Modules/Providers/ProviderHelpers/AADConditionalAccessHelper.psm1
class CapHelper { <# .description Class for parsing conditional access policies (Caps) to generate a pre-processed version that can be used to generate the HTML table of the condiational access policies in the report. #> <# The following hashtables are used to map the codes used in the API output to human-friendly strings #> [System.Collections.Hashtable] $ExternalUserStrings = @{"b2bCollaborationGuest" = "B2B collaboration guest users"; "b2bCollaborationMember" = "B2B collaboration member users"; "b2bDirectConnectUser" = "B2B direct connect users"; "internalGuest" = "Local guest users"; "serviceProvider" = "Service provider users"; "otherExternalUser" = "Other external users"} [System.Collections.Hashtable] $StateStrings = @{"enabled" = "On"; "enabledForReportingButNotEnforced" = "Report-only"; "disabled" = "Off"} [System.Collections.Hashtable] $ActionStrings = @{"urn:user:registersecurityinfo" = "Register security info"; "urn:user:registerdevice" = "Register or join devices"} [System.Collections.Hashtable] $ClientAppStrings = @{"exchangeActiveSync" = "Exchange ActiveSync Clients"; "browser" = "Browser"; "mobileAppsAndDesktopClients" = "Mobile apps and desktop clients"; "other" = "Other clients"; "all" = "all"} [System.Collections.Hashtable] $GrantControlStrings = @{"mfa" = "multifactor authentication"; "compliantDevice" = "device to be marked compliant"; "domainJoinedDevice" = "Hybrid Azure AD joined device"; "approvedApplication" = "approved client app"; "compliantApplication" = "app protection policy"; "passwordChange" = "password change"} [System.Collections.Hashtable] $CondAccessAppControlStrings = @{"monitorOnly" = "Monitor only"; "blockDownloads" = "Block downloads"; "mcasConfigured" = "Use custom policy"} [string[]] GetMissingKeys([System.Object]$Obj, [string[]] $Keys) { <# .Description Returns a list of the keys in $Keys are not members of $Obj. Used to validate the structure of the conditonal access policies. .Functionality Internal #> $Missing = @() if ($null -eq $Obj) { # Note that $null needs to come first in the above check to keep the # linter happy. "$null should be on the left side of equality comparisons" return $Missing } foreach ($Key in $Keys) { $HasKey = [bool]($Obj.PSobject.Properties.name -match $Key) if (-not $HasKey) { $Missing += $Key } } return $Missing } [string[]] GetIncludedUsers([System.Object]$Cap) { <# .Description Parses a given conditional access policy (Cap) to generate the list of included users/roles used in the policy. .Functionality Internal #> # Perform some basic validation of the CAP. If some of these values # are missing it could indicate that the API has been restructured. $Missing = @() $Missing += $this.GetMissingKeys($Cap, @("Conditions")) $Missing += $this.GetMissingKeys($Cap.Conditions, @("Users")) $Missing += $this.GetMissingKeys($Cap.Conditions.Users, @("IncludeGroups", "IncludeGuestsOrExternalUsers", "IncludeRoles", "IncludeUsers")) if ($Missing.Length -gt 0) { Write-Warning "Conditional access policy structure not as expected. The following keys are missing: $($Missing -Join ', ')" return @() } # Begin processing the CAP $Output = @() $CapIncludedUsers = $Cap.Conditions.Users.IncludeUsers if ($CapIncludedUsers -Contains "All") { $Output += "All" } elseif ($CapIncludedUsers -Contains "None") { $Output += "None" } else { # Users if ($CapIncludedUsers.Length -eq 1) { $Output += "1 specific user" } elseif ($CapIncludedUsers.Length -gt 1) { $Output += "$($CapIncludedUsers.Length) specific users" } # Roles $CapIncludedRoles = $Cap.Conditions.Users.IncludeRoles if ($Cap.Conditions.Users.IncludeRoles.Length -eq 1) { $Output += "1 specific role" } elseif ($CapIncludedRoles.Length -gt 1) { $Output += "$($CapIncludedRoles.Length) specific roles" } # Groups $CapIncludedGroups = $Cap.Conditions.Users.IncludeGroups if ($CapIncludedGroups.Length -eq 1) { $Output += "1 specific group" } elseif ($CapIncludedGroups.Length -gt 1) { $Output += "$($CapIncludedGroups.Length) specific groups" } # External/guests if ($null -ne $Cap.Conditions.Users.IncludeGuestsOrExternalUsers.ExternalTenants.MembershipKind) { $GuestOrExternalUserTypes = $Cap.Conditions.Users.IncludeGuestsOrExternalUsers.GuestOrExternalUserTypes -Split "," $Output += @($GuestOrExternalUserTypes | ForEach-Object {$this.ExternalUserStrings[$_]}) } } return $Output } [string[]] GetExcludedUsers([System.Object]$Cap) { <# .Description Parses a given conditional access policy (Cap) to generate the list of excluded users/roles used in the policy. .Functionality Internal #> # Perform some basic validation of the CAP. If some of these values # are missing it could indicate that the API has been restructured. $Missing = @() $Missing += $this.GetMissingKeys($Cap, @("Conditions")) $Missing += $this.GetMissingKeys($Cap.Conditions, @("Users")) $Missing += $this.GetMissingKeys($Cap.Conditions.Users, @("ExcludeGroups", "ExcludeGuestsOrExternalUsers", "ExcludeRoles", "ExcludeUsers")) if ($Missing.Length -gt 0) { Write-Warning "Conditional access policy structure not as expected. The following keys are missing: $($Missing -Join ', ')" return @() } # Begin processing the CAP $Output = @() # Users $CapExcludedUsers = $Cap.Conditions.Users.ExcludeUsers if ($CapExcludedUsers.Length -eq 1) { $Output += "1 specific user" } elseif ($CapExcludedUsers.Length -gt 1) { $Output += "$($CapExcludedUsers.Length) specific users" } # Roles $CapExcludedRoles = $Cap.Conditions.Users.ExcludeRoles if ($CapExcludedRoles.Length -eq 1) { $Output += "1 specific role" } elseif ($CapExcludedRoles.Length -gt 1) { $Output += "$($CapExcludedRoles.Length) specific roles" } # Groups $CapExcludedGroups = $Cap.Conditions.Users.ExcludeGroups if ($CapExcludedGroups.Length -eq 1) { $Output += "1 specific group" } elseif ($CapExcludedGroups.Length -gt 1) { $Output += "$($CapExcludedGroups.Length) specific groups" } # External/guests if ($null -ne $Cap.Conditions.Users.ExcludeGuestsOrExternalUsers.ExternalTenants.MembershipKind) { $GuestOrExternalUserTypes = $Cap.Conditions.Users.ExcludeGuestsOrExternalUsers.GuestOrExternalUserTypes -Split "," $Output += @($GuestOrExternalUserTypes | ForEach-Object {$this.ExternalUserStrings[$_]}) } # If no users are excluded, rather than display an empty cell, display "None" if ($Output.Length -eq 0) { $Output += "None" } return $Output } [string[]] GetApplications([System.Object]$Cap) { <# .Description Parses a given conditional access policy (Cap) to generate the list of included/excluded applications/actions used in the policy. .Functionality Internal #> # Perform some basic validation of the CAP. If some of these values # are missing it could indicate that the API has been restructured. $Missing = @() $Missing += $this.GetMissingKeys($Cap, @("Conditions")) $Missing += $this.GetMissingKeys($Cap.Conditions, @("Applications")) $Missing += $this.GetMissingKeys($Cap.Conditions.Applications, @("ApplicationFilter", "ExcludeApplications", "IncludeApplications", "IncludeAuthenticationContextClassReferences", "IncludeUserActions")) if ($Missing.Length -gt 0) { Write-Warning "Conditional access policy structure not as expected. The following keys are missing: $($Missing -Join ', ')" return @() } # Begin processing the CAP $Output = @() $CapIncludedActions = $Cap.Conditions.Applications.IncludeUserActions $CapAppFilterMode = $Cap.Conditions.Applications.ApplicationFilter.Mode $CapIncludedApps = $Cap.Conditions.Applications.IncludeApplications if ($CapIncludedApps.Length -gt 0 -or $null -ne $CapAppFilterMode) { # For "Select what this policy applies to", "Cloud Apps" was selected $Output += "Policy applies to: apps" # Included apps: if ($CapIncludedApps -Contains "All") { $Output += "Apps included: All" } elseif ($CapIncludedApps -Contains "None") { $Output += "Apps included: None" } elseif ($CapIncludedApps.Length -eq 1) { $Output += "Apps included: 1 specific app" } elseif ($CapIncludedApps.Length -gt 1) { $Output += "Apps included: $($CapIncludedApps.Length) specific apps" } if ($CapAppFilterMode -eq "include") { $Output += "Apps included: custom application filter" } $CapExcludedApps = $Cap.Conditions.Applications.ExcludeApplications if ($CapExcludedApps.Length -eq 1) { $Output += "Apps excluded: 1 specific app" } elseif ($CapExcludedApps.Length -gt 1) { $Output += "Apps excluded: $($CapExcludedApps.Length) specific apps" } if ($CapAppFilterMode -eq "exclude") { $Output += "Apps excluded: custom application filter" } if ($CapAppFilterMode -ne "exclude" -and $CapExcludedApps.Length -eq 0) { $Output += "Apps excluded: None" } } elseif ($CapIncludedActions.Length -gt 0) { # For "Select what this policy applies to", "User actions" was selected $Output += "Policy applies to: actions" $Output += "User action: $($this.ActionStrings[$CapIncludedActions[0]])" # While "IncludeUserActions" is a list, the GUI doesn't actually let you select more than one # item at a time, hence "IncludeUserActions[0]" above } else { # For "Select what this policy applies to", "Authentication context" was selected $AuthContexts = $Cap.Conditions.Applications.IncludeAuthenticationContextClassReferences if ($AuthContexts.Length -eq 1) { $Output += "Policy applies to: 1 authentication context" } else { $Output += "Policy applies to: $($AuthContexts.Length) authentication contexts" } } return $Output } [string[]] GetConditions([System.Object]$Cap) { <# .Description Parses a given conditional access policy (Cap) to generate the list of conditions used in the policy. .Functionality Internal #> # Perform some basic validation of the CAP. If some of these values # are missing it could indicate that the API has been restructured. $Missing = @() $Missing += $this.GetMissingKeys($Cap, @("Conditions")) $Missing += $this.GetMissingKeys($Cap.Conditions, @("UserRiskLevels", "SignInRiskLevels", "Platforms", "Locations", "ClientAppTypes", "Devices")) $Missing += $this.GetMissingKeys($Cap.Conditions.Platforms, @("ExcludePlatforms", "IncludePlatforms")) $Missing += $this.GetMissingKeys($Cap.Conditions.Locations, @("ExcludeLocations", "IncludeLocations")) $Missing += $this.GetMissingKeys($Cap.Conditions.Devices, @("DeviceFilter")) if ($Missing.Length -gt 0) { Write-Warning "Conditional access policy structure not as expected. The following keys are missing: $($Missing -Join ', ')" return @() } # Begin processing the CAP $Output = @() # User risk $CapUserRiskLevels = $Cap.Conditions.UserRiskLevels if ($CapUserRiskLevels.Length -gt 0) { $Output += "User risk levels: $($CapUserRiskLevels -Join ', ')" } # Sign-in risk $CapSignInRiskLevels = $Cap.Conditions.SignInRiskLevels if ($CapSignInRiskLevels.Length -gt 0) { $Output += "Sign-in risk levels: $($CapSignInRiskLevels -Join ', ')" } # Device platforms $CapIncludedPlatforms = $Cap.Conditions.Platforms.IncludePlatforms if ($null -ne $CapIncludedPlatforms) { $Output += "Device platforms included: $($CapIncludedPlatforms -Join ', ')" $CapExcludedPlatforms = $Cap.Conditions.Platforms.ExcludePlatforms if ($CapExcludedPlatforms.Length -eq 0) { $Output += "Device platforms excluded: none" } else { $Output += "Device platforms excluded: $($CapExcludedPlatforms -Join ', ')" } } # Locations $CapIncludedLocations = $Cap.Conditions.Locations.IncludeLocations if ($null -ne $CapIncludedLocations) { if ($CapIncludedLocations -Contains "All") { $Output += "Locations included: all locations" } elseif ($CapIncludedLocations -Contains "AllTrusted") { $Output += "Locations included: all trusted locations" } elseif ($CapIncludedLocations.Length -eq 1) { $Output += "Locations included: 1 specific location" } else { $Output += "Locations included: $($CapIncludedLocations.Length) specific locations" } $CapExcludedLocations = $Cap.Conditions.Locations.ExcludeLocations if ($CapExcludedLocations -Contains "AllTrusted") { $Output += "Locations excluded: all trusted locations" } elseif ($CapExcludedLocations.Length -eq 0) { $Output += "Locations excluded: none" } elseif ($CapExcludedLocations.Length -eq 1) { $Output += "Locations excluded: 1 specific location" } else { $Output += "Locations excluded: $($CapExcludedLocations.Length) specific locations" } } # Client Apps $ClientApps += @($Cap.Conditions.ClientAppTypes | ForEach-Object {$this.ClientAppStrings[$_]}) $Output += "Client apps included: $($ClientApps -Join ', ')" # Filter for devices if ($null -ne $Cap.Conditions.Devices.DeviceFilter.Mode) { if ($Cap.Conditions.Devices.DeviceFilter.Mode -eq "include") { $Output += "Custom device filter in include mode active" } else { $Output += "Custom device filter in exclude mode active" } } return $Output } [string] GetAccessControls([System.Object]$Cap) { <# .Description Parses a given conditional access policy (Cap) to generate the list of access controls used in the policy. .Functionality Internal #> # Perform some basic validation of the CAP. If some of these values # are missing it could indicate that the