Skip to content

Commit f5ff2c5

Browse files
authored
Merge branch 'main' into localden/auth
2 parents c19a6e6 + 44029de commit f5ff2c5

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ while maintaining simplicity:
4545
1. MCP authorization servers and MCP clients **SHOULD** support the OAuth 2.0 Dynamic Client Registration
4646
Protocol ([RFC7591](https://datatracker.ietf.org/doc/html/rfc7591)).
4747

48-
1. MCP servers **MUST** implement [OAuth 2.0 Protected Resource Metadata](https://datatracker.ietf.org/doc/html/rfc9728).
48+
1. MCP servers **MUST** implement OAuth 2.0 Protected Resource Metadata ([RFC9728](https://datatracker.ietf.org/doc/html/rfc9728)).
4949
MCP clients **MUST** use OAuth 2.0 Protected Resource Metadata for authorization server discovery.
5050

5151
1. MCP authorization servers and MCP clients **MUST** implement OAuth 2.0 Authorization
@@ -82,17 +82,20 @@ authorization servers to MCP clients, as well as the discovery process through w
8282
clients can determine authorization server endpoints and supported capabilities.
8383

8484
### 2.3.1 Authorization Server Location
85-
MCP servers **MUST** implement the [OAuth 2.0 Protected Resource Metadata](https://datatracker.ietf.org/doc/html/rfc9728)
85+
86+
MCP servers **MUST** implement OAuth 2.0 Protected Resource Metadata ([RFC9728](https://datatracker.ietf.org/doc/html/rfc9728))
8687
specification to indicate the locations of authorization servers. The Protected Resource Metadata document returned by the MCP server **MUST** include
8788
the `authorization_servers` field containing at least one authorization server.
8889

8990
The specific use of `authorization_servers` is beyond the scope of this specification; implementers should consult
90-
the [OAuth 2.0 Protected Resource Metadata](https://datatracker.ietf.org/doc/html/rfc9728) documentation for
91-
guidance on implementation details. Implementors should note that Protected Resource Metadata documents can define multiple authorization servers. The responsibility for selecting which authorization server to use lies with the MCP client, following the guidelines specified in
91+
OAuth 2.0 Protected Resource Metadata ([RFC9728](https://datatracker.ietf.org/doc/html/rfc9728)) for
92+
guidance on implementation details.
93+
94+
Implementors should note that Protected Resource Metadata documents can define multiple authorization servers. The responsibility for selecting which authorization server to use lies with the MCP client, following the guidelines specified in
9295
[RFC9728 Section 7.6 "Authorization Servers"](https://datatracker.ietf.org/doc/html/rfc9728#name-authorization-servers).
9396

9497
MCP servers **MUST** use the HTTP header `WWW-Authenticate` when returning a _401 Unauthorized_ to indicate the location of the resource server metadata URL
95-
as described in [OAuth 2.0 Protected Resource Metadata](https://datatracker.ietf.org/doc/html/rfc9728).
98+
as described in OAuth 2.0 Protected Resource Metadata ([RFC9728](https://datatracker.ietf.org/doc/html/rfc9728)).
9699

97100
MCP clients **MUST** be able to parse `WWW-Authenticate` headers and respond appropriately to `HTTP 401 Unauthorized` responses from the MCP server.
98101

0 commit comments

Comments
 (0)