Verification Flows
Different verification flow patterns in MCP-I implementations
Verification Flows
MCP-I supports multiple verification flows depending on the implementation level and service capabilities.
Level 1: Edge Proxy Verification
In Level 1 implementations, verification occurs at the Edge Proxy, which acts as a trusted intermediary:
Loading diagram...
Level 2+: Direct Service Verification
In Level 2+ implementations, MCP-I-aware services can directly verify credentials:
Loading diagram...
Security Boundary
The verification process establishes the security boundary for MCP-I. Any compromise of the verification components can undermine the entire system's security.