The access is permanently forbidden and tied to the application logic, such as insufficient rights to a resource.

  • No labels