Abstract: We are living in a web-centric communication world. In which we are facing certain security exposures with the login system JWT token payload part as the user role identity is identified in ...