The contents of the Header describe the cryptographic operations to the JWT data.
The payload is the central part of the JWT which contains verifiable security statements
Registered Claim Names
Public Claim Names
Private Claim Names
HS256 algorithm, which is short for HMAC-SHA256
RS256 signing algorithm, which is short for RSA-SHA256
Role-based access control is a method of restricting network access based on the roles of individual users within an enterprise.
it is what the user is supposed to do in an organization, what are his/her duties.
(JSON Web Token (JWT) access tokens conform to the JWT standard and contain information about an entity in the form of claims. They are self-contained therefore it is not necessary for the recipient to call a server to validate the token.