|
| 1 | +--- |
| 2 | +title: "SEP-1046: Support OAuth client credentials flow in authorization" |
| 3 | +sidebarTitle: "SEP-1046: Support OAuth client credentials flow i…" |
| 4 | +description: "Support OAuth client credentials flow in authorization" |
| 5 | +--- |
| 6 | + |
| 7 | +import { Badge } from "/snippets/badge.mdx"; |
| 8 | + |
| 9 | +<div className="flex items-center gap-2 mb-4"> |
| 10 | + <Badge color="green">Final</Badge> |
| 11 | + <Badge color="gray">Standards Track</Badge> |
| 12 | +</div> |
| 13 | + |
| 14 | +| Field | Value | |
| 15 | +| ------------- | ------------------------------------------------------------------------ | |
| 16 | +| **SEP** | 1046 | |
| 17 | +| **Title** | Support OAuth client credentials flow in authorization | |
| 18 | +| **Status** | Final | |
| 19 | +| **Type** | Standards Track | |
| 20 | +| **Created** | 2025-07-23 | |
| 21 | +| **Author(s)** | Darin McAdams ([@D-McAdams](https://github.com/D-McAdams) ) | |
| 22 | +| **Sponsor** | None | |
| 23 | +| **PR** | [#1046](https://github.com/modelcontextprotocol/specification/pull/1046) | |
| 24 | + |
| 25 | +--- |
| 26 | + |
| 27 | +## Abstract |
| 28 | + |
| 29 | +Recommends adding the OAuth client credentials flow to the authorization spec to enable machine-to-machine scenarios. |
| 30 | + |
| 31 | +### Motivation |
| 32 | + |
| 33 | +The original authorization spec mentioned the client credentials flow, but it was dropped in subsequent revisions. Therefore, the spec is currently silent on how to solve machine-to-machine scenarios where an end-user is unavailable for interactive authorization. |
| 34 | + |
| 35 | +### Specification |
| 36 | + |
| 37 | +The authorization spec would be amended to list the OAuth client credentials flow as being allowed. Adhering to the patterns established by OAuth 2.1, the specification would RECOMMEND the use of asymmetric methods defined in RFC 753 (JWT Assertions), but also allow client secrets. |
| 38 | + |
| 39 | +As guidance to implementors, the spec overview would also be updated to describe the different flows and when each is applicable. In addition, to address a common question, the spec would be updated to indicate that implementors may implement other authorization scenarios beyond what's defined; emphasizing that the specification defines the baseline requirements. |
| 40 | + |
| 41 | +### Rationale |
| 42 | + |
| 43 | +To maximize interoperability (and minimize SDK complexity), this change would intentionally constrain the client credentials flow to two options: |
| 44 | + |
| 45 | +1. JWT Assertions as per RFC 7523 (RECOMMENDED) |
| 46 | +2. Client Secrets via HTTP Basic authentication (Allowed for maximum compatibility with existing systems) |
| 47 | + |
| 48 | +Other options, such as mTLS, are not included. |
| 49 | + |
| 50 | +While the spec encourages the use of RFC 7523 (JWT Assertions), it does not yet specify how to populate the JWT contents nor how to discover the client's JWKS URI to validate the JWT. In future iterations of the spec, it will be beneficial to do so. However, this was currently left unspecified pending maturity of other RFCs that can define these profiles. The other RFCs include [WIMSE Headless JWT Authentication](https://www.ietf.org/archive/id/draft-levy-wimse-headless-jwt-authentication-01.html) (for specifying JWT contents) and [Client ID Metadata](https://datatracker.ietf.org/doc/draft-parecki-oauth-client-id-metadata-document/) (for specifying the JWKS URI). This revision intentionally leaves extensibility for these future profiles. As a practical matter, this means implementers needing to ship solutions ASAP will most likely use client secrets which are widely supported today, whereas the JWT Assertion pattern represents the longer-term direction. |
| 51 | + |
| 52 | +### Backward Compatibility |
| 53 | + |
| 54 | +This change is fully backward compatible. It introduces a new authorization flow, but does not alter the existing flows. |
| 55 | + |
| 56 | +### Security Implications |
| 57 | + |
| 58 | +The specification refers to the existing OAuth security guidance. |
0 commit comments