Skip to content

Conversation

SoldierSacha
Copy link

@SoldierSacha SoldierSacha commented Jun 4, 2025

Motivation and Context

#881

In addition to implementing the Client Credentials grant (as referenced in the issue linked above), I have also integrated support for the Token Exchange grant.

Reasoning for Token Exchange: While the Client Credentials grant is suitable for machine-to-machine authorization, I realized that there are times where the client machine (acting as an MCP Client) might have to make requests on behalf of an end-user to the MCP Server. With that being said, in the current implementation, this did not exist because there was no way to securely identify the end-user.

Now it does through Token Exchange.

How Has This Been Tested?

Added test cases (all pass), and also currently using in my own mcp server and client. Everything is working as intended.

Breaking Changes

None

Types of changes

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to change)
  • Documentation update

Checklist

  • I have read the MCP Documentation
  • My code follows the repository's style guidelines
  • New and existing tests pass locally
  • I have added appropriate error handling
  • I have added or updated documentation as needed

Additional context

No

@SoldierSacha
Copy link
Author

@SoldierSacha
Copy link
Author

@Kludex @pcarleton

@felixweinberger felixweinberger marked this pull request as draft September 26, 2025 13:43
@felixweinberger
Copy link
Contributor

Converting this to a draft for now as the SEP is still being discussed - once accepted feel free to re-publish for review.

@SoldierSacha
Copy link
Author

SoldierSacha commented Oct 18, 2025

Hi @felixweinberger!

I see thathttps://github.com/modelcontextprotocol/modelcontextprotocol/pull/1047 was closed in favor of modelcontextprotocol/ext-auth#3, which was recently accepted. Would you like me to now change this as 'Ready for Review?'

@felixweinberger felixweinberger added needs maintainer action Potentially serious issue - needs proactive fix and maintainer attention and removed pending SEP approval When a PR is attached as an implementation detail to a SEP, we mark it as such for triage. labels Oct 21, 2025
@felixweinberger felixweinberger marked this pull request as ready for review October 21, 2025 17:00
@felixweinberger felixweinberger dismissed their stale review October 21, 2025 17:01

Dismissing own review as related SEP now accepted.

@felixweinberger
Copy link
Contributor

Hi @felixweinberger!

I see thathttps://github.com/modelcontextprotocol/modelcontextprotocol/pull/1047 was closed in favor of modelcontextprotocol/ext-auth#3. Would you like me to now change this as 'Ready for Review?'

Thanks, I marked it as ready for review.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

auth Issues and PRs related to Authentication / OAuth needs maintainer action Potentially serious issue - needs proactive fix and maintainer attention

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Implement SEP-1046: Support OAuth client credentials flow in authorization

7 participants