PK 8^Eoa,mimetypeapplication/epub+zipPK8^EiTunesMetadata.plisth artistName Oracle Corporation book-info cover-image-hash 465017337 cover-image-path OEBPS/dcommon/oracle-logo.jpg package-file-hash 337093976 publisher-unique-id E27151-04 unique-id 817814104 genre Oracle Documentation itemName Oracle® Fusion Middleware User's Guide for Oracle Identity Manager, 11g Release 2 (11.1.2) releaseDate 2012-12-14T20:39:31Z year 2012 PK /mhPK8^EMETA-INF/container.xml PKYuPK8^EOEBPS/partpage_user.htm Getting Started With Oracle Identity Manager User Interface

Part II

Getting Started With Oracle Identity Manager User Interface

This part describes the various self service tasks that you can perform in Oracle Identity Manager.

It contains the following chapters:

PK  PK8^EOEBPS/catalog.htmBA Using the Access Request Catalog

8 Using the Access Request Catalog

Oracle Identity Manager supports requesting for entities such as roles, application instances, and entitlements. You can request for these entities by using an access request catalog. All entities that can be requested are published to the catalog, using which you can request for the entities. Publishing is a term used for making an entity available for requesting or provisioning by the users of a particular organization. Users of that organization with Viewer admin role, can request for the entity through the request catalog. In addition, users can request for entities that are published to the home organization.

This section discusses the following topics:


Note:

At some places in this guide, access request catalog has been referred to as catalog or request catalog.


8.1 Viewing and Modifying the Access Request Catalog for Catalog Items

You can view and modify catalog items in a request catalog as follows:

  1. Log in to Oracle Identity Self Service.

  2. In the left pane, under Requests, click Catalog. The Catalog page is displayed.

  3. Search for a catalog item that you want to view or modify as follows:

    In the Catalog field, enter a search keyword, and click the search icon on the right. The search results are displayed. The catalog items that match the search condition are listed in the Catalog Items section. Search results are filtered and displayed depending on the authorization policy granted to the user that is performing the search. See "Supported Search Operators" for more information about supported search operators.

  4. To view the catalog item, from the search results, select a catalog item. The details of the catalog item are displayed in the Detailed Information section.

  5. To modify the catalog item, in the Detailed Information section, modify the attributes of the catalog item and then click Apply to save the changes. Table 8-1 lists the fields in the Detailed Information section.


    Note:

    • You can modify attribute values if the fields are editable. If you do not have the required permission to modify the details, then these fields are displayed as read-only.

    • To see the edit changes, you must log out and relogin to the Catalog edit page.


    Table 8-1 Fields in the Detailed Information Section

    FieldsDescription

    Name

    Base entity name

    Display Name

    Base entity display name

    Description

    Description of the base entity

    Category

    Category of the catalog item

    By default, category can be either Role, Entitlement, or Application Instance. You can edit the value of this field to create a new user-defined category. This is illustrated by the following example:

    Suppose the category is Role. If you want to specify a new category (for example, My_Roles) for the current catalog item, then change the value of this field to My_Roles.

    Audit Objective

    A text field in which any relevant value or description that is use for Oracle Identity Analytics (OIA) certification

    Risk Level

    Level of risk for the entity

    The values that you can set for this field are Low Risk, Medium Risk, and High Risk.

    User Defined Tags

    Any value that describes the catalog item and used for searching the entity in future

    Approver User

    User who can approve the catalog item

    This is used at the time of processing the request for the catalog item or during attestation

    Approver Role

    Role that can approve the catalog item

    Certifier User

    User that can certify the catalog item

    Certifier Role

    Role that can certify the catalog item

    Fulfillment User

    User that can complete or fulfill the request for the catalog item

    Fulfillment Role

    Role that can complete or fulfill the request for the catalog item

    Certifiable

    Specifies whether a catalog item is certifiable


  6. If you want to revert the changes made, then click Revert.

8.1.1 Refining Search Results

After searching for catalog items, as described in "Viewing and Modifying the Access Request Catalog for Catalog Items", you can refine your search results to make it more precise. To do so, in the Refine Search section of the Catalog page, select one or more categories to display the catalog items of those categories. You can select or deselect the Select All checkbox to display or hide all items belonging to the categories.

Categories are a way of organizing entities in a request catalog. Each catalog item is associated with one and only one category. Categories of a catalog can be roles, entitlements, or application instances. For example, you can refine your search result to display catalog items belonging to the entitlements category only by selecting Entitlements in the Categories section.

8.1.2 Supported Search Operators

You use the Catalog field to specify a keyword to search or browse through the request catalog for catalog items. A search keyword is case insensitive. Here are the supported search operators:

  • One or more keywords: You can specify one or more keywords as a search condition.

    Sample value for one keyword: administrator

    This search condition finds all catalog items that contain the term "administrator."

    Sample value for more than one keyword: web administrator

    This search condition finds all catalog items that contain the terms web and administrator. This search automatically applies the AND operator to the search keywords. This is because a space character between keywords behaves as an AND operator. Alternatively, you can use an & operator to denote an AND relationship explicitly.

    For example, web administrator and web & administrator return catalog items that contain both web and administrator .

  • Phrase search: To search for catalog items that contain the exact phrase that you enter, you must specify the search condition within double quotes (").

    For example, searching for "web administrator" returns catalog items containing the phrase "web administrator"

  • OR [|] search: Use the OR [|] operator to search for catalog items containing any of the search keywords.

    Sample value 1: web | administrator

    This search condition returns catalog items containing the term web or administrator.

    Sample value 2: "vision purchasing" | administrator

    This search condition returns catalog items containing the phrase "vision purchasing" or the term administrator.

  • Wildcard search: You can use the asterisk (*) symbol as the wildcard to perform search operations. However, the catalog search does not support a search condition that begins with or contains only the asterisk (*) symbol.

    For example, admin* returns catalog items beginning with admin such as administrator and administration.


Note:

  • If the number of records are huge in the catalog table, and if you use the hash symbol (#) and add the asterisk (*) symbol to it, you get an error.

  • You must use only double quote while performing search.


8.2 Adding and Removing Catalog Items to and from the Cart

A request cart, also known as a cart, contains a set of catalog items that the user selects from the request catalog. Users can add catalog items to the request cart to submit a request for entities such as roles, entitlements, and application instances. The request cart does not persist across user sessions.

To add catalog items to the cart:

  1. Log in to Identity Self Service.

  2. Search for the catalog items that you want to add to the cart. See "Viewing and Modifying the Access Request Catalog for Catalog Items" for the procedure to search for catalog items.

  3. If required, narrow down your search result by selecting or deselecting one or more categories in the Refine Search section. You can select or deselect the Select All checkbox to display or hide all the items belonging to the categories.

  4. Select a catalog item that you want to request, and then click Add to Cart. The information of the selected catalog item is displayed in the Detailed Information section.

    You can also select multiple items by pressing Ctrl and clicking the items, and the clicking Add Selected to cart.

  5. Click Edit. The Request Cart dialog box is displayed with a list of catalog items in the cart, as shown in Figure 8-1:

    Figure 8-1 The Request Cart

    Description of Figure 8-1 follows

  6. Select a catalog item to display detailed information about the item. Review the details, and if required, you can remove the item from the cart by clicking Remove for the corresponding item.

    Alternatively, you can click Remove All to delete all items from the cart.

PKB GABAPK8^EOEBPS/dcommon/oracle.gifJGIF87aiyDT2F'G;Q_oKTC[ 3-Bq{ttsoGc4I)GvmLZ).1)!ꑈ53=Z]'yuLG*)g^!8C?-6(29K"Ĩ0Яl;U+K9^u2,@@ (\Ȱ Ë $P`lj 8x I$4H *(@͉0dа8tA  DсSP v"TUH PhP"Y1bxDǕ̧_=$I /& .)+ 60D)bB~=0#'& *D+l1MG CL1&+D`.1qVG ( "D2QL,p.;u. |r$p+5qBNl<TzB"\9e0u )@D,¹ 2@C~KU 'L6a9 /;<`P!D#Tal6XTYhn[p]݅ 7}B a&AƮe{EɲƮiEp#G}D#xTIzGFǂEc^q}) Y# (tۮNeGL*@/%UB:&k0{ &SdDnBQ^("@q #` @1B4i@ aNȅ@[\B >e007V[N(vpyFe Gb/&|aHZj@""~ӎ)t ? $ EQ.սJ$C,l]A `8A o B C?8cyA @Nz|`:`~7-G|yQ AqA6OzPbZ`>~#8=./edGA2nrBYR@ W h'j4p'!k 00 MT RNF6̙ m` (7%ꑀ;PKl-OJPK8^EOEBPS/dcommon/oracle-logo.jpgJ\JFIFC    $.' ",#(7),01444'9=82<.342C  2!!22222222222222222222222222222222222222222222222222'7" }!1AQa"q2#BR$3br %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz w!1AQaq"2B #3Rbr $4%&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz ?( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( ( (QEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQE!KEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEQEzE7V%ȣOΏ9??:a"\fSrğjAsKJ:nOzO=}E1-I)3(QEQEQEQEQEQEQE֝Hza<["2"pO#f8M[RL(,?g93QSZ uy"lx4h`O!LŏʨXZvq& c՚]+: ǵ@+J]tQ]~[[eϸ (]6A&>ܫ~+כzmZ^(<57KsHf妬Ϧmnẁ&F!:-`b\/(tF*Bֳ ~V{WxxfCnMvF=;5_,6%S>}cQQjsOO5=)Ot [W9 /{^tyNg#ЄGsֿ1-4ooTZ?K Gc+oyڙoNuh^iSo5{\ܹ3Yos}$.nQ-~n,-zr~-|K4R"8a{]^;I<ȤL5"EԤP7_j>OoK;*U.at*K[fym3ii^#wcC'IIkIp$󿉵|CtĈpW¹l{9>⪦׺*ͯj.LfGߍԁw] |WW18>w.ӯ! VӃ :#1~ +މ=;5c__b@W@ +^]ևՃ7 n&g2I8Lw7uҭ$"&"b eZ":8)D'%{}5{; w]iu;_dLʳ4R-,2H6>½HLKܹR ~foZKZ࿷1[oZ7׫Z7R¢?«'y?A}C_iG5s_~^ J5?œ tp]X/c'r%eܺA|4ծ-Ե+ْe1M38Ǯ `|Kյ OVڅu;"d56, X5kYR<̭CiطXԮ];Oy)OcWj֩}=܅s۸QZ*<~%뺃ȶp f~Bðzb\ݳzW*y{=[ C/Ak oXCkt_s}{'y?AmCjޓ{ WRV7r. g~Q"7&͹+c<=,dJ1V߁=T)TR՜*N4 ^Bڥ%B+=@fE5ka}ędܤFH^i1k\Sgdk> ֤aOM\_\T)8靠㡮3ģR: jj,pk/K!t,=ϯZ6(((((((49 xn_kLk&f9sK`zx{{y8H 8b4>ÇНE|7v(z/]k7IxM}8!ycZRQ pKVr(RPEr?^}'ðh{x+ՀLW154cK@Ng C)rr9+c:׹b Жf*s^ fKS7^} *{zq_@8# pF~ [VPe(nw0MW=3#kȵz晨cy PpG#W:%drMh]3HH<\]ԁ|_W HHҡb}P>k {ZErxMX@8C&qskLۙOnO^sCk7ql2XCw5VG.S~H8=(s1~cV5z %v|U2QF=NoW]ո?<`~׮}=ӬfԵ,=;"~Iy7K#g{ñJ?5$y` zz@-~m7mG宝Gٱ>G&K#]؃y1$$t>wqjstX.b̐{Wej)Dxfc:8)=$y|L`xV8ߙ~E)HkwW$J0uʟk>6Sgp~;4֌W+חc"=|ř9bc5> *rg {~cj1rnI#G|8v4wĿhFb><^ pJLm[Dl1;Vx5IZ:1*p)إ1ZbAK(1ׅ|S&5{^ KG^5r>;X׻K^? s fk^8O/"J)3K]N)iL?5!ƾq:G_=X- i,vi2N3 |03Qas ! 7}kZU781M,->e;@Qz T(GK(ah(((((((Y[×j2F}o־oYYq $+]%$ v^rϭ`nax,ZEuWSܽ,g%~"MrsrY~Ҿ"Fت;8{ѰxYEfP^;WPwqbB:c?zp<7;SBfZ)dϛ; 7s^>}⍱x?Bix^#hf,*P9S{w[]GF?1Z_nG~]kk)9Sc5Ո<<6J-ϛ}xUi>ux#ţc'{ᛲq?Oo?x&mѱ'#^t)ϲbb0 F«kIVmVsv@}kҡ!ˍUTtxO̧]ORb|2yԵk܊{sPIc_?ħ:Ig)=Z~' "\M2VSSMyLsl⺿U~"C7\hz_ Rs$~? TAi<lO*>U}+'f>7_K N s8g1^CeКÿE ;{+Y\ O5|Y{/o+ LVcO;7Zx-Ek&dpzbӱ+TaB0gNy׭ 3^c T\$⫫?F33?t._Q~Nln:U/Ceb1-im WʸQM+VpafR3d׫é|Aү-q*I P7:y&]hX^Fbtpܩ?|Wu󭏤ʫxJ3ߴm"(uqA}j.+?S wV ~ [B&<^U?rϜ_OH\'.;|.%pw/ZZG'1j(#0UT` Wzw}>_*9m>󑓀F?EL3"zpubzΕ$+0܉&3zڶ+jyr1QE ( ( ( ( ( ( ( (UIdC0EZm+]Y6^![ ԯsmܶ捆?+me+ZE29)B[;я*wGxsK7;5w)}gH~.Ɣx?X\ߚ}A@tQ(:ͧ|Iq(CT?v[sKG+*רqҍck <#Ljα5݈`8cXP6T5i.K!xX*p&ќZǓϘ7 *oƽ:wlຈ:Q5yIEA/2*2jAҐe}k%K$N9R2?7ýKMV!{W9\PA+c4w` Wx=Ze\X{}yXI Ү!aOÎ{]Qx)#D@9E:*NJ}b|Z>_k7:d$z >&Vv󃏽WlR:RqJfGإd9Tm(ҝEtO}1O[xxEYt8,3v bFF )ǙrPNE8=O#V*Cc𹾾&l&cmCh<.P{ʦ&ۣY+Gxs~k5$> ӥPquŽўZt~Tl>Q.g> %k#ú:Kn'&{[yWQGqF}AЅ׮/}<;VYZa$wQg!$;_ $NKS}“_{MY|w7G!"\JtRy+贾d|o/;5jz_6fHwk<ѰJ#]kAȎ J =YNu%dxRwwbEQEQEQEQEQEQEQEQEQE'fLQZ(1F)hQ@X1KEQE-Q@ 1KE3h=iPb(((1GjZ(-ʹRPbR@ 1KE7`bڒyS0(-&)P+ ڎԴP11F)h&:LRmQ@Q@Š(((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((_ğ<+F; sU%ԑ >,BH(uSU xþ1Wϲs${wgoQn_swB/'L\ܓFgԏZ ^dj^L^NmH Ҁ6(?nƓjh%ةlΣ /F6}pj2E3HgHЌ(UQR8oX,G8OB]>o9@$xWy'ڹOM=ҼWb"٠9-*r⬻zWokeh͝(F@n~X=q+⟇1b>ƑeIX.~C,o5የ-m;D Nʬ` `+CcE??Ki!R!cxw[ jvc}&Eٱ7T)8&þ/?os$wSn^bo:-4^js4JKm!#rv89>' O59t , \8r,Vk|IgxEv((RmĜ+bkz6,u/}-|.'<VÚ~tk,^cH61¢ !;M;Ėz[#CuAƶ+j_&*/;Q8d ǹHyAsM↷7l-6rò,%Fs;A*',}'f[]tݷs~UWhk?:4JE]WpcY=" ƚw/|_xSw(kycH#r28,X7D5Kh76 mɍ~0H;6194WpGӧգ%8Z&GdPƧo6kcO5Kv`{}fyq \`@?Kv=26OޝyAe Qɼ芍H8͟2敮j#;iѻm؏6+wTx;KYY\-%'Aӣ?|=\-ٴk+٬$ɷlr3S򮆻_eq#T58m]>$W'j41=3[hڵ`Kn 8PI k#ƻ~-5'=1b[0o*|8Q6F:k?{/-<1gun2k7p F]]`#9#/ 8Q\QCߨk:[jhIPq\<+FId wXȰI}$.ӐA9 /0xOo&2`Iâ={:u ặXTeu# 8 sXzgxzK%dǻsrOZ|-%煴i zmuApel&X`1@X,9-B->%A$[$ax9#'ڱSh#m/ݷ~8=RNo߇w^m 6,d1.OqؠHI,2_˟f~g;zk$ׅ-y˩“itqpAq0\x/6%{<8bMp'k,0HQ^'gWwZ ^*mT(v =zo..ͣ^Y^eq%M!$P!Nx(c_|7HAq0B帕XNz8H/?5]/d/'S$lw^Nn5 g}MnU2N[aT{k)bcbػUag9[?_ A<5ۛiC喍|xܜzg5P/?hc—=7Znc$̐ 0g\O 焮|]dKmIr)X$pX?*/9//വA.H,x$ƬP-QZ}˽GB8''$cq޻ (?C O.Y."# vHx+222OĿFcPGGO5Y&o=I 0 vLzepZZǍO $< @MF?kk}:o۾._Tz񇁼KO&?hėlQKiro;aAFLEyYu?g(a6<`˱YTo^qM↉76qlRܬq!F\q;,ީEx!>"rS?'G?~gݷsۭnxzl|SY麥ŭuHp#fS]ĀǎFHz%W㼰L $0? i$vC0y/{yeFPİ'CV~=f|> ʹH-p0w(6fմm17o\[ GHG~$j'м=i5xE7)m=FHqn(h+'."_2"'z 9[=8?-RHMR ̃T.)bڽ|5?.ZNf%r!<pHg5Ey.+ZkwY5MZ(#8ASA V ._Z C7i4P4 c<;dPĆ}wm5 1c[R](Hr<}Լ-x7݄V{CM<RE k(;ִ_xo^)zG2@MpAS)_/%sAi>m㶙\ZTa 8$q=2{_j^ - MiY. p'R49<sUW<iwkLn7tpbQ.\(?&/o}:Sv#QZW<9qk-bY,zQr:FC/Y}gYywx4r@c ~5bmxQx{A?i[6]wXzuWtzK-ƃ/;Πv[6p{q0_8^Ov[zF%r J=KjIeis~:TJgXO: >} E%} IRr:0aں XvV2j  M23.ywl< Wm;N[UsM4嶄t^SkIRL8< u?O2'URI @7HpϹ\+_o~ ;P;*AȻ6"#|B1k dbE$)boK1PI=&=!r rPؠE[y=OO) yI*0Boc~}NRD5$Y7##+ vQ%=C9W蠢Hr2 ?NC}ϾWh}IƼ*d dd^^/7'n5-Wu֑[y)".$9ۆs4nӮl=[#܍نrc^_ %'o;FkY'܀;h'+Ҽmo׺yef)P AZ^ Goh߷nw3񝏃tx亿&On8TN2FN28$y{6˽7Poc,G,S0REG&I5=JIH2%UV\p7c3źςtnfHYC`B (bǦrp76[w9]z׸W^X?_]9qo3C¶Wq 1t6;lŚ|I}RROXY8m@_mK+pC1=`cc}ȺMCD2ʹt3JA;XMyYx2O^ݬ. |b8 %TK? 58l5ʅ 5dA;[pyxfKWZis˻`@ǰbgP+׺ΡR}̆X7Yr6Fw+%>M4嶄t^SkIRL8< |k{wExó:O=sp)dp$To߇ww}ȩpp0BC2Ân2Xm s|H|avq/^IbFvW2q\^ROηJfӏ$fD<* %x6P]ަ 4g%GvC-KQ_.b22Gu 2&67̤oםU.原Xy?fA,֐MI]h(:;wgF|3ns89Xz>)ɠx\CyvlFU,rAf" +&OQ^tՈ;\}7-.H)R~G k^# 妨WL>Dn²F2ێg%;+կ<;CGm_iou)liP"Fq@Q@Q@Q@s}>_~9ۜgxoX5_K.;Con0r}$ֻ (((((7u6w_d'Hn<'88=q^wxwWG׵O<7"`0p SP{ }3N˵!7'ZEU1XA[V,z I^3 \ ( (1I$ӣ ]X_ ɂ 1_zw@:\"xH>4Zlĸ^%>P.\+((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((((PKRxO\J\PK8^EOEBPS/dcommon/cpyr.htmD Oracle Legal Notices

Oracle Legal Notices

Copyright Notice

Copyright © 1994-2014, Oracle and/or its affiliates. All rights reserved.

Trademark Notice

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.

License Restrictions Warranty/Consequential Damages Disclaimer

This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.

Warranty Disclaimer

The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.

Restricted Rights Notice

If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:

U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.

Hazardous Applications Notice

This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.

Third-Party Content, Products, and Services Disclaimer

This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.

Alpha and Beta Draft Documentation Notice

If this document is in preproduction status:

This documentation is in preproduction status and is intended for demonstration and preliminary use only. It may not be specific to the hardware on which you are using the software. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to this documentation and will not be responsible for any loss, costs, or damages incurred due to the use of this documentation.

