Skip to content

Commit de769bb

Browse files
authored
Merge pull request modelcontextprotocol#787 from modelcontextprotocol/localden/note
chore: Update security considerations in authorization.mdx
2 parents b7b32d7 + 5e95a79 commit de769bb

File tree

1 file changed

+11
-0
lines changed

1 file changed

+11
-0
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -290,6 +290,17 @@ Servers **MUST** return appropriate HTTP status codes for authorization errors:
290290

291291
Implementations **MUST** follow OAuth 2.1 security best practices as laid out in [OAuth 2.1 Section 7. "Security Considerations"](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#name-security-considerations).
292292

293+
### Token Audience Binding and Validation
294+
295+
[RFC 8707](https://www.rfc-editor.org/rfc/rfc8707.html) Resource Indicators provide critical security benefits by binding tokens to their intended
296+
audiences **when the Authorization Server supports the capability**. To enable current and future adoption:
297+
298+
- MCP clients **MUST** include the `resource` parameter in authorization and token requests as specified in the [Resource Parameter Implementation](#resource-parameter-implementation) section
299+
- MCP servers **MUST** validate that tokens presented to them were specifically issued for their use
300+
301+
The [Security Best Practices document](/specification/draft/basic/security_best_practices#token-passthrough)
302+
outlines why token audience validation is crucial and why token passthrough is explicitly forbidden.
303+
293304
### Token Theft
294305

295306
Attackers who obtain tokens stored by the client, or tokens cached or logged on the server can access protected resources with

0 commit comments

Comments
 (0)