Skip to content

Commit 3e72c0f

Browse files
committed
rm mitm sentence
1 parent ad18178 commit 3e72c0f

File tree

1 file changed

+0
-2
lines changed

1 file changed

+0
-2
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -271,8 +271,6 @@ as outlined in [OAuth 2.1, section 7.1](https://datatracker.ietf.org/doc/html/dr
271271
MCP authorization servers SHOULD issue short-lived access tokens token to reduce the impact of leaked tokens. For public clients, MCP authorization servers MUST rotate refresh tokens as described in [Section 4.3.1 of OAuth 2.1](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-4.3.1).
272272

273273
### 3.2 Communication Security
274-
An attacker positioned between MCP clients and MCP servers can intercept tokens via [Man-in-the-Middle (MITM)](https://en.wikipedia.org/wiki/Man-in-the-middle_attack) attacks.
275-
276274
Implementations MUST follow [OAuth 2.1 section 1.5](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-1.5).
277275

278276
Specifically:

0 commit comments

Comments
 (0)