Oracle Logo

PK0hPK8^EOEBPS/dcommon/blafdoc.cssc@charset "utf-8"; /* Copyright 2002, 2011, Oracle and/or its affiliates. All rights reserved. Author: Robert Crews Version: 2011.8.12 */ body { font-family: Tahoma, sans-serif; /* line-height: 125%; */ color: black; background-color: white; font-size: small; } * html body { /* http://www.info.com.ph/~etan/w3pantheon/style/modifiedsbmh.html */ font-size: x-small; /* for IE5.x/win */ f\ont-size: small; /* for other IE versions */ } h1 { font-size: 165%; font-weight: bold; border-bottom: 1px solid #ddd; width: 100%; text-align: left; } h2 { font-size: 152%; font-weight: bold; text-align: left; } h3 { font-size: 139%; font-weight: bold; text-align: left; } h4 { font-size: 126%; font-weight: bold; text-align: left; } h5 { font-size: 113%; font-weight: bold; display: inline; text-align: left; } h6 { font-size: 100%; font-weight: bold; font-style: italic; display: inline; text-align: left; } a:link { color: #039; background: inherit; } a:visited { color: #72007C; background: inherit; } a:hover { text-decoration: underline; } a img, img[usemap] { border-style: none; } code, pre, samp, tt { font-family: monospace; font-size: 110%; } caption { text-align: center; font-weight: bold; width: auto; } dt { font-weight: bold; } table { font-size: small; /* for ICEBrowser */ } td { vertical-align: top; } th { font-weight: bold; text-align: left; vertical-align: bottom; } li { text-align: left; } dd { text-align: left; } ol ol { list-style-type: lower-alpha; } ol ol ol { list-style-type: lower-roman; } td p:first-child, td pre:first-child { margin-top: 0px; margin-bottom: 0px; } table.table-border { border-collapse: collapse; border-top: 1px solid #ccc; border-left: 1px solid #ccc; } table.table-border th { padding: 0.5ex 0.25em; color: black; background-color: #f7f7ea; border-right: 1px solid #ccc; border-bottom: 1px solid #ccc; } table.table-border td { padding: 0.5ex 0.25em; border-right: 1px solid #ccc; border-bottom: 1px solid #ccc; } span.gui-object, span.gui-object-action { font-weight: bold; } span.gui-object-title { } p.horizontal-rule { width: 100%; border: solid #cc9; border-width: 0px 0px 1px 0px; margin-bottom: 4ex; } div.zz-skip-header { display: none; } td.zz-nav-header-cell { text-align: left; font-size: 95%; width: 99%; color: black; background: inherit; font-weight: normal; vertical-align: top; margin-top: 0ex; padding-top: 0ex; } a.zz-nav-header-link { font-size: 95%; } td.zz-nav-button-cell { white-space: nowrap; text-align: center; width: 1%; vertical-align: top; padding-left: 4px; padding-right: 4px; margin-top: 0ex; padding-top: 0ex; } a.zz-nav-button-link { font-size: 90%; } div.zz-nav-footer-menu { width: 100%; text-align: center; margin-top: 2ex; margin-bottom: 4ex; } p.zz-legal-notice, a.zz-legal-notice-link { font-size: 85%; /* display: none; */ /* Uncomment to hide legal notice */ } /*************************************/ /* Begin DARB Formats */ /*************************************/ .bold, .codeinlinebold, .syntaxinlinebold, .term, .glossterm, .seghead, .glossaryterm, .keyword, .msg, .msgexplankw, .msgactionkw, .notep1, .xreftitlebold { font-weight: bold; } .italic, .codeinlineitalic, .syntaxinlineitalic, .variable, .xreftitleitalic { font-style: italic; } .bolditalic, .codeinlineboldital, .syntaxinlineboldital, .titleinfigure, .titleinexample, .titleintable, .titleinequation, .xreftitleboldital { font-weight: bold; font-style: italic; } .itemizedlisttitle, .orderedlisttitle, .segmentedlisttitle, .variablelisttitle { font-weight: bold; } .bridgehead, .titleinrefsubsect3 { font-weight: bold; } .titleinrefsubsect { font-size: 126%; font-weight: bold; } .titleinrefsubsect2 { font-size: 113%; font-weight: bold; } .subhead1 { display: block; font-size: 139%; font-weight: bold; } .subhead2 { display: block; font-weight: bold; } .subhead3 { font-weight: bold; } .underline { text-decoration: underline; } .superscript { vertical-align: super; } .subscript { vertical-align: sub; } .listofeft { border: none; } .betadraft, .alphabetanotice, .revenuerecognitionnotice { color: #f00; background: inherit; } .betadraftsubtitle { text-align: center; font-weight: bold; color: #f00; background: inherit; } .comment { color: #080; background: inherit; font-weight: bold; } .copyrightlogo { text-align: center; font-size: 85%; } .tocsubheader { list-style-type: none; } table.icons td { padding-left: 6px; padding-right: 6px; } .l1ix dd, dd dl.l2ix, dd dl.l3ix { margin-top: 0ex; margin-bottom: 0ex; } div.infoboxnote, div.infoboxnotewarn, div.infoboxnotealso { margin-top: 4ex; margin-right: 10%; margin-left: 10%; margin-bottom: 4ex; padding: 0.25em; border-top: 1pt solid gray; border-bottom: 1pt solid gray; } p.notep1 { margin-top: 0px; margin-bottom: 0px; } .tahiti-highlight-example { background: #ff9; text-decoration: inherit; } .tahiti-highlight-search { background: #9cf; text-decoration: inherit; } .tahiti-sidebar-heading { font-size: 110%; margin-bottom: 0px; padding-bottom: 0px; } /*************************************/ /* End DARB Formats */ /*************************************/ @media all { /* * * { line-height: 120%; } */ dd { margin-bottom: 2ex; } dl:first-child { margin-top: 2ex; } } @media print { body { font-size: 11pt; padding: 0px !important; } a:link, a:visited { color: black; background: inherit; } code, pre, samp, tt { font-size: 10pt; } #nav, #search_this_book, #comment_form, #comment_announcement, #flipNav, .noprint { display: none !important; } body#left-nav-present { overflow: visible !important; } } PKr.hcPK8^EOEBPS/dcommon/doccd_epub.jsM /* Copyright 2006, 2012, Oracle and/or its affiliates. All rights reserved. Author: Robert Crews Version: 2012.3.17 */ function addLoadEvent(func) { var oldOnload = window.onload; if (typeof(window.onload) != "function") window.onload = func; else window.onload = function() { oldOnload(); func(); } } function compactLists() { var lists = []; var ul = document.getElementsByTagName("ul"); for (var i = 0; i < ul.length; i++) lists.push(ul[i]); var ol = document.getElementsByTagName("ol"); for (var i = 0; i < ol.length; i++) lists.push(ol[i]); for (var i = 0; i < lists.length; i++) { var collapsible = true, c = []; var li = lists[i].getElementsByTagName("li"); for (var j = 0; j < li.length; j++) { var p = li[j].getElementsByTagName("p"); if (p.length > 1) collapsible = false; for (var k = 0; k < p.length; k++) { if ( getTextContent(p[k]).split(" ").length > 12 ) collapsible = false; c.push(p[k]); } } if (collapsible) { for (var j = 0; j < c.length; j++) { c[j].style.margin = "0"; } } } function getTextContent(e) { if (e.textContent) return e.textContent; if (e.innerText) return e.innerText; } } addLoadEvent(compactLists); function processIndex() { try { if (!/\/index.htm(?:|#.*)$/.test(window.location.href)) return false; } catch(e) {} var shortcut = []; lastPrefix = ""; var dd = document.getElementsByTagName("dd"); for (var i = 0; i < dd.length; i++) { if (dd[i].className != 'l1ix') continue; var prefix = getTextContent(dd[i]).substring(0, 2).toUpperCase(); if (!prefix.match(/^([A-Z0-9]{2})/)) continue; if (prefix == lastPrefix) continue; dd[i].id = prefix; var s = document.createElement("a"); s.href = "#" + prefix; s.appendChild(document.createTextNode(prefix)); shortcut.push(s); lastPrefix = prefix; } var h2 = document.getElementsByTagName("h2"); for (var i = 0; i < h2.length; i++) { var nav = document.createElement("div"); nav.style.position = "relative"; nav.style.top = "-1.5ex"; nav.style.left = "1.5em"; nav.style.width = "90%"; while (shortcut[0] && shortcut[0].toString().charAt(shortcut[0].toString().length - 2) == getTextContent(h2[i])) { nav.appendChild(shortcut.shift()); nav.appendChild(document.createTextNode("\u00A0 ")); } h2[i].parentNode.insertBefore(nav, h2[i].nextSibling); } function getTextContent(e) { if (e.textContent) return e.textContent; if (e.innerText) return e.innerText; } } addLoadEvent(processIndex); PKo"nR M PK8^E OEBPS/toc.ncxq Oracle® Fusion Middleware User's Guide for Oracle Identity Manager, 11g Release 2 (11.1.2) Cover Title and Copyright Information Contents List of Figures List of Tables Preface Part I Concepts 1 Feature Overview 2 Oracle Identity Self Service Interface Part II Getting Started With Oracle Identity Manager User Interface 3 Registering to Self Service 4 Accessing Oracle Identity Self Service 5 Personalizing Self Service 6 Managing Profile Information 7 Managing Access 8 Using the Access Request Catalog 9 Managing Requests 10 Managing Tasks Part III Identity Administration 11 Managing Users 12 Managing Roles 13 Managing Organizations 14 Using the Attestation Dashboard Glossary Index Copyright PKvqPK8^EOEBPS/content.opf!$ Oracle® Fusion Middleware User's Guide for Oracle Identity Manager, 11g Release 2 (11.1.2) en-US E27151-04 Oracle Corporation Oracle Corporation Oracle® Fusion Middleware User's Guide for Oracle Identity Manager, 11g Release 2 (11.1.2) 2012-12-14T20:39:31Z Describes how to log in to Oracle Identity Manager and perform self service operations, request for roles and resources, manage various approval, provisioning, and attestation tasks, and perform identity administration tasks. PK !!PK8^EOEBPS/idntmngr.htmQ= Feature Overview

1 Feature Overview

Oracle Identity Manager is a user provisioning and administration solution, which automates the process of adding, updating, and deleting user accounts from applications and directories. It also improves regulatory compliance by providing granular reports that attest to who has access to what. Oracle Identity Manager is available as a stand-alone product or as part of Oracle Identity and Access Management Suite.

Automating user identity provisioning can reduce Information Technology (IT) administration costs and improve security. Provisioning also plays an important role in regulatory compliance. Key features of Oracle Identity Manager include password management, workflow and policy management, identity reconciliation, reporting and auditing, and extensibility.

1.1 Features of Oracle Identity Manager

The features of Oracle Identity Manager can be divided into the following categories:

1.1.1 Business User-Friendly Usage

In earlier releases of Oracle Identity Manager, the usage of Oracle Identity Manager was IT centric. To request for a role, entitlement, or application, business users had to know details, such as which request template, resource object, or IT resource to use. From this release onward, Oracle Identity Manager is easy to use. Business users do not need to know about IT-related details. Instead, business users can search for an item in the request catalog and add it in the shopping cart.Oracle Identity Manager provides ease of use to business users through simplified request interface that includes shopping cart and catalog-based experience, business-friendly request tracking, unified inbox for approval and provisioning tasks, and unified interface for self service and delegated administration tasks.

1.1.2 Business Friendly Request Interface

In earlier releases of Oracle Identity Manager, complex request scenarios could be implemented by using role requests, request templates and SOA approval processes. However, the request management engine did not offer the ability to request application entitlements. In addition, the overall request process was cumbersome.

From this release onward, the shopping cart pattern has been introduced to simplify the request interface. End users can request for entities such as roles, entitlements, and application instances from the access request catalog by using the shopping cart pattern.

1.1.3 Business User Friendly Request Tracking

Administrators and end users can track all requests easily by using the simplified and user-friendly request tracking interface. By using the Track Requests page in Oracle Identity Self Service, you can view, approve, reject, or close requests by searching for requests based on request ID, status, request type, requested date, beneficiary, and requester.

1.1.4 Unified Interface for Self Service and Delegated Administration

Unlike earlier releases, the current release of Oracle Identity Manager provides a unified interface for the end user self-service for self and others, and user delegated-administration flows. In this release, delegated-administration functions on users are nothing but requests raised on behalf of other users that are automatically approved based on security configuration.

1.1.5 Organization-Scoped Security

Oracle Identity Manager provides an organizational-level scoping mechanism for delegated administration and data security of various entities. Every entity is published to a set of organizations and only the users in the published organizations are allowed to receive access.

1.1.6 Business User Friendly Personalization

Oracle Identity Manager allows users to personalize Oracle Identity Self Service for their respective logins. Users can rearrange or hide regions in the Home Page, save and reuse regularly searched items, save sorting preferences, and so on.

1.1.7 User Administration

By deploying self-service features and delegating administrative functions, an organization can increase user productivity, user satisfaction, and operational efficiency.

Single Interface for Self Service and System Administration

Oracle Identity Manager provides a single Web-based interface for performing all types of operations related to self, identity administration, and system administration and configuration.

User Profile Management

Users can view and edit their own profiles by using Oracle Identity Self Service. This reduces administrative overhead and provides users with control over their identity profiles.

Administrators can view and manage the profiles of other users subject to access permissions by using the user interface for Oracle Identity Manager administration. This allows administrators to create and edit user profiles, change passwords of users, and perform other delegated administration tasks.

Request Management

Oracle Identity Self Service also enables users to create provisioning requests for resources with fine-grained entitlements, profile management requests, and role membership requests. The items to be requested can be selected from a Web-based catalog interface. Business approvers, such as team leaders, line managers, and department heads, can use the same Web-based interface to examine and approve incoming requests. This helps organizations in reducing effort and cost.

Delegated Administration

Oracle Identity Manager features a highly flexible security framework that supports delegation of most administrative functions to any group or user. By moving administration points as close to the user as possible, an organization can achieve tighter control and better security, increasing productivity at the same time.

1.1.8 Password Management

Password management is one of the foremost issues in organizations nowadays. Implementing a password management solution reduces cost and overhead related to raising tickets or calling help desks. The password management features of Oracle Identity Manager discussed in this section aim to help organizations in this area.

Self-Service Password Management

Users can manage their own enterprise passwords, which might then be synchronized with their managed accounts depending on how the managed accounts are individually configured. The enterprise passwords are managed by using the self-service capabilities of Oracle Identity Manager. If a user forgets the password, Oracle Identity Manager can present customizable challenge questions to enable self-service identity verification and password reset. Research shows that the bulk of help desk calls are related to password reset and account lockout. By reducing the need for help desk calls, this self-service capability lowers costs.

Advanced Password Policy Management

Most best practices are supported out of the box and are configurable through an intuitive user interface. Supported password complexity requirements include: password length, alphanumeric and special characters usage, uppercase and lowercase usage, full or partial exclusion of user name, minimum password age, and historical passwords. Oracle Identity Manager lets you define complex password policies that control the passwords set by users. In addition, Oracle Identity Manager allows the application of multiple policies for each resource. For instance, users with fewer privileges can be subjected to a more relaxed password policy, whereas privileged administrators can be subjected to a more stringent policy.

Password Synchronization

Oracle Identity Manager can synchronize or map passwords across managed resources and enforce differences in password policies among these resources. In addition, if an organization is using the desktop-based password reset feature of Microsoft Windows, the Active Directory (AD) connector of Oracle Identity Manager can intercept password changes at the AD server and subsequently propagate these changes to other managed resources in accordance with policies. Similar bidirectional password synchronization capability is offered in most Oracle Identity Manager connectors for directory servers and mainframes.

1.1.9 User Provisioning

Provisioning provides outward flow of user information from Oracle Identity Manager to a target system. Provisioning is the process by which an action to create, modify, or delete user information in a resource is started from Oracle Identity Manager and passed into the resource. The provisioning system communicates with the resource and specifies changes to be made to the account.

Provisioning includes the following:

  • Automated user identity and account provisioning: This manages user identities and accounts in multiple systems and applications. For example, when an employee working in the payroll department is created in the human resources system, accounts are also automatically created for this user in the e-mail, telephone, accounting, and payroll reports systems.

  • Workflow and policy management: This enables identity provisioning. Administrators can use interfaces provided by provisioning tools to create provisioning processes based on security policies.

  • Reporting and auditing: This enables creating documentation of provisioning processes and their enforcement. This documentation is essential for audit, regulatory, and compliance purposes.

  • Attestation: This enables administrators to confirm users' access rights on a periodic basis.

  • Access deprovisioning: When the access for a user is no longer required or valid in an organization, Oracle Identity Manager revokes access on demand or automatically, as dictated by role or attribute-based access policies. This ensures that a user's access is promptly terminated where is it no longer required. This is done to minimize security risks and prevent paying for access to costly resources, such as data services.

1.1.10 Organization and Role Management

An organization entity represents a logical container of other entities such as users, roles, and policies in Oracle Identity Manager. In other words, organizations are containers that can be used for delegated administrative model. In addition, organizations define the scope of other Oracle Identity Manager entities, such as users. Oracle Identity Manager supports a flat organization structure or a hierarchical structure, which means that an organization can contain other organizations. The hierarchy can represent departments, geographical areas, or other logical divisions for easier management of entities.

Roles are logical groupings of users to whom you can assign access rights within Oracle Identity Manager, provision resources automatically, or use in common tasks such as approval and attestation. Roles can be independent of organizations, span multiple organizations, or can contain users from a single organization.

PKXSV=Q=PK8^E OEBPS/lot.htmQ List of Tables PKw6VQPK8^EOEBPS/my_profile.htmO Managing Profile Information

6 Managing Profile Information

The My Information page in Oracle Identity Self Service enables you to view and modify personal details.

To open the My Information page:

  1. Log in to Identity Self Service.

  2. In the left pane, under My Profile, click My Information.

    The My Information page is displayed with sections for modifying profile attributes, changing password, setting challenge questions, viewing direct reports and their attributes, and viewing and modifying proxy users.

The My Information page has the following sections:

6.1 Managing Profile Attributes

When you open the My Information page, your profile attributes are displayed in the Basic User Information section. If the section is not expanded by default, then click the arrow icon beside Basic User Information to expand the section.

Editable attributes are displayed in editable text boxes or appropriate UI widgets, such as lookup fields. You can provide new values and click the Apply button to submit a change.

When the profile update is submitted, a request is created for the profile update, and a message is displayed along with a tracking number for the request. Workflow rules determine the approval workflow to start and obtain approval before allowing the changes in attributes. The status of the request can be seen on the Tracking Requests page of Identity Self Service. For more information about requests and tracking, see Chapter 9, "Managing Requests."


Note:

The language preference of the user for the UI is not set according to the locale specified by the user in the Basic User Information section of the Self Service. The UI locale is determined as described in "Setting the Language for Users" in the Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager.


After submitting the request for modifying profile attributes, you can click the down arrow icon beside Basic User Information to collapse the section.

6.2 Changing Password

The Change Password section allows you to reset your enterprise password or target system account password (for example, the Microsoft Active Directory account) that you have been provisioned to. To specify a new password, enter and re-confirm the new passwords. The new password is evaluated for compliance against the applicable password policy. If the new password does not comply with the password policies, then the password change is rejected and you are informed of the failing condition(s). If the password evaluates successfully against all policies, then the password is changed.

To change the password:

  1. In the My Information page, expand the Change Password section.

  2. From the Account Type list, select one of the following options:

    • Oracle Identity Manager - This specifies that the Oracle Identity Manager password is being reset.

    • Target system account - This specifies that the password of the target system account that has been selected is being reset. For example, if you have been provisioned to both Microsoft Active Directory and Lotus Notes and Domino, and you want to reset the password of the Lotus Notes and Domino account, then select Lotus Notes and Domino.

  3. If you selected Oracle Identity Manager in the preceding step, then specify values for the following fields:

    • Old Password: Enter the existing password.

    • New Password: Enter the new password that you want to set. Click the icon to the right of the New Password field. A list of conditions to set the password is displayed. These conditions are being specified in the password policy, and you must comply with the conditions to specify a password.

    • Confirm New Password: Re-enter the new password.

    For information about password policies, see the "Managing Password Policies" chapter in Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager.

  4. If you selected a target system account in Step 2, then specify values for the following fields:

    • New Password: Enter the new password that you want to set. Click the icon to the right of the New Password field. A list of conditions (as specified on the target system) to set the password is displayed. If no conditions to set the password are available on the target system, then the conditions set for the enterprise account are displayed. These conditions are being specified in the password policy, and you must comply with the conditions to specify a password.

    • Confirm New Password: Re-enter the new password.

    For information about password policies, see the "Managing Password Policies" chapter in Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager.

  5. Click Apply. If the old password is valid and the new password is in compliance with the password policy, then the password is changed. Otherwise, an error message is displayed.

6.3 Setting Challenge Questions and Response

The challenge-response service allows you to set up a series of challenge questions that are used to validate the user's identity to reset a forgotten password. Only the user should know the correct answers to the challenge questions.

Questions and answers are stored as part of the user's profile as a name-value pair list, where the name is the question, and the value is the answer to that question. For example, for user John Doe, the challenge-response set could be as follows:

ChallengeResponse

What is your favorite color?

Blue

What is the name of your pet?

Rex

What is the city of your birth?

New York



Note:

Oracle recommends defining answers to challenge questions that cannot be guessed easily by collecting information about the user from the Internet or other public sources.


When a user's identity needs to be validated without relying on the authentication scheme, the challenge questions are asked, and the user must provide the necessary number of correct answers.

To set the challenge questions and responses:

  1. In the My Information page, expand the Challenge Questions section.

  2. Select questions from the Question 1, Question 2, and Question 3 fields.

  3. In the corresponding Answer 1, Answer 2, and Answer 3 fields, enter the answers.

  4. Click Apply.


Note:

Challenge questions and responses once set are not visible in this section. If you see the following message in the Challenge Questions section, then you have already set your challenge questions and responses:

Your secret questions and answers are already set.

You can modify the challenge questions and responses that you have already set by performing the procedure described earlier in this section.


6.4 Viewing Direct Reports

The Direct Reports section in the My Information page lists the direct reports of the user in the management hierarchy, in a tabular format. This section allows you to view the details of each direct report. For each user in the list, the following are displayed:

  • Display Name

  • User Login

  • Identity Status

  • Organization


Tip:

You can add or remove users to and from organizations by using the Attributes tab of the user details page.


If there are a large number of users as your direct reports, then you can query and find a direct report by using the Query By Example feature. See "Using Query By Example" for more information about the Query By Example feature.

6.4.1 Viewing and Modifying Direct Reports

To view and modify direct reports:

  1. In the My Information page, expand the Direct Reports section.

  2. Select a user or direct report by clicking the record of the direct report.

  3. From the Actions menu, select Open. Alternatively, click the Open icon on the toolbar. The details of the user is displayed in a new tab. This tab displays the details of the user in various subtabs, such as Attributes, Roles, Entitlements, Accounts, and so on. You can click each tab to review the details of the user.

    When you open the user details of a direct report, you can perform certain tasks for the user, such as reset password for the user, and unlock or lock the user's account. You can also view the details of the direct reports of the open user, and perform certain tasks for the user, who is your indirect report. For more details, see "Modifying Users".

6.5 Managing Proxies

The Proxies section in the My Information page allows you to view and manage the proxy information. It displays the proxies currently set up within Oracle Identity Manager for you, and also allows you to view previously set up proxies. The past proxies view, which displays all proxies that were added in the past, is read-only, and no modifications are allowed.

The existing proxy view allows you to cancel an upcoming proxy whose start date is in the future. You can also edit only the end date of an in-progress proxy whose start date is in the past and end date is in future or not specified.

In the section for current proxies, you can also add new proxies. When adding new proxies, you must specify a start date, an end date, and the proxy user.

This section contains the following topics:

6.5.1 Adding a Proxy

To add a proxy:

  1. In the My Information page, expand the Proxies section.

    The Current section displays a list of users currently set up as your proxy. The Past section displays a list of past proxies.

  2. In the Current section, from the Actions menu, select Add. Alternatively, you can click Add on the toolbar.

    The Add Proxy dialog box is displayed.

  3. For Proxy Name, select any one of the following:

    • My Manager: To specify your manager as proxy.

    • Other User: To specify any other user as proxy. To do so, click the lookup icon to search for the user you want to specify as proxy.

  4. In the Start Date field, specify a start date. To do so, click the Select Date icon to the right of the Start Date field, and select a date from the calendar.

  5. In the End Date field, specify an end date.

  6. Click Apply. The proxy is added to the list of proxies in the Proxies section.


Note:

Oracle Identity Manager does not allow adding another proxy whose start and end dates overlap with the existing proxy.


6.5.2 Editing a Proxy

To edit a proxy:

  1. In the Current section, select a proxy that you want to edit.

  2. From the Actions menu, select Edit. Alternatively, you can click Edit on the toolbar.

    The Edit Details dialog box is displayed.

  3. In the Proxy Name field, select My Manager to specify your manager as proxy. Otherwise, select Other User to specify any other user as proxy. You can search for the user name.


    Note:

    • To change the proxy user, you can search only those users for which you have search permission.

    • You cannot modify the Proxy Name field for proxy that is in the "In Progress" state.


  4. In the Start Date and End Date fields, if required, specify revised dates.


    Note:

    You cannot modify the Start Date field for a proxy that is in the "In Progress" state.


  5. Click Apply. The edited proxy information is saved.

6.5.3 Removing a Proxy

To remove a proxy:

  1. In the Current section, select a proxy that you want to remove.

  2. From the Actions menu, select Remove. Alternatively, you can click Remove on the toolbar.

    When a current proxy is deleted, its end date is set as the date when it is deleted and when a future proxy is deleted, it is removed from the system.

    To remove all proxies, click Remove All on the toolbar, or select Remove All from the Actions menu.

    A message is displayed asking for confirmation.

  3. Click Yes. The selected proxy is removed from the Current section.

PK@-OOPK8^EOEBPS/selfreg.htm; Registering to Self Service

3 Registering to Self Service

This chapter discusses the following topics:

3.1 Submitting Registration Requests

Oracle Identity Manager requires you to register yourself with an identity to perform certain tasks on Oracle Identity Self Service or Oracle Identity System Administration.

To register yourself with Oracle Identity Manager:

  1. In the Oracle Identity Self Service login page, click New User Registration. The User Registration page is displayed.

  2. In the Basic Information section, enter first name, middle name, last name, email, common name, and display name in the respective fields.

    Display name is the name of the user displayed in the UI. If not specified, then it is autogenerated while creating the user.

  3. In the Enter User ID and Password section, enter the user login name, password, and confirm password in the respective fields.

  4. In the Select your challenge questions and answers section, select the challenge question and set an answer for each question.


    Note:

    • Challenge questions and answers are asked if the attribute for this is defined in the template for self registration.

    • All Oracle Identity Manager deployments do not support self-registration. This is especially true of internal deployments that manage the identities of employees and contractors, where the identities are added through reconciliation and not self-registration.


  5. Click Register. You are provided a tracking ID for the registration activity that is used for the tracking the registration feature.

3.2 Tracking Registration Requests

You can track your request to register as an identity in Oracle Identity Manager. If the current status indicates success, then you can go to Identity Self Service, and then enter your username and password to log in.

  1. In the Identity Self Service login page, click Track My Registration. The Track Requests page is displayed.

  2. In the Tracking ID field, enter the tracking ID that has been assigned to your registration request. Then click Submit. The registration request status is displayed with the following details:

    • Tracking request ID

    • Request submission date

      When the request is submitted and approval is not done, the date shown is the request submission date. In all cases, the date always reflects the last update date.

    • Current status of the request

      Every self-registration request that is submitted has to go through approvals for it to be processed completely.

      If a user tracks the current status of the request, the status is shown with a description of the stage the request is in. The status would be one of the following:

      • Pending: This state indicates that the request is submitted and the approval is pending. In case of default approval, the following status message is displayed:

        "Obtaining request-level approval for registration. The manager needs to approve this request."

        If the request level approval is pending. Once the request level approval is obtained, the following status message is displayed:

        "Obtaining operation-level approval for registration."

      • Rejected: This state indicates that the request is rejected during approval. The description indicates the reason of rejection. In case of default approval levels, if the request got disapproved at the request approval level, then the following status message is displayed:

        "Request rejected. Please call Help-Desk."

        If the request gets disapproved at the operation level or request level, then the following status message is displayed:

        "Operation approval rejected for registration."

      • Completed: This state indicates that the request is completed. If all the approvals have been provided and the request is successfully completed, the following status message is displayed:

        "Request has been completed."

      • Failed: This state indicates that the request is failed during submission. If the request submission is failed, the following status message is displayed:

        "The request registration failed."

  3. Click Track Another Registration to display the status of another registration request.

    Or, click Back to Login to display the login page.


Note:

You can only track the status of Self Registration Requests from this page.


PKm}PK8^E OEBPS/lof.htmJ List of Figures PKdOJPK8^EOEBPS/myaccess.htm=v Managing Access

7 Managing Access

In Oracle Identity Manager, you have access to entities, such as roles, entitlements, accounts, and admin roles. Access to these entities is governed by authorization policies. For information about authorization policies, see "Security Architecture" in Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager.

The entities to which you have access are displayed in the My Access section of the Oracle Identity Self Service. Typical tasks you perform in the My Access section are described in the following topics:


Tip:

Adding and removing entities, such as roles, entitlements, and accounts, go through requests that are subject to approval. Before you perform the steps to manage your access to entities, it is recommended that you see Chapter 9, "Managing Requests" for detailed information about requests in Oracle Identity Manager.


7.1 Managing Roles

The Roles tab in the My Access section displays the roles assigned to you. In this tab, you can perform the following:

7.1.1 Requesting for Roles

To request for roles from the My Access page:

  1. Log in to Identity Self Service.

  2. Under My Profile, click My Access. The My Access page is displayed.

  3. Click the Roles tab. A list of roles assigned to you is displayed.


    Note:

    In all the tabs in the My Access page, you can refine your search by using Query By Example. For information about using Query By Example, see "Using Query By Example".


  4. From the Actions menu, select Request. Alternatively, click Request Roles on the toolbar.

    The Catalog page is displayed. You use the Catalog page to create requests. For information about request catalog, and how to create requests from the Catalog page, see "Creating Requests".

