|
You are here |
www.shuttle.dev | ||
| | | | |
blog.christianposta.com
|
|
| | | | | The Model Context Protocol has created quite the buzz in the AI ecosystem at the moment, but as enterprise organizations look to adopt it, they are confronted with a hard truth: it lacks important security functionality. Up until now, as people experiment with Agentic AI and tool support, they've mostly adopted the MCP stdio transport, which means you end up with a 1:1 deployment of MCP server and MCP client. What organizations need is a way to deploy MCP servers remotely and leverage authorization to give resource owner's access to their data safely. | |
| | | | |
aaronparecki.com
|
|
| | | | | This post describes OAuth 2.0 in a simplified format to help developers and service providers implement the protocol. | |
| | | | |
www.shuttle.rs
|
|
| | | | | Build an SSE-based MCP server with OAuth 2 in Rust using rmcp and Axum and deploy to Shuttle with PostgreSQL/SQLx. | |
| | | | |
conductofcode.io
|
|
| | | Modern web development architecture: | ||