Since the JWT used for authentication directly contains the list of authorization claims, it can be evaluated how to hide or disable relevant parts of the UI when the permission to use them is missing.
The aim is to improve the user experience without displaying buttons and UI affordances that are, in fact, not usable because the user is not authorized.
Since the JWT used for authentication directly contains the list of authorization claims, it can be evaluated how to hide or disable relevant parts of the UI when the permission to use them is missing.
The aim is to improve the user experience without displaying buttons and UI affordances that are, in fact, not usable because the user is not authorized.