    When you submit your request for roles, and the request is approved at all approval levels, the roles will be assigned to you.

7.1.2 Modifying Role Details

To modify the details of a role assigned to you:

  1. In the Roles tab of the My Access page, select a role whose details you want to modify.

  2. From the Actions menu, select Open. Alternatively, click Open on the toolbar.

    The Role: ROLE_NAME page is displayed with details of the selected role. In this page, you can modify role attributes, role hierarchy, role membership, and publish the role to organizations. For details about these tasks, see "Managing Roles".

7.1.3 Removing Roles

To remove roles assigned to you:

  1. In the Roles tab of the My Access page, select a role that you want to remove.

  2. From the Actions menu, select Remove. Alternatively, click Remove Roles on the toolbar. The Remove Roles catalog page is displayed.

  3. Submit the request to remove roles. The role will be removed after the request is approved.

7.2 Managing Entitlements

The Entitlements tab in the My Access page displays the entitlements assigned to you. In this tab, you can perform the following:

7.2.1 Requesting for Entitlements

To request for entitlements:

  1. In the My Access page, click the Entitlements tab. A list of entitlements assigned to you is displayed.


    Note:

    In an upgraded deployment of Oracle Identity Manager 11g Release 2 (11.1.2), the entitlements provisioned to the users before the upgrade are not displayed in the Entitlements tab. To display the entitlements in the Entitlements tab after the upgrade, login to Oracle Identity System Administration, and run the Entitlement Assignments scheduled job. See "Predefined Scheduled Tasks" in the Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager for information about the Entitlement Assignments scheduled job.


  2. From the Actions menu, click Request. Alternatively, click Request Entitlements on the toolbar. The Catalog page is displayed.

  3. Submit the request from the Catalog page. The entitlement will be assigned after the request is approved.

    For information about creating a request, see "Creating Requests".

7.2.2 Removing Entitlements

To remove entitlements assigned to you:

  1. In the Entitlements tab, select the entitlements that you want to remove.

  2. From the Actions menu, select Remove. Alternatively, click Remove Entitlements from the toolbar. The Catalog page is displayed.

  3. Submit the request to remove entitlements. The entitlement will be removed after the request is approved.

7.3 Managing Accounts

The Accounts tab in the My Access page displays the accounts assigned to you. In this tab, you can perform the following:

7.3.1 Requesting for Accounts

To request for accounts:

  1. In the My Access page, click the Accounts tab. A list of accounts assigned to you is displayed.

  2. From the Actions menu, click Request. Alternatively, click Request Accounts on the toolbar. The Catalog page is displayed.

  3. Submit the request from the Catalog page. The account will be assigned after the request is approved.

    For information about creating a request, see "Creating Requests".


Note:

If you request for an entitlement and application instance together in a single request, and if the beneficiary does not have an account provisioned at the time of entitlement provisioning, then entitlement provisioning fails. However, application instance provisioning succeeds. Therefore, if you request for entitlement and application instance together in a single request, then you must have a primary account provisioned to the target on which the entitlement is stored.


7.3.2 Modifying Accounts

To modify accounts assigned to you:

  1. In the Accounts tab, select an account that you want to modify.

  2. From the Actions menu, select Modify. Alternatively, click Modify Accounts on the toolbar. The Catalog page is displayed.

  3. Edit the attributes of the account and submit the request from the Catalog page. The account will be modified after the request is approved.

7.3.3 Removing Accounts

To remove accounts assigned to you:

  1. In the Accounts tab, select the account that you want to remove.

  2. From the Actions menu, select Remove. Alternatively, click Remove Accounts from the toolbar. The Catalog page is displayed.

  3. Submit the request to remove accounts. The accounts will be removed after the request is approved.

7.3.4 Disabling an Account

To disable an account:

  1. In the Accounts tab, select an account that you want to disable.

  2. From the Actions menu, select Disable. Alternatively, select Disable on the toolbar. The Catalog Page is displayed.

  3. Submit the request to disable accounts. The accounts will be disabled after the request is approved.

7.3.5 Enabling an Account

To enable an account:

  1. In the Accounts tab, select an account that you want to enable.

  2. From the Actions menu, select Enable. Alternatively, select Enable on the toolbar. The Catalog Page is displayed.

  3. Submit the request to enable accounts. The accounts will be enabled after the request is approved.

7.4 Viewing Admin Roles

The Admin Roles tab of the My Access page displays the admin roles you have. Admin roles determine the operations you can perform on each entity. This is governed by authorization policies based on organizations and admin roles. For details on admin roles and authorization in Oracle Identity Manager, see "Security Architecture" in the Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager.

PK==PK8^EOEBPS/index.htm Index

Index

A  B  C  D  E  F  H  I  L  M  N  O  P  Q  R  S  T  U  V  W 

A

access
managing, 7
roles, 7.1
modify, 7.1.2
remove, 7.1.3
request for, 7.1.1
access request catalog, 8, 9.8.2
accessibility, 2.2.1.1
accounts
disabling, 7.3.4, 11.4.4.4.5
enabling, 7.3.5, 11.4.4.4.6
locking, 11.4.8
managing, 7.3
modifying, 7.3.2, 11.4.4.4, 11.4.4.4.2
non-primary, 11.4.4.4.1
primary, 11.4.4.4.1, 11.4.4.4.4
provisioning, 13.8.3.7.1
removing, 7.3.3
removing from user, 11.4.4.4.3
requesting, 7.3.1, 11.4.4.4.1
revoking from organizations, 13.8.3.7.2
types, 11.4.4.4.1
unlocking, 11.4.9
admin roles, 7.4, 13.5
granting, 13.8.3.5.1
managing, 13.8.3.5
revoking, 13.8.3.5.2
admin roles, viewing, 7.4
approval tasks, 10.1
adding attachments, 10.1.4
adding comments, 10.1.4
approving, 10.1.5
delegating, 10.1.7
reassigning, 10.1.7, 10.1.7
rejecting, 10.1.6
searching, 10.1.2
suspending, 10.1.8
task details, 10.1.3, 10.1.3
viewing, 10.1.1
withdrawing, 10.1.9
Attestation Dashboard
e-mail notifications, 14.2
scheduled tasks, 14.3
viewing attention request details, 14.1
attestation tasks, 10.3
request details, 10.3.2
searching, 10.3.1

B

beneficiary, 9
bulk request, 9.2

C

catalog
refining search results, 8.1.1
catalog items
adding to cart, 8.2
modifying, 8.1
removing from cart, 8.2
viewing, 8.1
catalog-based requests, 9.5
challenge questions and response, 6.3
child organizations
deleting, 13.8.3.2.2
disabling, 13.8.3.2.3
enabling, 13.8.3.2.4
opening, 13.8.3.2.5
child requests, 9.2
common name, 11.6
common name generation, 11.6
create user operation, 11.6.1
modify user operation, 11.6.2
configure
username policy, 11.5.2
create
child organizations, 13.8.3.2.1
custom user name policies, 11.5.3
organizations, 13.8.2
request, 9.8
request profile, 9.7.1
role categories, 12.5.3.1
roles, 12.5.1, 12.5.1
saved searches, 5.4.1
users, 11.4.2

D

default roles, 12.4, 12.4
default roles categories, 12.5.3
delegated administration, 1.1.7
delete
attributes from search criteria, 5.2
catalog items, 8.2
child organizations, 13.8.3.2.2
containers, 5.1.3
organizations, 13.8.5, 13.8.5
proxies, 6.5.3
request profile, 9.7.3
role categories, 12.5.3.4
roles, 12.5.2.4
saved searches, 5.4.3
user membership rules, 12.5.2.2.9
users, 11.4.7
direct operation, 9.4
direct reports
modifying, 6.4.1, 11.4.4.5
viewing, 6.4.1
disable
accounts, 7.3.4, 11.4.4.4.5
child organizations, 13.8.3.2.3
organizations, 13.8.4
provisioned accounts, 13.8.3.7.4
username reservation, 11.5.1
users, 11.4.5

E

enable
accounts, 7.3.5, 11.4.4.4.6
child organizations, 13.8.3.2.4
organizations, 13.8.4
provisioned accounts, 13.8.3.7.5
username reservation, 11.5.1
users, 11.4.6
entitlements
managing, 7.2
remove, 7.2.2
request for, 7.2.1
entity definition
organizations, 13.2
roles, 12.3
users, 11.2
evaluating password policies, 13.7

F

features of Oracle Identity Manager, 1.1
forgot password, 4.3
forgot user login, 4.2

H

help, 2.2.1.3
heterogeneous requests, 9.3

I

Identity Self Service
logging in, 2.1
login, 4.1
overview of, 2.2
registering, 3.1
registration request, 3.1
tracking registration request, 3.2

L

layout of pages in UI, 2.2
lock, accounts, 11.4.8
log in to Oracle Identity Self Service, 2.1, 4.1

M

manage
access, 7
accounts, 7.3
admin roles, 13.8.3.5
approval tasks, 10.1
attestation tasks, 10.3
entitlements, 7.2
organizations, 13
provisioning tasks, 10.2
requests, 9
roles, 12, 12.5.2
tasks, 10
user profile, 6
users, 11, 11.4
modify
accounts, 11.4.4.4, 11.4.4.4.2
catalog items, 8.1
organizations, 13.8.3
request profile, 9.7.2
role categories, 12.5.3.3
user membership rules, 12.5.2.2.9
users, 11.4.4
modifying
direct reports, 11.4.4.5

N

non-catalog-based requests, 9.5
non-primary accounts, 11.4.4.4.1

O

OIM Account, 11.1.1
Oracle Identity Manager, 1
registering, 3.1
organization and role management, 1.1.10
organizations, 11.1.2, 13
attributes, 13.8.3.1
child organizations, 13.8.3.2
creating, 13.8.2
creating child organizations, 13.8.3.2.1
delegated administration, 13.1
deleting, 13.8.5, 13.8.5
deleting child organizations, 13.8.3.2.2
disabling child organizations, 13.8.3.2.3
enabling and disabling, 13.8.4
enabling child organizations, 13.8.3.2.4
entity definition, 13.2
managing, 13
members, 13.8.3.3
opening child organizations, 13.8.3.2.5
publishing entities, 13.4
scoping and hierarchy, 13.3
searching, 13.8.1
viewing and modifying, 13.8.3

P

parent request, 9.2
password management, 1.1.8
advanced, 1.1.8
self-service, 1.1.8
synchronization, 1.1.8
password policies, 13.7
password policies evaluation, 13.7
personalizing, 2.2.2.1, 5
creating saved searches, 5.4.1
deleting saved searches, 5.4.3
Home page
adding containers, 5.1.1
changing the Home page layout, 5.1.5
editing containers, 5.1.2
moving containers, 5.1.4
removing containers, 5.1.3
saved searches, 5.4.2
search criteria, 5.2
search result, 5.3
primary accounts, 11.4.4.4.1, 11.4.4.4.4
provisioned accounts, 13.8.3.7
provisioning, 1.1.9
provisioning tasks, 10.2
adding notes, 10.2.4
assignment history, 10.2.6
form details, 10.2.7
manually fulfilling, 10.2.10
modifying form details, 10.2.8
reassigning, 10.2.5
retrying, 10.2.9
searching, 10.2.1
setting response, 10.2.3
task details, 10.2.2
publishing, 12.5.2.2.11
publishing roles, 12.5.2.2.11

Q

query by example, refine search results, 5.6

R

registration requests, 3
submitting, 3.1
tracking, 3.2
remove
accounts, 7.3.3
accounts from user, 11.4.4.4.3
catalog items, 8.2
entitlements, 7.2.2
entitlements from user, 11.4.4.3
parent role, 12.5.2.2.4
roles assigned, 7.1.3
roles from user, 11.4.4.2
request
catalog-based
application instance request, 9.5
entitlement request, 9.5
role request, 9.5
creating, 9.8
request catalog, 8, 9.8.2
request category, 9.5
request failure, 9.6
request profiles, 9.7, 9.8.3
creating, 9.7.1
deleting, 9.7.3
modifying, 9.7.2
request stages, 9.1
requester, 9
requests, 9, 9.4
applications instances, 9.5
beneficiary, 9
bulk request, 9.2
catalog-based, 9.5
categories, 9.5
child request, 9.2
closing, 9.11
entitlements, 9.5
failure, 9.6
heterogeneous, 9.3
managing, 9
non-catalog-based, 9.5
parent request, 9.2
process flow, 9
requester, 9
role, 9.5
stages, 9.1
target entity, 9
tracking, 9.9
withdrawing, 9.10
role categories, 12.5.3
creating, 12.5.3.1
deleting, 12.5.3.4
modifying, 12.5.3.3
searching, 12.5.3.2
role categories, default, 12.5.3
roles, 11.1.3, 12
adding membership rules, 12.5.2.2.9, 12.5.2.2.9
assigning members, 12.5.2.2.7
attributes, 12.5.2.2.1
creating, 12.5.1, 12.5.1
default, 12.4, 12.4
deleting, 12.5.2.4
deleting membership rules, 12.5.2.2.9, 12.5.2.2.9
entity definition, 12.3
hierarchy, 12.5.2.2.2
inherited by, 12.2, 12.5.2.2.2
inherited from, 12.2, 12.5.2.2.2
managing, 12, 12.5.2
members, 12.5.2.2.6
membership inheritance, 12.1
modifying membership rules, 12.5.2.2.9, 12.5.2.2.9
opening child roles, 12.5.2.2.5
opening parent roles, 12.5.2.2.5
permission inheritance, 12.2
publishing to organizations, 12.5.2.2.11
removing parent role, 12.5.2.2.4
revoke members, 12.5.2.2.8
revoke organizations, 12.5.2.2.12
searching, 12.5.2.1
viewing and administering, 12.5.2.2

S

sandbox, 2.2.1.2
search
approval tasks, 10.1.2
attestation tasks, 10.3.1
operations on results, 11.4.1.1
organizations, 13.8.1
provisioning tasks, 10.2.1
role categories, 12.5.3.2
roles, 12.5.2.1
users, 11.4.1
search operators, 8.1.2
self-service features, 1.1.7
profile management, 1.1.7
request management, 1.1.7
simple search
operations on results, 11.4.1.1
sort data, 5.5
supported, 8.1.2

T

target entity, 9
task
managing, 10
TaskList, 10
tasks, 10
approval tasks, 10, 10.1
attestation tasks, 10, 10.3
provisioning tasks, 10, 10.2

U

unlock, accounts, 11.4.9
user attributes, 11.2
user lifecycle, 11.1
user profile
challenge questions and response, 6.3
direct reports, 6.4
managing, 6
password, 6.2
profile attributes, 6.1
proxies, 6.5
adding, 6.5.1
editing, 6.5.2
removing, 6.5.3
username, 11.5
policy configuration, 11.5.2
releasing, 11.5.4
username policies, create, 11.5.3
username reservation, 11.5
enabling and disabling, 11.5.1
users, 11
adding entitlements, 11.4.4.3
adding roles, 11.4.4.2
attributes, 11.2
creating, 11.4.2
deleting, 11.4.7
disabling, 11.4.5
editing user attributes, 11.4.4.1
enabling, 11.4.6
entity definition, 11.2
lifecycle, 11.1
managing, 11, 11.4
modifying, 11.4.4
OIM Account, 11.1.1
removing entitlements, 11.4.4.3
removing roles, 11.4.4.2
requesting entitlements, 11.4.4.3
searching, 11.4.1
viewing details, 11.4.3

V

view
admin roles, 7.4
approval task details, 10.1.3
approval tasks, 10.1.1
attestation task request details, 10.3.2
catalog items, 8.1
direct reports, 6.4
form details, 10.2.7
organizations, 13.8.3
provisioned account details, 13.8.3.7.3
provisioned accounts, 13.8.3.7
provisioning task assignment history, 10.2.6
provisioning task details, 10.2.2
user details, 11.4.3

W

workflow and policy
deprovisioning, 1.1.9
provisioning, 1.1.9
writing custom user name policies, 11.5.3
PKP:0PK8^EOEBPS/usr_mangmnt.htm Managing Users

11 Managing Users

The user management feature in Oracle Identity Manager includes creating, updating, deleting, enabling and disabling, locking, and unlocking of user accounts. This feature is described in the following sections:

11.1 User Lifecycle

User lifecycle is a term to describe the process flow of how a user entity is created, managed, and terminated in the system based on certain events or time factors.

A user entity goes through various stages in the lifecycle. The stages are non-existent, disabled, active, and deleted. Figure 11-1 depicts the different lifecycle stages, all possible transitions, and the operations that set up those transitions:

Figure 11-1 User Life Cycle

Description of Figure 11-1 follows

There is a possibility of process rules or business requirements being defined for each transition of the user lifecycle. You can use the sample scenarios listed in Table 11-1 to establish the link between user lifecycle transitions and business objectives.

Table 11-1 User Life Cycle and Business Objectives Sample Scenarios

Current StateOperationSample ScenarioProcess Description

Non-existent

Create

HR enters user profile information for a new hire. If the new hire is not introduced to the system immediately, then HR sets a future start date for the user.

If the start is not a future date then the user is introduced into the system in an Active state.If the Start Date is in future then the create process creates the user in a disabled state.

Disabled

Enable

User's start date is in effect. The system initiates provisioning for the new hire.

User is marked enabled in the system and the user is now able to login and use the system. By default, all necessary memberships and accounts are established as part of the workflow.

Active

Modify

User is promoted to a new position. As a result, HR changes the job title of the user.

New resources are provisioned to the user, and old irrelevant resources are deprovisioned from the user.

Active

Disable

User takes one year sabbatical from the company. HR manually disables the user on the last working day of the user. The user re-joins the company after some period. HR can make the user Active again.

User is marked disabled in the system, and the user is no longer able to login to the system. The disabled users can be made Active again.

Active

Deleted

User retires from the company. HR manually deletes the user on the last working day of the user.

User is marked deleted in the system, and the user is no longer able to login to the system. By default, all users' accounts are deprovisioned as part of the workflow.


The following concepts are integral to user lifecycle management:

11.1.1 OIM Account

OIM Account is an abstraction representing a means to be authenticated to access Oracle Identity Manager. In Oracle Identity Manager, the cardinality of relationship between user and OIM account is one-to-one. By default, users are associated with OIM accounts that allow users to access Oracle Identity Manager. However, there may be users who do not need to access Oracle Identity Manager, and therefore, may not be provisioned with an OIM account.

Some user operations, such as lock and unlock, are explicitly account operations. When locking or unlocking a user, you lock or unlock the user's OIM account.

In Oracle Identity Manager, each user has a Design Console Access attribute that controls the OIM account of the user. If the Design Console Access option for a user is selected in the UI, then the user is End-User Administrator. If this option is not selected, then the user is an End-User.

11.1.2 Organization

Organization is a logical container for authorization and permission data. A user in Oracle Identity Manager must belong to one organization only. For detailed information about organizations in Oracle Identity Manager, see Chapter 13, "Managing Organizations".

11.1.3 Role

Oracle Identity Manager provides easy and controlled privilege management through roles. Roles are named groups of related privileges that you grant to users or other roles. Roles are designed to ease the administration of end-user system and schema object privileges. For detailed information about roles, see Chapter 12, "Managing Roles".

11.2 User Entity Definition

Attributes are defined for the user entity in Oracle Identity Manager. These attributes are the same for all entities. You can add your own attributes to the user entity.

For each attribute of an entity, the following properties are defined in Oracle Identity Manager:

  • Attribute Name: The name of the attribute.

  • Type: Indicates the type of data in the attribute. Supported types are string, number, date, and boolean.

  • Properties: For each attribute, the properties such as Use in bulk (specifies whether the attribute is available in bulk operations), Encrypt (determines whether the attribute must be encrypted), Searchable (determines whether the attribute can be searched by a user), and so on can be defined.


    See Also:

    "Configuring Custom Attributes" in Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager for more information about adding custom attributes and their properties


Table 11-2 lists the attributes defined for the user entity in Oracle Identity Manager:

Table 11-2 Attributes Defined for User Entity

Attribute NameCategoryDescriptionData TypePropertiesLookup Code and its Entries

usr_key

Account Settings

The GUID of the user. It is autogenerated when the user is created.

number

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 19

Visible: No

Display-Type: ENTITY

N/A

act_key

Basic User Information

The GUID of the organization to which the user belongs. This is a mandatory field.

number

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: 19

Visible: Yes

Display-Type: ENTITY

N/A

Last Name

Basic User Information

The last name of the user. This is a mandatory field.

string

Required: Yes

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

First Name

Basic User Information

The first name of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

Middle Name

Basic User Information

The middle name of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

Display Name

Basic User Information

The display name of the user. If not specified, then it is autogenerated while creating the user.

string

Required: No

MLS: No

Multi-represented: Yes

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 382

Visible: Yes

Display-Type: TEXT

N/A

Xellerate Type

Basic User Information

The type of end-user or administrator.

string

Required: Yes

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: 30

Visible: Yes

Display-Type: CHECKBOX

Lookup.Users.XellerateType

End-User

End-User Administrator

usr_password

Account Settings

The password of the user. It is stored as an encrypted value.

string

Required: Yes

System-Controlled: No

Encryption: Encrypt

User-Searchable: No

Bulk-Updatable: No

Read-Only: No

Max-Size: 128

Visible: Yes

Display-Type: SECRET

N/A

usr_disabled

Account Settings

Indicates whether the user is disabled or enabled.

0 indicates that the user is enabled. 1 Indicates that the user is disabled.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: Yes

Read-Only: Yes

Max-Size: 1

Visible: Yes

Display-Type: CHECKBOX

N/A

Status

Account Settings

The status of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: Yes

Max-Size: 25

Visible: Yes

Display-Type: LOV

Lookup.WebClient.Users.Status

Active

Disabled

Deleted

Disabled Until Start Date

Role

Basic User Information

The type of user in the system.

string

Required: Yes

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: 255

Visible: Yes

Display-Type: LOV

Lookup.Users.Role

Full-Time

Part-Time

Temp

Intern

Consultant

EMP

CWK

NONW

OTHER

Contractor

User Login

Account Settings

The login ID of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 256

Visible: Yes

Display-Type: TEXT

N/A

usr_manager_key

Basic User Information

The GUID of the user's manager.

number

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: 19

Visible: Yes

Display-Type: ENTITY

N/A

Start Date

Account Effective Dates

The start date of the user.

date

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: -

Visible: Yes

Display-Type: DATE_ONLY

N/A

End Date

Account Effective Dates

The end date of the user.

date

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: -

Visible: Yes

Display-Type: DATE_ONLY

N/A

usr_provisioning_date

Provisioning Dates

The date on which the user profile has been created in Oracle Identity Manager.

date

Required: No

System-Controlled: No

Encryption: Clear

Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: -

Visible: Yes

Display-Type: DATE_ONLY

N/A

usr_deprovisioning_date

Provisioning Dates

The date when the resources will be deprovisioned from the user.

date

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: -

Visible: Yes

Display-Type: DATE_ONLY

N/A

usr_provisioned_date

System

The date when the resources have been provisioned to the user.

date

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: Yes

Max-Size: -

Visible: No

Display-Type: DATE_ONLY

N/A

usr_deprovisioned_date

System

The date when the resources are deprovisioned from the user.

date

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: Yes

Max-Size: -

Visible: No

Display-Type: DATE_ONLY

N/A

Email

Basic User Information

The e-mail address of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 256

Visible: Yes

Display-Type: TEXT

N/A

usr_locked

Account Settings

Indicates whether the user account is locked or unlocked.

The value 0 indicates that the account is unlocked.

The value 1 indicates that the account is locked.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Update: No

Read-Only: Yes

Max-Size: 1

Visible: Yes

Display-Type: LOV

Users.Lock User

0

1

Locked On

Lifecycle

The date on which the user account has been locked.

date

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: -

Visible: No

Display-Type: DATE_ONLY

N/A

Automatically Delete On

Lifecycle

The date on which the user account will be automatically deleted.

date

Required: No

System-Controlled: No

Encryption: Clear

Searchable: Yes

Bulk-Updatable: Yes

Read-Only: Yes

Max-Size: -

Visible: No

Display-Type: DATE_ONLY

N/A

Manually Locked

Lifecycle

Indicates whether the user account has been automatically or manually locked.

1 indicates that the account has been manually locked by an administrator.

0 indicates that the account has been automatically locked, for instance, on exceeding the maximum number of login attempts with incorrect password.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 1

Visible: No

Display-Type: TEXT

N/A

usr_login_attempts_ctr

System

The number of times the user has tried logging in with incorrect password. It is set to 0 at every successful login.

number

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 19

Visible: No

Display-Type: NUMBER

N/A

usr_create

System

The date on which the user has been created.

date

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: Yes

Max-Size: -

Visible: No

Display-Type: DATE_ONLY

N/A

usr_update

System

The date on which the user has been last updated.

date

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: Yes

Max-Size: -

Visible: No

Display-Type: DATE_ONLY

N/A

usr_timezone

Preferences

The timezone preference of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: 100

Visible: Yes

Display-Type: TIME_ZONE

N/A

usr_locale

Preferences

The locale preference of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: 100

Visible: Yes

Display-Type: LOV

Notification.Languages

English

French

German

Italian Spanish

Brazilian Portuguese

Japanese

Korean

Simplified Chinese

Traditional Chinese

Arabic

Czech

Danish

Dutch

Finnish

Greek

Hebrew

Hungarian

Norwegian

Polish

Portuguese

Romanian

Russian

Slovak

Swedish

Thai

Turkish

usr_pwd_cant_change

System

This field is currently not used.

string

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 1

Visible: No

Display-Type: CHECKBOX

N/A

usr_pwd_must_change

System

This field is currently not used.

The value 0 indicates that the password is not required to be changed.

The value 1 mandates that the user changes the password.

string

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 1

Visible: No

Display-Type: CHECKBOX

N/A

usr_pwd_never_expires

System

This field is currently not used.

