Testing/Unit/PowerShell/Providers/AADProvider/Export-Caps.Tests.ps1
BeforeAll { $ClassPath = (Join-Path -Path $PSScriptRoot -ChildPath "./../../../../../Modules/Providers/ProviderHelpers/AADConditionalAccessHelper.psm1") Import-Module $ClassPath [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssignments', 'CapHelper')] $CapHelper = Get-CapTracker } Describe "GetIncludedUsers" { BeforeEach { [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssignments', 'Cap')] $Cap = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "./CapSnippets/Users.json") | ConvertFrom-Json } It "returns 'None' when no users are included" { $Cap.Conditions.Users.IncludeUsers += "None" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "None" } It "handles including single users" { $Cap.Conditions.Users.IncludeUsers += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "1 specific user" } It "handles including multiple users" { $Cap.Conditions.Users.IncludeUsers += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.IncludeUsers += "baaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "2 specific users" } It "handles including single groups" { $Cap.Conditions.Users.IncludeGroups += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "1 specific group" } It "handles including multiple groups" { $Cap.Conditions.Users.IncludeGroups += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.IncludeGroups += "baaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "2 specific groups" } It "handles including single roles" { $Cap.Conditions.Users.IncludeRoles += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "1 specific role" } It "handles including multiple roles" { $Cap.Conditions.Users.IncludeRoles += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.IncludeRoles += "baaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "2 specific roles" } It "handles including users, groups, and roles simultaneously" { $Cap.Conditions.Users.IncludeUsers += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.IncludeRoles += "baaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.IncludeRoles += "caaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.IncludeGroups += "daaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.IncludeGroups += "eaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.IncludeGroups += "faaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "1 specific user, 2 specific roles, 3 specific groups" } It "returns 'All' when all users are included" { $Cap.Conditions.Users.IncludeUsers += "all" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "All" } It "handles including single type of external user" { $Cap.Conditions.Users.IncludeGuestsOrExternalUsers.ExternalTenants.MembershipKind = "all" $Cap.Conditions.Users.IncludeGuestsOrExternalUsers.GuestOrExternalUserTypes = "internalGuest" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "Local guest users" } It "handles including all types of guest users" { $Cap.Conditions.Users.IncludeGuestsOrExternalUsers.ExternalTenants.MembershipKind = "all" $Cap.Conditions.Users.IncludeGuestsOrExternalUsers.GuestOrExternalUserTypes = "b2bCollaborationGuest,b2bCollaborationMember,b2bDirectConnectUser,internalGuest,serviceProvider,otherExternalUser" $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap)) -Join ", " $UsersIncluded | Should -Be "B2B collaboration guest users, B2B collaboration member users, B2B direct connect users, Local guest users, Service provider users, Other external users" } It "handles empty input" { $Cap = @{} $UsersIncluded = $($CapHelper.GetIncludedUsers($Cap) 3>$null) -Join ", " # 3>$null to surpress the warning # message as it is expected in this case $UsersIncluded | Should -Be "" } } Describe "GetExcludedUsers" { BeforeEach { [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssignments', 'Cap')] $Cap = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "./CapSnippets/Users.json") | ConvertFrom-Json } It "returns 'None' when no users are included" { $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap)) -Join ", " $UsersExcluded | Should -Be "None" } It "handles excluding single users" { $Cap.Conditions.Users.ExcludeUsers += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap)) -Join ", " $UsersExcluded | Should -Be "1 specific user" } It "handles excluding multiple users" { $Cap.Conditions.Users.ExcludeUsers += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.ExcludeUsers += "baaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap)) -Join ", " $UsersExcluded | Should -Be "2 specific users" } It "handles excluding single groups" { $Cap.Conditions.Users.ExcludeGroups += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap)) -Join ", " $UsersExcluded | Should -Be "1 specific group" } It "handles excluding multiple groups" { $Cap.Conditions.Users.ExcludeGroups += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.ExcludeGroups += "baaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap)) -Join ", " $UsersExcluded | Should -Be "2 specific groups" } It "handles excluding single roles" { $Cap.Conditions.Users.ExcludeRoles += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap)) -Join ", " $UsersExcluded | Should -Be "1 specific role" } It "handles excluding multiple roles" { $Cap.Conditions.Users.ExcludeRoles += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.ExcludeRoles += "baaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap)) -Join ", " $UsersExcluded | Should -Be "2 specific roles" } It "handles excluding users, groups, and roles simultaneously" { $Cap.Conditions.Users.ExcludeUsers += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.ExcludeRoles += "baaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.ExcludeRoles += "caaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.ExcludeGroups += "daaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.ExcludeGroups += "eaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Users.ExcludeGroups += "faaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap)) -Join ", " $UsersExcluded | Should -Be "1 specific user, 2 specific roles, 3 specific groups" } It "handles excluding all types of external users" { $Cap.Conditions.Users.ExcludeGuestsOrExternalUsers.ExternalTenants.MembershipKind = "all" $Cap.Conditions.Users.ExcludeGuestsOrExternalUsers.GuestOrExternalUserTypes = "b2bCollaborationGuest,b2bCollaborationMember,b2bDirectConnectUser,internalGuest,serviceProvider,otherExternalUser" $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap)) -Join ", " $UsersExcluded | Should -Be "B2B collaboration guest users, B2B collaboration member users, B2B direct connect users, Local guest users, Service provider users, Other external users" } It "handles excluding a single type of external user" { $Cap.Conditions.Users.ExcludeGuestsOrExternalUsers.ExternalTenants.MembershipKind = "all" $Cap.Conditions.Users.ExcludeGuestsOrExternalUsers.GuestOrExternalUserTypes = "serviceProvider" $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap)) -Join ", " $UsersExcluded | Should -Be "Service provider users" } It "handles empty input" { $Cap = @{} $UsersExcluded = $($CapHelper.GetExcludedUsers($Cap) 3>$null) -Join ", " # 3>$null to surpress the warning # message as it is expected in this case $UsersExcluded | Should -Be "" } } Describe "GetApplications" { BeforeEach { [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssignments', 'Cap')] $Cap = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "./CapSnippets/Apps.json") | ConvertFrom-Json } It "handles including all apps" { $Cap.Conditions.Applications.IncludeApplications += "All" $Apps = $($CapHelper.GetApplications($Cap)) $Apps[0] | Should -Be "Policy applies to: apps" $Apps[1] | Should -Be "Apps included: All" $Apps[2] | Should -Be "Apps excluded: None" } It "handles including/excluding no apps" { $Cap.Conditions.Applications.IncludeApplications += "None" $Apps = $($CapHelper.GetApplications($Cap)) $Apps[0] | Should -Be "Policy applies to: apps" $Apps[1] | Should -Be "Apps included: None" $Apps[2] | Should -Be "Apps excluded: None" } It "handles including/excluding single specific apps" { $Cap.Conditions.Applications.IncludeApplications += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Applications.ExcludeApplications += "baaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Apps = $($CapHelper.GetApplications($Cap)) $Apps[0] | Should -Be "Policy applies to: apps" $Apps[1] | Should -Be "Apps included: 1 specific app" $Apps[2] | Should -Be "Apps excluded: 1 specific app" } It "handles including/excluding multiple specific apps" { $Cap.Conditions.Applications.IncludeApplications += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Applications.IncludeApplications += "baaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Applications.IncludeApplications += "caaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Applications.ExcludeApplications += "daaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Cap.Conditions.Applications.ExcludeApplications += "eaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Apps = $($CapHelper.GetApplications($Cap)) $Apps[0] | Should -Be "Policy applies to: apps" $Apps[1] | Should -Be "Apps included: 3 specific apps" $Apps[2] | Should -Be "Apps excluded: 2 specific apps" } It "handles app filter in include mode" { $Cap.Conditions.Applications.ApplicationFilter.Mode = "include" $Apps = $($CapHelper.GetApplications($Cap)) $Apps[0] | Should -Be "Policy applies to: apps" $Apps[1] | Should -Be "Apps included: custom application filter" $Apps[2] | Should -Be "Apps excluded: None" } It "handles app filter in exclude mode" { $Cap.Conditions.Applications.ApplicationFilter.Mode = "exclude" $Cap.Conditions.Applications.IncludeApplications += "All" $Apps = $($CapHelper.GetApplications($Cap)) $Apps[0] | Should -Be "Policy applies to: apps" $Apps[1] | Should -Be "Apps included: All" $Apps[2] | Should -Be "Apps excluded: custom application filter" } It "handles including app filter and specific apps" { $Cap.Conditions.Applications.ApplicationFilter.Mode = "include" $Cap.Conditions.Applications.IncludeApplications += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Apps = $($CapHelper.GetApplications($Cap)) $Apps[0] | Should -Be "Policy applies to: apps" $Apps[1] | Should -Be "Apps