Skip to content

Commit aae001d

Browse files
authored
Merge pull request #23 from max-stytch/patch-1
Correct reference from MCP server to MCP Client
2 parents f29c419 + f0f5f0d commit aae001d

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

specification/draft/enterprise-managed-authorization.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ Location: https://acme.idp.example/authorize?response_type=code&scope=openid&cli
9898
The user authenticates with the IdP, and is redirected back to the Client with an authorization code, which it can then exchange for an ID Token.
9999

100100
The enterprise IdP may enforce additional security controls such as multi-factor authentication before granting the user access to the MCP Client.
101-
For example, in an OpenID Connect flow, after receiving a redirect from the IdP with an authorization code, the MCP server makes a request to the Authorization Server and, if valid, receives the tokens in the response:
101+
For example, in an OpenID Connect flow, after receiving a redirect from the IdP with an authorization code, the MCP Client makes a request to the Authorization Server and, if valid, receives the tokens in the response:
102102

103103
```
104104
POST /token HTTP/1.1

0 commit comments

Comments
 (0)