The value 0 indicates that the password will expire.

The value 1 indicates that password never expires.

string

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 1

Visible: Yes

Display-Type: CHECKBOX

N/A

usr_pwd_expire_date

System

The date on which the password will expire. Valid if Password Never Expires is 0.

date

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: -

Visible: No

Display-Type: DATE_ONLY

N/A

usr_pwd_warn_date

System

The date after which the user will be warned to change the password.

date

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Update: No

Read-Only: Yes

Max-Size: -

Visible: No

Display-Type: DATE_ONLY

N/A

usr_pwd_expired

System

Indicates whether the user password has expired. If so, then the password must be reset.

The value 0 indicates that password has not expired.

The value 1 indicates that password has expired.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Update: No

Read-Only: Yes

Max-Size: 1

Visible: No

Display-Type: CHECKBOX

N/A

usr_pwd_warned

System

Indicates whether the user has been warned to change the password.

0 indicates that the user has not been warned to change the password yet.

1 indicates that the user has been warned to change the password.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 1

Visible: No

Display-Type: CHECKBOX

N/A

usr_pwd_reset_attempts_ctr

System

The number of times the user has tried resetting the password with incorrect answers to challenge questions. It is set to 0 at every successful reset password.

number

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 19

Visible: No

Display-Type: NUMBER

N/A

usr_change_pwd_at_next_logon

System

Indicates whether the user must change his password at next login.

The value 1 indicates that the user must reset password at next login. The value 0 indicates that user does not need to reset password at next login.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Update: No

Read-Only: Yes

Max-Size: 1

Visible: No

Display-Type: CHECKBOX

N/A

usr_data_level

System

Indicates the kind of operation, such as add, modify, or delete, supported on this record.

The possible values for this column are:

0: Indicates that this row can be updated or deleted

1: Indicates that this row cannot be updated and deleted

2: Indicates that the row can only be modified and cannot be deleted

3: Indicates that the row can only be deleted and cannot be modified

string

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 1

Visible: No

Display-Type: TEXT

N/A

usr_pwd_min_age_date

System

If set, then it indicates the date before which the user password cannot be changed.

date

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: -

Visible: No

Display-Type: DATE_ONLY

N/A

usr_createby

System

The GUID of the user who created this user.

number

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 19

Visible: No

Display-Type: ENTITY

N/A

usr_updateby

System

The GUID of the user who updated this user.

number

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 19

Visible: No

Display-Type: ENTITY

N/A

usr_created

System

This is not currently used in Oracle Identity Manager.

date

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 19

Visible: No

Display-Type: DATE_ONLY

N/A

usr_policy_update

System

This is used to re-evaluate the user's policies. To re-evaluate object policies for any user to whom the current policy applies, evaluate the UPP and UPD tables to get list of users for the current policy. For each user found, set the policy_update flag. Attach as a post-insert, post-update and post_delete event handler to tcPOP.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: Yes

Read-Only: Yes

Max-Size: 1

Visible: No

Display-Type: TEXT

N/A

Country

Other User Attributes

The country of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 100

Visible: Yes

Display-Type: TEXT

N/A

Department Number

Other User Attributes

The department number of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

Description

Other User Attributes

The description of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 2000

Visible: Yes

Display-Type: TEXT

N/A

Common Name

Other User Attributes

The common name of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 240

Visible: Yes

Display-Type: TEXT

N/A

Employee Number

Other User Attributes

The employee number of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

Fax

Other User Attributes

The FAX number of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: Yes

Display-Type: TEXT

N/A

Generation Qualifier

Other User Attributes

The Generation Qualifier for the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: Yes

Display-Type: TEXT

N/A

Hire Date

Other User Attributes

The hire date of the user.

date

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: -

Visible: Yes

Display-Type: DATE_ONLY

N/A

Home Phone

Other User Attributes

The home phone number of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: Yes

Display-Type: TEXT

N/A

Locality Name

Other User Attributes

The locality name of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

Mobile

Other User Attributes

The mobile number of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: Yes

Display-Type: TEXT

N/A

Pager

Other User Attributes

The pager number of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: Yes

Display-Type: TEXT

N/A

Home Postal Address

Other User Attributes

The home postal address of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 256

Visible: Yes

Display-Type: TEXT

N/A

Postal Address

Other User Attributes

The postal address of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 256

Visible: Yes

Display-Type: TEXT

N/A

Postal Code

Other User Attributes

The postal code of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 230

Visible: Yes

Display-Type: TEXT

N/A

PO Box

Other User Attributes

The PO box number of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: Yes

Display-Type: TEXT

N/A

State

Other User Attributes

The state of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

Street

Other User Attributes

The street name in the user's address.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

Telephone Number

Other User Attributes

The telephone number of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: Yes

Display-Type: TEXT

N/A

Title

Other User Attributes

The title of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

Initials

Other User Attributes

The initials of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 10

Visible: Yes

Display-Type: TEXT

N/A

Password Generated

System

This flag indicates whether the password has been autogenerated for the user.

string

Required: No

System-Controlled: Yes

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: Yes

Max-Size: 1

Visible: No

Display-Type: TEXT

N/A

LDAP Organization

Other User Attributes

User organization name in LDAP.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

LDAP Organization Unit

Other User Attributes

User organization unit in LDAP, such as department or any subentity of a larger entity.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 80

Visible: Yes

Display-Type: TEXT

N/A

LDAP GUID

Other User Attributes

User global unique identifier in LDAP.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 256

Visible: Yes

Display-Type: TEXT

N/A

LDAP DN

Other User Attributes

User distinguished name in LDAP.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 256

Visible: Yes

Display-Type: TEXT

N/A

FA Language

Preferences

Language of the user for LDAP environment.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: 100

Visible: No

Display-Type: TEXT

NA

Embedded Help

Other User Attributes

Indicates whether to suppress the help popups on rollover. This attribute is not interpreted by Oracle Identity Manager and is used to persist values in LDAP.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: No

Max-Size: 10

Visible: No

Display-Type: LOV

Lookup.Users.EmbeddedHelp

true

false

Number Format

Other User Attributes

The number format preference of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: No

Max-Size: 30

Visible: No

Display-Type: LOV

Lookup.Users.NumberFormat

#,##0.##[.,]

#,##0.###[\u00A0,]

#,##0.###

#,##0.###;#,##0.###-

#,##0.###[.,]

#,##0.###;(#,##0.###)[.,]

#,##0.##[\u00A0,]

#,##0.###['.]

#,##0.###[',]

Date Format

Other User Attributes

The date format preference of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: No

Display-Type: LOV

Lookup.Users.DateFormat

MM-dd-yyyy

MM-dd-yy

MM.dd.yyyy

MM.dd.yy

MM/dd/yyyy

MM/dd/yy

M-d-yyyy

M-d-yy

M.d.yyyy

M.d.yy

M/d/yyyy

M/d/yy

dd-MM-yyyy

dd-MM-yy

d-M-yyyy

d-M-yy

dd.MM.yyyy

dd.MM.yy

d.M.yyyy

d.M.yy

dd/MM/yyyy

dd/MM/yy

d/M/yyyy

d/M/yy

yyyy-MM-dd

yy-MM-dd

yyyy-M-d

yy-M-d

yyyy.MM.dd

yy.MM.dd

yyyy.M.d

yy.M.d

yy. M. d

yyyy/MM/dd

yy/MM/dd

yyyy/M/d

yy/M/d

Time Format

Other User Attributes

The time format preference of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: No

Display-Type: LOV

Lookup.Users.TimeFormat

HH.mm

HH.mm.ss

HH:mm

HH:mm:ss

H:mm

H:mm:ss

H.mm

H.mm.ss

a hh.mm

a hh.mm.ss

a hh:mm

a hh:mm:ss

ah:mm

ah:mm:ss

hh.mm a

hh.mm.ss a

hh:mm a

hh:mm:ss a

Currency

Other User Attributes

The preferred currency code of the user.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: No

Display-Type: LOV

Lookup.Users.Currency

Font Size

Other User Attributes

The preferred font size of the user, such as large or medium. This is related to the Accessibility feature. This attribute is not interpreted by Oracle Identity Manager and is used to persist values in LDAP.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: No

Max-Size: 10

Visible: No

Display-Type: LOV

Lookup.Users.FontSize

LARGE

MEDIUM

Color Contrast

Other User Attributes

The preferred color contrast of the user, such as standard or high. This is related to the Accessibility feature. This attribute is not interpreted by Oracle Identity Manager and is used to persist values in LDAP.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: No

Max-Size: 10

Visible: No

Display-Type: LOV

Lookup.Users.ColorContrast

STANDARD

HIGH

Accessibility Mode

Other User Attributes

The preferred accessibility feature of the user, such as Screen Reader Optimized or Standard Accessibility. This attribute is not interpreted by Oracle Identity Manager and is used to persist values in LDAP.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: No

Bulk-Updatable: No

Read-Only: No

Max-Size: 20

Visible: No

Display-Type: Text

Lookup.Users.AccessibilityMode

screenReader

inaccessible

default

FA Territory

Preferences

Region of the user for LDAP environment.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: No

Read-Only: No

Max-Size: 100

Visible: No

Display-Type: LOV

NA

User Name Preferred Language

Preferences

The preference language of the user used to show only the display name of the user in that language.

Note: The preference can be stored in Oracle Identity Manager, but it is not honored on Oracle Identity Manager UI.

string

Required: No

System-Controlled: No

Encryption: Clear

User-Searchable: Yes

Bulk-Updatable: Yes

Read-Only: No

Max-Size: 20

Visible: No

Display-Type: LOV

Select MLS_LOCALE_CODE as USR_NAME_PREFERRED_LANG from mls_locale where locale_flag=0 OR locale_flag 1 order by mls_locale_code asc


11.3 Default User Accounts

Table 11-3 lists the default user accounts that are created in Oracle Identity Manager.

Table 11-3 Default User Accounts

AccountDescription

XELSYSADM

This account is the Oracle Identity Manager administrator (super-user) and is created during installation. You create a password for this account during installation. To change the password at any later point in time after installation, see "Changing Oracle Identity Manager Administrator Password" in Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager.

WEBLOGIC

This account is used for integrating SOA and Oracle Identity Manager by using the 'User Role Provider' implementation. When SOA is reconfigured to use LDAP-based user-role provider, Oracle Identity Manager does not require this account.

This account is created during installation. You create a password for this account during installation. To change the user name of this account at any later point in time after installation, see "Enabling Oracle Identity Manager to Connect to SOA Using the Administrative Users Provisioned in LDAP" in Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management.

OIMINTERNAL

This account is set to a'run as' user for Message Driven Beans (MDBs) executing JMS messages. This account is created during installation and is used internally by Oracle Identity Manager.

The password of this account is set to a single space character in Oracle Identity Manager database to prevent user login through Oracle Identity Manager Design console or Oracle Identity Manager System Administration Console.

Do not change the user name or password of this account.


11.4 User Management Tasks

You can perform the following user management tasks by using Oracle Identity Self Service:


Note:

For more information about the tasks listed in this section, see "Security Architecture" in Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager.


11.4.1 Searching Users

The search operation lets you search user entities based on the search criteria that you specify. Each search criterion consists of:

  • The attribute to search against

  • The search operators, such as Equals and Starts with

  • The values to search for

To search for users:

  1. Log in to Identity Self Service.

  2. On the left pane, under Administration, select Users. The Manage Users page is displayed.

  3. Select any one of the following options:

    • All: On selecting this option, the search is performed with the AND condition. This means that the search operation is successful only when all the search criteria specified are matched.

    • Any: On selecting this option, the search is performed with the OR condition. This means that the search operation is successful when any search criterion specified is matched.

  4. In the searchable user attribute fields, such as User Login, specify a value. You can include wildcard characters (*) in the attribute value.

    For some attributes, select the attribute value from the list. For example, to search all users with locked accounts, select Locked from the Account Status list.

  5. For each attribute value that you specify, select a search operator from the list. The following search operators are available:

    • Starts with

    • Ends with

    • Equals

    • Does not equal

    • Contains

    • Does not contain

    The search operator can be combined with wildcard characters to specify a search condition. The asterisk (*) character is used as a wildcard character. For example, you can specify the value of the User Login attribute to be Jo* as the search criteria, and select Equals as the search operator. The users with login names that begins with Jo are displayed.

  6. To add a searchable user attribute to the Manage Users page, click Add Fields, and select the attribute from the list of attributes.

    For example, if you want to search all users with the Country attribute as US, then you can add the Country attribute as a searchable field and specify a search condition.


    Note:

    You can configure the attributes that are searchable. The attributes available for search must be a subset of the attributes defined for the user entity that are marked with the Searchable = Yes property.


  7. Optionally click Reset to reset the search conditions that you specified. Typically, you perform this step to remove the specified search conditions and specify a new search condition.

  8. Click Search. The search results is displayed in a tabular format, as shown in Figure:

  9. If you want to hide columns in the search results table, then perform the following steps:

    1. Click View on the toolbar, select Columns, Manage Columns. The Manage Columns dialog box is displayed.

    2. From the Visible Columns list, select the columns that you want to hide.

    3. Click the left arrow icon to add the columns in the Hidden Columns list.

    4. Click OK. The selected columns are not displayed in the search results. A status message displays along the bottom of the search table to identify how many columns are currently hidden. Figure shows that three columns are hidden:

11.4.1.1 Operations on Search Results

This section describes the operations that you can perform based on selection of row(s) in the search results table. It is divided into single selection operations and bulk or multiple selection operations.

You can perform the following single selection operations by selecting a user from the search results table:

  • View detail

  • Modify, only if the user status is active

  • Enable, only if the user status is disabled

  • Disable, only if the user status is enabled

  • Lock, only if the selected user's account is unlocked

  • Unlock, only if the selected user's account is locked

  • Reset password

  • Delete

You can perform the following bulk or multiple selection operations by selecting multiple users from the search results table:

  • Modify

  • Enable, only if the user status is disabled

  • Disable, only if the user status is enabled

  • Lock, only if the selected user's account is unlocked

  • Unlock, only if the selected user's account is locked

  • Delete


Note:

All bulk operations and single operations can be a direct operation or generate a request which is subject to approval, based on the authorization privileges you have determined by the admin roles of the user.


11.4.2 Creating a User

You can create a new user in Oracle Identity Manager by using the Create User page. You can open this page only if you are authorized to create users as determined by the authorization policy on the Create User privilege on any organization in Oracle Identity Manager.


Note:

The create user operation can be a direct operation or generate a request, which is subject to approval, based on the authorization privileges you have.


To create a user:

  1. In Identity Self Service, under Administration, click Users. The Search Users page is displayed.

  2. From the Actions menu, select Create. Alternatively, you can click Create on the toolbar. The Create User page is displayed with input fields for user profile attributes.

  3. Enter details of the user in the Create User page. Table 11-4 describes the fields in the Create User page:

    Table 11-4 Fields in the Create User Page

    SectionFieldDescription

    Justification and Effective Date

    Justification

    Justification for creating the user.


    Effective Date

    Date on which the user must be created.

    Basic User Information

    First Name

    First name of the user.


    Middle Name

    Middle name of the user.


    Last Name

    Last name of the user.


    Email

    E-mail address of the user.


    Manager

    The reporting manager of the user.


    Organization

    The organization to which the user belongs. This is also known as the home organization.


    User Type

    The type of employee, such as consultant, contractor, contingent worker, employee, full-time employee, intern, non-worker, other, part-time employee, or temporary.


    Display Name

    It can have localized values, which can be added by clicking Manage Localizations, and selecting from a list of languages. Display Name is available in 33 languages.

    Account Settings

    User Login

    The user name to be specified for logging in to the Administration Console.


    Password

    The password to be specified for logging in to the Administration console.


    Confirm Password

    Re-enter the password to be specified for logging in to the Administration console.

    Account Effective Dates

    Start Date

    The date when the user will be activated in the system.


    End Date

    The date when the user will be deactivated in the system.

    Provisioning Dates

    Provisioning Date

    Date when user is getting provisioned into the system.


    Deprovisioning Date

    Date when the user is getting deprovisioned from the system.

    Contact Information

    Telephone Number

    The telephone number of the user.


    Home Phone

    The telephone number of the user's residence.


    Home Postal Address

    The postal address of the user's residence.


    Fax

    The fax number of the user.


    Mobile

    The mobile number of the user.


    Pager

    The pager number of the user.


    Postal Address

    The postal address of the user.


    Postal Code

    The postal code number of the user's address.


    PO Box

    The post box number of the user's address.


    State

    The state name of the user.


    Street

    The street name where the user resides.


    Country

    The country where user resides.

    Preferences

    Locale

    The locale code of the user.


    Timezone

    The timezone of the user.

    Other Attributes

    Common Name

    The common name of the user.


    Department Number

    The department number of the user.


    Employee Number

    The employee number of the user.


    Generation Qualifier

    Whether the user qualifies the generation.


    Hire Date

    The hiring date of the user.


    Locality Name

    The name of the locality where user resides.


    Initials

    The initials of the user.


    Title

    The title for the user.


  4. Click Submit. A message is displayed stating that the user is created successfully.


    Tip:

    Users can be created by any one of the following methods:

    • By using Oracle Identity Administration

    • By self registration

    • By using SPML Web service or APIs

    For all the above methods, Oracle Identity Manager uses the default password policy or Password Policy against Default Rule. If you want to use a different password policy, then you must attach the new password policy to the default rule by using Oracle Identity System Administration. To do so, see "Managing Password Policies" in the Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager.


11.4.3 Viewing User Details

The view user operation allows you to view detailed user profile information in the User Details page. You can open this page if you are authorized to view the user's profile as determined by the authorization policy through the View User Details privilege.

To display user details:

  1. In Identity Self Service, under Administration, click Users. The Search Users page is displayed.

  2. Search for the user for which you want to display the details.

  3. In the search results table, click the user login name in the User Login column. The User Details page is displayed.

The user details are displayed in the following tabs:

  • The Attributes Tab: Displays the attribute profile that includes details about basic user information, account effective dates, and provisioning dates. For more details, see "Editing User Attributes".

  • The Roles Tab: Displays a list of roles to which the user belongs. You can click each role to display summary information about the role.

    In the Roles tab, you can assign roles to the user and remove roles from the user. For more details, see "Adding and Removing Roles".

  • The Entitlements Tab: Displays a list of entitlements for the user. You can click each entitlement to display a summary of the entitlement.

    In the Entitlements tab, you can request for entitlements and remove entitlements from the user. For more details, see "Adding and Removing Entitlements".

  • The Accounts Tab: Displays a list of accounts for the user. You can click each account to display a summary of the account.

    Typical tasks you perform in this tab are request for an account, modify and remove accounts, mark an account as primary, and disable and enable accounts. For more details, see "Modifying Accounts".

  • The Direct Reports Tab: Displays a read-only table of users for whom the user is set as the manager. In other words, this tab lists the direct reportees of the user. For each user in the table, it displays the following:

    • Display Name

    • User Login

    • Status

    • Organization

    If you select a row in the table, then summary information about the direct reportee is displayed at the bottom.

    Direct reports allows you to open the user details of the direct reportees. To do so, select a row in the table of direct reportees, and click the open icon on the toolbar.

  • The Admin Roles Tab: Displays a list of admin roles assigned to the user. You can select an admin role to display a summary of the admin role.

    Using the admin role detail information, you can select or deselect the include sub-orgs option. When this option is selected, it specifies that the admin role is applicable to the users of the organization and all the suborganizations of the organization. When this option is not selected, it specifies that the admin role is applicable to the users of the organization only. See "Managing Admin Roles" for more information.

11.4.4 Modifying Users

You can perform administrative user modification tasks from the user details. The modification is broken up across the different tabs in the page that displays user details, which means that modifications done in each tab are independent of each other and must be saved individually. The modifications you can perform in each tab is outlined in the following sections:


Note:

The modify user operation can be a direct operation or generate a request, which is subject to approval, based on the authorization privileges you have.


11.4.4.1 Editing User Attributes

To edit the attributes of a user:

  1. In the Users section under Administration, search for the user for which you want to modify the attributes.

  2. Select the user in the search results table.

  3. Modify the user in one of the following ways:

    • Click Edit on the toolbar.

    • From the Actions menu, select Edit.

    • Click the user login of the user record that you want to disable. On the User Details page, click Modify User on the toolbar.

  4. In the Modify User page, change values of the attributes in the respective fields as required.

  5. Click Submit. The modify attribute operation is completed successfully.

11.4.4.2 Adding and Removing Roles

In the Roles tab of the User Details page, you can add and remove roles. To assign roles for a user:

  1. In the User Details page, click the Roles tab. The Roles tab is displayed with the list of roles assigned to the user.

  2. From the Actions menu, select Request. Alternatively, you can click Request Roles on the toolbar. The Catalog page is displayed.

  3. Click the search icon next to the Catalog field. A list of catalog items available for requesting is displayed.


    Note:

    The catalog items that are available for requesting by a user is governed by authorization privileges defined for the admin roles of the user.


  4. Select the catalog item for the role that you want to request.

  5. Click Add Selected to Cart. The selected role catalog item is added to the request cart.

  6. Click Checkout. The role will be assigned to the user when an approver approves the request.

    You can edit the catalog item by clicking View & Edit.

To remove roles from a user:

  1. In the User Details page, click the Roles tab. The Roles tab is displayed with the list of roles assigned to the user.

  2. Select the role that you want to remove.

  3. From the Actions menu, select Remove. Alternatively, you can click Remove Roles on the toolbar. The Catalog page is displayed.

  4. Click the search icon next to the Catalog field. A list of catalog items available for requesting is displayed.


    Note:

    The catalog items that are available for requesting by a user is governed by authorization privileges defined for the admin roles of the user.


  5. Select the catalog item for the role that you want to remove.

  6. Click Add Selected to Cart. The selected role catalog item is added to the request cart.

  7. Click Checkout. The role is either removed immediately or a request is raised depending on authorization privileges granted to the user.

    You can edit the catalog item by clicking View & Edit.

11.4.4.3 Adding and Removing Entitlements

To request entitlements for a user:

  1. In the User Details page, click Entitlements. The Entitlements tab is displayed with the list of entitlements assigned to the user.

  2. From the Actions menu, select Request. Alternatively, you can click Request Entitlements on the toolbar. The Catalog page is displayed.

  3. Click the search icon next to the Catalog field. A list of catalog items available for requesting is displayed.


    Note:

    The catalog items that are available for requesting by a user is governed by authorization privileges defined for the admin roles of the user.


  4. Select the catalog item for the entitlement that you want to request.

  5. Click Add Selected to Cart. The selected entitlement catalog item is added to the request cart.

  6. Click Checkout. The entitlement will be assigned to the user when an approver approves the request.

    You can edit the catalog item by clicking View & Edit.

To remove entitlements from a user:

  1. In the User Details page, click Entitlements. The Entitlements tab is displayed with the list of entitlements assigned to the user.

  2. Select the entitlement that you want to remove.

  3. From the Actions menu, select Remove. Alternatively, you can click Remove Entitlements on the toolbar. The Catalog page is displayed.

  4. Click the search icon next to the Catalog field. A list of catalog items available for requesting is displayed.


    Note:

    The catalog items that are available for requesting by a user is governed by authorization privileges defined for the admin roles of the user.


  5. Select the catalog item for the entitlement that you want to remove.

  6. Click Add Selected to Cart. The selected entitlement catalog item is added to the request cart.

  7. Click Checkout. The entitlement will be removed from the user when an approver approves the request.

    You can edit the catalog item by clicking View & Edit.

11.4.4.4 Modifying Accounts

You can perform the following account modification operations from the Accounts tab of the User Details page:

11.4.4.4.1 Requesting for an Account

You can request accounts by requesting an application instance. You can request for the following types of accounts (application instances):

  • Primary account: A primary account is the first account created for a user in a target application. In other words, a primary account is the first application instance that is being requested. Oracle Identity Manager supports multiple accounts for a single application instance. The first account that is created is tagged as primary account, and there can be only one primary account for a user. The other accounts (non-primary accounts) are associated with the primary account. When the user requests entitlements, the entitlements are appended to the primary account.

  • Non-primary account: If a user already has a primary account and requests for another account in the same target application, then that account is a non-primary account. A user can have multiple non-primary accounts, but only one primary account.


See Also:

"Marking an Account as Primary" for more information on marking an account as primary


To request for an account:

  1. In the User Details page, click the Accounts tab. This tab lists the accounts of the user.

  2. From the Actions menu, select Request. Alternatively, click Request Accounts on the toolbar. The Catalog page is displayed.

  3. Click the search icon next to the Catalog field. A list of catalog items available for requesting is displayed.


    Note:

    The catalog items that are available for requesting by a user is governed by authorization privileges defined for the admin roles of the user.


  4. Select the catalog item for the account that you want to request. In other words, select the application instance that you want to request.

  5. Click Add Selected to Cart. The selected account catalog item is added to the request cart.

  6. Click Checkout. The account will be granted to the user when an approver approves the request.

    You can edit the catalog item by clicking View & Edit.

11.4.4.4.2 Modifying an Account

To modify an account for the user:

  1. In the Accounts tab, select the account that you want to modify.

  2. From the Actions menu, select Modify. Alternatively, click Modify Accounts on the toolbar. The account details is displayed which is available for editing.

  3. Edit the fields that you want to modify.

  4. Click OK.

11.4.4.4.3 Removing an Account

To remove an account from the user:

  1. In the Accounts tab, from the Actions menu, select Remove. Alternatively, click Remove Accounts on the toolbar. The Catalog page is displayed.

  2. Click the search icon next to the Catalog field. A list of catalog items available for requesting is displayed.


    Note:

    The catalog items that are available for requesting by a user is governed by authorization privileges defined for the admin roles of the user.


