@@ -52,20 +52,6 @@ while maintaining simplicity:
52
52
Server Metadata ([ RFC8414] ( https://datatracker.ietf.org/doc/html/rfc8414 ) ).
53
53
MCP clients ** MUST** use the OAuth 2.0 Authorization Server Metadata.
54
54
55
- ### 2.1.1 OAuth Grant Types
56
-
57
- OAuth specifies different flows or grant types, which are different ways of obtaining an
58
- access token. Each of these targets different use cases and scenarios.
59
-
60
- MCP servers ** SHOULD** support the OAuth grant types that best align with the intended
61
- audience. For instance:
62
-
63
- 1 . Authorization Code: useful when the client is acting on behalf of a (human) end user.
64
- - For instance, an agent calls an MCP tool implemented by a SaaS system.
65
- 2 . Client Credentials: the client is another application (not a human)
66
- - For instance, an agent calls a secure MCP tool to check inventory at a specific
67
- store. No need to impersonate the end user.
68
-
69
55
### 2.2 Roles
70
56
A protected MCP server acts as a [ OAuth 2.1 resource server] ( https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-12.html#name-roles ) ,
71
57
capable of accepting and responding to protected resource requests using access tokens.
@@ -162,7 +148,7 @@ Any MCP authorization servers that _do not_ support Dynamic Client Registration
162
148
alternative ways to obtain a client ID (and, if applicable, client credentials). For one of
163
149
these authorization servers, MCP clients will have to either:
164
150
165
- 1 . Hardcode a client ID (and, if applicable, client credentials) specifically for that MCP
151
+ 1 . Hardcode a client ID (and, if applicable, client credentials) specifically for that authorization
166
152
server, or
167
153
2 . Present a UI to users that allows them to enter these details, after registering an
168
154
OAuth client themselves (e.g., through a configuration interface hosted by the
0 commit comments