3.2.3. Grant users access to protected applications