The latest version of the MCP spec is now officially 2025-06-18! Congrats to everyone in the MCP community involved in making this happen! Key updates to the authorization section: ⚙️ MCP Servers are no longer responsible for issuing access tokens or handling user authentication 🛡️ A dedicated Authorization Server separate from the MCP Server handles user authentication and issuing access tokens 🔍 RFC9728 Protected Resource Metadata enables the MCP client to dynamically discover the MCP Server's authorization server 👉 RFC8707 Resource Indicators are required as a security measure Thanks to everyone who contributed to the many discussions to update the authorization part of the spec to be more compatible with existing OAuth systems! David Soria Parra, Paul Carleton, Den Delimarsky, Nate Barbettini, William Dawson, Jared Hanson, Karl McGuinness, Darin McAdams, Jean-François LOMBARDO and apologies if I forgot to mention you, those threads were extremely long! #modelcontextprotocol #mcp #oauth #ai
What a fantastic milestone for MCP and a tribute to the collaboration between the AI and Identity communities and experts. Aaron Parecki thanks for your proactive leadership! To all AI/Identity exoerts— stay tuned at openID.net for an AI and Identity Management CG to be announced imminently! Oidf hopes to offer this « safe space » to identify gaps and accelerate work. We will also release a AI and Identity draft whitepaper about the current landscape and roadmap of opportunities ~July tor public feedback.
great work on this one. big update!
Been waiting for this one to materialize, makes me feel better about the entire process of working with MCP servers. Thanks for all you do.
Thank you for all of your hard work on this Aaron Parecki!
Pavel Lazarenko ^ :)
Congrats and thanks for sharing, Aaron Parecki! how do we retroactively ensure all 20K+ MCP servers that are already out there follow these? Is there a conformance test suite that will be published to ensure a min level of security is achieved for interop? The list here - https://mcp.backslash.security/ is increasing everyday! cc Shahar Man Backslash Security 👇 👇 👇 https://www.linkedin.com/posts/shaharman_appsec-cisos-vibecoding-activity-7340870343646937088-Np6a
Go identerati!
Great work. Generative AI will be more secure to be used in enterprise ecosystems.
IT Engineer | CISSP | CCSP | CEH (Master): research | learn | do | MENTOR
5moBut MCP clients still must register, most likely as dynamic ad-hoc OAuth clients with the third party authorization servers, right? Do most of the identity servers support dynamic OAuth client registration, Entra ID for example?