In the previous scenarios, we only used LDAP to authenticate users and authorize their requests. Let's say we have this LDAP structure below. We have one organization unit for all the applications ...