Set-TierAdminUser.ps1

<#
        .SYNOPSIS
            Creates a new administrator in the tiered environment. Adds them to their Harvard affiliatecode admin group.
         
        .FUNCTIONALITY
            Active Directory tiered administration
 
        .DESCRIPTION
            Specify a sam account a source user to create an administrator account for. The tools verifies the user
            can be added to the group and then adds the user into the administrator group
 
        .PARAMETER AdminAcct
            OPTIONAL: Can be used with the Reset parameter to specify the Tiered Admain account that you would like to reset
            the password for. Example -Reset -AdminAcct abc123-at2
         
        .PARAMETER Domain
            OPTIONAL: Default University, but can be changed for use in additional domains.
            Example -Domain HUITDEV
 
        .PARAMETER Reset
            Optional: Can be used when a Tiered Admin account password needs to be reset.
            Example -Reset -AdminAcct abc123-at1
                                               
        .PARAMETER Roles
            MANDATORY: Which portion of the tier and 3 letter code will the person administer
            Example -Roles Admin or -Roles Group,OU,HelpDesk
                                    
        .PARAMETER SourceAcct
            MANDATORY: Samaccountname or HUID of the administrator you want to modify
 
        .PARAMETER Ticket
            OPTIONAL: Ticket # from Service Now for the Tiered account request. This value will be written to the account
            Notes field (info attribute).
             
        .PARAMETER Tier
            MANDATORY: Tier # that the admin account will be created for
             
        .EXAMPLE
            Set-TierAdminUser -SourceAcct abc123 -tier 1 -Domain Contoso -Roles Admin
            Creates a new tiered administrator user in the Contoso Domain for abc123-t1 and adds them to the admin group of
            their 3 letter code
             
        .EXAMPLE
            Set-TierAdminUser -SourceAcct abc123 -tier 2 -Roles Computer,HelpDesk
            Creates a new tiered administrator user for abc123-t2 and adds them to the HelpDesk and Computer Admins groups of
            their 3 letter code
 
        .EXAMPLE
            Set-TierAdminUser -SourceAcct abc123 -tier 2 -Ticket INC01223344 -Roles HelpDesk
            Creates a new tiered administrator user for abc123-t2, writes the ticket number in the Notes field and adds them
            to the HelpDesk group of their 3 letter code
 
        .EXAMPLE
            Set-TierAdminUser -Reset -AdminAcct abc123-at2
            Creates a new tiered administrator user for abc123-t2, writes the ticket number in the Notes field and adds them
            to the HelpDesk group of their 3 letter code
    #>
    

#------------------------------------ [Commandline switches] ------------------------------------------------------
    [CmdletBinding(DefaultParameterSetName = 'SourceAcct')] 
    Param 
    (   [Parameter(Mandatory=$false)]
        [string]$Domain = "university",
        [Parameter(Mandatory=$false)]
        [string]$Ticket,
        [Parameter(Mandatory=$false,ParameterSetName = 'SourceAcct')] 
        [string]$SourceAcct,
        [Parameter(Mandatory=$true,ParameterSetName = 'SourceAcct')]
        [ValidateSet('2','1','0')] 
        [int]$Tier,
        [Parameter(ValueFromRemainingArguments=$true,Mandatory=$false,ParameterSetName = 'SourceAcct')]
        [String[]]$Roles,
        [Parameter(ValueFromRemainingArguments=$true,Mandatory=$false,ParameterSetName = 'SourceAcct')]
        [String[]]$Groups,
        [Parameter(Mandatory=$true,ParameterSetName = 'Reset')] 
        [switch]$Reset=$true,
        [Parameter(Mandatory=$true,ParameterSetName = 'Reset')] 
        [string]$AdminAcct
    )

#-----------------------------------------------------------[Functions]------------------------------------------------------------
function Write-Log
{
    [CmdletBinding()] 
    Param 
    ( 
        [Parameter(Mandatory=$true, 
        ValueFromPipelineByPropertyName=$true)] 
        [ValidateNotNullOrEmpty()] 
        [Alias("LogContent")] 
        [string]$Message, 

        [Parameter(Mandatory=$false)] 
        [Alias('LogPath')] 
        [string]$Path="C:\Logs\Script.log", 
    
        [Parameter(Mandatory=$false)] 
        [ValidateSet("Error","Warn","Info")] 
        [string]$Level="Info", 
    
