Is that allowed? Authentication and authorization in Model Context Protocol
Short excerpt below. Click through to read at the original source.
Learn how to protect MCP servers from unauthorized access and how authentication of MCP clients to MCP servers works.