included: 1 specific app" $Apps[2] | Should -Be "Apps included: custom application filter" $Apps[3] | Should -Be "Apps excluded: None" } It "handles excluding app filter and specific apps" { $Cap.Conditions.Applications.ApplicationFilter.Mode = "exclude" $Cap.Conditions.Applications.IncludeApplications += "All" $Cap.Conditions.Applications.ExcludeApplications += "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa" $Apps = $($CapHelper.GetApplications($Cap)) $Apps[0] | Should -Be "Policy applies to: apps" $Apps[1] | Should -Be "Apps included: All" $Apps[2] | Should -Be "Apps excluded: 1 specific app" $Apps[3] | Should -Be "Apps excluded: custom application filter" } It "handles registering a device" { $Cap.Conditions.Applications.IncludeUserActions += "urn:user:registerdevice" $Apps = $($CapHelper.GetApplications($Cap)) $Apps[0] | Should -Be "Policy applies to: actions" $Apps[1] | Should -Be "User action: Register or join devices" } It "handles registering security info" { $Cap.Conditions.Applications.IncludeUserActions += "urn:user:registersecurityinfo" $Apps = $($CapHelper.GetApplications($Cap)) $Apps[0] | Should -Be "Policy applies to: actions" $Apps[1] | Should -Be "User action: Register security info" } It "handles registering security info" { $Cap.Conditions.Applications.IncludeAuthenticationContextClassReferences += "c1" $Cap.Conditions.Applications.IncludeAuthenticationContextClassReferences += "c3" $Apps = $($CapHelper.GetApplications($Cap)) $Apps | Should -Be "Policy applies to: 2 authentication contexts" } It "handles empty input" { $Cap = @{} $Apps = $($CapHelper.GetApplications($Cap) 3>$null) -Join ", " # 3>$null to surpress the warning # message as it is expected in this case $Apps | Should -Be "" } } Describe "GetConditions" { BeforeEach { [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssignments', 'Cap')] $Cap = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "./CapSnippets/Conditions.json") | ConvertFrom-Json } It "handles user risk levels" { $Cap.Conditions.UserRiskLevels += "high" $Cap.Conditions.UserRiskLevels += "medium" $Cap.Conditions.UserRiskLevels += "low" $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[0] | Should -Be "User risk levels: high, medium, low" } It "handles sign-in risk levels" { $Cap.Conditions.SignInRiskLevels += "low" $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[0] | Should -Be "Sign-in risk levels: low" } It "handles including all device platforms" { $Cap.Conditions.Platforms.ExcludePlatforms = @() $Cap.Conditions.Platforms.IncludePlatforms = @("all") $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[0] | Should -Be "Device platforms included: all" $Conditions[1] | Should -Be "Device platforms excluded: none" } It "handles including/excluding specific device platforms" { $Cap.Conditions.Platforms.ExcludePlatforms = @("iOS", "macOS", "linux") $Cap.Conditions.Platforms.IncludePlatforms = @("android") $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[0] | Should -Be "Device platforms included: android" $Conditions[1] | Should -Be "Device platforms excluded: iOS, macOS, linux" } It "handles including all locations" { $Cap.Conditions.Locations.ExcludeLocations = @() $Cap.Conditions.Locations.IncludeLocations = @("All") $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[0] | Should -Be "Locations included: all locations" $Conditions[1] | Should -Be "Locations excluded: none" } It "handles excluding trusted locations" { $Cap.Conditions.Locations.ExcludeLocations = @("AllTrusted") $Cap.Conditions.Locations.IncludeLocations = @("All") $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[0] | Should -Be "Locations included: all locations" $Conditions[1] | Should -Be "Locations excluded: all trusted locations" } It "handles including/excluding single custom locations" { $Cap.Conditions.Locations.ExcludeLocations = @("00000000-0000-0000-0000-000000000000") $Cap.Conditions.Locations.IncludeLocations = @("10000000-0000-0000-0000-000000000000") $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[0] | Should -Be "Locations included: 1 specific location" $Conditions[1] | Should -Be "Locations excluded: 1 specific location" } It "handles including/excluding multiple custom locations" { $Cap.Conditions.Locations.ExcludeLocations = @() $Cap.Conditions.Locations.ExcludeLocations += @("00000000-0000-0000-0000-000000000000") $Cap.Conditions.Locations.ExcludeLocations += @("10000000-0000-0000-0000-000000000000") $Cap.Conditions.Locations.ExcludeLocations += @("20000000-0000-0000-0000-000000000000") $Cap.Conditions.Locations.IncludeLocations = @() $Cap.Conditions.Locations.IncludeLocations += @("30000000-0000-0000-0000-000000000000") $Cap.Conditions.Locations.IncludeLocations += @("40000000-0000-0000-0000-000000000000") $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[0] | Should -Be "Locations included: 2 specific locations" $Conditions[1] | Should -Be "Locations excluded: 3 specific locations" } It "handles including trusted locations" { $Cap.Conditions.Locations.IncludeLocations = @("AllTrusted") $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[0] | Should -Be "Locations included: