Skip to content

Commit 66b8a65

Browse files
committed
Update authorization.mdx
1 parent a45cad7 commit 66b8a65

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ Authorization: Bearer eyJhbGciOiJIUzI1NiIs...
269269

270270
MCP servers, acting in their role as an OAuth 2.1 resource server, **MUST** validate access tokens as described in
271271
[OAuth 2.1 Section 5.2](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-5.2).
272-
MCP servers **MUST** validate that access tokens were issued specifically for them as the intended audience,
272+
MCP servers **MUST** validate that access tokens were issued specifically for them as the intended audience,
273273
according to [RFC 8707 Section 2](https://www.rfc-editor.org/rfc/rfc8707.html#section-2).
274274
If validation fails, servers **MUST** respond according to
275275
[OAuth 2.1 Section 5.3](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-5.3)
@@ -366,6 +366,6 @@ MCP servers **MUST** only accept tokens specifically intended for themselves and
366366
If the MCP server makes requests to upstream APIs, it may act as an OAuth client to them. The access token used at the upstream API is a seperate token, issued by the upstream authorization server. The MCP server **MUST NOT** pass through the token it received from the MCP client.
367367

368368
MCP clients **MUST** implement and use the `resource` parameter as defined in [RFC 8707 - Resource Indicators for OAuth 2.0](https://www.rfc-editor.org/rfc/rfc8707.html)
369-
to explicitly specify the target resource for which the token is being requested. This requirement aligns with the recommendation in
369+
to explicitly specify the target resource for which the token is being requested. This requirement aligns with the recommendation in
370370
[RFC 9728 Section 7.4](https://datatracker.ietf.org/doc/html/rfc9728#section-7.4). This ensures that access tokens are bound to their intended resources and
371371
cannot be misused across different services.

0 commit comments

Comments
 (0)