Model Context Protocol, or MCP for short, has taken over the AI world.
If you've been following our blog, you've probably read the introduction to the
topic, Connect Your AI to Everything: Spring AI's MCP Boot Starters.
The security aspects of MCP have been evolving fast, and the latest version of the spec is getting more and more support
from the ecosystem.
To meet the needs of Spring users, we have incubated a dedicated project on
Github: spring-ai-community/mcp-security.
This week, we pushed our first releases, and you can now add them to your Spring AI 1.1.x-based applications.
In this…
Last month, we explored how to secure Spring AI MCP Servers[1] with the OAuth2 authorization framework.
In the conclusion of that article, we mentioned we'd explore using standalone Authorization Servers for MCP Security and deviate from the then-current specification. Since we published the article, the community has been very active in revising the original version of the specification.
The new draft is simpler, and the major change does match what we had imagined for security.
MCP Servers are still OAuth2 Resource Servers, meaning they authorize incoming requests using access tokens passed…
Spring AI offers support for Model Context Protocol, or MCP for short, which allows AI models to interact with and access external tools and resources in a structured way.
With Spring AI, developers can create their own MCP Servers and expose capabilities to AI models in just a few lines of code. Authorization and security in MCP MCP Servers can run locally, using the STDIO transport.
To expose an MCP server to the outside world, it must expose a few standard HTTP endpoints.
While MCP Servers used privately might not require strict authentication, enterprise deployments need robust security…