@@ -52,20 +52,6 @@ while maintaining simplicity:
5252   Server Metadata ([ RFC8414] ( https://datatracker.ietf.org/doc/html/rfc8414 ) ).
5353   MCP clients ** MUST**  use the OAuth 2.0 Authorization Server Metadata.
5454
55- ### 2.1.1 OAuth Grant Types  
56- 
57- OAuth specifies different flows or grant types, which are different ways of obtaining an
58- access token. Each of these targets different use cases and scenarios.
59- 
60- MCP servers ** SHOULD**  support the OAuth grant types that best align with the intended
61- audience. For instance:
62- 
63- 1 .  Authorization Code: useful when the client is acting on behalf of a (human) end user.
64-    -  For instance, an agent calls an MCP tool implemented by a SaaS system.
65- 2 .  Client Credentials: the client is another application (not a human)
66-    -  For instance, an agent calls a secure MCP tool to check inventory at a specific
67-      store. No need to impersonate the end user.
68- 
6955### 2.2 Roles  
7056A protected MCP server acts as a [ OAuth 2.1 resource server] ( https://www.ietf.org/archive/id/draft-ietf-oauth-v2-1-12.html#name-roles ) ,
7157capable of accepting and responding to protected resource requests using access tokens.
@@ -162,8 +148,8 @@ Any MCP authorization servers that _do not_ support Dynamic Client Registration
162148alternative ways to obtain a client ID (and, if applicable, client credentials). For one of
163149these authorization servers, MCP clients will have to either:
164150
165- 1 .  Hardcode a client ID (and, if applicable, client credentials) specifically for that  MCP
166-    server, or
151+ 1 .  Hardcode a client ID (and, if applicable, client credentials) specifically for the  MCP client to use when 
152+    interacting with that authorization  server, or
1671532 .  Present a UI to users that allows them to enter these details, after registering an
168154   OAuth client themselves (e.g., through a configuration interface hosted by the
169155   server).
0 commit comments