@@ -155,7 +155,7 @@ Clients **MUST** first attempt to discover endpoints via the metadata document b
155
155
falling back to default paths. When using default paths, all other protocol requirements
156
156
remain unchanged.
157
157
158
- ### 2.3 Dynamic Client Registration
158
+ ### 2.4 Dynamic Client Registration
159
159
160
160
MCP clients and servers ** SHOULD** support the
161
161
[ OAuth 2.0 Dynamic Client Registration Protocol] ( https://datatracker.ietf.org/doc/html/rfc7591 )
@@ -178,7 +178,7 @@ these servers, MCP clients will have to either:
178
178
OAuth client themselves (e.g., through a configuration interface hosted by the
179
179
server).
180
180
181
- ### 2.4 Authorization Flow Steps
181
+ ### 2.5 Authorization Flow Steps
182
182
183
183
The complete Authorization flow proceeds as follows:
184
184
@@ -211,7 +211,7 @@ sequenceDiagram
211
211
C->>M: API Requests with Access Token
212
212
```
213
213
214
- #### 2.4 .1 Decision Flow Overview
214
+ #### 2.5 .1 Decision Flow Overview
215
215
216
216
``` mermaid
217
217
flowchart TD
@@ -235,9 +235,9 @@ flowchart TD
235
235
N --> O[Use Access Token]
236
236
```
237
237
238
- ### 2.5 Access Token Usage
238
+ ### 2.6 Access Token Usage
239
239
240
- #### 2.5 .1 Token Requirements
240
+ #### 2.6 .1 Token Requirements
241
241
242
242
Access token handling ** MUST** conform to
243
243
[ OAuth 2.1 Section 5] ( https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-5 )
@@ -263,7 +263,7 @@ Host: mcp.example.com
263
263
Authorization: Bearer eyJhbGciOiJIUzI1NiIs...
264
264
```
265
265
266
- #### 2.5 .2 Token Handling
266
+ #### 2.6 .2 Token Handling
267
267
268
268
Resource servers ** MUST** validate access tokens as described in
269
269
[ Section 5.2] ( https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-5.2 ) .
@@ -272,7 +272,7 @@ If validation fails, servers **MUST** respond according to
272
272
error handling requirements. Invalid or expired tokens ** MUST** receive a HTTP 401
273
273
response.
274
274
275
- ### 2.6 Security Considerations
275
+ ### 2.7 Security Considerations
276
276
277
277
The following security requirements ** MUST** be implemented:
278
278
@@ -282,7 +282,7 @@ The following security requirements **MUST** be implemented:
282
282
4 . Servers ** MUST** validate redirect URIs to prevent open redirect vulnerabilities
283
283
5 . Redirect URIs ** MUST** be either localhost URLs or HTTPS URLs
284
284
285
- ### 2.7 Error Handling
285
+ ### 2.8 Error Handling
286
286
287
287
Servers ** MUST** return appropriate HTTP status codes for authorization errors:
288
288
@@ -292,22 +292,22 @@ Servers **MUST** return appropriate HTTP status codes for authorization errors:
292
292
| 403 | Forbidden | Invalid scopes or insufficient permissions |
293
293
| 400 | Bad Request | Malformed authorization request |
294
294
295
- ### 2.8 Implementation Requirements
295
+ ### 2.9 Implementation Requirements
296
296
297
297
1 . Implementations ** MUST** follow OAuth 2.1 security best practices
298
298
2 . PKCE is ** REQUIRED** for all clients
299
299
3 . Token rotation ** SHOULD** be implemented for enhanced security
300
300
4 . Token lifetimes ** SHOULD** be limited based on security requirements
301
301
302
- ### 2.9 Third-Party Authorization Flow
302
+ ### 2.10 Third-Party Authorization Flow
303
303
304
- #### 2.9 .1 Overview
304
+ #### 2.10 .1 Overview
305
305
306
306
MCP servers ** MAY** support delegated authorization through third-party authorization
307
307
servers. In this flow, the MCP server acts as both an OAuth client (to the third-party
308
308
auth server) and an OAuth authorization server (to the MCP client).
309
309
310
- #### 2.9 .2 Flow Description
310
+ #### 2.10 .2 Flow Description
311
311
312
312
The third-party authorization flow comprises these steps:
313
313
@@ -341,7 +341,7 @@ sequenceDiagram
341
341
M->>C: MCP access token
342
342
```
343
343
344
- #### 2.9 .3 Session Binding Requirements
344
+ #### 2.10 .3 Session Binding Requirements
345
345
346
346
MCP servers implementing third-party authorization ** MUST** :
347
347
@@ -350,7 +350,7 @@ MCP servers implementing third-party authorization **MUST**:
350
350
3 . Implement appropriate token lifecycle management
351
351
4 . Handle third-party token expiration and renewal
352
352
353
- #### 2.9 .4 Security Considerations
353
+ #### 2.10 .4 Security Considerations
354
354
355
355
When implementing third-party authorization, servers ** MUST** :
356
356
0 commit comments