API has been restructured. $Missing = @() $Missing += $this.GetMissingKeys($Cap, @("GrantControls")) $Missing += $this.GetMissingKeys($Cap.GrantControls, @("AuthenticationStrength", "BuiltInControls", "CustomAuthenticationFactors", "Operator", "TermsOfUse")) $Missing += $this.GetMissingKeys($Cap.GrantControls.AuthenticationStrength, @("DisplayName")) if ($Missing.Length -gt 0) { Write-Warning "Conditional access policy structure not as expected. The following keys are missing: $($Missing -Join ', ')" return @() } # Begin processing the CAP $Output = "" if ($null -ne $Cap.GrantControls.BuiltInControls) { if ($Cap.GrantControls.BuiltInControls -Contains "block") { $Output = "Block access" } else { $GrantControls = @($Cap.GrantControls.BuiltInControls | ForEach-Object {$this.GrantControlStrings[$_]}) if ($null -ne $Cap.GrantControls.AuthenticationStrength.DisplayName) { $GrantControls += "authentication strength ($($Cap.GrantControls.AuthenticationStrength.DisplayName))" } if ($Cap.GrantControls.TermsOfUse.Length -gt 0) { $GrantControls += "terms of use" } $Output = "Allow access but require $($GrantControls -Join ', ')" if ($GrantControls.Length -gt 1) { # If multiple access controls are in place, insert the AND or the OR # before the final access control $Output = $Output.Insert($Output.LastIndexOf(',')+1, " $($Cap.GrantControls.Operator)") } } } if ($Output -eq "") { $Output = "None" } return $Output } [string[]] GetSessionControls([System.Object]$Cap) { <# .Description Parses a given conditional access policy (Cap) to generate the list of session controls used in the policy. .Functionality Internal #> # Perform some basic validation of the CAP. If some of these values # are missing it could indicate that the API has been restructured. $Missing = @() $Missing += $this.GetMissingKeys($Cap, @("SessionControls")) $Missing += $this.GetMissingKeys($Cap.SessionControls, @("ApplicationEnforcedRestrictions", "CloudAppSecurity", "ContinuousAccessEvaluation", "DisableResilienceDefaults", "PersistentBrowser", "SignInFrequency")) $Missing += $this.GetMissingKeys($Cap.SessionControls.ApplicationEnforcedRestrictions, @("IsEnabled")) $Missing += $this.GetMissingKeys($Cap.SessionControls.CloudAppSecurity, @("CloudAppSecurityType", "IsEnabled")) $Missing += $this.GetMissingKeys($Cap.SessionControls.ContinuousAccessEvaluation, @("Mode")) $Missing += $this.GetMissingKeys($Cap.SessionControls.PersistentBrowser, @("IsEnabled", "Mode")) $Missing += $this.GetMissingKeys($Cap.SessionControls.SignInFrequency, @("IsEnabled", "FrequencyInterval", "Type", "Value")) if ($Missing.Length -gt 0) { Write-Warning "Conditional access policy structure not as expected. The following keys are missing: $($Missing -Join ', ')" return @() } # Begin processing the CAP $Output = @() if ($Cap.SessionControls.ApplicationEnforcedRestrictions.IsEnabled) { $Output += "Use app enforced restrictions" } if ($Cap.SessionControls.CloudAppSecurity.IsEnabled) { $Mode = $this.CondAccessAppControlStrings[$Cap.SessionControls.CloudAppSecurity.CloudAppSecurityType] $Output += "Use Conditional Access App Control ($($Mode))" } if ($Cap.SessionControls.SignInFrequency.IsEnabled) { if ($Cap.SessionControls.SignInFrequency.FrequencyInterval -eq "everyTime") { $Output += "Sign-in frequency (every time)" } else { $Value = $Cap.SessionControls.SignInFrequency.Value $Unit = $Cap.SessionControls.SignInFrequency.Type $Output += "Sign-in frequency (every $($Value) $($Unit))" } } if ($Cap.SessionControls.PersistentBrowser.IsEnabled) { $Mode = $Cap.SessionControls.PersistentBrowser.Mode $Output += "Persistent browser session ($($Mode) persistent)" } if ($Cap.SessionControls.ContinuousAccessEvaluation.Mode -eq "disabled") { $Output += "Customize continuous access evaluation" } if ($Cap.SessionControls.DisableResilienceDefaults) { $Output += "Disable resilience defaults" } if ($Output.Length -eq 0) { $Output += "None" } return $Output } [string] ExportCapPolicies([System.Object]$Caps) { <# .Description Parses the conditional access policies (Caps) to generate a pre-processed version that can be used to generate the HTML of the condiational access policies in the report. .Functionality Internal #> if ($Caps.Length -eq 1 -and $Caps[0].PSobject.Properties.name -match "Value" -and $Caps[0].Value.Length -eq 0) { # For