Skip to content

Commit c2a753b

Browse files
localdenaaronpk
andauthored
Update docs/specification/draft/basic/authorization.mdx
Co-authored-by: Aaron Parecki <[email protected]>
1 parent e592655 commit c2a753b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -318,7 +318,7 @@ This vulnerability has two critical dimensions:
318318
1. Allow circumvention of security controls between services
319319
1. Enable replay attacks against multiple backend systems
320320

321-
MCP servers **MUST** take all necessary steps to ensure no data is returned to unauthorized parties and **MUST** ensure any credentials are valid before processing the request.
321+
MCP servers **MUST** validate access tokens before processing the request, ensuring the access token is issued specifically for the MCP server, and take all necessary steps to ensure no data is returned to unauthorized parties.
322322

323323
A MCP server **CAN** follow the guidelines in [OAuth 2.1 - Section 5.2](https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-12.html#section-5.2) to validate inbound tokens.
324324

0 commit comments

Comments
 (0)