You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am looking to understand the OAuth flow based on recent published specifications, specifically following the OAuth 2.0 flow (which can operate without DCR). My current understanding is that an MCP client communicates with an MCP server that exposes metadata about the authorization server. The client then uses this information to redirect to the authorization server, that does the user authentication, and sends tokens back.
I have a few questions regarding the management of tokens by standard clients (such as Claude Desktop or Cursor):
How do these clients manage the access token and refresh token once they have been obtained?
Is the access token passed with every request as a Bearer token in the Authorization header?
How do standard clients handle token refresh after expiry? Is the refresh token automatically requested, and what is the common practice especially for public clients?
Are there formal specifications or best practices that define how these standard client handle token storage, refresh flows, and what are the practice that should be followed on MCP server side ?
I plan to build an MCP server that secures the user token issued by the Identity Provider (IDP) and uses that same token to access underlying APIs within client tools. Any clarification, articles, or sample implementations addressing these aspects would be greatly appreciated.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
I am looking to understand the OAuth flow based on recent published specifications, specifically following the OAuth 2.0 flow (which can operate without DCR). My current understanding is that an MCP client communicates with an MCP server that exposes metadata about the authorization server. The client then uses this information to redirect to the authorization server, that does the user authentication, and sends tokens back.
I have a few questions regarding the management of tokens by standard clients (such as Claude Desktop or Cursor):
How do these clients manage the access token and refresh token once they have been obtained?
Is the access token passed with every request as a Bearer token in the Authorization header?
How do standard clients handle token refresh after expiry? Is the refresh token automatically requested, and what is the common practice especially for public clients?
Are there formal specifications or best practices that define how these standard client handle token storage, refresh flows, and what are the practice that should be followed on MCP server side ?
I plan to build an MCP server that secures the user token issued by the Identity Provider (IDP) and uses that same token to access underlying APIs within client tools. Any clarification, articles, or sample implementations addressing these aspects would be greatly appreciated.
Beta Was this translation helpful? Give feedback.
All reactions