Skip to content

Commit b277e19

Browse files
committed
Sync open source content 🐝 (from 70a18bf9a19d29fffafcd6a2969b5c28713ea127)
1 parent a47fb8c commit b277e19

32 files changed

Lines changed: 1310 additions & 3472 deletions

mcp/ai-agents/real-world-examples.mdx

Lines changed: 0 additions & 510 deletions
This file was deleted.
Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,11 @@
11
---
22
title: What is MCP authorization?
33
description: Learn how authorization works in the Model Context Protocol.
4+
asIndexPage: true
45
---
56

67
import { Callout } from "@/mdx/components";
7-
import GramCallout from "../.partials/gram-callout.mdx";
8+
import GramCallout from "./.partials/gram-callout.mdx";
89

910
<GramCallout />
1011

@@ -83,7 +84,6 @@ When an agent tries to access this system through an MCP client, the following f
8384
4. **User consent**: The client is authenticated and granted the requested permissions, for example, for an `editor` role.
8485
5. **Token exchange**: After consent, the authorization server issues an access token.
8586
6. **Authorized request**: The client includes this token in subsequent requests and can access only the tools allowed by the role.
86-
8787
- For example, a client with the `editor` role can call `readDocument`, `createDocument`, and `updateDocument`, but not `deleteDocument`.
8888

8989
7. **Permission verification**: The MCP server validates not just the token's authenticity but also the specific permissions it grants.
@@ -232,7 +232,6 @@ flowchart LR
232232
![Sentry OAuth authorization dialog](/assets/mcp/mcp-authorization/mcp-sentry-approve.png)
233233

234234
7. **Double token exchange**:
235-
236235
- Sentry issues an OAuth token to the MCP server (not to your client).
237236
- The MCP server creates its own session token for your client.
238237
- The Sentry token stays secure on the server side.
File renamed without changes.

0 commit comments

Comments
 (0)