You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
MCP clients **MUST** support both discovery mechanisms to obtain the information required to interact with the authorization server.
59
72
60
-
### Roles
61
-
62
-
A protected MCP server acts as an [OAuth 2.1 resource server](https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-12.html#name-roles),
63
-
capable of accepting and responding to protected resource requests using access tokens.
64
-
65
-
An MCP client acts as an [OAuth 2.1 client](https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-12.html#name-roles),
66
-
making protected resource requests on behalf of a resource owner.
67
-
68
-
The authorization server is responsible for interacting with the user (if necessary) and issuing access tokens for use at the MCP server.
69
-
The implementation details of the authorization server are beyond the scope of this specification. It may be hosted with the
70
-
resource server or a separate entity. The [Authorization Server Discovery section](#authorization-server-discovery)
71
-
specifies how an MCP server indicates the location of its corresponding authorization server to a client.
72
-
73
73
### Authorization Server Discovery
74
74
75
75
This section describes the mechanisms by which MCP servers advertise their associated
@@ -304,7 +304,7 @@ requests that appear legitimate to resource servers.
304
304
Clients and servers **MUST** implement secure token storage and follow OAuth best practices,
305
305
as outlined in [OAuth 2.1, Section 7.1](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-7.1).
306
306
307
-
MCP authorization servers SHOULD issue short-lived access tokens to reduce the impact of leaked tokens.
307
+
MCP authorization servers **SHOULD** issue short-lived access tokens to reduce the impact of leaked tokens.
308
308
For public clients, MCP authorization servers **MUST** rotate refresh tokens as described in [OAuth 2.1 Section 4.3.1 "Refresh Token Grant"](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-4.3.1).
0 commit comments