Skip to content

Commit a8b7d1c

Browse files
committed
fixed
1 parent 0d82ca8 commit a8b7d1c

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

aspnetcore/security/authentication/configure-jwt-bearer-authentication.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,12 @@ The [OAuth specifications](https://learn.microsoft.com/entra/identity-platform/a
9090

9191
### 403 Forbidden
9292

93-
A 403 forbidden response is normally returned when a business permission is missing. The authorization has nothing to do with the authentication or the standard claims used in the access token. This could be implemented using an ASP.NET requirement with a policy or also a role authorization.
93+
A [403 Forbidden](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403) response typically indicates that the authenticated user lacks the necessary permissions to access the requested resource. This is distinct from authentication issues, e.g. an invalid token, and is unrelated to the standard claims within the access token.
94+
95+
In ASP.NET Core, you can enforce authorization using:
96+
97+
[Requirements and policies](/aspnet/core/security/authorization/policies?view=aspnetcore-9.0): Define custom requirements, e.g., "Must be an administrator" and associate them with policies.
98+
[Role-based authorization](/aspnet/core/security/authorization/roles*): Assign users to roles e.g., "Admin," "Editor", and restrict access based on those roles.
9499

95100
## What role has OIDC and/or OAuth when using bearer tokens?
96101

0 commit comments

Comments
 (0)