        [Parameter(Mandatory=$false)] 
        [switch]$NoClobber 
    ) 
    Begin 
    { 
        # Set VerbosePreference to Continue so that verbose messages are displayed.
        #$VerbosePreference = 'SilentlyContinue'
        $VerbosePreference = 'Continue' 
    } 
    Process 
    { 
    #If the file already exists and NoClobber was specified, do not write to the log.
        if ((Test-Path $Path) -AND $NoClobber) { 
            Write-Error "Log file $Path already exists, and you specified NoClobber. Either delete the file or specify a different name." 
            Return 
        } 

            # If attempting to write to a log file in a folder/path that doesn't exist create the file including the path.
        elseif (!(Test-Path $Path)) 
        { 
            Write-Verbose "Creating $Path." 
            $NewLogFile = New-Item $Path -Force -ItemType File 
        } 

        else { 
            # Nothing to see here yet.
        } 

        # Format Date for our Log File
        $FormattedDate = Get-Date -Format "yyyy-MM-dd HH:mm:ss" 

        # Write message to error, warning, or verbose pipeline and specify $LevelText
        switch ($Level) { 
                'Error' { 
                    Write-Error $Message 
                    $LevelText = 'ERROR:' 
                    } 
                'Warn' { 
                    Write-Warning $Message 
                    $LevelText = 'WARNING:' 
                    } 
                'Info' { 
                    Write-Verbose $Message 
                    $LevelText = 'INFO:' 
                    } 
        } 
    
        # Write log entry to $Path
        "$FormattedDate $LevelText $Message" | Out-File -FilePath $Path -Append 
    } 
    End{} 
}

function New-SWRandomPassword
{
    <#
    .Synopsis
    Generates one or more complex passwords designed to fulfill the requirements for Active Directory
 
    .DESCRIPTION
    Generates one or more complex passwords designed to fulfill the requirements for Active Directory
 
    .EXAMPLE
    New-SWRandomPassword
    C&3SX6Kn
 
    Will generate one password with a length between 8 and 12 chars.
 
    .EXAMPLE
    New-SWRandomPassword -MinPasswordLength 8 -MaxPasswordLength 12 -Count 4
    7d&5cnaB
    !Bh776T"Fw
    9"C"RxKcY
    %mtM7#9LQ9h
 
    Will generate four passwords, each with a length of between 8 and 12 chars.
 
    .EXAMPLE
    New-SWRandomPassword -InputStrings abc, ABC, 123 -PasswordLength 4
    3ABa
 
    Generates a password with a length of 4 containing atleast one char from each InputString
 
    .EXAMPLE
    New-SWRandomPassword -InputStrings abc, ABC, 123 -PasswordLength 4 -FirstChar abcdefghijkmnpqrstuvwxyzABCEFGHJKLMNPQRSTUVWXYZ
    3ABa
 
    Generates a password with a length of 4 containing atleast one char from each InputString that will start with a letter from
    the string specified with the parameter FirstChar
 
    .OUTPUTS
    [String]
 
    .NOTES
    Written by Simon WÃ¥hlin, blog.simonw.se
    I take no responsibility for any issues caused by this script.
 
    .FUNCTIONALITY
    Generates random passwords
 
    .LINK
    http://blog.simonw.se/powershell-generating-random-password-for-active-directory/
 
    #>


    [CmdletBinding(DefaultParameterSetName='FixedLength',ConfirmImpact='None')]
    [OutputType([String])]
    Param
    (
        # Specifies minimum password length
        [Parameter(Mandatory=$false,
                ParameterSetName='RandomLength')]
        [ValidateScript({$_ -gt 0})]
        [Alias('Min')] 
        [int]$MinPasswordLength = 12,
        
        # Specifies maximum password length
        [Parameter(Mandatory=$false,
                ParameterSetName='RandomLength')]
        [ValidateScript({
                if($_ -ge $MinPasswordLength){$true}
                else{Throw 'Max value cannot be lesser than min value.'}})]
        [Alias('Max')]
        [int]$MaxPasswordLength = 20,

        # Specifies a fixed password length
        [Parameter(Mandatory=$false,
                ParameterSetName='FixedLength')]
        [ValidateRange(1,2147483647)]
        [int]$PasswordLength = 8,
        
        # Specifies an array of strings containing charactergroups from which the password will be generated.
        # At least one char from each group (string) will be used.
        [String[]]$InputStrings = @('abcdefghijkmnpqrstuvwxyz', 'ABCEFGHJKLMNPQRSTUVWXYZ', '23456789', '!#%&'),

        # Specifies a string containing a character group from which the first character in the password will be generated.
        # Useful for systems which requires first char in password to be alphabetic.
        [String] $FirstChar,
        
