Overview
API authentication and authorization fail when developers implement authentication (proving who you are) without implementing authorization (proving what you can access). An API that validates a JWT token and then returns the requested resource without checking whether that token's user is permitted to access that specific resource has implemented authentication but left authorization open — any authenticated user can access any other user's data.
The API Authentication & Authorization Framework selects the right mechanism, implements tokens correctly, and enforces authorization at the resource level to prevent both vertical (privilege escalation) and horizontal (cross-user data access) violations.