
198
+ ### 2.5 Authorization Flow Steps
199
199
200
200
The complete Authorization flow proceeds as follows:
201
201
@@ -228,7 +228,7 @@ sequenceDiagram
228
228
C->>M: API Requests with Access Token
229
229
```
230
230
231
- #### 2.4 .1 Decision Flow Overview
231
+ #### 2.5 .1 Decision Flow Overview
232
232
233
233
``` mermaid
234
234
flowchart TD
@@ -252,9 +252,9 @@ flowchart TD
252
252
N --> O[Use Access Token]
253
253
```
254
254
255
- ### 2.5 Access Token Usage
255
+ ### 2.6 Access Token Usage
256
256
257
- #### 2.5 .1 Token Requirements
257
+ #### 2.6 .1 Token Requirements
258
258
259
259
Access token handling ** MUST** conform to
260
260
[ OAuth 2.1 Section 5] ( https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-5 )
@@ -280,7 +280,7 @@ Host: mcp.example.com
280
280
Authorization: Bearer eyJhbGciOiJIUzI1NiIs...
281
281
```
282
282
283
- #### 2.5 .2 Token Handling
283
+ #### 2.6 .2 Token Handling
284
284
285
285
Resource servers ** MUST** validate access tokens as described in
286
286
[ Section 5.2] ( https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-5.2 ) .
@@ -289,7 +289,7 @@ If validation fails, servers **MUST** respond according to
289
289
error handling requirements. Invalid or expired tokens ** MUST** receive a HTTP 401
290
290
response.
291
291
292
- ### 2.6 Security Considerations
292
+ ### 2.7 Security Considerations
293
293
294
294
The following security requirements ** MUST** be implemented:
295
295
@@ -299,7 +299,7 @@ The following security requirements **MUST** be implemented:
299
299
4 . Servers ** MUST** validate redirect URIs to prevent open redirect vulnerabilities
300
300
5 . Redirect URIs ** MUST** be either localhost URLs or HTTPS URLs
301
301
302
- ### 2.7 Error Handling
302
+ ### 2.8 Error Handling
303
303
304
304
Servers ** MUST** return appropriate HTTP status codes for authorization errors:
305
305
@@ -309,22 +309,22 @@ Servers **MUST** return appropriate HTTP status codes for authorization errors:
309
309
| 403 | Forbidden | Invalid scopes or insufficient permissions |
310
310
| 400 | Bad Request | Malformed authorization request |
311
311
312
- ### 2.8 Implementation Requirements
312
+ ### 2.9 Implementation Requirements
313
313
314
314
1 . Implementations ** MUST** follow OAuth 2.1 security best practices
315
315
2 . PKCE is ** REQUIRED** for all clients
316
316
3 . Token rotation ** SHOULD** be implemented for enhanced security
317
317
4 . Token lifetimes ** SHOULD** be limited based on security requirements
318
318
319
- ### 2.9 Third-Party Authorization Flow
319
+ ### 2.10 Third-Party Authorization Flow
320
320
321
- #### 2.9 .1 Overview
321
+ #### 2.10 .1 Overview
322
322
323
323
MCP servers ** MAY** support delegated authorization through third-party authorization
324
324
servers. In this flow, the MCP server acts as both an OAuth client (to the third-party
325
325
auth server) and an OAuth authorization server (to the MCP client).
326
326
327
- #### 2.9 .2 Flow Description
327
+ #### 2.10 .2 Flow Description
328
328
329
329
The third-party authorization flow comprises these steps:
330
330
@@ -358,7 +358,7 @@ sequenceDiagram
358
358
M->>C: MCP access token
359
359
```
360
360
361
- #### 2.9 .3 Session Binding Requirements
361
+ #### 2.10 .3 Session Binding Requirements
362
362
363
363
MCP servers implementing third-party authorization ** MUST** :
364
364
@@ -367,7 +367,7 @@ MCP servers implementing third-party authorization **MUST**:
367
367
3 . Implement appropriate token lifecycle management
368
368
4 . Handle third-party token expiration and renewal
369
369
370
- #### 2.9 .4 Security Considerations
370
+ #### 2.10 .4 Security Considerations
371
371
372
372
When implementing third-party authorization, servers ** MUST** :
373
373
0 commit comments