        # Specifies number of passwords to generate.
        [ValidateRange(1,2147483647)]
        [int]$Count = 1
    )
    Begin {
        Function Get-Seed{
            # Generate a seed for randomization
            $RandomBytes = New-Object -TypeName 'System.Byte[]' 4
            $Random = New-Object -TypeName 'System.Security.Cryptography.RNGCryptoServiceProvider'
            $Random.GetBytes($RandomBytes)
            [BitConverter]::ToUInt32($RandomBytes, 0)
        }
    }
    Process {
        For($iteration = 1;$iteration -le $Count; $iteration++){
            $Password = @{}
            # Create char arrays containing groups of possible chars
            [char[][]]$CharGroups = $InputStrings

            # Create char array containing all chars
            $AllChars = $CharGroups | ForEach-Object {[Char[]]$_}

            # Set password length
            if($PSCmdlet.ParameterSetName -eq 'RandomLength')
            {
                if($MinPasswordLength -eq $MaxPasswordLength) {
                    # If password length is set, use set length
                    $PasswordLength = $MinPasswordLength
                }
                else {
                    # Otherwise randomize password length
                    $PasswordLength = ((Get-Seed) % ($MaxPasswordLength + 1 - $MinPasswordLength)) + $MinPasswordLength
                }
            }

            # If FirstChar is defined, randomize first char in password from that string.
            if($PSBoundParameters.ContainsKey('FirstChar')){
                $Password.Add(0,$FirstChar[((Get-Seed) % $FirstChar.Length)])
            }
            # Randomize one char from each group
            Foreach($Group in $CharGroups) {
                if($Password.Count -lt $PasswordLength) {
                    $Index = Get-Seed
                    While ($Password.ContainsKey($Index)){
                        $Index = Get-Seed                        
                    }
                    $Password.Add($Index,$Group[((Get-Seed) % $Group.Count)])
                }
            }

            # Fill out with chars from $AllChars
            for($i=$Password.Count;$i -lt $PasswordLength;$i++) {
                $Index = Get-Seed
                While ($Password.ContainsKey($Index)){
                    $Index = Get-Seed                        
                }
                $Password.Add($Index,$AllChars[((Get-Seed) % $AllChars.Count)])
            }
            Write-Output -InputObject $(-join ($Password.GetEnumerator() | Sort-Object -Property Name | Select-Object -ExpandProperty Value))
        }
    }
}

function Write-AccountInfo {
    Param 
    ( 
    [Parameter(Mandatory=$true)] 
    [string]$Account="",
    [Parameter(Mandatory=$true)] 
    [string]$password="",
    [Parameter(Mandatory=$false)] 
    [string]$ticket=""
    )
    Write-Host $Account -ForegroundColor Cyan
    Write-Host "Current password: $password" -ForegroundColor Cyan
    $FileOutput = $previouspath + "\" + $Account + ".txt"
    $Account  |Out-File -FilePath $FileOutput
    "Current password: $password" |Out-File -FilePath $FileOutput -Append
    "SNOW Ticket: $ticket" |Out-File -FilePath $FileOutput -Append
}      
    
function NewAcct()
{   
    Begin{
        Write-Verbose -Message "Using variable $SourceAcct"

        $ADUserCheck = $null
        try{
            Write-Verbose -Message "Checking for SAMACCOUNTNAME"
            $ADUserCheck = Get-ADUser $SourceAcct -Properties *
            }
        Catch{ Write-Verbose -Message "Checking for HUID"
            Try{
                $ADUserCheck = Get-ADUser -f{harvardEduADHUID -eq $SourceAcct} -Properties *
                } 
            Catch{}
            if (!$ADUserCheck){
            Write-Warning "$SourceAcct not found in domain. Exiting script"
                }
            }
        
        if ($ADUserCheck){
            #BEGIN PARAMS
            #====================
            $d = (Get-ADDomain)
            $dn = $d.distinguishedname
            $pdc = $d.PDCEmulator
            #===================

            $tierOU = 'OU=T'+$tier +'-Accounts,OU=Tier '+$tier +',OU=Admin,'+ $dn
        
            #Begin Functions Used ##############################################
        
            $pwd = (New-SWRandomPassword -MinPasswordLength 18 -MaxPasswordLength 20)

            $harvardEduADAffiliateCode = ($ADUserCheck.harvardEduADRoleAffiliateCode0)
                if($harvardEduADAffiliateCode.length -ne 3){$harvardEduADAffiliateCode = $ADUserCheck.harvardEduADRoleAffiliateCode1}
                if($harvardEduADAffiliateCode.length -ne 3){$harvardEduADAffiliateCode = $ADUserCheck.harvardEduADRoleAffiliateCode2}
        
