@@ -172,7 +172,7 @@ Clients **MUST** first attempt to discover endpoints via the metadata document b
172172falling back to default paths. When using default paths, all other protocol requirements
173173remain unchanged.
174174
175- ### 2.3 Dynamic Client Registration
175+ ### 2.4 Dynamic Client Registration
176176
177177MCP clients and servers ** SHOULD** support the
178178[ OAuth 2.0 Dynamic Client Registration Protocol] ( https://datatracker.ietf.org/doc/html/rfc7591 )
@@ -195,7 +195,7 @@ these servers, MCP clients will have to either:
195195 OAuth client themselves (e.g., through a configuration interface hosted by the
196196 server).
197197
198- ### 2.4 Authorization Flow Steps
198+ ### 2.5 Authorization Flow Steps
199199
200200The complete Authorization flow proceeds as follows:
201201
@@ -228,7 +228,7 @@ sequenceDiagram
228228 C->>M: API Requests with Access Token
229229```
230230
231- #### 2.4 .1 Decision Flow Overview
231+ #### 2.5 .1 Decision Flow Overview
232232
233233``` mermaid
234234flowchart TD
@@ -252,9 +252,9 @@ flowchart TD
252252 N --> O[Use Access Token]
253253```
254254
255- ### 2.5 Access Token Usage
255+ ### 2.6 Access Token Usage
256256
257- #### 2.5 .1 Token Requirements
257+ #### 2.6 .1 Token Requirements
258258
259259Access token handling ** MUST** conform to
260260[ OAuth 2.1 Section 5] ( https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-5 )
@@ -280,7 +280,7 @@ Host: mcp.example.com
280280Authorization: Bearer eyJhbGciOiJIUzI1NiIs...
281281```
282282
283- #### 2.5 .2 Token Handling
283+ #### 2.6 .2 Token Handling
284284
285285Resource servers ** MUST** validate access tokens as described in
286286[ Section 5.2] ( https://datatracker.ietf.org/doc/html/draft-ietf-oauth-v2-1-12#section-5.2 ) .
@@ -289,7 +289,7 @@ If validation fails, servers **MUST** respond according to
289289error handling requirements. Invalid or expired tokens ** MUST** receive a HTTP 401
290290response.
291291
292- ### 2.6 Security Considerations
292+ ### 2.7 Security Considerations
293293
294294The following security requirements ** MUST** be implemented:
295295
@@ -299,7 +299,7 @@ The following security requirements **MUST** be implemented:
2992994 . Servers ** MUST** validate redirect URIs to prevent open redirect vulnerabilities
3003005 . Redirect URIs ** MUST** be either localhost URLs or HTTPS URLs
301301
302- ### 2.7 Error Handling
302+ ### 2.8 Error Handling
303303
304304Servers ** MUST** return appropriate HTTP status codes for authorization errors:
305305
@@ -309,22 +309,22 @@ Servers **MUST** return appropriate HTTP status codes for authorization errors:
309309| 403 | Forbidden | Invalid scopes or insufficient permissions |
310310| 400 | Bad Request | Malformed authorization request |
311311
312- ### 2.8 Implementation Requirements
312+ ### 2.9 Implementation Requirements
313313
3143141 . Implementations ** MUST** follow OAuth 2.1 security best practices
3153152 . PKCE is ** REQUIRED** for all clients
3163163 . Token rotation ** SHOULD** be implemented for enhanced security
3173174 . Token lifetimes ** SHOULD** be limited based on security requirements
318318
319- ### 2.9 Third-Party Authorization Flow
319+ ### 2.10 Third-Party Authorization Flow
320320
321- #### 2.9 .1 Overview
321+ #### 2.10 .1 Overview
322322
323323MCP servers ** MAY** support delegated authorization through third-party authorization
324324servers. In this flow, the MCP server acts as both an OAuth client (to the third-party
325325auth server) and an OAuth authorization server (to the MCP client).
326326
327- #### 2.9 .2 Flow Description
327+ #### 2.10 .2 Flow Description
328328
329329The third-party authorization flow comprises these steps:
330330
@@ -358,7 +358,7 @@ sequenceDiagram
358358 M->>C: MCP access token
359359```
360360
361- #### 2.9 .3 Session Binding Requirements
361+ #### 2.10 .3 Session Binding Requirements
362362
363363MCP servers implementing third-party authorization ** MUST** :
364364
@@ -367,7 +367,7 @@ MCP servers implementing third-party authorization **MUST**:
3673673 . Implement appropriate token lifecycle management
3683684 . Handle third-party token expiration and renewal
369369
370- #### 2.9 .4 Security Considerations
370+ #### 2.10 .4 Security Considerations
371371
372372When implementing third-party authorization, servers ** MUST** :
373373
0 commit comments