@@ -109,7 +109,7 @@ class McpServerConfiguration {
109109 .authorizeHttpRequests(auth - > auth. anyRequest(). authenticated())
110110 // Configure OAuth2 on the MCP server
111111 .with(
112- McpResourceServerConfigurer . mcpServerOAuth2(),
112+ McpServerOAuth2Configurer . mcpServerOAuth2(),
113113 (mcpAuthorization) - > {
114114 // REQUIRED: the issuerURI
115115 mcpAuthorization. authorizationServer(issuerUrl);
@@ -351,7 +351,7 @@ For our MCP clients, there are three flows available for obtaining tokens:
351351🤔 Which flow should I use?
352352
353353- If there are user-level permission, AND you know every MCP request will be made within the context of a user request
354- (ensure there are not ` tools/list ` call no app startup), then use the ` authorization_code ` flow, with either
354+ (ensure there are no ` tools/list ` calls on app startup), then use the ` authorization_code ` flow, with either
355355 ` OAuth2AuthorizationCodeSyncHttpRequestCustomizer ` or ` McpOAuth2AuthorizationCodeExchangeFilterFunction ` .
356356- If there are no user-level permissions, and you want to secure "client-to-server" communication with an access token,
357357 use the ` client_credentials ` flow, with either ` OAuth2ClientCredentialsSyncHttpRequestCustomizer ` or
@@ -363,7 +363,7 @@ For our MCP clients, there are three flows available for obtaining tokens:
363363
364364### Setup for all use-cases
365365
366- In very case, you need to activate Spring Security's OAuth2 client support.
366+ In every case, you need to activate Spring Security's OAuth2 client support.
367367Add the following properties to your ` application.properties ` file.
368368Depending on the flow you chose (see above), you may need one or both client registrations:
369369
0 commit comments