  3. Select the catalog item for the account that you want to remove.

  4. Click Add Selected to Cart. The selected account catalog item is added to the request cart.

  5. Click Checkout. The account will be removed from the user when an approver approves the request.

    You can edit the catalog item by clicking View & Edit.

11.4.4.4.4 Marking an Account as Primary

Oracle Identity Manager supports multiple accounts in a single application instance. The first account that is created is tagged as the primary account, and there can be only one primary account for a user. The other accounts (non-primary accounts) are associated with the primary account.

All types of entitlements are available for request in the request catalog. If the request for an entitlement is approved, it is associated with the primary account and not the non-primary account.

When the user gets provisioned to an application instance, Oracle Identity Manager checks if it is the first account provisioned for the user in that application instance. If so, the account is marked as primary. When existing user accounts are reconciled from application instances, the first account that gets reconciled is marked as primary.

A user can have only one primary account. However, Oracle Identity Manager supports multiple accounts for a single application instance. If the account marked as primary is not supposed to be the actual primary account, you can manually change the primary tag for the account and mark another account as primary. By doing so, you can ensure that when the user requests entitlements, the entitlements are appended to the primary account.

To mark an account as a primary account:

  1. In the Accounts tab, select the account that you want to mark as primary.

  2. From the Actions menu, select Make Primary. Alternatively, click Make Primary on the toolbar.

    A message is displayed asking for confirmation.

  3. Click Yes to confirm. The account is marked as primary.

11.4.4.4.5 Disabling an Account

You can disable an account that is in enabled state. To disable an account:

  1. In the Accounts tab, select the account that you want to disable.

  2. From the Actions menu, select Disable. Alternatively, click Disable on the toolbar.

    A message is displayed asking for confirmation.

  3. Click Yes to confirm. The account is disabled.

11.4.4.4.6 Enabling an Account

You can enable an account that is in disabled state. To enable an account:

  1. In the Accounts tab, select the account that you want to enable.

  2. From the Actions menu, select Enable. Alternatively, click Enable on the toolbar.

    A message is displayed asking for confirmation.

  3. Click Yes to confirm. The account is enabled.

11.4.4.5 Modifying Details of Direct Reports

The modify the details of direct reports:

  1. In the User Details page, click the Direct Reports tab. This tab lists the direct reports of the open user.

  2. Select the user or direct report you want to modify.

  3. Click the edit icon on the toolbar. The User details page of the selected direct report is displayed. Use the toolbar and tabs to modify the details of the direct report.

11.4.5 Disabling a User

To disable a user that is in enabled state:

  1. In the Users section under Administration, search for and select the user you want to disable.

  2. Disable the user in one of the following ways:

    • Click Disable on the toolbar.

    • From the Actions menu, select Disable.

    • Click the user login of the user record that you want to disable. On the User Details page, click Disable User on the toolbar.

  3. In the Target Users section, click the plus icon to search for more target users and add to the list of users that you want to disable. You can also view the user details by clicking the User Details link for each user.

  4. In the Justification and Effective Date section, specify a justification and effective date for disabling the selected user.Click Submit. A message is displayed stating that the user is successfully disabled.

11.4.6 Enabling a User

To enable a disabled user:

  1. In the Users section under Administration, search for and select the user you want to enable.

  2. Enable the user in one of the following ways:

    • Click Enable on the toolbar.

    • From the Actions menu, select Enable.

    • Click the user login of the user record that you want to enable. On the User Details page, click Enable User on the toolbar.

  3. In the Target Users section, click the plus icon to search for more target users and add to the list of users that you want to enable. You can also view the user details by clicking the User Details link for each user.

  4. In the Justification and Effective Date section, specify a justification and effective date for enabling the selected user.Click Submit. A message is displayed stating that the user is successfully enabled.

11.4.7 Deleting a User

To delete a user:

  1. In the Users section under Administration, search for and select the user you want to delete.

  2. Delete the user in one of the following ways:

    • Click Delete on the toolbar.

    • From the Actions menu, select Delete.

    • Click the user login of the user record that you want to delete. On the User Details page, click Delete User on the toolbar.

  3. Verify that the selected user is displayed in the Target Users section.

  4. If required, in the Target Users section, click the plus icon to search for more target users and add to the list of users that you want to delete. You can also view the user details by clicking the User Details link for each user.

  5. In the Justification field, enter a justification for deleting the user.

  6. In the Effective Date field, specify a date from which the user account must be removed.

  7. Click Submit. A request to delete the user is created, which is subject to approval.

11.4.8 Locking an Account

To lock the account of a user:

  1. In the Users section under Administration, search for and select the user you want to lock.

  2. Lock the user in one of the following ways:

    • Click Lock Account on the toolbar.

    • From the Actions menu, select Lock Account.

    • Click the user login of the user record that you want to lock. On the User Details page, click Lock Account on the toolbar.

  3. In the confirmation message that is displayed, click Lock. The account of the selected user is locked.

11.4.9 Unlocking an Account

To unlock the account of a user:

  1. In the Users section under Administration, search for and select the user you want to unlock.

  2. Unlock the user in one of the following ways:

    • Click Unlock Account on the toolbar.

    • From the Actions menu, select Unlock Account.

    • Click the user login of the user record that you want to unlock. On the User Details page, click Unlock Account on the toolbar.

  3. In the confirmation message that is displayed, click Unlock. The account of the selected user is unlocked.

11.5 Username Reservation

When the request for user creation is submitted, the following scenarios are possible:

  • While the request is pending, another create user request is submitted with the same username. If the second request is approved and the user is created, then the first request, when approved, fails because the username already exists in Oracle Identity Manager.

  • While the request is pending, another user with the same username is directly created in the LDAP identity store. When the create user request is approved, it fails while provisioning the user entity to LDAP because an entry already exists in LDAP with the same username.

To avoid these problems, you can reserve the username in both Oracle Identity Manager and LDAP while the create user request is pending for approval. If a request is created to create a user with the same username, then an error message is displayed and the create user request is not created.


See Also:

"Creating Requests" for information about creating requests to create a user


For reserving the username:

  • The USER ATTRIBUTE RESERVATION ENABLED system property must be set to TRUE for the functionality to be enabled. For information about searching and modifying system properties, see "Managing System Properties" in the Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager.

  • Reservation in LDAP is done only if reservation functionality is enabled, and LDAP is in sync with Oracle Identity Manager database. For information about synchronization between Oracle identity Manager and LDAP identity store, see "Integration Between LDAP Identity Store and Oracle Identity Manager" in Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager.


    Note:

    • If LDAP provider is not configured, then the reservation is done only in Oracle Identity Manager.

    • When LDAP synchronization and user attribute reservation features are enabled, it is recommended to enable UID uniqueness in the directory server. Without this, user reservation in the directory does not work properly because while the user is reserved in the reservation container, the user with the same user ID can be created in the user container. This results is user creation failure when Oracle Identity Manager tries to move the user from the reservation container to the user container.


If user attribute reservation is enabled, the reservation happens in two phases:

In the first phase, an entry is created in Oracle Identity Manager database and a user is created in reservation container. This entry in Oracle Identity Manager database is removed after successful creation of user, rejection by approver, or request failure.

In the second phase, in LDAP, on successful creation, the user is moved to the reservation container. In other cases such as rejection by approver or request failure, the user is removed from the reservation container.

After the request-level and operation-level approvals are obtained for the create user request, the username is no longer reserved in the username container in LDAP. The username is moved to the container in which the existing users are stored. The user is also created in Oracle Identity Manager.

This section consists of the following topics:

11.5.1 Enabling and Disabling Username Reservation

The username reservation functionality is enabled by default in Oracle Identity Manager. This is done by keeping the value of the USER ATTRIBUTE RESERVATION ENABLED system property to TRUE. You can verify the value of this system property in the System Configuration section of the Oracle Identity Manager System Administration Console.

To disable username reservation:

  1. Log in to Oracle Identity System Administration.

  2. In the left pane, under System Management, click System Configuration. The Advanced Administration opens in a new window.

  3. In the left pane, click the search icon to search for all existing system properties. A list of system properties are displayed in the search results table.

  4. Click User Attribute Reservation Enabled. The System Property Detail page for the selected system property is displayed, as shown in Figure 11-2:

    Figure 11-2 The System Property Detail Page

    Description of Figure 11-2 follows

  5. In the Value field, enter False.

  6. Click Save. The username reservation functionality is disabled.

11.5.2 Configuring the Username Policy

Username Policy is a plugin implementation for username operations such as username generation and username validation. You can change the default policies from the System Configuration section in Oracle Identity System Administration.

In case of a Create User usecase, the plugins are invoked only if the user login is not provided. In such a case, the plugin to be invoked is picked up from the system property, "Default policy for username generation".

Table 11-5 lists the predefined username policies provided by Oracle Identity Manager. In this table, the dollar ($) sign in the username generation indicates random alphabet:

Table 11-5 Predefined Username Policies

Policy NameExpected InformationUsername Generated

oracle.iam.identity.usermgmt.impl.plugins.EmailIDPolicy

E-mail

E-mail value is used as the auto-generated user name

oracle.iam.identity.usermgmt.impl.plugins.LastNameFirstInitialLocalePolicy

First name, last name, and locale

last name + first initial_locale, last name + middle initial + first initial_locale, last name + $ + first initial_locale (all possibilities of single random alphabets), last name + $$ + first initial_locale

oracle.iam.identity.usermgmt.impl.plugins.FirstInitialLastNameLocalePolicy

Firstname, Lastname, Locale

first initial + lastname_locale, first initial + middle initial + first name_locale, first initial + $ + lastname_locale, first initial + $$ + lastname_locale

oracle.iam.identity.usermgmt.impl.plugins.LastNameFirstInitialPolicy

Firstname, Lastname

lastname+firstInitial, lastname+middleinitial+firstInitial, lastname+$+firstInitial ( all possibilities of single random alphabets) , lastname+$$+firstInitial

oracle.iam.identity.usermgmt.impl.plugins.FirstInitialLastNamePolicy

Firstname, Lastname

firstInitial+lastname, firstInitial+middleInitial+firstname, firstInitial+$+lastname, firstInitial+$$+lastname

oracle.iam.identity.usermgmt.impl.plugins.LastNameFirstNamePolicy

Firstname, Lastname

lastname.firstname, lastname.middleinitial.firstname, lastname.$.firstname ( all possibilities of single random alphabets) , lastname.$$.firstname

oracle.iam.identity.usermgmt.impl.plugins.FirstNameLastNamePolicy

Firstname, Lastname

firstname.lastname, firstname.middleinitial.lastname, firstname.$.lastname (all possibilities of single random alphabets) , firstname.$$.lastname

oracle.iam.identity.usermgmt.impl.plugins.DefaultComboPolicy

Any one of the following:

- Email

- Firstname, Last Name

- Last name.

If e-mail is provided, then username is generated based on the e-mail. If e-mail is not available, then it generates username based on firstname and lastname by appending a user domain to it. If first name is not available, then it generates the username based of the last name only by appending a user domain to it.

The user domain is configured as the Default user name domain system property, and the default value is @oracle.com

oracle.iam.identity.usermgmt.impl.plugins.LastNamePolicy,

Lastname

lastname, middle initial + lastname , $ + lastname, $$ + lastname

oracle.iam.identity.usermgmt.impl.plugins.LastNameLocalePolicy

Lastname, Locale

lastname_locale, middle initial + lastname_locale , $ + lastname_locale, $$ + lastname_locale

oracle.iam.identity.usermgmt.impl.plugins.FirstNameLastNamePolicyForAD

Firstname, Lastname

firstname+lastname, substring of firstname+lastname+$, substring of firstname+ substring of lastname+$

oracle.iam.identity.usermgmt.impl.plugins.LastNameFirstNamePolicyForAD

Lastname, Firstname

lastname+firstname, lastname+substring of firstname+$, substring of lastname+ substring of firstname+$


The policy implementations generate the username, check for its availability, and if the username is not available, then generate other username based on the policy in the order mentioned in Table 11-5, and repeat the procedure. The dollar ($) sign in the username generation indicates random alphabet. If any of the expected information is missing, then the policies generate errors.

Values must be provided for all the parameters of the username generation format. If any of the parameters are not provided, then Oracle Identity Manager generates an error. For example, If the firstname.lastname policy is configured and the firstname is not provided, then the error would be "An error occurred while generating the Username. Please provide firstname as expected by the firstname.lastname policy".

The username generation is exposed as public APIs in User Manager. Oracle Identity Manager provides an utility class for accessing the functionality of generating user names. The class that contains utility methods is as shown:

oracle.iam.identity.usermgmt.api.UserManager

The UserManager class exposes the following public API for username generation and validation:

//Method that will generate username based on default policy

    public String generateUserNameFromDefaultPolicy(Map<String,  Object> attrMap)
 throws UserNameGenerationException,  UserManagerException;

//Method that will generate username based on policy

    public String generateUserNameFromPolicy(String policyId,  Map<String, Object> 
attrMap) throws UserNameGenerationException,  UserManagerException;

//Method that will check whether username is valid against default policy

    public boolean isUserNameValidForDefaultPolicy(String userName,  Map<String, 
Object> attrMap) throws UserManagerException;

//Method that will check whether username is valid against given policy

    public boolean isUserNameValidForPolicy(String userName, String  policyId, 
Map<String, Object> attrMap) throws  UserManagerException;

//Method to return all policies (including customer written)

        public List<Map<String, String>> getAllUserNamePolicies(Locale locale)

//Method that will return policy description in given locale

    public String getPolicyDescription(String policyID, Locale locale)

Table 11-6 lists the constants defined in the UserManager class to represent the policy ID of the default username policies:

Table 11-6 Constants Representing Policy IDs

Policy NameConstant

EmailUserNamePolicy

EMAIL_ID_POLICY

LastNameFirstInitialLocalePolicy

FIRSTNAME_LASTNAME_POLICY

FirstInitialLastNameLocalePolicy

LASTNAME_FIRSTNAME_POLICY

LastNameFirstInitialPolicy

FIRSTINITIAL_LASTNAME_POLICY

FirstInitialLastNamePolicy

LASTNAME_FIRSTINITIAL_POLICY

LastNameFirstNamePolicy

FIRSTINITIAL_LASTNAME_LOCALE_POLICY

FirstNameLastNamePolicy

LASTNAME_FIRSTINITIAL_LOCALE_POLICY

DefaultComboPolicy

DEFAULT_COMBO_POLICY

LastNamePolicy

LASTNAME_POLICY

LastNameLocalePolicy

LASTNAME_LOCALE_POLICY

FirstNameLastNamePolicyForAD

FIRSTNAME_LASTNAME_POLICY_FOR_AD

LastNameFirstNamePolicyForAD

LASTNAME_FIRSTNAME_POLICY_FOR_AD


When called to generate username, the policy classes expect the attribute values to be set in a map by using the key constants defined in the oracle.iam.identity.utils class.Constants. This means that a proper parameter value must be passed to call the method by using the appropriate constant defined for it, for example, the FirstName parameter has a constant defined for it.

The default username policy can be configured by using the Oracle Identity System Administration. To do so:

  1. Navigate to the System Configuration section.

  2. Search for all the system properties.

  3. Click Default policy for username generation. The System Property Detail page for the selected property is displayed, as shown in Figure 11-3:

    Figure 11-3 The Default Username Policy Configuration

    Description of Figure 11-3 follows

    The XL.DefaultUserNameImpl system property is provided for picking up the default policy implementation. By default, it points to the default username policy, which is oracle.iam.identity.usermgmt.impl.plugins.DefaultComboPolicy displayed in the Value field.

  4. In the Value field, enter oracle.iam.identity.usermgmt.impl.plugins.POLICY. Here, POLICY is one of the policy implementations.


    Note:

    All the plug-ins must be registered with Oracle Identity Manager by using the /identity/metadata/plugin.xml file. A sample plugin.xml file is as shown:

    <plugins pluginpoint="oracle.iam.identity.usermgmt.api.UserNamePolicy">        <plugin
    pluginclass="oracle.iam.identity.usermgmt.impl.plugins.LastNameFirstNamePolicy"
    version="1.0" name="LastNameFirstNamePolicy"/>
    </plugins>
    

  5. Click Save.

11.5.3 Writing Custom User Name Policy

You can write your own policies by adding new plug-ins and changing the default policies from the System Configuration section in Oracle Identity System Administration.


See Also:

"Developing Plug-ins" in the Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager for information about the plug-in framework


The UserManager exposes APIs for username operations. The APIs take the user data as input and return a generated username. The APIs make a call to plug-ins that return the username. This allows you to replace the default policies with custom plug-ins with your implementation for username operations.


Note:


You can write your own username policies by implementing the plug-in interface, as shown:

package oracle.iam.identity.usermgmt.api;

public interface UserNameGenerationPolicy extends
 oracle.iam.identity.usermgmt.api.UserNamePolicy {
public String getUserName(Map<String, Object> reqData) throws UserNameGenerationException;
public boolean isGivenUserNameValid(String userName, Map<String, Object> reqData);

//methods inherited from old user name policy interface
//oracle.iam.identity.usermgmt.api.UserNamePolicy
public String getUserNameFromPolicy(HashMap<String, String> reqData) throws UserNameGenerationException;
public boolean isUserNameValid(String userName, HashMap<String, String> reqData);
public String getDescription(Locale locale);

}

This plug-in point is exposed as a kernel plug-in that takes request data as input and returns the username. Each plug-in expects some information and generates username based on that information provided.


Note:

Oracle Identity Manager provides an abstract implementation of the oracle.iam.identity.usermgmt.api.UserNameGenerationPolicy interface as the oracle.iam.identity.usermgmt.api.AbstractUserNameGenerationPolicy class name. Therefore, you need not implement the following two methods:

public String getUserNameFromPolicy(HashMap<String, String> reqData) throws UserNameGenerationException;

public boolean isUserNameValid(String userName, HashMap<String, String> reqData);

All the plug-ins must be registered with Oracle Identity Manager by using the /identity/metadata/plugin.xml file. A sample plugin.xml file is mentioned below:

<plugins pluginpoint="oracle.iam.identity.usermgmt.api.UserNamePolicy"> 
<pluginpluginclass="oracle.iam.identity.usermgmt.impl.plugins.CustomDepartmentNumberEmployeeNumberPolicy "
version="1.0" name="CustomDepartmentNumberEmployeeNumberPolicy"/>
</plugins>

The following are the guidelines on while writing custom user name policies:

  • Policies should implement the new interface oracle.iam.identity.usermgmt.api.UserNameGenerationPolicy.

  • Custom user name policies must be re-entrant. This means that the custom code in the policy should return the same user login if approver has updated an attribute that does not contribute in generating the user login.

For sample implementation please refer below:

package oracle.iam.identity.usermgmt.impl.plugins;

import java.util.Locale;
import java.util.Map;

import oracle.iam.identity.exception.UserNameGenerationException;
import oracle.iam.identity.usermgmt.api.AbstractUserNameGenerationPolicy;
import oracle.iam.identity.usermgmt.api.UserManagerConstants;
import oracle.iam.identity.usermgmt.api.UserNameGenerationPolicy;

public class CustomDepartmentNumberEmployeeNumberPolicy extends AbstractUserNameGenerationPolicy implements UserNameGenerationPolicy {


          private String departmentNumberKey = UserManagerConstants.AttributeName.DEPARTMENT_NUMBER.getId();

          private String employeeNumberKey = UserManagerConstants.AttributeName.EMPLOYEE_NUMBER.getId();

          @Override
          public String getUserName(Map<String, Object> reqData)
                                    throws UserNameGenerationException {

          String departmentnumber = reqData.get(departmentNumberKey) == null ? null : reqData.get(departmentNumberKey).toString();

          String employeeNumber = reqData.get(employeeNumberKey) == null ? null : reqData.get(employeeNumberKey).toString();
           
          // Required in case of approver edit. If approver has not modified any attribute which contributes in user name generation , then return same old user login

          //Check if user data is not changed using checkForSameUserLogin method present in AbstractUserNameGenerationPolicy, then return same user login

          //OR use Map<String, Object> existingData = (Map<String, Object>) reqData.get(oracle.iam.identity.usermgmt.api.UserManagerConstants.EXISTING_DATA ) to implement your own comparison logic

          // If existingData is NULL, it means generate a new user login. If it is not NULL, then it means policy is invoked during approver edit.

          // If it is NOT NULL, Compare value of participating attributes from existingData and reqData. If same, return same user login as present in existingData ; otherwise generate a new user login.

          String oldUserLogin = checkForSameUserLogin(reqData , new String[]{departmentNumberKey , employeeNumberKey});
               if(oldUserLogin!=null)
                    return oldUserLogin;

               // TODO: DO basic validations. Also, Ensure newly generated user name is unique and not reserved. You may use utility methods in oracle.iam.identity.usermgmt.utils.UserNamePolicyUtil for preforming validations.
               return departmentnumber + "-" + employeeNumber;
          }

          @Override
          public boolean isGivenUserNameValid(String userName, Map<String, Object> reqData) {
               // TODO : custom implementation
               return true;
}

@Override
public String getDescription(Locale locale) {
               return "User Name Generation Policy using department number and employee number";
     }

}

11.5.4 Releasing the Username

The username is released in the following scenarios:

  • When the request is approved, and the user is successfully created in Oracle Identity Manager and provisioned to LDAP, and the username from the reserved table is removed. The reserved username is removed after successful user creation after the approvals. The reserved entry in LDAP is removed and the actual user is created.

  • If the request is rejected, then the reserved entry of username in LDAP and Oracle Identity Manager is removed.

  • If the request fails while or before creating a user in Oracle Identity Manager or LDAP, then the reserved username is deleted.

11.5.5 Configuring Username Generation to Support Microsoft Active Directory

In Oracle Identity Manager deployment with LDAP synchronization is enabled, where Microsoft Active Directory (AD) is the data store, the User Login attribute in Oracle Identity Manager is mapped to the uid attribute in LDAP, which in turn is mapped to the sAMAccountName attribute. The sAMAccountName attribute is used as login for all AD-based applications. There is a limitation on the maximum length supported for value contained in the sAMAccountName attribute in AD. It cannot exceed 20 characters.

Oracle Identity Manager accepts user name as an input at the time of user creation and it can be more than 20 characters. Because AD does not support user name of more than 20 characters, Oracle Identity Manager can be configured to generate the user name, which consists of less than 20 characters.

When AD is used as data store, you can configure the autogeneration of user name by setting the value of the XL.DefaultUserNamePolicyImpl system property to any one of the following:

  • FirstNameLastNamePolicyForAD: Generates the user login by prefixing a substring from the first name to that of the last name

  • LastNameFirstNamePolicyForAD: Generates the user login by prefixing a substring from last name to that of the first name

See "Administering System Properties" for information about the XL.DefaultUserNamePolicyImpl system property and setting values of system properties.


Note:

If AD is the data store, then any one of the FirstNameLastNamePolicyForAD or LastNameFirstNamePolicyForAD policies must be used. Any other user name generation policy will fail to generate the user name.


11.6 Common Name Generation

The generation of the Common Name user attribute value in Oracle Identity Manager is described in the following sections:

11.6.1 Common Name Generation for Create User Operation

In an LDAP-enabled deployment of Oracle Identity Manager, Fusion applications such as Human Capability Management (HCM) does not pass the common name via SPML request. Given that the common name is a mandatory attribute in LDAP and Oracle Identity Manager is setup to use it as the RDN, Oracle Identity Manager must generate a unique common name.

Based on the description on Common Name, it is the user's display name consisting of first name and last name. Therefore, Oracle Identity Manager generates the Common Name with the help of a common name generation policy that specifies the Common Name in the "firstname lastname" format.

To configure common name generation in Oracle Identity Manager, set the value of the XL.DefaultCommonNamePolicyImpl system property to oracle.iam.identity.usermgmt.impl.plugins.FirstNameLastNamePolicy. For information about the XL.DefaultCommonNamePolicyImpl system property and setting the value of a system property, see "Managing System Properties" in the Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager.

The following are the details of the FirstNameLastNamePolicy:

  • Expected information: Firstname, Lastname

  • Common Name generated: firstname.lastname, firstname.$.lastname (all possibilities of single random alphabets), firstname.$$.lastname and so on until a unique common name is generated


    Note:

    The common name must be reserved until the user is created by the request so that multiple requests generated simultaneously having same first and last names do not generate the same common name.


11.6.2 Common Name Generation for Modify User Operation

When the user profile is modified, one or more attributes can change. HCM cannot filter out and send only the modified data to Oracle Identity Manager because it does not have the old user attributes and cannot determine which ones are modified. Therefore, all attributes including the common name (CN) are passed to Oracle Identity Manager by the SPML request. Because the CN changed, Oracle Identity Manager attempts a modify operation (modrdn) in the directory resulting in DN change. Because of this unintended DN change, the group membership DN becomes stale resulting in the user loosing membership in that group. This subsequently results in authorization failure. This happens when referential integrity is turned off in the LDAP server, and therefore, the referenced groups are not updated when the RDN of the user changes. Therefore, referential integrity must be turned on in the target LDAP server. Otherwise, the group memberships become stale. The referential integrity issue is also applicable to roles. Groups are also members of other groups and any RDN changes must be reflected as well.

You can turn on the referential integrity by setting the value of the XL.IsReferentialIntegrityEnabled system property to TRUE. For information about this system property, see "Managing System Properties" in the Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager.

Table 11-7 lists the possible scenarios when RDN is modified:

Table 11-7 RDN Modification Scenarios

Referential Integrity in LDAPXL.IsReferentialIntegrityEnabledResult of Modify Operation (modrdn)

Disabled

FALSE

Oracle Identity Manager generates an error and operation fails.

Disabled

TRUE

Modify operation passes from Oracle Identity Manager and RDN is changed in LDAP. However, the group references are not updated and are stale. This configuration is not recommended.

Enabled

FALSE

Oracle Identity Manager generates an error and modify operation fails. This property must be set to TRUE in Oracle Identity Manager because referential integrity is enabled in LDAP.

