We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 36b3bed commit d160524Copy full SHA for d160524
docs/specification/draft/basic/authorization.mdx
@@ -276,7 +276,7 @@ An attacker positioned between MCP clients and MCP servers can intercept tokens
276
Implementations MUST follow [OAuth 2.1 section 1.5](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-1.5).
277
278
Specifically:
279
-1. All authorization endpoints **MUST** be served over HTTPS.
+1. All authorization server endpoints **MUST** be served over HTTPS.
280
1. All redirect URIs **MUST** be either `localhost` or use HTTPS.
281
282
### 3.3 Authorization Code Protection
0 commit comments