Claims-based authorization uses attributes (or “claims”) embedded in a user’s identity token—like roles, email, or group membership—to determine access. These claims are passed along with requests and evaluated by services or gateways to enforce access policies.