Enabled

TRUE

Modify operation passes and RDN is updated. In addition, the references for the DN are updated in LDAP.

Multiple directories with roles and users stored in separate directories.

Referential integrity property is not relevant here.

FALSE

Modify operation fails from Oracle Identity Manager. This is not supported by LDAP. Therefore, FALSE is the recommended value in Oracle Identity Manager for the property.

Multiple directories with roles and users stored in separate directories.

Referential integrity property is not relevant here.

TRUE

Modify operation passes and RDN is modified. However, because LDAP does not support referential integrity in multiple directories, the group references are stale and must be manually updated.


PK<uPK8^EOEBPS/partpage_con.htm3 Concepts

Part I

Concepts

This part introduces Oracle Identity Manager and describes the concepts related to Oracle Identity Manager.

It contains the following chapters:

PK w*83PK8^EOEBPS/selfservice.htmSF Oracle Identity Self Service Interface

2 Oracle Identity Self Service Interface

This chapter will help you familiarize with Oracle Identity Self Service. This will enable you to quickly find the information you need and complete the required tasks easily.

This chapter discusses the following topics:

2.1 Logging in to Oracle Identity Self Service

To log in to Oracle Identity Self Service:

  1. Browse to the following URL by using a Web browser:

    http://HOSTNAME:PORT/identity
    

    In this URL, HOSTNAME represents the name of the computer hosting the application server and PORT refers to the port on which the server is listening.


    Note:

    The application name, identity, is case-sensitive.


  2. After the Identity Self Service login page is displayed, log in with your user name and password.


See Also:

"Accessing Oracle Identity Self Service" for detailed information on logging in


2.2 Overview of the Oracle Identity Self Service Interface

Oracle Identity Self Service provides user self-service and delegated identity administration features that serve most of the users of Oracle Identity Manager. This console provides access to the self service console and unauthenticated self service console. Figure 2-1 shows these two consoles.

Figure 2-1 Login Page of Oracle Identity Self Service

Description of Figure 2-1 follows

Identity Self Service supports access to unauthenticated self-service tasks in the Unauthenticated Self Service Console. Users who have not authenticated into, or not logged in to Identity Self Service can access the Unauthenticated Self Service Console by clicking the Forgot User Login?, Forgot Password?, New User Registration, or Track My Information links. This console enables an unauthenticated user to retrieve a forgotten user login ID or password, register to the Oracle Identity Manager environment, and track the registration. See "Registering to Self Service" and "Accessing Oracle Identity Self Service" chapters for more information.

Access to authenticated self-service tasks is available by logging in to Identity Self Service. The interface of Identity Self Service is composed of the following areas:

Figure 2-2 shows a sample page and the layout of Identity Self Service.

Figure 2-2 Layout of Oracle Identity Self Service

Description of Figure 2-2 follows

2.2.1 Links

This area consists of the following links in the upper-right-hand corner of the interface:

2.2.1.1 Accessibility

Identity Self Service has been designed to adhere to the standards set in Section 508 of the Rehabilitation Act and the World Wide Web Consortium's Web Content Accessibility Guidelines 2.0 AA (WCAG 2.0 'AA").

When you click the Accessibility link in the upper right corner of the page, the Accessibility dialog box is displayed. You can select one of the following options from the Accessibility dialog box:

  • I use a screen reader

    Select this option if you want to use a screen reader.

  • I use high contrast colors

    Select this option to use the high-contract color scheme that you have specified in your operating system, rather than using the default color scheme specified in Identity Self Service.

  • I use large fonts

    Select this option if you want to change the font size for easy viewing and readability.

2.2.1.2 Sandboxes

A sandbox represents an area where metadata objects can be modified without affecting their mainline usage. In other words, a sandbox is a temporary storage area to save a group of runtime page customizations before they are either saved and published to other users, or discarded.

In the Manage Sandboxes page, you can create, delete, activate, deactivate, and publish sandboxes. See the "Managing Sandboxes" section in Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager for detailed information.

2.2.1.3 Help

Identity Self Service includes a help system. Clicking the Help link opens the help system in a new window. In addition, Identity Self Service provides context-sensitive help. For example, if you are in the Catalog page and click the Help link, then help content related to catalog is displayed.

Figure 2-3 shows a sample page and default layout of the help interface.

Figure 2-3 Layout of the Help Interface

Description of Figure 2-3 follows

The default view of the help system consists of three panes:

2.2.1.3.1 Top Pane

The top pane consists of the following:

  • Book drop-down list: From this drop-down list you can select one of the following values:

    • Help Topics for Oracle Identity Manager: Select this value to open all help topics for Oracle Identity Manager.

    • Administrator's Guide for Oracle Identity Manager: Select this value to open the online help version of Oracle Fusion Middleware Administrator's Guide for Oracle Identity Manager.

    • Developer's Guide for Oracle Identity Manager: Select this value to open the online help version of Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager.

    • User's Guide for Oracle Identity Manager: Select this value to open the online help version of Oracle Fusion Middleware User's Guide for Oracle Identity Manager.

    • Custom Help Topics for Oracle Identity Manager: Select this value to open any custom help topics.

  • Search field: Specify any word or term to search for in the help system.

  • View: From the View menu, you can select any one of the following options:

    • Maximize Reading Pane: Collapses the lower left pane to maximize the reading pane, which is the lower right pane.

    • Restore Default Window Layout: Restore the current layout of the help system to the default layout.

    • Contents: Restores the lower left pane to display the Contents region along with the help topics, if it is not already being displayed.

    • Search: Displays the Search region in the lower left pane. In the Search region, you can search for help topic and the search results are displayed in a tabular format. Here are a few guidelines on performing a search:

      • Search criterion specified in the Search field can be made case sensitive by selecting the Case Sensitive option.

      • To define your search precisely, you can specify the boolean operators & (for AND), |(for OR), ! (for NOT) in your search criterion, select the Boolean expression option, and then click Search.

      • To search for help topics containing all words specified in the search criterion, select All words.

      • To search for help topics containing any word specified in the search criterion, select Any words.

    • Show permanent link for this topic page: If you want to save the link to a help topic for future reference, then from the View menu, select Show permanent link for this topic page. In the dialog box that is displayed, right-click the link to the help topic and select one of the following options:

      • Bookmark This Link: Adds the help topic URL to the browser bookmarks.

      • Copy Link Location: Copies the help topic URL to the clipboard.

  • Toolbar: The help system contains a toolbar that provides action buttons for certain tasks. You can view the name of the button by moving the mouse pointer over the button. The following buttons are available:

    • Go back one page: Takes you back to the page containing the previous help topic.

    • Go forward one page: This icon is enabled only if you have clicked the Go back one page icon. Clicking the Go forward one page icon takes you to the next page in the sequence of topics you visited.

    • Print this topic page: Prints the current help topic.

    • Email this topic page: Drafts an email with a link to the help topic currently displayed in the help system. This draft can be sent to the desired email recipient.

    • Link to this topic page: Saves the link to a help topic for future reference by right-clicking the link to the help topic in the dialog box that is displayed, and then selecting one of the following options:

      • Bookmark This Link: Adds the help topic URL to the browser bookmarks.

      • Copy Link Location: Copies the help topic URL to the clipboard.

2.2.1.3.2 Lower Left Pane

The left pane contains the Contents and Search regions. By default, the Contents region is expanded. The Contents region displays links to help topics depending on the option you select from the Book drop-down list in the top pane. You can click the arrow icon beside Contents to expand or collapse the Contents region.

2.2.1.3.3 Lower Right Pane

The lower right pane displays any help topic that you search for or open from the Contents and Search regions in the lower left pane. This pane is also known as the reading pane.

2.2.1.4 Sign Out

Click the Sign Out link to log out of Identity Self Service.

2.2.2 Left and Right Panes

Every page in Identity Self Service is divided into two panes. The left pane consists of sections that contain links to regions using which a variety of tasks can be accomplished. The left pane is the primary navigation tool and is displayed on all web pages of Identity Self Service. Depending on the link that you click in the left pane, corresponding details are displayed in the right pane.

The left pane consists of these regions:

2.2.2.1 Home

The Home page provides you a snapshot of the various functions in Identity Self Service. By default, this page contains the Pending Requests, Pending Approvals, My Accounts, Direct Reports, Getting Started Help Topics, and Change Password containers. You can personalize the Home page by rearranging, hiding, removing, or modifying containers.

See "Personalizing Self Service" for more information.

2.2.2.2 My Profile

The My Profile region contains the following:

  • My Information

    Use this page to view and modify personal details of your profile such as changing passwords, setting challenge questions and response, and so on.

    See "Managing Profile Information" for more information.

  • My Access

    This page displays entities such as Roles, Entitlements, Accounts, and Admin Roles, to which you have access. In this section, you can request for, remove, or modify entities.

    See "Managing Access" for more information.

2.2.2.3 Requests

The Request region contains the following:

  • Catalog

    Use this page to search for, view, and request catalog items such as roles, entitlements, and application instances.

    See "Using the Access Request Catalog" for more information.

  • Track Requests

    Use this page to search for and track requests raised by you and requests raised for you. You can search for requests based on request ID, status, request type, requested date, beneficiary, and requester.

    See "Tracking a Request" for more information.

  • Pending Approvals

    Use this page to view and manage approval tasks that correspond to requests that are in the user or administrator's queue to be approved.

    See "Managing Approval Tasks" for more information.

  • Pending Attestations

    Use this page to view and manage attestation tasks that correspond to outstanding attestation process in the user or administrator's queue.

    See "Managing Attestation Tasks" for more information.

2.2.2.4 Administration

The Administration region contains the following:

  • Users

    Use this page to view and manage users. Some of the user management tasks that you can perform in this page include creating, modifying, deleting, enabling, and disabling users.

    See "Managing Users" for more information.

  • Roles

    Use this page to view and manage roles. Some of the role management tasks that you can perform in this page include creating, viewing, administering, and deleting roles.

    See "Managing Roles" for more information.

  • Role Categories

    Use this page to view and manage role categories. See "Creating and Managing Role Categories" for more information.

  • Organizations

    Use this page to view and manage organizations. Some of the organization management tasks include creating, viewing, modifying, and deleting organizations.

    See "Managing Organizations" for more information.

  • Attestation Dashboard

    Use this page to view the state of attestation processes that are owned by any group of which you are a member.

    See "Using the Attestation Dashboard" for more information.

  • Open Tasks

    Use this page to view and manage provisioning tasks that correspond to tasks instantiated by requests, or pending manual provisioning tasks, or failed automatic provisioning tasks in the user or administrator's queue.

    See "Managing Provisioning Tasks" for more information.

PK^jSSPK8^EOEBPS/part_idm.htm7 Identity Administration

Part III

Identity Administration

This part describes Oracle Identity Manager delegated administration functionalities by using the identity administration features.

It contains the following chapters:

PK+͞Q<7PK8^EOEBPS/glossary.htm Glossary

Glossary

access policy

This is a list of user groups and the resources with which users in the group are to be provisioned or deprovisioned. Access policies are defined using the Access Policies menu item in Oracle Identity Manager Web admin console.

adapter

A Java class, generated by the Adapter Factory, that enables Oracle Identity Manager to interact with an external .jar file, a target IT resource (for example, a resource asset), or a user-defined form.

An adapter extends the internal logic and functionality of Oracle Identity Manager. It automates process tasks, and defines the rules for the auto-generation and validation of data in fields within Oracle Identity Manager.

There are five types of adapters: task assignment adapters, task adapters, rule generator adapters, pre-populate adapters, and entity adapters.

adapter factory

A code-generation tool provided by Oracle Identity Manager, which enables a User Administrator to create Java classes, known as adapters.

adapter task

This is one of several possible components within an adapter. And this is a logical step within an adapter, equivalent to calling a programming language method. The following types of adapter tasks are available: Java Task, Remote Task, Stored Procedure Task, Utility Task, Oracle Identity Manager API Task, Set Variable Task, Error Handler Task, and Logic Task.

adapter variable

This is a user-defined placeholder within the adapter that contains runtime application data used by its adapter tasks. An adapter variable may be used multiple times within a single adapter.

Admin Roles

Roles that are predefined in Oracle Identity Manager that have a one-to-one mapping to the Application Roles defined in Oracle Entitlement Server. Application Roles are Oracle Entitlements Server (OES) construct and cannot be viewed or assigned through Oracle Identity Manager. Hence, each Application Role in OES will have a corresponding Admin Role in Oracle Identity Manager

Application Instance

An entity that depicts the intersection between an IT resource instance and a resource object. Users are expected to have accounts and entitlements tied to application instance and not to the IT resource instance or resource object. Today, some Oracle Identity Manager features work at IT resource instance level and some work at resource object level. With the introduction of this entity, all accounts and entitlements will be consistently identified at Application Instance level.

Application Program Interface (API)

This is the interface (calling conventions) by which an application program accesses an operating system and other services. An API is defined at the source code level and provides a level of abstraction between the application and the kernel (or other privileged utilities) to ensure the portability of the code.

An API can also provide an interface between a high-level language and lower-level utilities and services that were written without consideration for the calling conventions supported by compiled languages. In this case, the main task of the API may be the translation of parameter lists from one format to another and the interpretation of call-by-value and call-by-reference arguments in one or both directions.

Application Roles

Predefined roles in Oracle Entitlements Server that govern the policies and permissions each of these roles can perform.

approval policy

Approval policy is a configurable entity of request management that helps associate various request types with approval processes defined in the request service only for request-level and operation-level approvals. It associates approval workflows to be initiated at request or operation levels for a request type. You can use approval policies to associate various request types with various approval processes, which are the SOA-based workflows. Approval policies control which approval process is to be invoked based on the request data evaluation.

approval task

Approval tasks are instantiated by request service and correspond to associated requests that are in the user or administrator's queue to be approved.

attestation

Attestation enables users designated as reviewers to be notified of reports they must review. These reports describe entitlements of other users. A reviewer can attest to the accuracy of these entitlements by providing a response.

attestation process

An attestation process is the mechanism by which an attestation task is set up. Input that an attestation process requires includes information about how to define the components that constitute the attestation task and how to associate the attestation task with a schedule at which the task must be run.

attestation task

The attestation action, along with the response the reviewer provides, any associated comments, and an audit view of the data that the reviewer views and attests to, is tracked and audited to provide a complete trail of accountability. In Oracle Identity Manager, this process is known as an attestation task.

authoritative identity reconciliation

This is also known as "Trusted Source Reconciliation", which can be used to create, update, and delete users in Oracle Identity Manager.

beneficiary

A beneficiary is an entity that benefits from the action performed after the request is completed and the request is completed only if it is executed successfully.

Bulk Load Utility

The Bulk Load utility is aimed at automating the process of loading a large amount of data into Oracle Identity Manager. It helps reduce the downtime involved in loading data. You can use this utility after you install Oracle Identity Manager or at any time during the production lifetime of Oracle Identity Manager. Bulk Load utility can be used to load user, account, role, role hierarchy, role membership, and role category data into Oracle Identity Manager.

callback service

The callback service invokes deployment-specific logic at predetermined points during Oracle Identity Manager event processing. The callback service triggers notifications and callbacks that allow external applications to perform some action as a part of Oracle Identity Manager event processing.

Catalog

Catalog, also known as Request Catalog, offers a consistent and intuitive request experience for customers to request roles, entitlements and application instance following the commonly used Shopping Cart paradigm. The catalog is a structured commodity with its own set of metadata.

Catalog Item

A catalog item is an entity, such as roles, entitlements or application instances, that can be requested by a user, either for themselves or on behalf of other users.

Catalog Item Navigation Category

A catalog Item Navigation Category is a way to organize the request catalog. Each catalog item is associated with one and only one category. A catalog item navigation category is an attribute of the catalog item. Catalog Administrators can edit a Catalog Item and provide a value for the category.

Connected Resource

Target systems that are online and have ways to provision directly by using connectors.

connector

Used to integrate Oracle Identity Manager with a specific third-party application, such as Microsoft Active Directory or Novell eDirectory.

Connector Server

Connector Servers are implementation of the ICF Framework and allow remote execution of target connector from Oracle Identity Manager. Communication between Oracle Identity Manager and an ICF-based connector server happens over a socket layer.

context

A context is the environment in which an Oracle Identity Manager operation is performed. For example, a user creation operation performed in Oracle Identity Self Service is carried out in the Web context.

data field

Areas of a form into which information may be entered (for example, Organization Name). Data fields are used to contain, display, and potentially edit the data entered into them.

database

This is the storage facility for data within Oracle Identity Manager. Oracle Identity Manager controls this data using a software application known as the Database Management System (DBMS).

delegated administrators

This is an Oracle Identity Manager user who has been assigned administrative responsibilities. Administrative rights are assigned using membership within administrative groups. Administrators have access only to those organizations, forms, data, and users for which/whom they are responsible.

Deployment Manager

The Deployment Manager is a tool for exporting and importing Oracle Identity Manager configurations and customizations. Usually, the Deployment Manager is used to migrate a configuration from one deployment to another, for example, from a test to a production deployment, or to create a backup of the deployment.

deprovisioning

The rescinding of a user's, user group's, and/or organization's access to a resource.

Diagnostic Dashboard

Diagnostic Dashboard is a stand-alone application that helps you validate some of the Oracle Identity Manager prerequisites and installation.

disconnected resource

Disconnected resources are targets for which there is no connector. Therefore, the provisioning fulfillment for disconnected resources is not automated, but manual.

e-mail definition

This is a predefined template that is used when generating e-mail notifications. E-mail definitions are created using the E-mail Definition form.

Enterprise Roles

Enterprise Roles are customer defined roles that can be requested via the catalog.

Entities

Managed entities like User, Organization, Role, Entitlements, Application Instance.

Entitlement

An entitlement granted to an account on a target system enables the account owner (user) to perform a specific task or function. An entitlement can be an application role, responsibility, or group membership. For example, if user Richard is granted the Inventory Analyst role on a target system, then Richard can use that entitlement to access and generate inventory-related reports from the target system.

Entity Owners

All Owners (Role, Entity, and Application Instance) are additional metadata on the entity, typically used in resolving approvals, certifications, etc. The Owners of an entity have no administrative rights on the entity itself.

error handler task

This is one of several adapter task types. This type of adapter task is used to display any errors associated with an adapter that occur at runtime. In addition, you can view the reasons for the errors, along with possible solutions. See adapter task.

error message

This is informative text that appears when a specific problem occurs within Oracle Identity Manager.

event

This is an action (initiated by Oracle Identity Manager, an external system, or a user) and/or a result of that action being performed.

event handler

An event handler is a piece of code that is registered with an orchestration on various stages. These event handlers are invoked when the relevant orchestration stage is performed.

See event.

form

A graphical user interface layout (i.e., mechanism) used to view, insert, edit, and delete information associated with records in the Oracle Identity Manager database. A form can be displayed as two distinct views:

  • Form View that contains detailed information related to a single record.

  • Table View that contains minimal information related to multiple records.

Form Designer

A form used to create customized Forms. Forms created using this form must be associated with a process or a resource object. These forms (and the fields they are comprised of) are used to provide processes or resource objects with a mechanism for obtaining additional information they require to conduct provisioning.

GTC

Generic Technology Connector (GTC) enables you to create a custom connector to link the target system and Oracle Identity Manager without using the customization features of the Adapter Factory.

GTC provider

The components that constitute a generic technology connector are called providers.

heterogeneous request

Heterogeneous request is a request created for entities of different types. Oracle Identity Manager supports requesting roles, application instances, and entitlements in a single request, which is heterogeneous in nature.

Identity connector

Identity connectors are components developed to link Oracle Identity Manager with external stores of applications, directories, and databases. This release of Oracle Identity Manager provides support for developing and building identity connectors by using the Identity Connector Framework (ICF). Using the ICF decouples Oracle Identity Manager from the other applications to which it connects. Therefore, you can build and test an identity connector before integrating it with Oracle Identity Manager.

identity connector server

An identity connector server is required when an identity connector bundle is not directly executed within your application. By using one or more identity connector servers, the ICF architecture permits your application to communicate with externally deployed identity connector bundles. Identity connector servers are available for Java™ and Microsoft .NET Framework applications.

Identity Store

A Identity Repository which stores all identity data.

JAR file

This is a Java Archive file. A compressed archive file (denoted by a .Jar extension) containing one or more Java class files. This file format is used to distribute and run Java applications.

Java task

This is one of several adapter task types available within the Adapter Factory form. This type of adapter task is used to communicate with an external source through a Java API. See adapter task.

JavaBean

JavaBeans allow developers to create reusable software components that can then be assembled together using visual application builder tools. Within Oracle Identity Manager, it is a Java program module that is used by Oracle Identity Manager Remote Manager to communicate bi-directionally with non-network-aware APIs. See remote manager.

Logic task

This is one of several adapter task types available within the Adapter Factory form. This type of adapter task is used to build a conditional statement within an adapter (for example, an if statement, a for-loop, or a while loop). See adapter task.

lookup definition

A definition that can represent:

  • The name and description of a text field;

  • A lookup field and the values that are accessible from that lookup field; or

  • A combo box and the commands that can be selected from that combo box.

Lookup definitions are created using the Lookup Definition form (for default forms) or the Form Designer form (for custom forms). See lookup field.

lookup field

This is a data field that provides the user with a set of pre-defined values. Lookup fields only accept values selected from the pre-defined list as valid entries. See data field.

lookup queries

You can define lookups (for lookup fields and combination boxes) in Oracle Identity Manager for user-defined fields (UDFs) in system forms (for example, User Form, Resource Object Form, etc.) and fields of user-defined resource and object forms. The lookups are defined in two ways:

  • Lookup Queries: where the queries are statically defined for the field and are run against the appropriate database table.

  • Lookup Codes: where the items are displayed in a list from a lookup definition table

The (custom) lookup queries has been enhanced to allow the lookup query to be parameter driven. The parameter property is a mapped parameter, where you can specify:Filter Column: the column for which a value is specified in the "where" clauseFilter Map: the source from where the value comes fromWhile the enhancement itself is delivered as part of the existing Forms Designer feature in the Java Client, any updates made by this feature are rendered on the Web Client dynamically as administrators, approvers, or end-users access the updated form(s).

lookup value

This is an item, which contains information pertaining to the text field, lookup field, or combo box that represents the lookup definition. See lookup definition.

Managed Organizations

The list of Organizations that are explicitly assigned to delegated administrators. These are organization for which the users have been granted the associated Admin Role.

Management Hierarchy

Is applicable globally and every manager will be able to manage (User Administration) their reports.

manual task

This is any task within a process that requires user action in order to be completed. Approval processes are generally comprised of manual tasks.

metadata

This is data about data. Metadata can represent information about or documentation of other data managed within an application or environment. For example, metadata can be used to provide information about data elements or attributes, (name, size, data type, etc.), records or data structures (length, fields, columns, etc.) or the physical location or permissions of data (where it is located, how it is associated, ownership, etc.). Within Oracle Identity Manager, there are two types of Metadata: system Metadata, which is internal to the Oracle Identity Manager system, and customer Metadata, such as process definitions.

nested rule

This is a rule that is contained or embedded within another rule.

non-primary account

If a user already has a primary account and requests for another account in the same target application, then that account is a non-primary account. A user can have multiple non-primary accounts, but only one primary account.

Oracle Identity Manager

A software platform that automates access rights management and the provisioning of resources. Oracle Identity Manager instantly connects users to the resources they need to be productive, and revokes and or prevents unauthorized access to protect proprietary information and enhance security.

orchestration

The process of any Oracle Identity Manager operation that goes through a predefined set of stages and executes some business logic in each stage is called an orchestration.

password policy

A collection of criteria used to validate password creation and modification within Oracle Identity Manager or on an external resource. The criteria within a policy are applied based on the rule associated with it on the resource object to which it has been attached. Password policies can be defined for Oracle Identity Manager and/or third-party system passwords.

password policy rule

A rule used to determine which password policy is to be applied to password creation and modification on a particular resource or within Oracle Identity Manager. Password policy rules are always of type General. See rule.

plug-in

A plug-in is a logical component that extends the functionality of features provided by Oracle Identity Manager. The plug-in framework enables you to define, register, and configure plug-ins, which extend the functionality provided by features. Plug-ins can be predefined or custom-developed, and they are utilized at plug-in points.

plug-in point

A plug-in point is a specific point in the business logic where extensibility can be provided. An interface definition called the plug-in interface accompanies such a point. You can extend the plug-in interface based on the business requirements and register them as plug-ins.

policy obligation

If a user has multiple roles that have different authorization policies applicable in the same context, then the user's access rights are the cumulative rights across those policies. For example, the authorization check for the permission to search for users returns a list of obligations. This is a list of obligations from each applicable authorization policy. These obligations from multiple policies are combined to get a unified search result.

prepopulate adapter

This is one of five Oracle Identity Manager adapter types that are used to populate data on user defined fields on user defined forms. This specific type of rule generator adapter can be attached either to custom fields of forms or to fields of custom forms. These fields are created using the User Defined Field Definition form and the Form Designer form, respectively.

