Skip to content

Commit 87a73db

Browse files
Update docs/specification/draft/basic/security_best_practices.mdx
Co-authored-by: Den Delimarsky 🌺 <[email protected]>
1 parent a9f2658 commit 87a73db

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/specification/draft/basic/security_best_practices.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -217,7 +217,7 @@ MCP servers that implement authorization **MUST** verify all inbound requests.
217217
MCP Servers **MUST NOT** use sessions for authentication.
218218

219219
MCP servers **MUST** use secure, non-deterministic session IDs.
220-
Generated session IDs (e.g., UUIDs) **SHOULD** use secure random generators. Avoid predictable or sequential session identifiers that could be guessed by an attacker. Rotating or expiring session IDs can also reduce the risk.
220+
Generated session IDs (e.g., UUIDs) **SHOULD** use secure random number generators. Avoid predictable or sequential session identifiers that could be guessed by an attacker. Rotating or expiring session IDs can also reduce the risk.
221221

222222
MCP servers **SHOULD** bind session IDs to user-specific information.
223223
When storing or transmitting session-related data (e.g., in a queue), combine the session ID with information unique to the authorized user, such as their internal user ID. Use a key format like `<user_id>:<session_id>`. This ensures that even if an attacker guesses a session ID, they cannot impersonate another user as the user ID is derived from the user token and not provided by the client.

0 commit comments

Comments
 (0)