            $AdminGivenName = $ADUserCheck.givenname
            $AdminSurname = $ADUserCheck.surname
            $AdminSAM = $ADUserCheck.SamAccountName
            #Permission set to OU names
            #The function names in the formulas that grant acl permissions do not match our OU naming structure
            #[ValidateSet('Admin','Computer','Group','User','Printer','OU','GPO')]
            $RoleToGroupMapping = @{}
            $RoleToGroupMapping.Add('Admin','Administrators')
            $RoleToGroupMapping.Add('Computer','Computer_Administrators')
            $RoleToGroupMapping.Add('Group','Group_Administrators')
            $RoleToGroupMapping.Add('User','User_Administrators') 
            $RoleToGroupMapping.Add('Printer', 'Printer_Administrators')
            $RoleToGroupMapping.Add('OU','OU_Administrators') 
            $RoleToGroupMapping.Add('GPO', 'GPO_Administrators')
            $RoleToGroupMapping.Add('HelpDesk', 'HelpDesk')

            # Search for the SubOU above the Affiliate Code OU, if it exists
            $OUTier = "Tier " + $tier
            $harvardEduADAffiliateCodeOUPart = "OU=" + $harvardEduADAffiliateCode + ","
            If ($Roles) {
                $CheckRoleGrp = $Roles | Select-Object -first 1
                $GroupOU = (Get-ADOrganizationalUnit -SearchScope Subtree -Filter {Name -eq $harvardEduADAffiliateCode} | `
                Where-Object {$_.DistinguishedName -like "*$OUTier*" `
                 -and $_.DistinguishedName -Notlike "*Devices*" `
                 -and $_.DistinguishedName -Notlike "*Groups*" `
                 -and $_.DistinguishedName -Notlike "*ServiceAccounts*" `
                 -and $_.DistinguishedName -Notlike "*Test*"} ).DistinguishedName
                $TopLevelOU = $GroupOU.Replace($harvardEduADAffiliateCodeOUPart,"").split(",")[0].split("=")[1]
                $checkgrp = $TopLevelOU + "_" + $harvardEduADAffiliateCode+"_t"+ $tier +"_"+ $RoleToGroupMapping[$CheckRoleGrp]

                Try {
                    Get-ADGroup -Identity $checkgrp -ErrorAction Stop | Out-Null
                    $GroupExists = $true
                    $SubOU = $TopLevelOU
                }
                catch [Microsoft.ActiveDirectory.Management.ADIdentityResolutionException] {
                    # Group SubOU does not exist
                    Write-Host "User account is not in group SUB OU" -ForegroundColor Gray
                    $SubOU = $null
                }
            }
        }

    }

    Process{
        #========================
        # If tier 0 specified, no need to do the Sub ou Check, or the tier 1 and tier 2 things
        # Grant only to the admin OU and the appropriate group
        #========================
        if ($ADUserCheck){
            try{
                If ($Domain -eq "university") {
                    # Create Hashtable for OtherAttributes so we can remove any null values
                    $OtherAttributes = @{
                       # harvardEduADRoleType = "Admin"
                       # harvardEduADSourceSystemUID = $ADUserCheck.harvardeduadhuid
                        info = $Ticket
                        mail = $ADUserCheck.mail
                    }
                }

                Else {
                    # Create Hashtable for OtherAttributes so we can remove any null values
                    $OtherAttributes = @{
                        info = $Ticket
                        mail = $ADUserCheck.mail
                        }                    
                }

                # Clear out any null values from OtherAttributes
                ($OtherAttributes.GetEnumerator() | ? { -not $_.Value }) | % { $OtherAttributes.Remove($_.Name) }  
                # Call option to create account
                New-ADUser `
                -Description $("Tier "+ $tier +" Admin") `
                -DisplayName ($AdminGivenName +" " + $AdminSurname) `
                -name ($AdminSAM +"-at"+ $tier) `
                -SamAccountName ($AdminSAM +"-at" +$tier) `
                -Surname $AdminSurname `
                -GivenName $AdminGivenName `
                -Enabled $true `
                -Path $tierOU `
                -UserPrincipalName ($AdminSAM+"-at"+$tier+"@university.harvard.edu") `
                -AccountPassword (ConvertTo-SecureString ($pwd) -AsPlainText -force) `
                -AccountNotDelegated $false `
                -AllowReversiblePasswordEncryption $false `
                -CannotChangePassword $false `
                -PasswordNeverExpires $false `
                -PasswordNotRequired $false `
                -SmartcardLogonRequired $false `
                -TrustedForDelegation $false `
                -Server $pdc `
                -Department $ADUserCheck.Department `
                -OtherAttributes $OtherAttributes `
                -ErrorAction Stop | Out-Null
                Write-Host "User created successfully" -ForegroundColor Green
                Write-AccountInfo -Account "$AdminSAM-at$tier" -password $pwd -ticket $Ticket
            }