See Rule Generator Adapter.

primary account

A primary account is the first account created for a user in a target application. In other words, a primary account is the first application instance that is being requested. Oracle Identity Manager supports multiple accounts for a single application instance. The first account that is created is tagged as primary account, and there can be only one primary account for a user. The other accounts (non-primary accounts) are associated with the primary account. When the user requests entitlements, the entitlements are appended to the primary account.

process

This is a collection of one or more process tasks, also, a requested instance of a process definition. See process definition.

process definition

This is a record containing a detailed definition of all properties of a process as aߞ well as its workflow and the tasks that comprise it.

process status

This is the current state of execution for a process. The status of a process is determined by the status of its tasks.

process task

This is a step or component of a process (as specified within the Process Definition form). Process tasks can be independent or dependent on one another.

process task adapter

This is one of five Oracle Identity Manager adapter types. This type of adapter allows Oracle Identity Manager to automate the execution of a process task. See process task.

provisioning

This is the granting of access for resources to users in conformance with Oracle Identity Manager policies. See deprovisioning.

provisioning policy

This is an access policy that is applied to a user group during resource provisioning. A provisioning policy is one of several factors that determine whether a resource object may ultimately be provisioned to the user. A provisioning policy definition specifies the resource objects that can be allowed or disallowed for one or more user groups. See access policy. See resource object.

provisioning process

This is one of two Oracle Identity Manager process types. This type of process is used to provision Oracle Identity Manager resources to users or organizations.

provisioning status

The status of the resource object as it is being provisioned to a user or an organization. A resource object can have one of nine pre-defined statuses:

  • Provisioning: The resource object has been assigned to a request, and an approval process and a provisioning process have been selected.

  • Provisioned: The resources, represented by the resource object, have been provisioned to the users or organizations

  • Enabled: The resources, represented by the resource object, have been provisioned to the users or organizations. In addition, these users or organizations have access to the resources.

  • Disabled: The resources, represented by the resource object, have been provisioned to the users or organizations. However, these users or organizations have temporarily lost access to the resources.

  • Revoked: The resources, represented by the resource object, have been provisioned to the users or organizations. However, these users or organizations have been permanently deprovisioned from using the resources.

  • Provide Information: Additional information is required before the resources, represented by the resource object, can be provisioned to the target users or organizations.

  • None: This status does not represent the provisioning status of the resource object. Rather, it signifies that a task, which belongs to the provisioning process that Oracle Identity Manager selects, has no effect on the status of the resource object.

provisioning task

Provisioning tasks are tasks instantiated by requests, or pending manual provisioning tasks, or failed automatic provisioning tasks in the user or administrator's queue.

Publish to Organizations

A list of roles (in Oracle Identity Manager Enterprise Edition), and entitlements and application instance (in Oracle Identity Manager) that are made available to organizations by the respective entity administrators

query

A method of searching for particular data records within a database using a common characteristic. For example, a common query performed on the Organizations page (Oracle Identity Self Service) is to retrieve all records related to a particular organizational unit. Oracle Identity Manager has many powerful built-in query syntax tools.

reconciliation

The process by which any action to create, modify, or delete a target system identity initiated in the target system (using traditional means) is communicated back to the provisioning system and recorded.

record

A collection of related items of information organized as a single unit of data (for example, a single record comprised of a name, telephone number, and address). The record is the entity stored in the database that contains this related information (whereas forms are the mechanism employed by the user to view or edit that information).

remote manager

A server that enables Oracle Identity Manager to communicate with a remote application that is either non-network-aware, or is network-aware, but is not located on the Oracle Identity Manager Server. Remote managers are employed when Oracle Identity Manager needs to perform some function with this third-party application (for example, call a method that resides within the external API).

request

A request is an entity created by the users or administrators performing a specific action that requires a discretionary permission to be gained by someone or some process before the action can be performed. For example, a user can create a request to gain access to a laptop computer, and a manager can create an open requisition based on the request. A request has a requester, a beneficiary (optional), and a target entity.

Request Cart

A request cart contains a set of request items that a user has requested. The request cart does not persist across user sessions.

Request Catalog

A request catalog is a collection of items that can be searched, browsed and requested by a user either for themselves or on behalf of others.

request dataset

Request dataset is an XML definition file that dictates what data needs to be collected during various phases of the request lifecycle. In the request dataset, you can define what attributes need to be submitted by the requester and approver, whether or not an attribute is mandatory, and how UI should render the attribute to the user. Every attribute defined as a part of the dataset is associated with a set of properties that define the behavior of the attributes. Request dataset also allows you to define additional attributes, which exist only in the context of the request.

Request Profile

A request profile is a cart that has been saved by an administrator. The administrator can, optionally, enter additional information about the items in the cart, before saving it. For example if an application instance is included in the profile then the request form (data set) for the application instance can be filled during profile creation by the administrator. The end user who is creating request based on the profile can change the information in the form if he wants to. All users have access to all request profiles. However, all users don't have access to all items in the request profile.

request stage

Each request goes through a specific lifecycle after it is created in the system. This lifecycle is managed and controlled by the request service. The lifecycle transits the request through various stages. The stage a request is in determines what action the controller takes in that step, what operations are available on the request at that time, and what the possible stage transitions are. Each stage represents the logical next step in the request lifecycle. Only the successful execution of an operation can take the request from one stage to the next.

requester

A requester is an entity that creates or raises a request. A requester can be a user or the system itself. The functional component decides on the requester for system-generated requests. An example of a system-generated request is a request created by the system based on access policy.

reset password

This is the ability of a user to change his or her password.

When the user first registers with Oracle Identity Manager (using the Oracle Identity Manager Web Application), he/she needs to select personal verification questions, and specify the answers to these questions. Oracle Identity Manager then uses these questions to verify a user's identity and reset his or her password.

resource

Also referred to as a Resource Object. This is any unit of hardware, software, or data over which a company wishes to enforce provisioning control. For example, hardware resources might be servers and printers in the network. Software resources can be programs, utilities, or even smaller elements within a program. Data resources could be any accessible files or databases.

The Oracle Identity Manager resource object definition is the virtual representation of the resources to be provisioned. For example, a resource object can have one or more approval processes, provisioning processes, rules, and password policies.

The Oracle Identity Manager resource object definition is used to control the various processes and policies associated with the resource, as well as set system-wide options that will determine how the resource is provisioned.

resource object

See resource.

rule

User-defined criteria employed by Oracle Identity Manager to match conditions and take action based on them. There are five types of rules (the first four are defined using the Rule Designer form):

  • General: This type of rule enables Oracle Identity Manager to add a user to a user group automatically. It also determines the password policy that will be assigned to a resource object.

  • Process Determination: This type of rule determines the standard approval process that will be associated with a request, as well as the approval and provisioning processes, which will be selected for a resource object.

  • Task Assignment: This type of rule is used to determine the user or user group to which a task is to be assigned.

  • Pre-Populate: This type of rule is used to determine the pre-populate adapter that Oracle Identity Manager selects when populating a custom field of an Oracle Identity Manager or user-defined form. See prepopulate adapter.

  • Reconciliation: This type of rule is used to specify the criteria Oracle Identity Manager applies when attempting to match changes to data within target resources or trusted sources (for example, external systems with which you have configured Oracle Identity Manager to compare and reconcile data) with data in Oracle Identity Manager. Reconciliation rules are defined using the Reconciliation Rules form.

rule element

This is the logical component of a rule. It is a unit that consists of an attribute, an operator, and a value (for example, user role == full time).

Rule Generator Adapter

This is one of five Oracle Identity Manager adapter types. This type of adapter is responsible for automatically generating, modifying, or verifying the value of a form's field, and saving this information to the database. Values supplied by a rule generator can be overridden by user input.

sandbox

A sandbox represents an area in the MDS repository where metadata objects can be modified without effecting their mainline usage. Typically, sandboxes are used to test changes to metadata objects before exposing them to the mainline use. Any changes made to a sandbox are visible only in the sandbox. By publishing the sandbox the changes are merged to the mainline.

scheduled task

A scheduled task configure the metadata for a job, which is to be run, and the parameters required for execution of that task. This metadata is predefined for the predefined tasks. A new task can be added by the user, which will have the new metadata or the existing tasks can be updated to add/update the parameters for other configuration details.

scheduler

Scheduler enables you to schedule jobs that automatically run predefined scheduled tasks at the specified time.

self-registration

This is the ability of a user to register with Oracle Identity Manager, using the Oracle Identity Manager Web Application.

shceduled job

A job can be scheduled to run at the specified interval. You can create multiple jobs scheduled to run at different time intervals. A job run is a specific execution of a job. Each job run includes information such as the start time, stop time, exceptions and status of the execution.

SoD

Segregation of Duties (SoD) is aimed at applying checks and balances on business processes. The SoD validation process in Oracle Identity Manager occurs when a user creates a request for an entitlement on a particular target system. The request is funneled through a resource approval workflow and, if it passes that initial workflow, a resource provisioning workflow. If the user's request passes SoD validation (and an approver approves the request), the resource provisioning workflow is initiated. If the request fails SoD validation, the resource approval workflow can be configured to take remediation steps.

SPML

Oracle Identity Manager provides client applications with the Identity Management service to manage identities, which makes use of the Service Provisioning Markup Language (SPML).

stored procedure

An SQL program located within a particular database schema. Stored procedures contain information, such as SQL statements, which are pre-compiled for greater efficiency. See stored procedure task.

stored procedure task

This is one of several adapter task types. This type of adapter task allows Oracle Identity Manager to map to and execute SQL programs that are located within a particular database schema. Within Oracle Identity Manager, these programs are known as stored procedures.

By incorporating a stored procedure task into an adapter and attaching this adapter to a process task, Oracle Identity Manager can utilize stored procedures on any Oracle or SQLServer database (assuming it is accessible on its network). This includes retrieving primitive values from stored procedures. See adapter task. See stored procedure.

system property

System properties define the characteristics that control the behavior of Oracle Identity Manager. You can define the functionality of consoles such as the Oracle Identity System Administration and Oracle Identity Self Service by using system properties.

target entity

Target entity is the resource or entity that is requested for the beneficiary.

target resource

The external resource or application to which you wish to provision a user or organization with access using Oracle Identity Manager.

Within the context of Oracle Identity Manager's reconciliation functions, this term has a more specific meaning. It is then used to refer to a resource with which Oracle Identity Manager has been set to conduct reconciliation. Target resources differ from trusted sources in that Oracle Identity Manager only accepts changes to the primary user record from a trusted source. All other external applications with which Oracle Identity Manager is conducting reconciliation are referred to as target resources.

target resource reconciliation

This refers to reconciliation that result in creation, update, or revocation of resources provisioned to a user in Oracle Identity Manager. Account Discovery, Orphan Account Discovery, Rogue Account Discovery, and Direct Management Discovery are all specific use cases within this type of reconciliation.

Task Assignment Adapter

This adapter enables Oracle Identity Manager to automate the allocation of a process task to a user or group. A task assignment adapter can be written to dynamically assign a task based on parameters in the task request. The new Task Assignment Adapter is associated with a task assignment rule.

The Task Assignment Adapter enhances the mechanism of assigning a task through the Assignment tab of the Editing Task form (nested in the Process Definition form), where a rule is attached to a task, and users or groups are assigned to the current task.

toolbar

The set of buttons along the top edge of the Oracle Identity Manager Design Console window that provides access to frequently used functions. Clicking the left mouse button when the pointer is over a button will execute that button's function. Hovering with your mouse over a button will cause a tool tip about that button to be displayed.

trusted certificate

A digital ID, which verifies that the user's password for an external application is being transmitted to Oracle Identity Manager from the correct location.

trusted source

This is the Resource object in which a unique key for reconciliation with data in Oracle Identity Manager has been defined. The trusted source is the resource object from which Oracle Identity Manager accepts changes to the user record definition. There may be more than one trusted source and more than one key per trusted source.

trusted source reconciliation

See authoritative identity reconciliation.

UDF

Entity attributes are properties of the entity. The information about the user entity is stored in the form of attributes, such as first name, last name, user login, and password. There are default user attributes in Oracle Identity Manager. However, you can create custom user attributes by using the Form Designer in the Oracle Identity System Administration. The custom attributes are referred to as user defined fields (UDFs). Oracle Identity Manager lets you create UDFs for the user, role, organization, and catalog entities.

user

An individual who possesses an account and login credentials within Oracle Identity Manager. There are two distinct types of users in Oracle Identity Manager:

  • End-User Administrators: This type of user may use either the Java or the Web version of Oracle Identity Manager. End-user administrators are responsible for configuring Oracle Identity Manager for their company's end-users.

  • End-Users: This type of user can access only the Oracle Identity Manager Web Application. End-users are generally only able to perform basic functions within Oracle Identity Manager.

PK4T-* PK8^EOEBPS/req_mangmnt_user.htm Managing Requests

9 Managing Requests

In Oracle Identity Manager, various operations, such as adding a role to self or provisioning an application instance, is performed through requests. A request is an entity created by the users or administrators performing a specific action that requires a discretionary permission to be gained by someone or some process before the action can be performed. For example, a user can create a request to gain access to a laptop computer, and a manager can create an open requisition based on the request.

A request has a requester, a beneficiary (optional), and a target entity. A requester is an entity that creates or raises a request. A requester can be a user or the system itself. The functional component decides on the requester for system-generated requests. An example of a system-generated request is a request created by the system based on access policy. Here, the functional component is access policy. For unauthenticated requests, the requester is not authenticated to Oracle Identity Manager and is therefore, not present in the system.

A beneficiary is an entity that benefits from the action performed after the request is completed and the request is completed only if it is executed successfully.

In Oracle Identity Manager, terms such as role, application instance, and entitlements are defined as entities. Each one of these entities maintains a list of attributes belonging to this entity. Each entity also defines a list of operations that it supports.

Target entity is the resource or entity that is requested for the beneficiary.

For instance, you create a request to provision a UNIX account for the user John Doe. Here, you are the requester, John Doe is the beneficiary, and the UNIX account is the target entity that is requested for John Doe.

As discussed earlier in this guide, Oracle Identity Manager supports requesting for entities such as users, resources, roles, application instances, and entitlements. You can request for these entities by using a request catalog.

Each request goes through a specific lifecycle after it is created in the system. This lifecycle is managed and controlled by the Request Service. The lifecycle transitions the request through various stages. The stage that a request is in determines what action the controller takes in that step, what operations are available on the request, and what possible stage the transitions are in at that time. Figure 9-1 outlines the process flow of a request:

Figure 9-1 Request Process Flow

Description of Figure 9-1 follows

The request process flow is described with the help of an example of provisioning a laptop computer to a user through a request. The steps are:

  1. The requester raises a request to assign a laptop computer to a user by using the Request UI.


    Note:

    Requests can be raised by using Oracle Identity Self Service or Oracle Identity System Administration.


  2. The request is submitted to the request service.

  3. The request is also stored in Oracle Identity Manager database.

  4. Request-Level Approval workflow is initiated by request service in Service-Oriented Architecture (SOA). Based on the workflow configuration, associated tasks are assigned to the corresponding approvers.


    See Also:

    "Developing Workflows for Approval and Manual Provisioning" for information about approval workflows in the Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager


  5. The request-level approver approves the request by using the Pending Approvals page in Identity Self Service. In this example, the requester's manager (Approver 1) is the request-level approver who decides whether to assign a laptop to user 1. If the request-level approver rejects the request, the request goes to a Rejected stage.


    Note:

    When a user requests for an item, Oracle Identity Manager checks if the requester can view the catalog items, but does not check if the items can be granted to the beneficiary. When the request is approved, then Oracle Identity Manager checks if the requested access can be granted to the beneficiary.


  6. If the Approver1 has designated his role to Approver 2 then Approver 2 is the request-level approver who decides whether to assign a laptop to user 1. If Approver 2 rejects the request, the request goes to a Rejected stage.

  7. The operation-level approver approves the request by using the Pending Approvals page. In this example, the IT admin for the organization is the operation-level approver (Approver 2) who is responsible for issuing a laptop to the user. If the operation-level approver rejects the request, then the request goes to a Rejected stage.


    Note:

    Operation-level request is not initiated if the request is rejected at the request level.


  8. The request operation is initiated in the request service, and the request is executed.

  9. The request operation is completed. At this stage, the request operation has the Completed status.

  10. The request status is updated in Oracle Identity Manager database.

This chapter describes request management in the following sections:

9.1 Request Stages

Each request goes through a specific lifecycle after it is created in the system. This lifecycle is managed and controlled by the request service. The lifecycle transits the request through various stages. The stage a request is in determines what action the controller takes in that step, what operations are available on the request at that time, and what the possible stage transitions are. Figure 9-2 outlines the lifecycle flow of a request in the request service:

Figure 9-2 Request Stages

Description of Figure 9-2 follows


Note:

If a request is not submitted successfully, then the error messages are displayed in the UI. For SPML-initiated requests, the error messages are thrown to SPML.


Figure 9-2 shows all the stages that a request can go through. This diagram specifies stages for a simple request. For information about bulk request, refer to Figure 9-3, "Bulk Request and Child Request Stages".

Each stage represents the logical next step in the request lifecycle. Only the successful execution of an operation can take the request from one stage to the next.

Table 9-1 describes how a request functions at various stages through its life cycle and how a request attains these stages:

Table 9-1 Request Stages

Request StageDescription

Request Created

After successful submission of the request, the request moves to the Request Created stage.

Obtaining Approval

After the request is created, the request engine moves the request to "Obtaining Approval" stage automatically if there are approvals defined for this request. At this stage, the corresponding approvals are initiated through the request service. Upon completion of the same, the request engine looks at the model defined for this request to find out the approval selection methodology to find out the exact approval process to instantiate.

When the request engine finds out the approvals that are required to be initiated, it again calls request service to instantiate the workflow.

If a request is withdrawn or closed at this stage, then the request engine calls cancel workflow on each workflow instance. Notifications are sent to approvers about the withdrawn tasks.

Note: Configuration of notification can be done in the human task of a SOA composite.

The following request statuses are associated with Obtaining Approval stage:

  • Obtaining Request Approval

  • Obtaining Operation Approval

For information about these request statuses, refer "Bulk Requests and Child Requests".

After the request successfully completes these statuses, it will attain the Request Approved stage.

If an SoD validation check is plugged-in after the request has been successfully created, the request is associated with the following statuses.

  • SoD check not initiated

    A request attains this stage, if the SoD validation is not initiated for provisioning resource based request. The request engine moves the request to this stage after submission of request and before Obtaining Approval.

  • SoD check initiated

    A request attains this stage, if the SoD validation is initiated asynchronously for provisioning resource based request. The request engine moves the request to this stage after submission of request and before Obtaining Approval.

  • SoD check completed

    A request attains this stage, if the SoD validation is completed for provisioning resource based request. The request engine moves the request to this stage after submission of request and before Obtaining Approval.

Note: These SoD request statuses are possible in case the request is any of the following request types:

  • Provision Application Instance

  • Modify Account

  • Provision Entitlement

  • Revoke Entitlement

  • Assign Roles

  • Remove from Roles

Approved

Only after an Operation Approval is approved, the request is moved to the next stage and the request engine is updated with the current status. The outcome that the request engine finds is Approved, Rejected, or Pending.

The following request statuses are associated with this stage:

  • Request Approval Approved

  • Operation Approval Approved

Rejected

Each time a workflow instance is updated, request service updates the request engine with the current status of that instance. The outcome that the request engine expects from request service is Approved or Rejected. If any of the workflow instances that are instantiated are rejected, then request engine moves the request to Rejected stage. If any workflow instance is rejected, then the controller calls cancel on all the pending workflows and moves the request to Rejected stage.

The following request statuses are associated with this stage:

  • Request Approval Rejected

  • Operation Approval Rejected

Operation Initiated

After the request is approved, the request engine moves the request to the Operation Initiated stage and initiates the operation.

The following request statuses are associated with this stage:

  • Operation Completed

    After completing the actual requested operation, the request engine moves the request to the Operation Completed stage. This happens after Operation Initiated status and is associated with Completed stage.

  • Post Operation Processing Initiated

    After the actual requested operation is completed, if there exists any additional operation that needs to be executed as post-processing, the request engine moves the request to the Post Operation Processing Initiated stage, before initiating those operations. This happens after Operation Completed status.

Note: In case of a bulk operation, child requests are created after request level approval, and the parent request moves to the "Request Awaiting Child Requests Completion" status.

Request Failed

When the associated operations specified in the request fails to execute, the request cancels any pending operations and moves the request to the Request Failed stage.

The following request statuses are associated with this stage:

  • Request Failed

    When all associated operations specified in a request fail, the request is moved to the Request Failed stage.

  • Request Partially Failed

    When any associated operation specified in a request fails, the request is moved to the Request Partially Failed stage.

  • Request Fulfillment Failed

    When a request associated with an application instance or entitlement fails, then the request moves to the Request Fulfillment Failed stage.

  • Request Fulfillment Failed After Max Retry

    When a request associated with an application instance or entitlement that is in the Rejected stage is retried until the maximum number of retries is reached, then request moves to the Request Fulfillment Failed After Max Retry.

Withdrawn

A request can be withdrawn by the requester. At this stage, the request is associated to the Request Withdrawn status, and the initiation of all approvals are canceled.

Note:

  • A request can be withdrawn before Operation Initiated stage. Once the request attains the Operation Initiated stage, the request cannot be withdrawn.

  • A request can always be withdrawn by a requester only, which is done by using Identity Self Service.

Completed

After the execution of all operations specified in the request are completed, the request engine moves the request to the Request Completed stage.

The following request statuses are associated with this stage:

  • Request Completed with Errors

    A request attains this status, when an actual requested operation executes fine, but fails to execute any of the post-processing operations. The Request Completed with Errors stage is associated with the Failed stage.

  • Request Completed

    A request attains this status, when an actual requested operation executes fine without any errors.

  • Request Awaiting Completion

    When a request is scheduled to be executed on a future date, the request attains Request Awaiting Completion status till the operation is completed on an effective date.


The successful attainment of a stage also results in the status of the request being updated to the corresponding status.

Operations can be executed manually or automatically by the system in response to an event. Examples of manual operations are:

  • Submit request

  • Close/cancel (withdraw) request

  • Approve request when the service is notified that the approval workflow is successfully approved

Examples of automatic operations are:

  • Start approvals when the request is submitted

  • Execute request when the request is approved and execution date is in the past or not specified

9.2 Bulk Requests and Child Requests

A bulk request is a request with multiple beneficiaries, multiple entities, or both. For example, a request to assign multiple roles to user John Doe generates a bulk request. Provisioning requests to provision a resource, such as AD User, to users John Doe and Jane Doe also generates a bulk request. A bulk request has two parts:

  • Parent requests: A request submitted with multiple beneficiaries, multiple target entities, or both is a parent request

  • Child requests: When the request level approval happens for a parent request, multiple child requests are created. The parent request is divided into multiple child requests containing one beneficiary and one target entity, or both.

The entity data in bulk requests must be same for different beneficiaries specified in the request. For example, for a "provision application instance" type of request, if multiple beneficiaries are selected, then the form data provided for an application instance is the same and applicable for all the selected beneficiaries.

The number of child requests generated depends on the number of target entities associated with each beneficiary. For each beneficiary, one of its associated target entities is used to generate for each child request. A child request contains only one beneficiary and one target entity.

For a request with no beneficiaries, each child request is spawned for each target entity. Consider the following example:

For a modify-user bulk request that modifies the attributes of two users, two child requests are created (one for each user).

Consider another example. For a "provision application instance" type of request, there are two beneficiaries. Two application instances are to be provisioned for each beneficiary. In this scenario, there are two child requests for the first beneficiary and two child requests for the second beneficiary. Each application instance and its associated beneficiary are present in each child request. Therefore, for this bulk request, there are a total of one parent request and four child requests.

Request-level approval is performed as a part of parent request. After the parent request spawns child requests, the parent request goes to the Request Awaiting Child Requests Completion stage, where in the request awaits for the child requests to complete the operation-level approval. After all the child requests complete, the parent request moves to the Completed stage.

Operation-level approval is performed for child requests only. Approvers can approve or reject child requests individually. If all the child requests are approved or rejected, then the parent request attains the Completed stage. If one or more (but not all) of the child requests fail, then the parent request attains the Request Partially Failed stage. If all the child requests fail, the parent request attains the Failed stage.

Figure 9-3 outlines the lifecycle flow of a request in the request service:

Figure 9-3 Bulk Request and Child Request Stages

Description of Figure 9-3 follows


See Also:

Table 9-1, "Request Stages" for information about request stages


9.3 Heterogeneous Requests

Heterogeneous request is a request created for entities of different types. Oracle Identity Manager supports requesting roles, application instances, and entitlements in a single request, which is heterogeneous in nature.

The following request types are supported in a heterogeneous request:

  • Provision Application Instance

  • Assign Role

  • Provision Entitlement

For a request that is submitted for different entities, the request type is set as "Heterogeneous request". For example, if you submit a single request for two separate entities such as roles and entitlements, then the request type is "Heterogeneous request".

For a request that is submitted for multiple entities of same type, the request type is set according to the entity selected. For example, if you submit a request for multiple roles, then the request type is "Assign Roles".

9.4 Request vs. Direct Operation

Users in Oracle Identity Manager can perform various operations in the application. Any operation that you can perform in Oracle Identity Manager is controlled by the authorization policies that have been defined. The admin roles granted to a user in an organization determine whether an operation that a user can perform in Oracle Identity Manager happens directly or through a request. For example, if you are a user administrator, then all operations such as create user, modify user, grant account, enable user account, and so on are direct operations. Similarly, if you have been assigned the Role Viewer admin role, then operations such as create user, enable user, delete user, grant role, revoke entitlements, and so on result in a request being created. For more information about admin roles in Oracle Identity Manager, the corresponding permissions allowed to users of that admin role and whether the operation is direct or results in a request, see the "Security Architecture" chapter in Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager.

Whether an operation results in a request or is performed directly depends on:

  • The admin roles granted to the user who is performing the operation. Based on the admin roles granted to the user, an authorization check is performed to determine whether the operation results in a request or direct operation.

  • Whether it is a bulk operation or single operation. Irrespective of the admin roles granted to the user, a bulk operation always results in a request.

  • Whether a value has been provided in the Effective Date field. If a value is specified in the Effective Date field, the operation results in a request, irrespective of single or bulk operation.

    For a single operation without effective date:

    • If you are performing an operation on yourself, then it results in a request.

    • If you are performing an operation on others and you are an authorizer, then the operation is direct.

All operations in Oracle Identity Manager do not go through the authorization check to determine if it is a direct operation or a request. Determining whether an operation is a request or not will be done only for requestable operations. See the tables in "Request Categories" for information about default requestable operations.

