Skip to content

Commit 17a28ff

Browse files
committed
refactor: refine wording
1 parent b16d80a commit 17a28ff

File tree

6 files changed

+25
-23
lines changed

6 files changed

+25
-23
lines changed

docs/use-cases/ai/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
sidebar_position: 3
3-
sidebar_label: AI use cases
3+
sidebar_label: AI
44
description: Explore how Logto can help you build secure, AI-enabled experiences.
55
---
66

docs/use-cases/ai/enable-ai-agent-access.mdx renamed to docs/use-cases/ai/enable-third-party-ai-agent-access.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
22
sidebar_position: 3
3-
sidebar_label: Enable AI agent access to app
3+
sidebar_label: Enable third-party AI agent access to app
44
---
55

6-
# Enable AI agent access to your app
6+
# Enable third-party AI agent access to your app
77

88
:::caution
99
👷 This tutorial is still in progress. Please check back later for updates. 🚧

docs/use-cases/ai/fragments/_catalog.mdx

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,10 +21,10 @@ Explore how Logto empowers you to build secure, AI-enabled experiences. Whether
2121
},
2222
{
2323
type: 'link',
24-
label: 'Enable AI agent and third-party app access to your MCP server',
25-
href: '/use-cases/ai/mcp-server-enable-ai-agent-and-third-party-access',
24+
label: 'Enable third-party AI agent access to your MCP server',
25+
href: '/use-cases/ai/mcp-server-enable-third-party-ai-agent-access',
2626
description:
27-
'Find out how to enable authentication and authorization for AI agents and third-party apps connecting to your MCP server.',
27+
'Find out how to enable authentication and authorization for third-party AI agents and apps connecting to your MCP server.',
2828
customProps: {
2929
icon: <FlaskIcon />,
3030
},
@@ -38,10 +38,10 @@ Explore how Logto empowers you to build secure, AI-enabled experiences. Whether
3838
items={[
3939
{
4040
type: 'link',
41-
label: 'Enable AI agent access to your app',
42-
href: '/use-cases/ai/enable-ai-agent-access',
41+
label: 'Enable third-party AI agent access to your app',
42+
href: '/use-cases/ai/enable-third-party-ai-agent-access',
4343
description:
44-
'Discover how to add authentication and authorization for AI agents accessing your app, ensuring security and control across AI-driven workflows.',
44+
'Discover how to add authentication and authorization for third-party AI agents accessing your app, ensuring security and control across AI-driven workflows.',
4545
customProps: {
4646
icon: <RobotIcon />,
4747
},

docs/use-cases/ai/mcp-server-enable-ai-agent-and-third-party-access.mdx renamed to docs/use-cases/ai/mcp-server-enable-third-party-ai-agent-access.mdx

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
sidebar_position: 2
3-
sidebar_label: Enable AI agent and third-party app access to MCP server
3+
sidebar_label: Enable third-party AI agent access to MCP server
44
---
55

66
import QuickStartsReference from '../../quick-starts/third-party/oidc/_quick-starts-reference.md';
@@ -10,10 +10,10 @@ import Prerequisites from './fragments/_mcp-prerequisites.mdx';
1010
import SampleCode from './fragments/_mcp-sample-code.mdx';
1111
import SetUpServer from './fragments/_mcp-set-up-server.mdx';
1212

13-
# Enable AI agent and third-party app access to your MCP server
13+
# Enable third-party AI agent access to your MCP server
1414

1515
:::note
16-
If you want to integrate your MCP server with your own app, please refer to the [Enable auth for your MCP-powered apps with Logto](./mcp-server-add-auth) guide.
16+
If you want to integrate your MCP server with your own AI agent or app, please refer to the [Enable auth for your MCP-powered apps with Logto](./mcp-server-add-auth) guide.
1717
:::
1818

1919
This guide walks you through integrating Logto with your MCP server using [mcp-auth](https://mcp-auth.dev), allowing you to authenticate users and securely retrieve their identity information using the standard OpenID Connect flow.
@@ -22,28 +22,30 @@ You'll learn how to:
2222

