MCP spec 2025-06-18: Authorization updates and contributors

View profile for Aaron Parecki

Director of Identity Standards at Okta / OAuth @ IETF / Co-chair of IPSIE @ OpenID

The latest version of the MCP spec is now officially 2025-06-18! Congrats to everyone in the MCP community involved in making this happen! Key updates to the authorization section: ⚙️ MCP Servers are no longer responsible for issuing access tokens or handling user authentication 🛡️ A dedicated Authorization Server separate from the MCP Server handles user authentication and issuing access tokens 🔍 RFC9728 Protected Resource Metadata enables the MCP client to dynamically discover the MCP Server's authorization server 👉 RFC8707 Resource Indicators are required as a security measure Thanks to everyone who contributed to the many discussions to update the authorization part of the spec to be more compatible with existing OAuth systems! David Soria Parra, Paul Carleton, Den Delimarsky, Nate Barbettini, William Dawson, Jared Hanson, Karl McGuinness, Darin McAdams, Jean-François LOMBARDO and apologies if I forgot to mention you, those threads were extremely long! #modelcontextprotocol #mcp #oauth #ai

Marjan Sterjev

IT Engineer | CISSP | CCSP | CEH (Master): research | learn | do | MENTOR

5mo

But MCP clients still must register, most likely as dynamic ad-hoc OAuth clients with the third party authorization servers, right? Do most of the identity servers support dynamic OAuth client registration, Entra ID for example?

Gail Hodges

Executive Director at OpenID Foundation & Special Advisor California DMV

5mo

What a fantastic milestone for MCP and a tribute to the collaboration between the AI and Identity communities and experts. Aaron Parecki thanks for your proactive leadership! To all AI/Identity exoerts— stay tuned at openID.net for an AI and Identity Management CG to be announced imminently! Oidf hopes to offer this « safe space » to identify gaps and accelerate work. We will also release a AI and Identity draft whitepaper about the current landscape and roadmap of opportunities ~July tor public feedback.

great work on this one. big update!

Heather Downing

Developer Advocate | AI, Data, C#, Security & IOT || 7x MSFT MVP

5mo

Been waiting for this one to materialize, makes me feel better about the entire process of working with MCP servers. Thanks for all you do.

Sam Julien

Head of Developer Relations & Experience at WRITER

5mo

Thank you for all of your hard work on this Aaron Parecki!

Jorge de la Cruz

Director, Observability & AI at Veeam Software

5mo

Congrats and thanks for sharing, Aaron Parecki! how do we retroactively ensure all 20K+ MCP servers that are already out there follow these? Is there a conformance test suite that will be published to ensure a min level of security is achieved for interop? The list here - https://mcp.backslash.security/ is increasing everyday! cc Shahar Man Backslash Security 👇 👇 👇 https://www.linkedin.com/posts/shaharman_appsec-cisos-vibecoding-activity-7340870343646937088-Np6a

Go identerati!

Like
Reply
Sashir Estela

Principal Software Engineer

5mo

Great work. Generative AI will be more secure to be used in enterprise ecosystems. 

Like
Reply
See more comments

To view or add a comment, sign in

Explore content categories