@@ -52,20 +52,6 @@ while maintaining simplicity:
5252 Server Metadata ([ RFC8414] ( https://datatracker.ietf.org/doc/html/rfc8414 ) ).
5353 MCP clients ** MUST** use the OAuth 2.0 Authorization Server Metadata.
5454
55- ### 2.1.1 OAuth Grant Types
56-
57- OAuth specifies different flows or grant types, which are different ways of obtaining an
58- access token. Each of these targets different use cases and scenarios.
59-
60- MCP servers ** SHOULD** support the OAuth grant types that best align with the intended
61- audience. For instance:
62-
63- 1 . Authorization Code: useful when the client is acting on behalf of a (human) end user.
64- - For instance, an agent calls an MCP tool implemented by a SaaS system.
65- 2 . Client Credentials: the client is another application (not a human)
66- - For instance, an agent calls a secure MCP tool to check inventory at a specific
67- store. No need to impersonate the end user.
68-
6955### 2.2 Roles
7056A protected MCP server acts as a [ OAuth 2.1 resource server] ( https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-12.html#name-roles ) ,
7157capable of accepting and responding to protected resource requests using access tokens.
@@ -162,8 +148,8 @@ Any MCP authorization servers that _do not_ support Dynamic Client Registration
162148alternative ways to obtain a client ID (and, if applicable, client credentials). For one of
163149these authorization servers, MCP clients will have to either:
164150
165- 1 . Hardcode a client ID (and, if applicable, client credentials) specifically for that MCP
166- server, or
151+ 1 . Hardcode a client ID (and, if applicable, client credentials) specifically for the MCP client to use when
152+ interacting with that authorization server, or
1671532 . Present a UI to users that allows them to enter these details, after registering an
168154 OAuth client themselves (e.g., through a configuration interface hosted by the
169155 server).
0 commit comments