            catch{
                Write-Host "Must have an error"
                #Write-Warning "Error Action for $SourceAcct in tier $tier"
                #$error[0]
                if ($Error[0].Exception.message -eq "The specified account already exists"){
                    Write-Host "Skipping account creation, $AdminSAM-at$tier already exists." -ForegroundColor Yellow
                    Set-ADAccountPassword "$AdminSAM-at$tier" -NewPassword (ConvertTo-SecureString ($pwd) -AsPlainText -force)
                    Enable-ADAccount "$AdminSAM-at$tier"
                    Write-AccountInfo -Account "$AdminSAM-at$tier" -password $pwd -ticket $Ticket
                }
                if ($Error[0].Exception.message -like "*access is denied*"){
                    Write-Host "You do not have permissions to created this type of account $AdminSAM-at$tier." -ForegroundColor Red
                }
            }
            # Add to groups
            If ($tier -ne 0) {
                If ($Groups) {
                Foreach ($Group in $Groups) {
                    $GroupCheck = Get-ADGroup $Group
                    Add-ADGroupMember -Identity $GroupCheck.distinguishedname -Members ($AdminSAM +"-at" +$tier) -Server $pdc -ErrorAction Stop |Out-Null
                    Write-Host "User added to group $Group" -ForegroundColor Green
                    }
                }
                If ($Roles) {
                    Foreach ($AdminRole in $Roles) {
                        If (!$SubOU){    
                            $grp = $harvardEduADAffiliateCode+"_t"+ $tier +"_"+ $RoleToGroupMapping[$AdminRole]
                        }
                        Else {
                            $grp = $Subou + "_" + $harvardEduADAffiliateCode+"_t"+ $tier +"_"+ $RoleToGroupMapping[$AdminRole]
                        }
                        Try {
                            Add-ADGroupMember -Identity $grp -Members ($AdminSAM +"-at" +$tier)  -Server $pdc -ErrorAction Stop |Out-Null
                            Write-Host "User added to group $grp" -ForegroundColor Green
                        }
                        Catch {
                            if ($Error[0].Exception.message -like "*Insufficient access rights*"){
                                Write-Host "Access Denied: Unable to add user to group $grp." -ForegroundColor Red
                            }                        
                        }
                    }
                }
                Else {
                    #No Roles were added so we will add the account to a TierXAdmins group if no groups were also added above.
                    If (!$Groups) {
                        # No roles selected. Account will be added to the TierXAdmins group.
                        $grp = "Tier" + $tier +"Admins"
                        Try {
                            Add-ADGroupMember -Identity $grp -Members ($AdminSAM +"-at" +$tier)  -Server $pdc -ErrorAction Stop |Out-Null
                            Write-Host "No admin groups selected, so user has been added to group $grp" -ForegroundColor Green
                            }
                        Catch {
                            if ($Error[0].Exception.message -like "*Insufficient access rights*"){
                                Write-Host "Access Denied: Unable to add user to group $grp." -ForegroundColor Red    
                            }                
                        }
                    }
                }
            }
        }
                 
    }

    End{}
 }

function Reset()
{   
    Begin{
        Write-Verbose -Message "Using variable $AdminAcct"

        $ADUserCheck = $null
        try{
            Write-Verbose -Message "Checking for SAMACCOUNTNAME"
            $ADUserCheck = Get-ADUser $AdminAcct -ErrorAction Stop
            }
        Catch{ Write-Verbose -Message "Checking for Tiered Account"
            #Write-Warning "$AdminAcct not found in domain. Exiting script"
            }
        
        if ($ADUserCheck){
            #BEGIN PARAMS
            #====================
            $d = (Get-ADDomain)
            $dn = $d.distinguishedname
            $pdc = $d.PDCEmulator
            #===================
        
            #Begin Functions Used ##############################################
        
            $pwd = (New-SWRandomPassword -MinPasswordLength 18 -MaxPasswordLength 20)

            }

    }

    Process{
        #========================
        # Update the Tiered account password and unlock
        #========================
        if ($ADUserCheck){
            Write-Host "Updating Tiered Account, $AdminAcct password."
            Set-ADAccountPassword $AdminAcct -NewPassword (ConvertTo-SecureString ($pwd) -AsPlainText -force)
            Unlock-ADAccount $AdminAcct
            Write-Host "User updated successfully" -ForegroundColor Green
            Write-AccountInfo -Account $AdminAcct -password $pwd -ticket $Ticket
        }
                 