all trusted locations" $Conditions[1] | Should -Be "Locations excluded: none" } It "handles including all client apps" { $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions | Should -Be "Client apps included: all" } It "handles including specific client apps" { $Cap.Conditions.ClientAppTypes = @("exchangeActiveSync", "browser", "mobileAppsAndDesktopClients", "other") $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions | Should -Be "Client apps included: Exchange ActiveSync Clients, Browser, Mobile apps and desktop clients, Other clients" } It "handles custom client app filter in include mode" { $Cap.Conditions.Devices.DeviceFilter.Mode = "include" $Cap.Conditions.Devices.DeviceFilter.Rule = "device.manufacturer -eq 'helloworld'" $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[1] | Should -Be "Custom device filter in include mode active" } It "handles custom client app filter in exclude mode" { $Cap.Conditions.Devices.DeviceFilter.Mode = "exclude" $Cap.Conditions.Devices.DeviceFilter.Rule = "device.manufacturer -eq 'helloworld'" $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[1] | Should -Be "Custom device filter in exclude mode active" } It "handles many conditions simultaneously" { $Cap.Conditions.UserRiskLevels += "low" $Cap.Conditions.SignInRiskLevels += "high" $Cap.Conditions.Platforms.ExcludePlatforms = @("android", "iOS", "macOS", "linux") $Cap.Conditions.Platforms.IncludePlatforms = @("all") $Cap.Conditions.Locations.IncludeLocations = @("AllTrusted") $Cap.Conditions.Locations.ExcludeLocations = @() $Cap.Conditions.ClientAppTypes = @("exchangeActiveSync") $Cap.Conditions.Devices.DeviceFilter.Mode = "exclude" $Cap.Conditions.Devices.DeviceFilter.Rule = "device.manufacturer -eq 'helloworld'" $Conditions = $($CapHelper.GetConditions($Cap)) $Conditions[0] | Should -Be "User risk levels: low" $Conditions[1] | Should -Be "Sign-in risk levels: high" $Conditions[2] | Should -Be "Device platforms included: all" $Conditions[3] | Should -Be "Device platforms excluded: android, iOS, macOS, linux" $Conditions[4] | Should -Be "Locations included: all trusted locations" $Conditions[5] | Should -Be "Locations excluded: none" $Conditions[6] | Should -Be "Client apps included: Exchange ActiveSync Clients" $Conditions[7] | Should -Be "Custom device filter in exclude mode active" } It "handles empty input" { $Cap = @{} $Conditions = $($CapHelper.GetConditions($Cap) 3>$null) -Join ", " # 3>$null to surpress the warning # message as it is expected in this case $Conditions | Should -Be "" } } Describe "GetAccessControls" { BeforeEach { [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssignments', 'Cap')] $Cap = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "./CapSnippets/AccessControls.json") | ConvertFrom-Json } It "handles blocking access" { $Cap.GrantControls.BuiltInControls = @("block") $Controls = $($CapHelper.GetAccessControls($Cap)) $Controls | Should -Be "Block access" } It "handles requiring single control" { $Cap.GrantControls.BuiltInControls = @("mfa") $Controls = $($CapHelper.GetAccessControls($Cap)) $Controls | Should -Be "Allow access but require multifactor authentication" } It "handles requiring terms of use" { $Cap.GrantControls.TermsOfUse = @("aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa") $Controls = $($CapHelper.GetAccessControls($Cap)) $Controls | Should -Be "Allow access but require terms of use" } It "handles requiring multiple controls in AND mode" { $Cap.GrantControls.BuiltInControls = @("mfa", "compliantDevice", "domainJoinedDevice", "approvedApplication", "compliantApplication", "passwordChange") $Cap.GrantControls.Operator = "AND" $Controls = $($CapHelper.GetAccessControls($Cap)) $Controls | Should -Be "Allow access but require multifactor authentication, device to be marked compliant, Hybrid Azure AD joined device, approved client app, app protection policy, AND password change" } It "handles requiring multiple controls in OR mode" { $Cap.GrantControls.BuiltInControls = @("mfa", "compliantDevice", "domainJoinedDevice", "approvedApplication", "compliantApplication", "passwordChange") $Cap.GrantControls.Operator = "OR" $Controls = $($CapHelper.GetAccessControls($Cap)) $Controls | Should -Be "Allow access but require multifactor authentication, device to be marked compliant, Hybrid Azure AD joined device, approved client app, app protection policy, OR password change" } It "handles using authentication strength (phishing resistant MFA)" { $Cap.GrantControls.AuthenticationStrength.DisplayName = "Phishing resistant MFA" $Controls = $($CapHelper.GetAccessControls($Cap)) $Controls | Should -Be "Allow access but require authentication strength (Phishing resistant MFA)" } It "handles using both authentication strength and a traditional control" { $Cap.GrantControls.AuthenticationStrength.DisplayName = "Multi-factor authentication" $Cap.GrantControls.BuiltInControls = @("passwordChange") $Cap.GrantControls.Operator = "AND" $Controls = $($CapHelper.GetAccessControls($Cap)) $Controls | Should -Be "Allow access but require password change, AND authentication strength (Multi-factor authentication)" } It "handles