Skip to content

Commit 4bd3596

Browse files
Apply editorial polish to v0.27.1 release docs
- Use singular "Client ID Metadata Document (CIMD)" to match RFC and PR #5085. - Replace "registers itself" with "identifies itself to" so the lead-in does not contradict the CIMD bullet's "no registration round-trip" claim. - Expand "HA" on first use in auth-k8s.mdx; flip the passive lead-in to active and parallel the redis-session-storage page. - Capitalize "Standalone" in the storage-block code title to match its Sentinel and Cluster peers. Co-Authored-By: Claude Opus 4.7 <noreply@anthropic.com>
1 parent bd7888c commit 4bd3596

2 files changed

Lines changed: 8 additions & 7 deletions

File tree

docs/toolhive/guides-cli/run-mcp-servers.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -684,10 +684,10 @@ thv run https://protected-api.com/mcp --name my-server
684684
```
685685

686686
If authentication is required, ToolHive will prompt you to complete the OAuth
687-
flow. When no client credentials are provided, ToolHive registers itself with
688-
the authorization server using one of two mechanisms:
687+
flow. When no client credentials are provided, ToolHive identifies itself to the
688+
authorization server using one of two mechanisms:
689689

690-
- **Client ID Metadata Documents (CIMD).** If the authorization server's
690+
- **Client ID Metadata Document (CIMD).** If the authorization server's
691691
discovery document sets `client_id_metadata_document_supported: true`,
692692
ToolHive presents
693693
[`https://toolhive.dev/oauth/client-metadata.json`](https://toolhive.dev/oauth/client-metadata.json)

docs/toolhive/guides-k8s/auth-k8s.mdx

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -649,10 +649,11 @@ For a complete walkthrough, see
649649
By default, the embedded authorization server stores sessions in memory.
650650
Upstream tokens are lost when pods restart, requiring users to re-authenticate.
651651
For production deployments, configure a Redis backend by adding a `storage`
652-
block to your `MCPExternalAuthConfig`. Three connection modes are supported, and
653-
exactly one must be set:
652+
block to your `MCPExternalAuthConfig`. The `redis` block supports three
653+
connection modes; you must set exactly one:
654654

655-
- **Sentinel** (`sentinelConfig`) - self-managed Redis with Sentinel-based HA
655+
- **Sentinel** (`sentinelConfig`) - self-managed Redis with Sentinel-based high
656+
availability (HA)
656657
- **Standalone** (`addr` only) - managed Redis services that expose a single
657658
endpoint, such as GCP Memorystore Basic/Standard or Azure Cache for Redis
658659
- **Cluster** (`addr` with `clusterMode: true`) - managed Redis Cluster
@@ -677,7 +678,7 @@ storage:
677678
key: password
678679
```
679680

680-
```yaml title="storage block for MCPExternalAuthConfig - standalone"
681+
```yaml title="storage block for MCPExternalAuthConfig - Standalone"
681682
storage:
682683
type: redis
683684
redis:

0 commit comments

Comments
 (0)