2323
- Configure Logto as the authorization server for your MCP server.
2424
- Set up a “whoami” tool to return the current user's identity claims.
25-
- Test the flow with an AI agent or third-party app.
25+
- Test the flow with a third-party AI agent.
2626

2727
After this tutorial, your MCP server will:
2828

2929
- Authenticate users in your Logto tenant.
3030
- Return identity claims (`sub`, `username`, `name`, `email`, etc.) for the "whoami" tool invocation.
3131

32-
<Prerequisites clientDescription="The AI agent or third-party app will be used as the client in this guide." />
32+
<Prerequisites clientDescription="The third-party AI agent will be used as the client in this guide." />
3333

34-
## Set up AI agent or third-party app
34+
## Set up third-party AI agent
3535

36-
To enable the AI agent or third-party app (client) to access your MCP server, you need to set up the following:
36+
To enable the third-party AI agent to access your MCP server, you need to set up the following:
3737

3838
1. The client should be able to make MCP requests to invoke the tools exposed by the MCP server.
3939
2. The client should be able to handle the 401 Unauthorized response. See [Authorization Flow Steps](https://modelcontextprotocol.io/specification/2025-03-26/basic/authorization#2-5-authorization-flow-steps) for more details.
4040
3. After successful authentication, the client should be able to make requests to the MCP server with the access token obtained from Logto.
4141

42-
## Set up app in Logto
42+
## Set up AI agent in Logto
4343

44-
### Allow developers to create third-party apps
44+
To enable the third-party AI agent to access your MCP server, you need to set up a **third-party app** in Logto. This app will be used to represent the AI agent and obtain the necessary credentials for authentication and authorization.
4545

46-
If you are building a marketplace or want to allow developers to create third-party apps, you can leverage [Logto Management API](/integrate-logto/interact-with-management-api) to create third-party apps programmatically. This allows developers to register their applications and obtain the necessary credentials for authentication.
46+
### Allow developers to create third-party apps in Logto
47+
48+
If you are building a marketplace or want to allow developers to create third-party apps in Logto, you can leverage [Logto Management API](/integrate-logto/interact-with-management-api) to create third-party apps programmatically. This allows developers to register their applications and obtain the necessary credentials for authentication.
4749

4850
You'll need to host your own service to handle the client registration process. This service will interact with the Logto Management API to create third-party apps on behalf of developers.
4951

@@ -57,7 +59,7 @@ flowchart LR
5759

5860
Alternatively, you can manually create third-party apps in Logto Console to get familiar with the process.
5961

60-
### Manually create a third-party app
62+
### Manually create a third-party app in Logto
6163

6264
You can manually create a third-party app in Logto Console for testing purposes or ad-hoc integrations. This is useful when you want to quickly test the integration without implementing a full client-registration flow.
6365

@@ -84,7 +86,7 @@ You can manually create a third-party app in Logto Console for testing purposes
8486
## Test the integration
8587

8688
1. Start the MCP server.
87-
2. Start the AI agent or third-party app (client).
89+
2. Start the AI agent.
8890
3. In the client, invoke the `whoami` tool to retrieve the current user's identity claims.
8991
4. The client should handle the 401 Unauthorized response and redirect the user to Logto for authentication.
9092
5. After successful authentication, the client should receive an access token and use it to make requests to the MCP server.

docs/use-cases/authorization/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
sidebar_position: 1
3-
sidebar_label: Authorization use cases
3+
sidebar_label: Authorization
44
description: Explore how Logto can help you build flexible authorization with role-based access control (RBAC) and resource indicators.
55
---
66

docs/use-cases/multi-tenancy/README.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
sidebar_position: 2
3-
sidebar_label: Multi-tenancy use cases
3+
sidebar_label: Multi-tenancy
44
description: Explore how Logto can help you build multi-tenancy applications with ease.
55
---
66

0 commit comments

Comments
 (0)