using no access controls" { $Cap.GrantControls.BuiltInControls = $null $Controls = $($CapHelper.GetAccessControls($Cap)) $Controls | Should -Be "None" } It "handles empty input" { $Cap = @{} $Controls = $($CapHelper.GetAccessControls($Cap) 3>$null) -Join ", " # 3>$null to surpress the warning # message as it is expected in this case $Controls | Should -Be "" } } Describe "GetSessionControls" { BeforeEach { [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSUseDeclaredVarsMoreThanAssignments', 'Cap')] $Cap = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "./CapSnippets/SessionControls.json") | ConvertFrom-Json } It "handles using no session controls" { $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls | Should -Be "None" } It "handles using app enforced restrictions" { $Cap.SessionControls.ApplicationEnforcedRestrictions.IsEnabled = $true $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls | Should -Be "Use app enforced restrictions" } It "handles using conditional access app control with custom policy" { $Cap.SessionControls.CloudAppSecurity.CloudAppSecurityType = "mcasConfigured" $Cap.SessionControls.CloudAppSecurity.IsEnabled = $true $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls | Should -Be "Use Conditional Access App Control (Use custom policy)" } It "handles using conditional access app control in monitor mode" { $Cap.SessionControls.CloudAppSecurity.CloudAppSecurityType = "monitorOnly" $Cap.SessionControls.CloudAppSecurity.IsEnabled = $true $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls | Should -Be "Use Conditional Access App Control (Monitor only)" } It "handles using conditional access app control in block mode" { $Cap.SessionControls.CloudAppSecurity.CloudAppSecurityType = "blockDownloads" $Cap.SessionControls.CloudAppSecurity.IsEnabled = $true $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls | Should -Be "Use Conditional Access App Control (Block downloads)" } It "handles using sign-in frequency every time" { $Cap.SessionControls.SignInFrequency.FrequencyInterval = "everyTime" $Cap.SessionControls.SignInFrequency.IsEnabled = $true $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls | Should -Be "Sign-in frequency (every time)" } It "handles using sign-in frequency time based" { $Cap.SessionControls.SignInFrequency.FrequencyInterval = "timeBased" $Cap.SessionControls.SignInFrequency.Type = "days" $Cap.SessionControls.SignInFrequency.Value = 10 $Cap.SessionControls.SignInFrequency.IsEnabled = $true $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls | Should -Be "Sign-in frequency (every 10 days)" } It "handles using persistent browser session" { $Cap.SessionControls.PersistentBrowser.IsEnabled = $true $Cap.SessionControls.PersistentBrowser.Mode = "never" $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls | Should -Be "Persistent browser session (never persistent)" } It "handles using customized continuous access evaluation" { $Cap.SessionControls.ContinuousAccessEvaluation.Mode = "disabled" $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls | Should -Be "Customize continuous access evaluation" } It "handles disabling resilience defaults" { $Cap.SessionControls.DisableResilienceDefaults = $true $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls | Should -Be "Disable resilience defaults" } It "handles multiple controls simultaneously" { $Cap.SessionControls.PersistentBrowser.IsEnabled = $true $Cap.SessionControls.PersistentBrowser.Mode = "never" $Cap.SessionControls.DisableResilienceDefaults = $true $Controls = $($CapHelper.GetSessionControls($Cap)) $Controls[0] | Should -Be "Persistent browser session (never persistent)" $Controls[1] | Should -Be "Disable resilience defaults" } It "handles empty input" { $Cap = @{} $Controls = $($CapHelper.GetSessionControls($Cap) 3>$null) -Join ", " # 3>$null to surpress the warning # message as it is expected in this case $Controls | Should -Be "" } } # SIG # Begin signature block # MIIuwAYJKoZIhvcNAQcCoIIusTCCLq0CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCACSFIzNeMYjV/a # Zh51GYald5L/cKTo0p2HopGGnoIFjaCCE6MwggWQMIIDeKADAgECAhAFmxtXno4h # MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK # EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV # BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z # ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0 # IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB # AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z # G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ # anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s # Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL # 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb # BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3 # JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c # AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx # YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0 # viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL # T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud # EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf # Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk # aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS # PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK # 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB # cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp # 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg # dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri # RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7 # 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5 # nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3 # i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H # EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G # CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ # bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0 # IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla # MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE # AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz # ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C # 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce # 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da # E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T # SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA # FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh # D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM # 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z # 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05 # huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY # mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP # /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T # AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD # VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG # A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY # aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj # ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV # HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU # cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN # BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry # sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL # IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf # Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh # OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh # dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV # 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j # wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH # Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC # XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l # /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW # eE4wggdXMIIFP6ADAgECAhANkQ8dPvvR0q3Ytt4H0T3aMA0GCSqGSIb3DQEBCwUA # MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE # AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz # ODQgMjAyMSBDQTEwHhcNMjQwMTMwMDAwMDAwWhcNMjUwMTI5MjM1OTU5WjBfMQsw # CQYDVQQGEwJVUzEdMBsGA1UECBMURGlzdHJpY3Qgb2YgQ29sdW1iaWExEzARBgNV # BAcTCldhc2hpbmd0b24xDTALBgNVBAoTBENJU0ExDTALBgNVBAMTBENJU0EwggIi # MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCT1y7uJCQax8JfiDEYgpiU9URj # EXCTRqtZbDALM9rPUudiuM3mj6A1SUSAAWYv6DTsvGPvxyMI2Idg0mQunl4Ms9DJ # yVwe5k4+Anj/73Nx1AbOPYP8xRZcD10FkctKGhV0PzvrDcwU15hsQWtiepFgg+bX # fHkGMeu426oc69f43vKE43DiqKTf0/UBX/qgpj3JZvJ3zc1kilBOv4sBCksfCjbW # tLZD0tqAgBsNPo3Oy5mQG31E1eZdTNvrdTnEXacSwb3k615z7mHy7nqBUkOruZ9E # tnvC2qla+uL3ks91O/e/LnKzH9Lj1JmEBf6jwPN/MYR9Dymni4Mi3AQ8mpQMyFmi # XcSHymibSNbtTMavpdBWjFfrcvPETX7krROUOoLzMQmNgHArceSh55tgvDRdSU5c # WK3BTvK3l3mgCdgjre7XGYxV3W8apyxk5+RKfHdbv9cpRwpSuDnI8sHeqmB3fnfo # Cr1PPu4WhKegt20CobhDVybiBdhDVqUdR53ful4N/coQOEHDrIExB5nJf9Pvdrza # DyIGKAMIXD79ba5/rQEo+2cA66oJkPlvB5hEGI/jtDcYwDBgalbwB7Kc8zAAhl6+ # JvHfYpXOkppSfEQbaRXZI+LGXWQAFa5pJDfDEAyZSXprStgw594sWUOysp+UOxFe # kSA4mBr0o1jVpdaulwIDAQABo4ICAzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8R # hvv+YXsIiGX0TkIwHQYDVR0OBBYEFAmyTB5bcWyA+8+rq540jPRLJ1nYMD4GA1Ud # IAQ3MDUwMwYGZ4EMAQQBMCkwJwYIKwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNl # cnQuY29tL0NQUzAOBgNVHQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMw # gbUGA1UdHwSBrTCBqjBToFGgT4ZNaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0Rp # Z2lDZXJ0VHJ1c3RlZEc0Q29kZVNpZ25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5j # cmwwU6BRoE+GTWh0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0 # ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEF # BQcBAQSBhzCBhDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29t # MFwGCCsGAQUFBzAChlBodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNl # cnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJ # BgNVHRMEAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQAh2Jnt9IPoBvOQlYQUlCP9iJ5y # XAvEWe1camOwedqMZsHEPpT2yd6+fMzPZmV3/bYJgaN2OrDS1snf62S7yc+AulVw # PAXSp1lSAiFEbZ6PFEdEBIag9B65Mp/cvRtJsIWQIc//jWqFMHpkU6r3MW9YARRu # vaIf5/0qlM4VEwn3lTf+jJdxhhyoOFTWWd3BrlMPcT06z6F6hFfyycQkZ3Y9wEJ3 # uOU9bCNLZL1HCjlKT+oI0WsgeRdbe2sYrnvv9NmDY9oEi8PEq+DGjiTgLbY5OcAX # uUogPPw6gbcuNn8Hq6FFKPIQxaksB8dF8Gw4m2lQoUWESPRF8Zaq9lmZN3+QzA79 # yskfJtAFqz3gUP5wJBdNfi/u1sGbLI0QnJQkIKfFuz7DfDPldw0gIl05BIYwZBmj # TpFRu1/+gIlP1Ul4L/wt9Lxk6pglObLsdxHP2UQrG30JaUN0gv3xZMBBByHGVVTe # cyU4qwJ0ulMdv/kjHwh+m58uOF8gHXLfyBmOjYpohN3+l0rS0qdArZMNSmLTA7N8 # n3V3AZLKB//1yhPt++gR4pCFdXmgwYDDLRxjlV0cMsG1UeSQUdI0aieh/grg5TQO # CergVXS5h3sz5U0ZQPWND41LJhA0gF2OGZNHdUc9+0dwTsfxAERrjaTdeZp0/rdZ # 9iGBoiRsS4U86S8xkDGCGnMwghpvAgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNV # BAoTDkRpZ2lDZXJ0LCBJbmMuMUEwPwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0 # IENvZGUgU2lnbmluZyBSU0E0MDk2IFNIQTM4NCAyMDIxIENBMQIQDZEPHT770dKt # 2LbeB9E92jANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh # AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM # BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCCG4nLZKgQ2m+ZN9qYyR1g0f4nV # 7J0PocipWKGPfMDDpTANBgkqhkiG9w0BAQEFAASCAgACEKpl5Q687CF91zZIJITI # oCxOI0uqM2V6Rwe8u6MSuHYapJlGau2VdB+zf87GACi7cweILWBj06Uca0z7Ts/Y # vr4jlF9Iv4x3g2T5agnrdpriBD/r4WRREKqAq0vldreAEggPeI2UzV9mry7l2xY5 # 0gVyAJ0sjm/aQJTyy282Pt/W0TDWbgb4p4XLoQ1VDIe7bljRbCfVINUqlBM6yIAx # BtfpX8ixjlnCdDEspKD63SvH/78t7ZnVk9u5Rh6s3Cqmu56icE4+/e4nXAyOrOg4 # z1bBy3kOK8jSMg/m6OaZqDsZGm3om2U7ldwORCqGUk0z0LE2Wae6G2dUw/BIjS9T # 6ojxgspEv4IUZpZy5LVInQ0kqVHfXzO1Boy/Jvw6m/nQSqfDhrtOhDHXS8ecbJJp # QBMXrbv9LYHM2IDGo9phzz53JdjW60Sp4R2mrHjBgEYNt98uTGKAxrj8CTCmksxO # wogHJNnNmKT1kcqxKRzkOBMaLe73zuCzq6OxgufviFVb73o9YoC+OdbLFQxZeepC # ZaSM200O/isIKdlPCLFqAAr0R8+sGzqsxbyY03mj+C2PPaVCfyfyFZDCAo8i/en4 # 7DwGIdE2hoGnJoUKbMe/yzoJbEQHcFx5ywZc7hA38dSvKiESVRdKb9TigdNvOiSf # riy92a8rW2Ar1ru79ZUNG6GCF0Awghc8BgorBgEEAYI3AwMBMYIXLDCCFygGCSqG # SIb3DQEHAqCCFxkwghcVAgEDMQ8wDQYJYIZIAWUDBAIBBQAweAYLKoZIhvcNAQkQ # AQSgaQRnMGUCAQEGCWCGSAGG/WwHATAxMA0GCWCGSAFlAwQCAQUABCCmb34hFTC6 # uAzLcBqAJVjhKnCYE10+gGCgqTuPcxsHzAIRAIbNsDD2D3iKmak/f82j+osYDzIw # MjQwNjEyMTMxNDQyWqCCEwkwggbCMIIEqqADAgECAhAFRK/zlJ0IOaa/2z9f5WEW # MA0GCSqGSIb3DQEBCwUAMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2Vy # dCwgSW5jLjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNI # QTI1NiBUaW1lU3RhbXBpbmcgQ0EwHhcNMjMwNzE0MDAwMDAwWhcNMzQxMDEzMjM1 # OTU5WjBIMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xIDAe # BgNVBAMTF0RpZ2lDZXJ0IFRpbWVzdGFtcCAyMDIzMIICIjANBgkqhkiG9w0BAQEF # AAOCAg8AMIICCgKCAgEAo1NFhx2DjlusPlSzI+DPn9fl0uddoQ4J3C9Io5d6Oyqc # Z9xiFVjBqZMRp82qsmrdECmKHmJjadNYnDVxvzqX65RQjxwg6seaOy+WZuNp52n+ # W8PWKyAcwZeUtKVQgfLPywemMGjKg0La/H8JJJSkghraarrYO8pd3hkYhftF6g1h # bJ3+cV7EBpo88MUueQ8bZlLjyNY+X9pD04T10Mf2SC1eRXWWdf7dEKEbg8G45lKV # tUfXeCk5a+B4WZfjRCtK1ZXO7wgX6oJkTf8j48qG7rSkIWRw69XloNpjsy7pBe6q # 9iT1HbybHLK3X9/w7nZ9MZllR1WdSiQvrCuXvp/k/XtzPjLuUjT71Lvr1KAsNJvj # 3m5kGQc3AZEPHLVRzapMZoOIaGK7vEEbeBlt5NkP4FhB+9ixLOFRr7StFQYU6mII # E9NpHnxkTZ0P387RXoyqq1AVybPKvNfEO2hEo6U7Qv1zfe7dCv95NBB+plwKWEwA # PoVpdceDZNZ1zY8SdlalJPrXxGshuugfNJgvOuprAbD3+yqG7HtSOKmYCaFxsmxx # rz64b5bV4RAT/mFHCoz+8LbH1cfebCTwv0KCyqBxPZySkwS0aXAnDU+3tTbRyV8I # pHCj7ArxES5k4MsiK8rxKBMhSVF+BmbTO77665E42FEHypS34lCh8zrTioPLQHsC # AwEAAaOCAYswggGHMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBYGA1Ud # JQEB/wQMMAoGCCsGAQUFBwMIMCAGA1UdIAQZMBcwCAYGZ4EMAQQCMAsGCWCGSAGG # /WwHATAfBgNVHSMEGDAWgBS6FtltTYUvcyl2mi91jGogj57IbzAdBgNVHQ4EFgQU # pbbvE+fvzdBkodVWqWUxo97V40kwWgYDVR0fBFMwUTBPoE2gS4ZJaHR0cDovL2Ny # bDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1NlRp # bWVTdGFtcGluZ0NBLmNybDCBkAYIKwYBBQUHAQEEgYMwgYAwJAYIKwYBBQUHMAGG # GGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBYBggrBgEFBQcwAoZMaHR0cDovL2Nh # Y2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0UlNBNDA5NlNIQTI1 # NlRpbWVTdGFtcGluZ0NBLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAgRrW3qCptZgX # vHCNT4o8aJzYJf/LLOTN6l0ikuyMIgKpuM+AqNnn48XtJoKKcS8Y3U623mzX4WCc # K+3tPUiOuGu6fF29wmE3aEl3o+uQqhLXJ4Xzjh6S2sJAOJ9dyKAuJXglnSoFeoQp # mLZXeY/bJlYrsPOnvTcM2Jh2T1a5UsK2nTipgedtQVyMadG5K8TGe8+c+njikxp2 # oml101DkRBK+IA2eqUTQ+OVJdwhaIcW0z5iVGlS6ubzBaRm6zxbygzc0brBBJt3e # WpdPM43UjXd9dUWhpVgmagNF3tlQtVCMr1a9TMXhRsUo063nQwBw3syYnhmJA+rU # kTfvTVLzyWAhxFZH7doRS4wyw4jmWOK22z75X7BC1o/jF5HRqsBV44a/rCcsQdCa # M0qoNtS5cpZ+l3k4SF/Kwtw9Mt911jZnWon49qfH5U81PAC9vpwqbHkB3NpE5jre # ODsHXjlY9HxzMVWggBHLFAx+rrz+pOt5Zapo1iLKO+uagjVXKBbLafIymrLS2Dq4 # sUaGa7oX/cR3bBVsrquvczroSUa31X/MtjjA2Owc9bahuEMs305MfR5ocMB3CtQC # 4Fxguyj/OOVSWtasFyIjTvTs0xf7UGv/B3cfcZdEQcm4RtNsMnxYL2dHZeUbc7aZ # +WssBkbvQR7w8F/g29mtkIBEr4AQQYowggauMIIElqADAgECAhAHNje3JFR82Ees # /ShmKl5bMA0GCSqGSIb3DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxE # aWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMT # GERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAz # MjIyMzU5NTlaMGMxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5j # LjE7MDkGA1UEAxMyRGlnaUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBU # aW1lU3RhbXBpbmcgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDG # hjUGSbPBPXJJUVXHJQPE8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6 # ffOciQt/nR+eDzMfUBMLJnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/ # qxkrPkLcZ47qUT3w1lbU5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3Hxq # V3rwN3mfXazL6IRktFLydkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVj # bOSmxR3NNg1c1eYbqMFkdECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcp # licu9Yemj052FVUmcJgmf6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZ # girHkr+g3uM+onP65x9abJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZG # s506o9UD4L/wojzKQtwYSH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHz # NklNiyDSLFc1eSuo80VgvCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2 # ElGTyYwMO1uKIqjBJgj5FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJ # ASgADoRU7s7pXcheMBK9Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYD # VR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8w # HwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGG # MBMGA1UdJQQMMAoGCCsGAQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcw # AYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8v # Y2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBD # BgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNl # cnRUcnVzdGVkUm9vdEc0LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgB # hv1sBwEwDQYJKoZIhvcNAQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4Q # TRPPMFPOvxj7x1Bd4ksp+3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfN # thKWb8RQTGIdDAiCqBa9qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1g # tqpPkWaeLJ7giqzl/Yy8ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1Ypx # dmXazPByoyP6wCeCRK6ZJxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/um # nXKvxMfBwWpx2cYTgAnEtp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+U # zTl63f8lY5knLD0/a6fxZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhz # q6YBT70/O3itTK37xJV77QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11 # LB4nLCbbbxV7HhmLNriT1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCY # oCvtlUG3OtUVmDG0YgkPCr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvk # dgIm2fBldkKmKYcJRyvmfxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3 # OBqhK/bt1nz8MIIFjTCCBHWgAwIBAgIQDpsYjvnQLefv21DiCEAYWjANBgkqhkiG # 9w0BAQwFADBlMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkw # FwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1 # cmVkIElEIFJvb3QgQ0EwHhcNMjIwODAxMDAwMDAwWhcNMzExMTA5MjM1OTU5WjBi # MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 # d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3Qg # RzQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAi # MGkz7MKnJS7JIT3yithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnny # yhHS5F/WBTxSD1Ifxp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE # 5nQ7bXHiLQwb7iDVySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm # 7nfISKhmV1efVFiODCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5 # w3jHtrHEtWoYOAMQjdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsD # dV14Ztk6MUSaM0C/CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1Z # XUJ2h4mXaXpI8OCiEhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS0 # 0mFt6zPZxd9LBADMfRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hk # pjPRiQfhvbfmQ6QYuKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m8 # 00ERElvlEFDrMcXKchYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+i # sX4KJpn15GkvmB0t9dmpsh3lGwIDAQABo4IBOjCCATYwDwYDVR0TAQH/BAUwAwEB # /zAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wHwYDVR0jBBgwFoAUReui # r/SSy4IxLVGLp6chnfNtyA8wDgYDVR0PAQH/BAQDAgGGMHkGCCsGAQUFBwEBBG0w # azAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEMGCCsGAQUF # BzAChjdodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRBc3N1cmVk # SURSb290Q0EuY3J0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2lj # ZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmwwEQYDVR0gBAowCDAG # BgRVHSAAMA0GCSqGSIb3DQEBDAUAA4IBAQBwoL9DXFXnOF+go3QbPbYW1/e/Vwe9 # mqyhhyzshV6pGrsi+IcaaVQi7aSId229GhT0E0p6Ly23OO/0/4C5+KH38nLeJLxS # A8hO0Cre+i1Wz/n096wwepqLsl7Uz9FDRJtDIeuWcqFItJnLnU+nBgMTdydE1Od/ # 6Fmo8L8vC6bp8jQ87PcDx4eo0kxAGTVGamlUsLihVo7spNU96LHc/RzY9HdaXFSM # b++hUD38dglohJ9vytsgjTVgHAIDyyCwrFigDkBjxZgiwbJZ9VVrzyerbHbObyMt # 9H5xaiNrIv8SuFQtJ37YOtnwtoeW/VvRXKwYw02fc7cBqZ9Xql4o4rmUMYIDdjCC # A3ICAQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4x # OzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGlt # ZVN0YW1waW5nIENBAhAFRK/zlJ0IOaa/2z9f5WEWMA0GCWCGSAFlAwQCAQUAoIHR # MBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAcBgkqhkiG9w0BCQUxDxcNMjQw # NjEyMTMxNDQyWjArBgsqhkiG9w0BCRACDDEcMBowGDAWBBRm8CsywsLJD4JdzqqK # ycZPGZzPQDAvBgkqhkiG9w0BCQQxIgQgxRrmQEcqjiJCScU8NScuhqQc8bcFmC+h # P/Y+/qqZY3UwNwYLKoZIhvcNAQkQAi8xKDAmMCQwIgQg0vbkbe10IszR1EBXaEE2 # b4KK2lWarjMWr00amtQMeCgwDQYJKoZIhvcNAQEBBQAEggIAJkPNHvrxmb2lLgWr # C7uLMqqzPCdiHRhr1A+SA+EeB0I0BotUTgLarb3E84Sb6dqB9NTACR3d5X+QgB3d # oCW2QyBIZ20qypZFsGjVH40mCu5NFjUWV4daecFwJtySoic45NpSYyBz2qjjfsy9 # o7HKLyrHiEJG9fuio+qSZeaD4kDRDQvamJ9odX2YoCaFwei5Tykj1ykZq4bAgSjs # l9o8vkG2d61a/PxAjHZ6G3wqiYQIeUs3zgW2XMLi6QdNLOcw6RJKNIPIeP2ShIn/ # vhYN/07luoIy1ChoOjDsc0syrHMSeoIrilClE0BjbygZ9JcdnMUwMpCtrB80Vf2V # F4MPrhF9T3JOelBCtDg+N7PwCWlwWUDwlAC1MNXnNaWi0R6hMS68XNp1sXEuicey # Kp8zlTJLIi66ImMezkVTgUSiyMUYL5/xmIvO8mBIvGOAn+CUDiL5tlj3OnD2wAA3 # OA1/ykmZnxDWL9J7VEYpKD5Plc2vdIoihaxu9+SdKAvk2YAqc7OPKBoSRePxLrqs # Fsefp/tSpK5M0eLcq4iA7cliClE/Ci0K8itVE6swcLw7O9j3ujWD9q73FLrOErT1 # 4A4UR9dDbiBprjacv1X7NkGaPtG/TlqPv+1aCtTWJdzQfF0SEEsO0LpQosb3iRS+ # cwMyWdc84OF3kq3kzL4Pm5Fx+b0= # SIG # End signature block |