    }

    End{}
 }


 #-----------------------------------------------------------[Main Script Body]------------------------------------------------------------

 # Check if the Domain parameter was passed, otherwise the script will run against the current domain
 if ($Domain)
{
    # Check the current path to return the script to the same directory it started from
    If ((Get-Location).Path -like "*\\*") {
        # Current path is UNC
        $PreviousPath = ((Get-Location).Path).split(":")[2]
    }
    Else {
        $PreviousPath = (Get-Location).Path
    }
    Import-Module ActiveDirectory
    $DomainInfo = Get-ADDomain $Domain
    New-PSDrive -Name $DomainInfo.NetBIOSName -PSProvider ActiveDirectory -Root "//RootDSE/" -Scope Global -Server $DomainInfo.DNSRoot
    $Drive = $DomainInfo.NetBIOSName + ":"
    Set-Location $Drive
}

If ($SourceAcct) {NewAcct}
If ($Reset) {Reset}
 Set-Location C:
 Set-Location $PreviousPath
 Remove-PSDrive -Name $DomainInfo.NetBIOSName

# SIG # Begin signature block
# MIIPrwYJKoZIhvcNAQcCoIIPoDCCD5wCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB
# gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR
# AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUou/+K13e3dFeXhQat2BhS0zt
# beWgggy7MIIGITCCBQmgAwIBAgITYwAAAVOZckg75vLFNQAAAAABUzANBgkqhkiG
# 9w0BAQsFADCBpDELMAkGA1UEBhMCVVMxFjAUBgNVBAgTDU1hc3NhY2h1c2V0dHMx
# EjAQBgNVBAcTCUNhbWJyaWRnZTExMC8GA1UEChMoUHJlc2lkZW50IGFuZCBGZWxs
# b3dzIG9mIEhhcnZhcmQgQ29sbGVnZTEMMAoGA1UECxMDUEtJMSgwJgYDVQQDEx9I
# YXJ2YXJkIFVuaXZlcnNpdHkgSXNzdWluZyBDQSAwMB4XDTIyMDkwOTE2MDc1NVoX
# DTI1MDkwODE2MDc1NVowgbIxCzAJBgNVBAYTAlVTMRYwFAYDVQQIEw1NYXNzYWNo
# dXNldHRzMRIwEAYDVQQHEwlDYW1icmlkZ2UxMTAvBgNVBAoTKFByZXNpZGVudCBh
# bmQgRmVsbG93cyBvZiBIYXJ2YXJkIENvbGxlZ2UxDDAKBgNVBAsTA1BLSTE2MDQG
# A1UEAxMtSGFydmFyZCBDb2RlIFNpZ25pbmcgQXV0aG9yaXR5IC0gSm9obiBMb2Nr
# ZXR0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuUu4M5+FKMkzMFRz
# rPgxeo3HjIYxzRaHD9hlABxjD4a/qDMmefEk/lqTG1sL/5o4devvSyyJYlsBFckf
# y7J1mnt6xoLPAD7i7d/ozdEwm4JFrBlES0FL1uP6SUuJhC3m4zBtULGyelTv7h0d
# EXu5yuYSXKDHIACLQ1JtfodE6mCz8xc0ZbHhkyfBqGSe7EClijxjRwsApI2zPLx7
# bsJwURnc7nGdarG+KDH3xD3FyZAGIX3o7TjVgRPjk+70jk9mDDIXza4pPKF3CUD6
# hEvTnQ4ewrsB0IFsa8j8y57Hwwun9hIa+eAtrCtGCPS/EB4JAxVbH9wRppfIn/gD
