Skip to content

Commit 7ebed44

Browse files
authored
Merge branch 'main' into spec/authorization-typo
2 parents 5d08396 + 1b29bac commit 7ebed44

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ This section describes the mechanisms by which MCP servers advertise their assoc
6969
authorization servers to MCP clients, as well as the discovery process through which MCP
7070
clients can determine authorization server endpoints and supported capabilities.
7171

72-
### 2.3.1 Authorization Server Location
72+
#### 2.3.1 Authorization Server Location
7373

7474
MCP servers **MUST** implement the OAuth 2.0 Protected Resource Metadata ([RFC9728](https://datatracker.ietf.org/doc/html/rfc9728))
7575
specification to indicate the locations of authorization servers. The Protected Resource Metadata document returned by the MCP server **MUST** include
@@ -92,7 +92,7 @@ MCP clients **MUST** be able to parse `WWW-Authenticate` headers and respond app
9292
MCP clients **MUST** follow the OAuth 2.0 Authorization Server Metadata [RFC8414](https://datatracker.ietf.org/doc/html/rfc8414)
9393
specification to obtain the information required to interact with the authorization server.
9494

95-
#### 2.3.4 Sequence Diagram
95+
#### 2.3.3 Sequence Diagram
9696
The following diagram outlines an example flow:
9797

9898
```mermaid
@@ -122,7 +122,7 @@ sequenceDiagram
122122
Note over C,M: MCP communication continues with valid token
123123
```
124124

125-
#### 2.4 MCP specific headers for discovery
125+
### 2.4 MCP specific headers for discovery
126126

127127
MCP clients **SHOULD** include the `MCP-Protocol-Version: <protocol-version>` HTTP header during
128128
any request to the MCP server allowing the MCP server to respond based on the MCP protocol version.
@@ -281,7 +281,7 @@ An attacker who has gained access to an authorization code contained in an autho
281281
To mitigate this, MCP clients **MUST** implement PKCE according to [OAuth 2.1 Section 7.5.2](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-7.5.2).
282282
PKCE helps prevent authorization code interception and injection attacks by requiring clients to create a secret verifier-challenge pair, ensuring that only the original requestor can exchange an authorization code for tokens.
283283

284-
### 3.3 Open Redirection
284+
### 3.4 Open Redirection
285285

286286
An attacker may craft malicious redirect URIs to direct users to phishing sites.
287287

@@ -296,7 +296,7 @@ Authorization servers **MUST** take precautions to prevent redirecting user agen
296296

297297
Authorization servers **SHOULD** only automatically redirect the user agent if it trusts the redirection URI. If the URI is not trusted, the authorization server MAY inform the user and rely on the user to make the correct decision.
298298

299-
### 3.4 Confused Deputy Problem
299+
### 3.5 Confused Deputy Problem
300300

301301
Attackers can exploit MCP servers acting as intermediaries to third-party APIs, leading to confused deputy vulnerabilities.
302302
By using stolen authorization codes, they can obtain access tokens without user consent.

0 commit comments

Comments
 (0)