@@ -155,7 +155,7 @@ Clients **MUST** first attempt to discover endpoints via the metadata document b
155155falling back to default paths. When using default paths, all other protocol requirements
156156remain unchanged.
157157
158- ### 2.3 Dynamic Client Registration
158+ ### 2.4 Dynamic Client Registration
159159
160160MCP clients and servers ** SHOULD** support the
161161[ OAuth 2.0 Dynamic Client Registration Protocol] ( https://datatracker.ietf.org/doc/html/rfc7591 )
@@ -178,7 +178,7 @@ these servers, MCP clients will have to either:
178178 OAuth client themselves (e.g., through a configuration interface hosted by the
179179 server).
180180
181- ### 2.4 Authorization Flow Steps
181+ ### 2.5 Authorization Flow Steps
182182
183183The complete Authorization flow proceeds as follows:
184184
@@ -211,7 +211,7 @@ sequenceDiagram
211211 C->>M: API Requests with Access Token
212212```
213213
214- #### 2.4 .1 Decision Flow Overview
214+ #### 2.5 .1 Decision Flow Overview
215215
216216``` mermaid
217217flowchart TD
@@ -235,9 +235,9 @@ flowchart TD
235235 N --> O[Use Access Token]
236236```
237237
238- ### 2.5 Access Token Usage
238+ ### 2.6 Access Token Usage
239239
240- #### 2.5 .1 Token Requirements
240+ #### 2.6 .1 Token Requirements
241241
242242Access token handling ** MUST** conform to
243243[ OAuth 2.1 Section 5] ( https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-5 )
@@ -263,7 +263,7 @@ Host: mcp.example.com
263263Authorization: Bearer eyJhbGciOiJIUzI1NiIs...
264264```
265265
266- #### 2.5 .2 Token Handling
266+ #### 2.6 .2 Token Handling
267267
268268Resource servers ** MUST** validate access tokens as described in
269269[ Section 5.2] ( https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-5.2 ) .
@@ -272,7 +272,7 @@ If validation fails, servers **MUST** respond according to
272272error handling requirements. Invalid or expired tokens ** MUST** receive a HTTP 401
273273response.
274274
275- ### 2.6 Security Considerations
275+ ### 2.7 Security Considerations
276276
277277The following security requirements ** MUST** be implemented:
278278
@@ -282,7 +282,7 @@ The following security requirements **MUST** be implemented:
2822824 . Servers ** MUST** validate redirect URIs to prevent open redirect vulnerabilities
2832835 . Redirect URIs ** MUST** be either localhost URLs or HTTPS URLs
284284
285- ### 2.7 Error Handling
285+ ### 2.8 Error Handling
286286
287287Servers ** MUST** return appropriate HTTP status codes for authorization errors:
288288
@@ -292,22 +292,22 @@ Servers **MUST** return appropriate HTTP status codes for authorization errors:
292292| 403 | Forbidden | Invalid scopes or insufficient permissions |
293293| 400 | Bad Request | Malformed authorization request |
294294
295- ### 2.8 Implementation Requirements
295+ ### 2.9 Implementation Requirements
296296
2972971 . Implementations ** MUST** follow OAuth 2.1 security best practices
2982982 . PKCE is ** REQUIRED** for all clients
2992993 . Token rotation ** SHOULD** be implemented for enhanced security
3003004 . Token lifetimes ** SHOULD** be limited based on security requirements
301301
302- ### 2.9 Third-Party Authorization Flow
302+ ### 2.10 Third-Party Authorization Flow
303303
304- #### 2.9 .1 Overview
304+ #### 2.10 .1 Overview
305305
306306MCP servers ** MAY** support delegated authorization through third-party authorization
307307servers. In this flow, the MCP server acts as both an OAuth client (to the third-party
308308auth server) and an OAuth authorization server (to the MCP client).
309309
310- #### 2.9 .2 Flow Description
310+ #### 2.10 .2 Flow Description
311311
312312The third-party authorization flow comprises these steps:
313313
@@ -341,7 +341,7 @@ sequenceDiagram
341341 M->>C: MCP access token
342342```
343343
344- #### 2.9 .3 Session Binding Requirements
344+ #### 2.10 .3 Session Binding Requirements
345345
346346MCP servers implementing third-party authorization ** MUST** :
347347
@@ -350,7 +350,7 @@ MCP servers implementing third-party authorization **MUST**:
3503503 . Implement appropriate token lifecycle management
3513514 . Handle third-party token expiration and renewal
352352
353- #### 2.9 .4 Security Considerations
353+ #### 2.10 .4 Security Considerations
354354
355355When implementing third-party authorization, servers ** MUST** :
356356
0 commit comments