# Jmt0xQIDAQABo4ICOjCCAjYwPgYJKwYBBAGCNxUHBDEwLwYnKwYBBAGCNxUIgbyH
# d4OYsyKHqZ0ih8rAOoHjsmyBAYeut3yB+M0LAgFkAgEQMBMGA1UdJQQMMAoGCCsG
# AQUFBwMDMA4GA1UdDwEB/wQEAwIHgDBWBgNVHSAETzBNMEsGCysGAQQBsUWDfQEE
# MDwwOgYIKwYBBQUHAgEWLmh0dHA6Ly9jcmwuaHVpdC5oYXJ2YXJkLmVkdS9wb2xp
# Y2llcy9oaWdoLmh0bWwwGwYJKwYBBAGCNxUKBA4wDDAKBggrBgEFBQcDAzAdBgNV
# HQ4EFgQU0OBFyn+6uXYRXQvQ4NhhN29MLvYwHwYDVR0jBBgwFoAUtrP8YtlLby2p
# qOM9wNbmhQhyVAgwXAYDVR0fBFUwUzBRoE+gTYZLaHR0cDovL2NybC5odWl0Lmhh
# cnZhcmQuZWR1L3BraS9IYXJ2YXJkJTIwVW5pdmVyc2l0eSUyMElzc3VpbmclMjBD
# QSUyMDAuY3JsMIG7BggrBgEFBQcBAQSBrjCBqzB6BggrBgEFBQcwAoZuaHR0cDov
# L2NybC5odWl0LmhhcnZhcmQuZWR1L3BraS9QMC1QS0ktSVNTQ0EwLnJlZC5odWl0
# LmhhcnZhcmQuZWR1X0hhcnZhcmQlMjBVbml2ZXJzaXR5JTIwSXNzdWluZyUyMENB
# JTIwMC5jcnQwLQYIKwYBBQUHMAGGIWh0dHA6Ly9vY3NwLmh1aXQuaGFydmFyZC5l
# ZHUvb2NzcDANBgkqhkiG9w0BAQsFAAOCAQEAQ88H4jF8MoupCyIXtjHte4Xj+5sK
# tvmNc5S+Lom21qohQFz3p8X/2kdC7rsRdXlDiwahvje5IN10CSUVtRR0cADKNOzr
# gYqRNb5xjq8bMyFFL5S40ghlmXPdS3gSeor+UQXWuSAhirrG4WXUXujfBrWo9fOZ
# rdZykznLpDfgmrs0+4xd4C3yyknYyH6hpKMuNt+dJPCM4ssBln2lRIVdYr4NwCg7
# OOVjXY24k9b8baTFijWn3IzUlSUVSq3nkLb1NiYAopNi9O7Fo0Apr6RoH56EaT9T
# KcXQHQzv+ZN+iZGnxXwn8eeXydiuWmgy35pIbA9f4Y1AJSNFYMMMKUJMZTCCBpIw
# ggR6oAMCAQICEycAAAACEE6egJ9S5DMAAAAAAAIwDQYJKoZIhvcNAQELBQAwgZ8x
# CzAJBgNVBAYTAlVTMRYwFAYDVQQIEw1NYXNzYWNodXNldHRzMRIwEAYDVQQHEwlD
# YW1icmlkZ2UxMTAvBgNVBAoTKFByZXNpZGVudCBhbmQgRmVsbG93cyBvZiBIYXJ2
# YXJkIENvbGxlZ2UxDDAKBgNVBAsTA1BLSTEjMCEGA1UEAxMaSGFydmFyZCBVbml2
# ZXJzaXR5IFJvb3QgQ0EwHhcNMTgxMTI3MjA1NTQwWhcNMjgxMTI3MjEwNTQwWjCB
# pDELMAkGA1UEBhMCVVMxFjAUBgNVBAgTDU1hc3NhY2h1c2V0dHMxEjAQBgNVBAcT
# CUNhbWJyaWRnZTExMC8GA1UEChMoUHJlc2lkZW50IGFuZCBGZWxsb3dzIG9mIEhh
# cnZhcmQgQ29sbGVnZTEMMAoGA1UECxMDUEtJMSgwJgYDVQQDEx9IYXJ2YXJkIFVu
# aXZlcnNpdHkgSXNzdWluZyBDQSAwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
# CgKCAQEAv5agkImBBfNDH20UkgckfukHNTUqPbJ5F9ctwIwFJD/0TJ43JO5bis+4
# ZHkeXzx9uGs+gMM2nfJBifexAzcuY6JlHofW1RpXkhbTcgNEjmLmqk5jesQGphkz
# a7HlPdQ8vd3HDhWEFgos2mwfxXIpV9Tgi+ySVf394xu9XaDhaBK/t8vOOH1fIp4D
# Tosy6j1W+rhNGRr/aPEqDEFocG9FhVl5YFj/WpbGZUFbiOxvYIFeNuaWLjxM/L5r
# bpQjj6ZSMppqzH7BAyYQxy9YYC3/mYOOS/v9I/D8uxnh8Pe6z62ej0sab/EU9oO0
# kuJCx9A1DtDXd9e5HlATXttkhWdEfwIDAQABo4IBvjCCAbowCwYDVR0PBAQDAgGG
# MBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBS2s/xi2UtvLamo4z3A1uaFCHJU
# CDBmBgNVHSAEXzBdMA0GCysGAQQBsUWDfQECMA0GCysGAQQBsUWDfQEDMA0GCysG
# AQQBsUWDfQEEMA4GDCsGAQQBsUWDfQEEATAOBgwrBgEEAbFFg30BBAMwDgYMKwYB
# BAGxRYN9AQQEMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMA8GA1UdEwEB/wQF
# MAMBAf8wHwYDVR0jBBgwFoAUYoKA1zSUqpUkOghATS0l6RYwrBIwVQYDVR0fBE4w
# TDBKoEigRoZEaHR0cDovL2NybC5odWl0LmhhcnZhcmQuZWR1L3BraS9IYXJ2YXJk
# JTIwVW5pdmVyc2l0eSUyMFJvb3QlMjBDQS5jcmwwbgYIKwYBBQUHAQEEYjBgMF4G
# CCsGAQUFBzAChlJodHRwOi8vY3JsLmh1aXQuaGFydmFyZC5lZHUvcGtpL1AwLVBL
# SS1Sb290Q0FfSGFydmFyZCUyMFVuaXZlcnNpdHklMjBSb290JTIwQ0EuY3J0MA0G
# CSqGSIb3DQEBCwUAA4ICAQCkJrhO58DnnYeEzuYL6WLC6QsQKPAtR9qR4r+BmnrZ
# 0OXDC9IjhhiIcYtnESsR8liR2Ta4VvwvONBxtH4NwCVQSK8Pnp6OunKjR+oCeopP
# AIpmXRiZNLzgmbMKXin+BnYYwsGy36TB926JghMx7N0BCaICgdDNsOx9GQiZvVJV
# fVl1yTeYnGS+t+4G1xbbIrmHqMnoTxyl2keEHHNjNmDYU6ABNMNeySXD58BCf5YQ
# eeQVuSuEurZBN96TOk3D2cPZN5J8yxGonFTuT8zLDs55hylPh6j0PsaehGhm3JVD
# 6JWYNXvYdx3lKe7ddB2N9RjPMt0Snu7xhLe31I9hmbvUJ7LuUvHKwLWy1/Q0tqDx
# fbLho/402giQOjkCBGYYQx/k3wHDooOdvuW56RKnzoN4E6OmTTjn29NivX5VQgYW
# IlXD6YbbE6OFOZ5mnZs+7GLF2w1DdmpCX1k8cSpkf+VqLiYtyKv9grCAh0S0jcAX
# jBpRTESeTo8Eu6ylvKGVAHzgeOAdBcZc7R9vTbOIyQ6dYTRVgQWOFt45zz81Z17n
# u3q/4GoSCCXn2ho+Vs2FAsGRCDdvA4cHWEhlGRGQIHVcO6qlvML8NEYkz8/pumSv
# 8auf3m+LhgoTI6sdn6jdqUSpqo6UYkhzq6GlMrRCAQRUYUw7kW94nqV6WoW1rWsE
# rTGCAl4wggJaAgEBMIG8MIGkMQswCQYDVQQGEwJVUzEWMBQGA1UECBMNTWFzc2Fj
# aHVzZXR0czESMBAGA1UEBxMJQ2FtYnJpZGdlMTEwLwYDVQQKEyhQcmVzaWRlbnQg
# YW5kIEZlbGxvd3Mgb2YgSGFydmFyZCBDb2xsZWdlMQwwCgYDVQQLEwNQS0kxKDAm
# BgNVBAMTH0hhcnZhcmQgVW5pdmVyc2l0eSBJc3N1aW5nIENBIDACE2MAAAFTmXJI
# O+byxTUAAAAAAVMwCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwxCjAIoAKAAKEC
# gAAwGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwG
# CisGAQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFCJAdlSrUho3GJ7J9/lnPEr4cAho
# MA0GCSqGSIb3DQEBAQUABIIBAAsi8b2RUGBnoJsvNq/1befsgmIKwH9W3ycN5tWr
# +t+KlMowOX3Gq2lX3AEYCSNjWAMQNGLaZo2VU1gP/blfEOGcuzT/tWU7mgE7X2vl
# YR+IYhBUkdJh/M/KZXdmDLWhH+ZB7HE+htUUg5XVgg+ZeHsVyRWto+xuqhvZmRIl
# 3Yg2W3b62Qz5iYtx+E4vYNqG+U35a2ac9DZAceB2d2cqrnGde75ukyQPuAJRyFXV
# QYagZwCrpLNKxIcH4M7gh+jRwh8qqn3FCqvUx3XYGSIXhsv8drbp35cFmH1b2n3k
# mMiGP+Pn5W8zzUclkxsUrm5BDBTtMaijUumqVScJ6TG3NOc=
# SIG # End signature block