some reason, when there are no conditional access policies, # we don't get an empty list. Instead we get a list with one # object containing the following: # "@odata.context": "https://graph.microsoft.com/beta/$metadata#identity/conditionalAccess/policies" # "Value": [] return "[]" } $Table = @() foreach ($Cap in $Caps) { $State = $this.StateStrings[$Cap.State] $UsersIncluded = $($this.GetIncludedUsers($Cap)) -Join ", " $UsersExcluded = $($this.GetExcludedUsers($Cap)) -Join ", " $Users = @("Users included: $($UsersIncluded)", "Users excluded: $($UsersExcluded)") $Apps = $this.GetApplications($Cap) $Conditions = $this.GetConditions($Cap) $AccessControls = $this.GetAccessControls($Cap) $SessionControls = $this.GetSessionControls($Cap) $CapDetails = [pscustomobject]@{ "Name" = $Cap.DisplayName; "State" = $State; "Users" = $Users "Apps/Actions" = $Apps; "Conditions" = $Conditions; "Block/Grant Access" = $AccessControls; "Session Controls" = $SessionControls; } $Table += $CapDetails } # Sort the table by State before converting to JSON and sort the name alphabetically $StateOrder = @{ "On" = 1 "Report-Only" = 2 "Off" = 3 } $Table = $Table | Sort-Object { $StateOrder[$_.State] }, Name $CapTableJson = ConvertTo-Json $Table return $CapTableJson } } function Get-CapTracker { [CapHelper]::New() } # SIG # Begin signature block # MIIu9wYJKoZIhvcNAQcCoIIu6DCCLuQCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAOX1yVTgLgUBuV # L5hEOe5pOk60aGpRFI9pEikfHkLvt6CCE6MwggWQMIIDeKADAgECAhAFmxtXno4h # MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z # ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0 # IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z # G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ # anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s # Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL # 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb # BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3 # JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c # AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx # YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0 # viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL # T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud # EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf # Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk # aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS # PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK # 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB # cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp # 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg # dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri # RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7 # 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5 # nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3 # i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H # EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G # CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0 # IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla # MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE # AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz # ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C # 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce # 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da # E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T # SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA # FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh # D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM # 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z # 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05 # huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY # mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP # /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T # AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD # VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG # A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV # HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU # cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN # BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry # sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL # IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf # Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh # OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh # dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV # 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j # wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH # Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC # XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l # /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW # eE4wggdXMIIFP6ADAgECAhAP1uYgxSr4joyBpB/eZOIuMA0GCSqGSIb3DQEBCwUA # MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE # AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz # ODQgMjAyMSBDQTEwHhcNMjUwMjA4MDAwMDAwWhcNMjYwMTE1MjM1OTU5WjBfMQsw # CQYDVQQGEwJVUzEdMBsGA1UECBMURGlzdHJpY3Qgb2YgQ29sdW1iaWExEzARBgNV # BAcTCldhc2hpbmd0b24xDTALBgNVBAoTBENJU0ExDTALBgNVBAMTBENJU0EwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCXm3O0IOQzt0tbPPKAv4IrrzOf # QjE4Mb9j1zLL1GehaE35ddnoitE7l8OmVEeTLwPH+UpI7DfynUCjLb8HGcsuHO0H # aUuVFR3FNyvGByYATUTA+bQ9UgcwCoPyL48cDmdqFzheQ/KsC+FhI4uEpYiB/6Jp # Q0UL0SUVfC8O8+1ioUXAwdMt3G8bT3x6WaEmAbGqM5yC5fd7rKZEmpLzpA6bP2Xc # QMwi6Jn1m4AvL/jJrXvPyVUK9UlbjobKjiVg6a/UBgFrq8cU7Q1w/e5ijy6XA+aC # Z7SICqimtCW4wbrvodZL0yFeZIxN9qJ24hvrVGf7P/ANTzkoGHuHLwpMIOjBrpA+ # ig3jBTjY1xE2DYgHWcKHsSHEbOxStk+qHsn2J5i9GK+nwS7GmMqIRaEwy+dbfh6l # Q2jI4PO6kPk0ePnB3jTD/bEkdbRXpuq3aUAMS4ZSESer+CnzeBLEXvHrVVs4yHrf # RPmLOX+T43FEf6iAY7Ta3ahn0icLtCtauJ9/jmMigM/l1IfaAF6E/SoCHc6G6S9F # 1ECU/nBkpThU5u2kufiGWBC8rV2V8D50QERbohnv3yWR5BTG8dX+NYjd7HdctRAj # 9al3sQ/tdyVgOHUp+9KseYJthuNnh8WCoDeho/GX65QJDSJwh5uDcvNUfpeebANU # U1GwatZ4l+EWfOc05QIDAQABo4ICAzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8R # hvv+YXsIiGX0TkIwHQYDVR0OBBYEFJIsiVnihq62MAlpq96K9lNX9UCGMD4GA1Ud # IAQ3MDUwMwYGZ4EMAQQBMCkwJwYIKwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNl # cnQuY29tL0NQUzAOBgNVHQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMw # gbUGA1UdHwSBrTCBqjBToFGgT4ZNaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0Rp # Z2lDZXJ0VHJ1c3RlZEc0Q29kZVNpZ25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5j # cmwwU6BRoE+GTWh0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0 # ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEF # BQcBAQSBhzCBhDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29t # MFwGCCsGAQUFBzAChlBodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNl # cnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJ # BgNVHRMEAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQChGHY/dRc2BtvGT6mHR4bqoakC # N9hyjDA+bbxJE73T2HgI5wKVmhu2JmFZ/FHmoXE4ngnLnGS+zMEoeTEfzb/MmAxF # H+Ca/JGMDsbVf+rP+aVc1NkSpUd6u5rsR01Dimcs+pHGwpEUF1HCDFrFcl10Smcj # b8Z+tPbIETe3yvdRyoJL2Lm6k8wvC7xfgPoMzdbKWRzTCEnVQ+B53vHBSLT4D5wW # dq3yv6oj2fQ381wZQm16fLIedmiStUYfp0ZICqI3T6UiQ5w/DXYy05Z/1Njqu3PQ # l2Sy/JLDZc7hBu5YH5ia1G2IFC6S9gN34jm8qhkkoo8kihsxRBbBLiiNB0z/eH7y # jsNgyRR+Vje51Jcgte18zVQH6fRkl+HDp2nMgdgzShlKYXZzVFQvgmMu76x72P5f # bOgzmOxCZNZh0AQUo16DdbnGvloqHCbEND2JA/0QpeB0dlWKkWiotu/MaJE8/4uU # sxw5JSZPj8ya4WnrntJaY73TxXBHSd9CezT7lDShTgB1FkCSAov3aFwqyGH4hC+2 # MGp3Wzn03rkqVCzjmgNSIkCxQzJ+hEIvbk6GVK2yk+Q9eZQCkjRKY+EYwJNDsB9I # w75dWMsi2S9PFBEkKZYZFgxwVaBvnWgrfxlZMOooNADSdmq5fvTH/tjR3vIEd4QP # Dlzb9f7QLX+cvb0MjjGCGqowghqmAgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNV # BAoTDkRpZ2lDZXJ0LCBJbmMuMUEwPwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0 # IENvZGUgU2lnbmluZyBSU0E0MDk2IFNIQTM4NCAyMDIxIENBMQIQD9bmIMUq+I6M # gaQf3mTiLjANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh # AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM # BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCDiGvOFXUyPW+UisKnuWp2uAFOw # vSxvaQjUa77msTXq9zANBgkqhkiG9w0BAQEFAASCAgA6biG70ixZrJMrzWG+TiPH # IULAnOyXvbNeS8jjNvnbdrGErN1XEzwjuO3YbypmDOMGqUMLuLgi6Bf6AQ2M/nVD # 5GI2+WenGfnXAgVmrcqte87jm0gzf6jVNrGaPX3oOTU+DJXXn+SlkXZnY91MQuVy # 8jwb7rQTqdmjEubWJXVNtiofkSL8OB4TAld0KZU9uIT8DmRYDhLvWw/fWBagXB0B # 4OfDG62yVtUo66ZaB4LMXVVl/2JdEnNguZm/5tuHkhRmVWnyi6pOeRPkuqdjC/iZ # G4IFvMPl/5ZJQxLY1UB0Uy8racOrwuBSijJCSX2MUOClvIKVOsVY3LYJs+kNckDW # 1cREZcgN/VCj1s1aC3mHO7HX/W8fM3vrg+GPNPNWGWziaQxPtkuixbW5kbZIa154 # 7cwST6Igq4A3SGytM1t4eKjRWi/Vrlyy0xJU2EZr9pxI24nVGjx1rANe5CEjf3EW # Yy1/sG1F9JiVXtqLJv5Jb/AyW4BeK5S6esQzfRhAoB7rwkmQUvpaagKLqKEo0QS5 # t8R3n/yyTi/oOCvc/nM+s/BTgeYd7mdzkpxZGT3HLbFO0HOPdB4iOo3RjH0xxcpE # oRYptdHZA8iAE898U6mxr03vIrKipHGMQOzhw36zHS5OLeh2cifj3cYdSafQGNnq # PuQ8Y+9ScSz+CRrTrrFVjaGCF3cwghdzBgorBgEEAYI3AwMBMYIXYzCCF18GCSqG # SIb3DQEHAqCCF1AwghdMAgEDMQ8wDQYJYIZIAWUDBAIBBQAweAYLKoZIhvcNAQkQ # AQSgaQRnMGUCAQEGCWCGSAGG/WwHATAxMA0GCWCGSAFlAwQCAQUABCBeKPeEyaDZ # EvXQ7Xp2Xt6GUf171sO2UtdzVZNcoH4GKwIRAMzYezGgncMaQtajsZdMHP4YDzIw # MjUxMDEwMTkxOTE3WqCCEzowggbtMIIE1aADAgECAhAKgO8YS43xBYLRxHanlXRo # MA0GCSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2Vy # dCwgSW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBUaW1lU3RhbXBp # bmcgUlNBNDA5NiBTSEEyNTYgMjAyNSBDQTEwHhcNMjUwNjA0MDAwMDAwWhcNMzYw # OTAzMjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu # Yy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFNIQTI1NiBSU0E0MDk2IFRpbWVzdGFtcCBS # ZXNwb25kZXIgMjAyNSAxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 0EasLRLGntDqrmBWsytXum9R/4ZwCgHfyjfMGUIwYzKomd8U1nH7C8Dr0cVMF3Bs # fAFI54um8+dnxk36+jx0Tb+k+87H9WPxNyFPJIDZHhAqlUPt281mHrBbZHqRK71E # m3/hCGC5KyyneqiZ7syvFXJ9A72wzHpkBaMUNg7MOLxI6E9RaUueHTQKWXymOtRw # JXcrcTTPPT2V1D/+cFllESviH8YjoPFvZSjKs3SKO1QNUdFd2adw44wDcKgH+JRJ # E5Qg0NP3yiSyi5MxgU6cehGHr7zou1znOM8odbkqoK+lJ25LCHBSai25CFyD23DZ # gPfDrJJJK77epTwMP6eKA0kWa3osAe8fcpK40uhktzUd/Yk0xUvhDU6lvJukx7jp # hx40DQt82yepyekl4i0r8OEps/FNO4ahfvAk12hE5FVs9HVVWcO5J4dVmVzix4A7 # 7p3awLbr89A90/nWGjXMGn7FQhmSlIUDy9Z2hSgctaepZTd0ILIUbWuhKuAeNIeW # rzHKYueMJtItnj2Q+aTyLLKLM0MheP/9w6CtjuuVHJOVoIJ/DtpJRE7Ce7vMRHoR # on4CWIvuiNN1Lk9Y+xZ66lazs2kKFSTnnkrT3pXWETTJkhd76CIDBbTRofOsNyEh # zZtCGmnQigpFHti58CSmvEyJcAlDVcKacJ+A9/z7eacCAwEAAaOCAZUwggGRMAwG # A1UdEwEB/wQCMAAwHQYDVR0OBBYEFOQ7/PIx7f391/ORcWMZUEPPYYzoMB8GA1Ud # IwQYMBaAFO9vU0rp5AZ8esrikFb2L9RJ7MtOMA4GA1UdDwEB/wQEAwIHgDAWBgNV # HSUBAf8EDDAKBggrBgEFBQcDCDCBlQYIKwYBBQUHAQEEgYgwgYUwJAYIKwYBBQUH # MAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBdBggrBgEFBQcwAoZRaHR0cDov # L2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0VGltZVN0YW1w # aW5nUlNBNDA5NlNIQTI1NjIwMjVDQTEuY3J0MF8GA1UdHwRYMFYwVKBSoFCGTmh0 # dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFRpbWVTdGFt # cGluZ1JTQTQwOTZTSEEyNTYyMDI1Q0ExLmNybDAgBgNVHSAEGTAXMAgGBmeBDAEE # AjALBglghkgBhv1sBwEwDQYJKoZIhvcNAQELBQADggIBAGUqrfEcJwS5rmBB7NEI # RJ5jQHIh+OT2Ik/bNYulCrVvhREafBYF0RkP2AGr181o2YWPoSHz9iZEN/FPsLST # wVQWo2H62yGBvg7ouCODwrx6ULj6hYKqdT8wv2UV+Kbz/3ImZlJ7YXwBD9R0oU62 # PtgxOao872bOySCILdBghQ/ZLcdC8cbUUO75ZSpbh1oipOhcUT8lD8QAGB9lctZT # TOJM3pHfKBAEcxQFoHlt2s9sXoxFizTeHihsQyfFg5fxUFEp7W42fNBVN4ueLace # Rf9Cq9ec1v5iQMWTFQa0xNqItH3CPFTG7aEQJmmrJTV3Qhtfparz+BW60OiMEgV5 # GWoBy4RVPRwqxv7Mk0Sy4QHs7v9y69NBqycz0BZwhB9WOfOu/CIJnzkQTwtSSpGG # hLdjnQ4eBpjtP+XB3pQCtv4E5UCSDag6+iX8MmB10nfldPF9SVD7weCC3yXZi/uu # hqdwkgVxuiMFzGVFwYbQsiGnoa9F5AaAyBjFBtXVLcKtapnMG3VH3EmAp/jsJ3FV # F3+d1SVDTmjFjLbNFZUWMXuZyvgLfgyPehwJVxwC+UpX2MSey2ueIu9THFVkT+um # 1vshETaWyQo8gmBto/m3acaP9QsuLj3FNwFlTxq25+T4QwX9xa6ILs84ZPvmpovq # 90K8eWyG2N01c4IhSOxqt81nMIIGtDCCBJygAwIBAgIQDcesVwX/IZkuQEMiDDpJ # hjANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNl # cnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdp # Q2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjUwNTA3MDAwMDAwWhcNMzgwMTE0MjM1 # OTU5WjBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xQTA/ # BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgVGltZVN0YW1waW5nIFJTQTQwOTYg # U0hBMjU2IDIwMjUgQ0ExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # tHgx0wqYQXK+PEbAHKx126NGaHS0URedTa2NDZS1mZaDLFTtQ2oRjzUXMmxCqvkb # sDpz4aH+qbxeLho8I6jY3xL1IusLopuW2qftJYJaDNs1+JH7Z+QdSKWM06qchUP+ # AbdJgMQB3h2DZ0Mal5kYp77jYMVQXSZH++0trj6Ao+xh/AS7sQRuQL37QXbDhAkt # VJMQbzIBHYJBYgzWIjk8eDrYhXDEpKk7RdoX0M980EpLtlrNyHw0Xm+nt5pnYJU3 # Gmq6bNMI1I7Gb5IBZK4ivbVCiZv7PNBYqHEpNVWC2ZQ8BbfnFRQVESYOszFI2Wv8 # 2wnJRfN20VRS3hpLgIR4hjzL0hpoYGk81coWJ+KdPvMvaB0WkE/2qHxJ0ucS638Z # xqU14lDnki7CcoKCz6eum5A19WZQHkqUJfdkDjHkccpL6uoG8pbF0LJAQQZxst7V # vwDDjAmSFTUms+wV/FbWBqi7fTJnjq3hj0XbQcd8hjj/q8d6ylgxCZSKi17yVp2N # L+cnT6Toy+rN+nM8M7LnLqCrO2JP3oW//1sfuZDKiDEb1AQ8es9Xr/u6bDTnYCTK # IsDq1BtmXUqEG1NqzJKS4kOmxkYp2WyODi7vQTCBZtVFJfVZ3j7OgWmnhFr4yUoz # ZtqgPrHRVHhGNKlYzyjlroPxul+bgIspzOwbtmsgY1MCAwEAAaOCAV0wggFZMBIG # A1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFO9vU0rp5AZ8esrikFb2L9RJ7MtO # MB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIB # hjATBgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUH # MAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDov # L2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQw # QwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lD # ZXJ0VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZI # AYb9bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQAXzvsWgBz+Bz0RdnEwvb4LyLU0pn/N # 0IfFiBowf0/Dm1wGc/Do7oVMY2mhXZXjDNJQa8j00DNqhCT3t+s8G0iP5kvN2n7J # d2E4/iEIUBO41P5F448rSYJ59Ib61eoalhnd6ywFLerycvZTAz40y8S4F3/a+Z1j # EMK/DMm/axFSgoR8n6c3nuZB9BfBwAQYK9FHaoq2e26MHvVY9gCDA/JYsq7pGdog # P8HRtrYfctSLANEBfHU16r3J05qX3kId+ZOczgj5kjatVB+NdADVZKON/gnZruMv # NYY2o1f4MXRJDMdTSlOLh0HCn2cQLwQCqjFbqrXuvTPSegOOzr4EWj7PtspIHBld # NE2K9i697cvaiIo2p61Ed2p8xMJb82Yosn0z4y25xUbI7GIN/TpVfHIqQ6Ku/qjT # Y6hc3hsXMrS+U0yy+GWqAXam4ToWd2UQ1KYT70kZjE4YtL8Pbzg0c1ugMZyZZd/B # dHLiRu7hAWE6bTEm4XYRkA6Tl4KSFLFk43esaUeqGkH/wyW4N7OigizwJWeukcyI # PbAvjSabnf7+Pu0VrFgoiovRDiyx3zEdmcif/sYQsfch28bZeUz2rtY/9TCA6TD8 # dC3JE3rYkrhLULy7Dc90G6e8BlqmyIjlgp2+VqsS9/wQD7yFylIz0scmbKvFoW2j # NrbM1pD2T7m3XDCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZI # hvcNAQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ # MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNz # dXJlZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVow # YjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQ # d3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290 # IEc0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjww # IjBpM+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J5 # 8soR0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMH # hOZ0O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6 # Zu53yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQ # ecN4x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4b # A3VdeGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9 # WV1CdoeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCU # tNJhbesz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvo # ZKYz0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/J # vNNBERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCP # orF+CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMB # Af8wHQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXr # oq/0ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRt # MGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEF # BQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJl # ZElEUm9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdp # Y2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgw # BgYEVR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cH # vZqsoYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8 # UgPITtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTn # f+hZqPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxU # jG/voVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8j # LfR+cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3ww # ggN4AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMu # MUEwPwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IFRpbWVTdGFtcGluZyBSU0E0 # MDk2IFNIQTI1NiAyMDI1IENBMQIQCoDvGEuN8QWC0cR2p5V0aDANBglghkgBZQME # AgEFAKCB0TAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF # MQ8XDTI1MTAxMDE5MTkxN1owKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQU3WIwrIYK # LTBr2jixaHlSMAf7QX4wLwYJKoZIhvcNAQkEMSIEIK8Tqb12TusDI2CvflY+GYXH # X8IDskEE9tmvjmSQv1ioMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEIEqgP6Is11yE # xVyTj4KOZ2ucrsqzP+NtJpqjNPFGEQozMA0GCSqGSIb3DQEBAQUABIICALHO2vi3 # Wqd6gHHQMgCa9BDRYwGBMF19nB2y46ZXReC9p6hjg2upHTD117hWntcUOSgelCq7 # 3UQ36q3LtmLjE0XPNBONsBlU3AoBis8G7GpuOJtuK4qIRNulalBrYzjU6Hyq7uhz # fmapL8uIRq6Q4r8G2sYPSWKl7UOSLszlo+NhfDKJmDe8nNg/k1yz8EWJLWu1u2DL # q80rsAQCbwUOnshGNHT2L2BDCMQoN4W//guegZt8KIGLvNyAATm9otjWYthl012m # pkyQTnwiOHUtjd/jyJf0mYIt7GKfOIMQU2/iAL3A3A3CEA6WeU+HN9z3uHtMbvnR # mMvvxC7VNmDoQX9T5cm7FKh/m3/vlojJelFsm5TYZzWUvJRw+BmfClhRFGVcFNwM # Iz9s2S90JiNzcz9tKn71hk5TVa1MO20QzM84f8R3ckE82N43RgoLSZDFpJDDaIXC # 3R7ogV6XlnbpDjJTrJ8Fc6i43YcsZkIYlLjQMzBYrFlTqjyuarzEpToQ+EiggUYM # Iu0j7pkI77CHFUtsK7HE2U2dbmvigXAJO+zS/xxb1iyoRm+iaASzF20ynPWuGHXz # 6tEXYDgTS7iHbUCn3cxvjFdpZ3v3RHCPWrl5HbQjdP7xghuQ8H1V2enJ9ajVclKl # 6W3ruOhKcMbwinucrGDdOFyVyEx6OkDYxrSX # SIG # End signature block |