Skip to content

Commit f9271f9

Browse files
committed
s/rfc9700/oauth-2.1/g
1 parent fa8acfc commit f9271f9

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

docs/specification/draft/basic/authorization.mdx

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -255,15 +255,14 @@ Servers **MUST** return appropriate HTTP status codes for authorization errors:
255255

256256
## 3. Security Considerations
257257

258-
Implementations **MUST** follow OAuth 2.1 security best practices. Refer to
259-
[RFC9700](https://datatracker.ietf.org/doc/html/rfc9700) for details.
258+
Implementations **MUST** follow OAuth 2.1 security best practices as laid out in [Section 7. Security Considerations](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#name-security-considerations).
260259

261260
### 3.1 Token Theft
262261
Attackers who obtain tokens stored by the client, or tokens cached or logged on the server can access protected resources with
263262
requests that appear legitimate to resource servers.
264263

265264
Clients **MUST** implement secure token storage and follow OAuth 2.0 best practices,
266-
as outlined in [RFC 9700](https://datatracker.ietf.org/doc/html/rfc9700).
265+
as outlined in [OAuth 2.1, section 7.1](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-7.1).
267266

268267
MCP authorization servers SHOULD enforce token expiration and rotation to limit the window of exploitation.
269268

@@ -278,7 +277,7 @@ Specifically:
278277

279278
### 3.3 Authorization Code Protection
280279

281-
An attacker who has gained access to an authorization code contained in an authorization response can try to redeem the authorization code for an access token or otherwise make use of the authorization code. (Further described in [RFC 9700 Section 4.5](https://www.rfc-editor.org/rfc/rfc9700.html#name-authorization-code-injectio))
280+
An attacker who has gained access to an authorization code contained in an authorization response can try to redeem the authorization code for an access token or otherwise make use of the authorization code. (Further described in [OAuth 2.1, section 7.5](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-7.5))
282281

283282
MCP clients **MUST** implement PKCE according to [OAuth 2.1 section 7.5.2](https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-12.html#name-countermeasures). PKCE helps prevent authorization code interception attacks by requiring clients to create a secret verifier-challenge pair, ensuring that only the original requestor can exchange an authorization code for tokens.
284283

@@ -293,4 +292,4 @@ Authorization servers **MUST** validate exact redirect URIs against pre-register
293292
MCP clients **SHOULD** use and verify state parameters in the authorization code flow
294293
and discard any results that do not include or have a mis-match with the original state.
295294

296-
Authorization servers **MUST** take precautions to prevent redirecting user agents to untrusted URI's, following suggestions laid out in [RFC 9700 Section 4.11.2](https://www.rfc-editor.org/rfc/rfc9700.html#section-4.11.2)
295+
Authorization servers **MUST** take precautions to prevent redirecting user agents to untrusted URI's, following suggestions laid out in [OAuth 2.1, Section 7.12.2](https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-7.12.2)

0 commit comments

Comments
 (0)