The check for direct operation or request is applicable to an operation only if it has a corresponding request model. As a result, this authorization check is performed for creating a user, but not for creating an organization because there is no request model for creating an organization. Similarly, locking and unlocking user accounts are also operations that do not go through the authorization check to determine request or direct operation. Therefore, these operations are direct.

Note that creation of a request does not always mean that the SOA workflow is invoked and manual approval is obtained. There are scenarios in which a request is created, but approval is not required. Consider the following sample scenarios:

Scenario 1:

A request is created when the operation is bulk, but at the operational level, if the requester is determined to be the admin of the entity, then it is considered auto-approved.

Scenario 2:

If an SoD check is enabled, then the approval workflow has to be initiated always. This is because SoD check happens in the approval workflow only.

End users can submit request for entities such as application instances, entitlements, and roles published to home organization for self or others in the same organization. To submit requests for users in other organizations, you must be granted the User Viewer admin role (in each of the organizations to which the users belong), and the corresponding Application Instance Viewer, Entitlement Viewer, or Role Viewer roles.

9.5 Request Categories

There are two categories of request in Oracle Identity Manager:

  • Catalog-based requests: This type of request focuses on granting access to users by using the access request catalog. A catalog-based request is a request created for entities such as roles, application instances, and entitlements. The following are the types of catalog-based requests:

    • Role request: This is a request for enterprise role, which in turn has one or more access policies associated with it.

    • Application instance request: This is a request for accounts in target applications. An application instance represents an account in a target application, typically known as an IT resource instance in Oracle Identity Manager. Requesting for and provisioning an application instance means that an account has been created for you in the target application.

    • Entitlement request: This is a request for additional access in target applications. For example, for an E-Business Suite account, you can request for entitlements such as CRM administrator or payroll supervisor. When a user requests for entitlements, the entitlements are appended to the primary account. See "Requesting for an Account" for information about primary and non-primary accounts.

    By default, the catalog is categorized by the type of entity. You can modify catalog items and specify your own category. See "Using the Access Request Catalog" for more information on viewing and modifying catalog items.

    You create catalog-based requests by adding request items to a request cart. The request cart can contain items of the same or different entity types.

    After you add the request items to the cart, you proceed to checkout where you select the target users and then submit the request. The users that you can select (in other words, beneficiaries of the request) depends on the User Viewer admin role that you have across organizations.

    Some application instances have forms associated with them for which you have to provide additional information. You cannot submit such application instance requests without completing the form.

    Oracle Identity Manager provides a set of predefined request types. Table 9-2 lists the operations and request types that Oracle Identity Manager supports by default for catalog-based requests.

    Table 9-2 Default Operations and Request Types for Catalog-Based Requests

    Catalog EntityRequest TypesBulkBeneficiary

    Application Instance

    Provision Application Instance

    Y

    Y

    Entitlement

    Provision Entitlement

    Y

    Y

    Role

    Assign Roles

    Y

    Y


  • Non-catalog-based requests: This type of request is created without using the request catalog. Examples of non-catalog-based requests include self registration, create user, modify user, modify account, modify provisioned account, revoke account, enable or disable an account, enable or disable users, and bulk modification of users.

    Oracle Identity Manager provides a set of predefined request types. Table 9-3 lists the operations and request models that Oracle Identity Manager supports by default for non-catalog-based requests.

    Table 9-3 Default Operations and Request Types for Non-Catalog-Based Requests

    CategoryRequest TypeBulkBeneficiary

    User Management

    Create User

    N

    N


    Self-Register User

    N

    N


    Modify User Profile

    Y

    N


    Enable User

    Y

    N


    Disable User

    Y

    N


    Delete User

    Y

    N

    Provisioning

    Modify Account

    Y

    Y


    Enable Account

    Y

    Y


    Disable Account

    Y

    Y


    Revoke Account

    Y

    Y

    Role Management

    Create Role

    N

    N


    Delete Role

    Y

    N


    Modify Role

    Y

    N


    Assign Roles

    Y

    Y


    Remove from Roles

    Y

    Y



    Note:

    The following request types are deprecated in the current release:

    • Request types related to "Self"

    • Request types related to "Resource"

    No new requests can be created based on these deprecated request types.


9.6 Common Reasons for Request Failure

When the associated operations specified in a request fail to execute, the request cancels any pending operations and moves the request to the Request Failed stage. Clicking the Request Failed hyperlink displays the reason for request failure.

A request can fail for any one of the following reasons:

  • If you are requesting a role, then your request can fail due to an SoD violation.

  • If you are requesting an application instance and that application instance depends on another application instance then it can fail because the parent application instance is not provisioned. For example, to successfully provision a user to a Microsoft Exchange account, the user must have a Microsoft Active Directory account in the domain controller that is managing the users of the Exchange server.

  • When you request for an entitlement, the entitlement is provisioned to the primary account. Therefore, if you are requesting an entitlement, but you do not have a primary account provisioned to you, the entitlement request fails.

In addition to the preceding reasons, failures can occur because of incorrect password, password policy violation, target system being unavailable, and so on.

9.7 Request Profiles

When you select catalog items for requesting, the items are added to a request cart. The request cart is similar to the shopping cart in Web sites that sell products to customers. You can view the selected items in the cart, or edit the request cart to add or remove items.

Request profiles are request carts that are saved for future reuse by the users. The request cart is saved by the catalog administrator or system administrator so that the user can use it to request for entities without searching through thousands of catalog items.


Note:

When a user creates a request through request profile, the items are filtered based on authorization policies. This means that the items for which the user does not have the required privileges to request, are automatically removed from the cart. If the user is not authorized to request any item in the profile, then the cart items will be empty.


This section discusses the following topics:


Note:

Creating, modifying, or deleting a request profile can be performed only by catalog administrators or system administrators.


9.7.1 Creating a Request Profile

To create a request profile:

  1. In the Catalog page, select one or more catalog items, and click Add to Cart. The catalog items are added to the request cart.

  2. Click Checkout. The Cart Details page is displayed. The select catalog items are displayed in the Cart Items section.

  3. Click Save As Profile. The Request Cart dialog box is displayed with the catalog items in the request profile.

  4. In the Save Profile Name field, enter a name for the request profile.

  5. In the Description field, enter a description of the request profile.

  6. Click Save. The request profile is created.

9.7.2 Modifying a Request Profile

To modify a request profile:

  1. In the Request Profiles section of the Catalog page, click the request profile that you want to modify. The Cart details page is displayed.

  2. In the Cart Items section, select a cart item to display the details of the item.

  3. In the Details section, modify the request details, if required. To do so, set or modify values in the Details section, and then click Ready to Submit.

  4. If you want to add more items to the cart, then:

    1. Click Back to Catalog.

    2. On the Catalog page, search for and select items to be added to the cart, and the click Add to Cart.

  5. Click Checkout. The Cart Details page is displayed.

  6. Click Save As Profile. The Save as Profile dialog box is displayed.

  7. In the Save Profile Name field, enter the name for the request profile that is being modified. If you enter a new name, then a new request profile is created. If you enter the name of an existing request profile, then that request profile is updated with the latest changes.

  8. In the Description field, enter a description of the request profile.

  9. Click Save. Depending on whether you have entered the name of an existing request profile or new name, the request profile is created or updated, respectively.


Note:

Values that you add or specify for Target Users, Justification, or Effective Date will not saved in a request profile.


9.7.3 Deleting a Request Profile

To delete a request profile:

  1. In the Request Profiles section of the Catalog page, click the red cross mark preceding the name of the request profile.

  2. In the Confirmation dialog box that is displayed, click Yes.

    The request profile is deleted.

9.8 Creating Requests

This section describes how to create requests in the following topics:

9.8.1 Creating a Request to Register Yourself in Oracle Identity Manager

Using the login page of Identity Self Service, you can create a request to register yourself in Oracle Identity Manager. This is called a self-registration request and can be raised by users not present in Oracle Identity Manager (anonymous users). To create a self-registration request, see "Submitting Registration Requests". After submitting the self-registration request, you can track it by navigating to the login page, and clicking Track My Registration.

9.8.2 Creating a Request By Using the Request Catalog


Note:

The procedure discussed in this section is applicable for requesting roles, entitlements, and application instances.


In Identity Self Service, you can create requests from various pages, such as the Home page, My Access page, and the entity detail pages for users and roles. Irrespective of the page or tab from where you are creating the request, you go through the request catalog to create requests.

To create a request by using the request catalog:

  1. Log in to Identity Self Service.

  2. Under Requests, click Catalog. The Catalog page is displayed.

  3. Search for the item that you want to request. To do so, enter a keyword in the search field, and click the search icon on the right. The search results are displayed. The catalog items that match the search condition are listed in the Catalog Items section, as shown in Figure 9-4:

    Figure 9-4 The Catalog Page

    Description of Figure 9-4 follows

  4. In the Refine Search section, select one or more categories to display the catalog items of those categories. You can click Select All to display or hide all the items belonging to the categories.

  5. Select a catalog item that you want to request. The summary information of the item is displayed below the Catalog Items section.

    You can also select multiple items by pressing Ctrl and clicking the items.

  6. Click Add Selected to Cart.

    The selected items are added to the request cart.

  7. Optionally, click Edit to view the catalog items added to the cart. The Request Cart dialog box is displayed with a list of catalog items in the cart, as shown in Figure 9-5:

    Figure 9-5 The Request Cart

    Description of Figure 9-5 follows

  8. If required, select a catalog item to display detailed information about the item. Review the details, and if required, you can remove the item from the cart by clicking Remove for the corresponding item.

    Alternatively, click Remove All to delete all items from the cart.

  9. Click Checkout. Alternatively, you can click Checkout on the Catalog page.

    The Cart Details page is displayed, as shown in Figure 9-6:

    Figure 9-6 The Cart Details Page

    Description of Figure 9-6 follows

  10. The Target Users section displays the usernames of beneficiaries for the request. You can click User Details for a user to view the details of the user.

  11. To add beneficiaries to the request:

    1. Click the green plus symbol. The Advanced Search for Target Users dialog box is displayed.

    2. Search and select one or more users that you want to add.

    3. Click Add Selected to add the selected users to the Selected Users list. Alternatively, click Add All to add all the users in the Selected Users list.

    4. Click Add. The selected users or beneficiaries are added to the Target Users section of the Request Cart Details page.

    You can also select a user that you want to remove from the list of beneficiaries, and click Remove.

  12. If required, in the Justification and Effective Date section, in the respective fields, specify a justification and effective date when the request will be active.

  13. In the Cart Items section, if required, select a cart item and click Details to display the details of the item.

  14. After reviewing and modifying the details or each item in the cart, click Submit.

    The request is submitted for approval, and the Request Summary page is displayed with summary information, target user or beneficiary information, and request and approval details. Figure 9-7 shows the Request Summary page:

    Figure 9-7 The Request Summary Page

    Description of Figure 9-7 follows


Note:

In the Request Summary page, if you want to withdraw the request, then click Withdraw Request, and click Yes to confirm. To withdraw requests from other pages in Identity Self Service, see "Withdrawing a Request".


9.8.3 Creating a Request By Using a Request Profile

To create a request by using the request profile:

  1. In Identity Self Service, under Requests, click Catalog. The Catalog page is displayed with the request profiles created for you.

  2. Click the request profile name that you want to use to create the request. The Cart Details page is displayed.

  3. The Target Users section displays the usernames of beneficiaries for the request. You can click information icon against each user to view the details.

  4. To add beneficiaries to the request:

    1. Click the Add icon. The Advanced Search for Target Users dialog box is displayed.

    2. Search and select one or more users that you want to add.

    3. Click Add Selected to add the selected users to the Selected Users list. Alternatively, click Add All to add all the users in the Selected Users list.

    4. Click Add. The selected users or beneficiaries are added to the Users section of the Request Cart Details page.

    You can also select a user that you want to remove from the list of beneficiaries, and click the Remove icon.

  5. If required, in the Justification and Effective Date section, in the respective fields, specify a justification and effective date when the request will be active.

  6. In the Cart Items section, select a cart item to display the details of the item.

  7. After reviewing and modifying the details or each request in the cart, click Submit.

    The request is submitted for approval, and the Request Summary page is displayed with summary information, target user or beneficiary information, and request and approval details.

9.9 Tracking a Request

To track a request:

  1. In Identity Self Service, under Requests, click Track Requests. The Track Requests page is displayed.

  2. Search for the requests you want to track. To do so:

    1. Select any one of the following:

      • All: On selecting this option, the search is performed with the AND condition. This means that the search operation returns requests that match all the search criteria that is specified.

      • Any: On selecting this option, the search is performed with the OR condition. This means that the search operation returns requests that match the search criterion that is specified.

    2. In the searchable request attribute fields, such as Request ID, specify a value. You can include wildcard characters (*) in the attribute value.

      For some attributes, select the attribute value from the lookup. For example, to search all requests with the Obtaining Operation Approval status, from the Status list, select the Equals search operator, and the select Obtaining Operation Approval from the adjacent list.

    3. For each attribute value that you specify, select a search operator from the list. The following search operators are available:

      • Starts with

      • Ends with

      • Equals

      • Does not equal

      • Contains

      • Does not contain

      For fields of date type, the search operators are:

      • Equals

      • Does not equal

      • Before

      • After

      • On or before

      • On or after

    4. To add a searchable request attribute to the Track Requests page, click Add Fields, and select the attribute from the list of attributes.

      For example, if you want to track all requests by a requester, then you can add the Requester attribute as a searchable field and specify a search condition.

    5. Optionally, click Reset to reset the search conditions that you specified. Typically, you perform this step to remove the specified search conditions and specify a new search condition.

    6. Click Search. The search results is displayed in a tabular format.

  3. If the request search you performed displays a large number of records, then you can filter the request search result. To do so:

    1. From the Show list, select any of the following:

      • Requests Raised By Me: This is selected by default. Returns requests created by logged-in user.

      • Requests Raised For Me: Returns requests where login user exists as beneficiary or target user.

      • For Reportee: This option is available if the logged-in user is a manager of a user.

      • For User: This option is available if the logged-in user has been granted the User Administrator or the HelpDesk admin role.

      • All: Returns all requests in the search result. This option is available if the logged-in user has been granted the System Administrator role.

    2. To sort the requests in the search result by any of the columns such as Request ID or Status, click the Sort Ascending or Sort Descending arrows in the column. The requests in the search result are sorted by the selected column.

  4. In the request search result, click a request to view the details of the request. The details of the request is shown in a page with the following information:

    • Summary information: This section shows general request details, such as request ID, request status, and effective date.

    • Target Users: This section lists the beneficiaries or target users for the request.

    • Related Requests: This section lists requests that are related to the open request, if any.

    • Request Details: This tab lists the requested catalog items. You can select an item to display a summary information of the item.

    • Approval Details: This tab displays the status of request approval by each approver to whom the request has been assigned.

9.10 Withdrawing a Request

A request can be withdrawn by the requester and only the requests that have not started the execution phase can be withdrawn. Also, beneficiaries cannot withdraw requests. Requests having the following stages can be withdrawn:

  • Obtaining Approval

  • Approved

To withdraw a request:

  1. In Identity Self Service, under Requests, click Track Requests. The Track Requests page is displayed.

  2. Search for the requests that you want to withdraw. The search results display a list of requests that match your search criteria with a Withdraw Request button for each request.

  3. For a request that you want to withdraw, click Withdraw Request. Alternatively, you can open the details of a request by clicking the request ID, and subsequently clicking Withdraw Request on the request details page.

  4. Click Yes in the confirmation message box. The request is withdrawn and a notification is sent to the beneficiary and requester of the request. If the withdrawal is successful, then request moves to the Request Withdrawn stage. Any pending approval tasks associated with the request are canceled.


    Note:

    • Configuration of notification can be done in the human task of a SOA composite.

    • For more information about request-related tasks, such as approving a request, reassigning a task, and rejecting a task, see "Managing Tasks".


9.11 Closing a Request

Administrators can prematurely close any request that has not started the execution phase. This includes all requests waiting for approvals or has completed approvals but no operation has been started. Requests with the following state can be closed:

  • Obtaining Approval

  • Approved


Note:

  • The requester or the beneficiary of a request cannot close the request.

  • If a request is closed while the request is in the Obtaining Approval stage, then all the approvals that are still pending in the approver task list are removed.


To close a request:

  1. In Identity Self Service, under Requests, click Track Requests. The Track Request page is displayed.

  2. Search for the requests that you want to close. The requests that match the search condition are displayed in a tabular format.

  3. Select the request that you want to close.

  4. From the Actions menu, select Close Request. Alternatively, you can click the Close Request icon on the toolbar.

  5. Click Yes in the confirmation message box. The request is closed and a notification is sent to the requestor and target user of this request. When a request is closed successfully, the request moves to the Request Closed stage.


    Note:

    • Configuration of notification can be done in the human task of a SOA composite.

    • For more information about request-related tasks, such as approving a request, reassigning a task, and rejecting a task, see "Managing Tasks".


PK* PK8^EOEBPS/img/addboxabove.gif+rGIF87aPdֽε޵9Z焌祭ΌJRZs{{1ZksƔޭ1k!c!RRJsB1JsRRJJksBsބ9s9kJ9ccޭck{Bsֵ)k){ZJR!B1sZJ{1ZZ9ZZk{cRk{1޵ZccJZBs!ss9c֭kZRk9s֜RckZ!cs9sks{cckscBJZJνJZBJ9J{sssZk111ޭcsΔ{k{19ccZc)skR{91s{{{ֵ!B9kks{s{)scBJJ{scZZZBBBkkkބs{!!!R{Bs1c)ZRZcZ)1Bc!s{!s!!ֵkcc{{J!c,Pd H*\ȰÇ#JHŋ3jȱǏ C~Dɓ(S\ɲ˗0cʜI͛8sɳϟ@ TQ*]ʴӧPJXjʵׯ`ÊKٳhӪ]˶۷pʝK+Rx݋jݿ LÈ+zǐZL˘3k̹ϠCMӨS^ͺד#˞M;)۸sͻ Nȓ+_μУKNoriǝ)j?ӫ_Ͼ-G`/(h& 68#avJ( 8v (#@?0Eh94h8@>@>?22E9J-PF)TV98S<#5@2<`9/~ j*j&nC8D+N/@!*)hrK̆+NChҮ7HH {R%@x N/~ @JЂMBINxCQF@E1zQft(HGђԤM)GUR0u)JWJӖ2MgjӞt:)O*ԠCMQӦթE*RJU25]V=ѭzs]LXJdTeMkP=l}\5g bxͫ^׾ ,_z MbVC d'KZͬf7[YcրhGKZֳ+E-c lgKEgZ lu+̌Hr:ЍtK]wCnuz]-fKMzϋ L덯|K_3Fzgw=LcD'}U{ch03bn/Ea(S9<>1*p%J4%nʐb o0v,'L*jǨr=)W_rL-chs3@:aZ12=gC?fJ+)8tK 7֐P99;?<+@;=+;JC˳KJA{@k8TXZh-Ox4[7;=MLE kr;tmktiUq\;[^Yawln+y+۶KxQ [[&+++v|;H;M v{Pӳ?빡;T1%kk?xU K{ ˼۵8 ( J ֋ۛҽ"䛲\;( p@L;3W+|l ( 9J05k˻6̱ &  ,1VJ33@oI>hTP^WH[.U^Jq dMxp\ @ `L`I M/*T1z (⅞1܏S W P ب@1l+봦n.ZVndM!cN@` ѩ >~҃~k =mx%N,1>RQ @ >?^lYNzN[\> LGNM>Nq `=`ǮNP5pP:?x D^ nB^]f޷Nٰd䊆NTa !/n'쏂2OQQ۔>Լ>/Aܒ>DHP/\U}jmb=/mJ qO *x!=N!-N$lBORK/Qn  Jko_` j|Nѕ@9DP@ $Zh!D -^ĘqG |D FQИRJ-]J1my`&K|R&:D4a UjUZ@֋R B,Jmݾ};'ܭ9SϠ|SVPqU?ё,?fΐvhh&^5uƤ][lm^An޽}\pōGw[Ӆ '`Zխ_Ǟ]vݽ^x͟G^zݿytV[/~oK?mOdASP &B /A j5K ? D?@CWdŌ"|@.fFo"1p*B?H#DYbG'?eıu<F{5F?XDAc  &h1T3J;3˃DHB,"P-†DO, s x4RH'6.;D!DD *~ 9\N:5V'DCn5ITQ%aXK:-S\5=hb@ DՁ\=[5\qsm5D0IBJK\VG7͂,d 26bV9뤸3co+@G&9u5. V fW1yCd 5w^`\#9a QZ+pA 8bWYjm'k9~`Dm@T~@ޠ]Fe 9g^(J8q]RZ>胎B'ؖU-z;:tߚӵ( Uߢu^7t%I;rfg=oi[}F^* h 5xڅڪzGG?}J?=P$``@ÄDӘ!a 䌔9L*D Eځ@v 2XbH)NTo!X"KHazs;H-my%0 NA/K! 48f@d*Q)B$@&AI_v { F!o~_WVK[_GwV(7p%Yfof0ЇFthF7яV4 iJWҗt5iNwҒs.=nrFwսnr?;w=ozwni;̓w>p{.1 7x%>qW5qwyE>r'sIr?8%bZEqLrOy9?H[\5kj 6΁>N"nSgtO u6:`{žSg ?_{.uvб{>q oggrxG'ӎ39t2?x?WG;k^O~t&7 |گ>dhtv?7y@{{>2T@t@4*Xk3P @,ЀTdt !$"4#Bn4K0ے[;1kš3,Beр-/01$.$3D4 3T6t7:&£C8d;=><@C@B4?TSVCCBtHCIDVKD1%=F2Q4SRDEHTUE S1L[ 0CEDUEeFuGHIJKLMNOPQ%O 1ͻ EUe9,VYWʫ#.RZU06Q+M&UdfŽ`}S2bUgV_[EU -Wprwn WeEt,'OxXV qOjUЀX V=:W~O׃=ωX#}%XEX]ٍUϑٴV QV H~>cK.1dMcCbOd7d8e%~d8ES+`5fdHVCZaPc].EV,eNKd^c&[bSffdZf@ja`6fmfT,oqYfti^gvem&e\zNb^[}FaWaz Vnh{=Fhp܅f_ng`~Fd`~fv^荾iN>ihfipVqih-ugi_h^>gF Hfvjڢj祀 (ijjvjᕀX{`v뷆븖빦뺶&6F rW.k=ƜɖߐiphƊ H^_P.^Bmm`HŻ8Xmۦ^phnn H&6FVfvoVC/(~mN'7GWgwS[N(oAoH'7GWgwqOp pTEU#(8&w'()*+,-./01'273G4W5/s( ": #$'<=>?@A'B7CGDWEgFwGHIJKs97pOPQ'Ry5TWUgVwuP;PKp$E++PK8^EOEBPS/img/tskadvsr.gifi.GIF87aB&ƽֵƔ祭cks9ZﭵνJ)Z9sR{k{R9έƽέֵR1kJ{{cJ9kZJ{cΔRcZ1!cΜk{k΄J{R1cZs{sZΔ޽筽Z!R111kskckΜ!!Δﭽƥ֜)!!!JJB991ޭޥRRޥR{JcZZcνksƽƽRBJZ)1BޜΔƥcsck{{Zc{{k{Rcssks{ZcssRZks{BRc9BRs{ks{JRcZck,B&%*\ȰÇ#JHŋ3jȱǏ CIaj֬=H˗0cʜI͛8sɳϟ@ JѣH*]ʴi D©իXjʵׯ`Ê hӪ]˶۷pjHݻx' L+^̸9A4sFrgz`&̹Ϡ2CFid4^ͺ=*lڥi߼/\Nq+_;9УKNسkν+7v هd'X1:ȟAϿh}(& 6F(VhfSL-R/0ŷ}!~.G1h8<< 3̐ RВ8`8|OǢNNi%YJ$,V dihf&, &,, #`29c}i啂n9e袌6裐η /RP/v(]'U&b:#yF*݂ . ܪK`ڪFʤˬF+V,R,܂H, Gn.»n./Λ,l' 7G,WlgL+K J,"X04k<@-DmtaLJGG-TWmXguԈ`Pomhl&-tmxK|߀.n'7G.Wng砇.褗n騧{.n/|o'G/W|g}/[}觯/?o/tLt X 'H Z` GH0@WB.p.ـ:D IRT@ H"`" P q90@:` H2p6Q1Sh X&> XL$_7:h M@AZ ٨Nz-c2pH8L*WV\%)O` e-b^~KPb8+\:WѥOzIMה/͡D@/2Qidg++PJhCfO͘Ӛ`Jvq3D:_YIx<'OOlVӡ&5*QdŨN,CD HG RԤ&=mTRt6% iJIJS; 8:4?)=#JԗXTmhN4 .PL]:SƴTjTIjGNN|:ѣdMjPi0`̀\J׺ftū^*WwM_kdb)֜՞j*RZu'`@ Yկ!^E;XrbWDe-*'><]A;عnu*ҵ7)+L+&O,U m`rֺ5xۈd@pMYoۙ "5,{_:R};. 3)L 5 o7  0d@b s(NW/9Lcx4\w@L"HN&;PL*Ytɍk.fzl21v|6eZ3L:sl>-3B+ }F;)ީJ[)^7idz0촨GmOyΤNM=hT՝f] ZWZ~cwmh\M׼}7`N6[=!!hBnіvml.dnZ$6pss{&dw}?wsݔ =; 2%7ƯP+whߍo%Gy%n|ruo;8e k;#'9o&'qr?Szϥ>~m& ̣~g|4ɯuϽmuu='bLB!;(&}mwS=琟ՙk=>]xQ 0_wǗNozOt߼=\6~K򾏺wӿxc?w/ [{;ߍ?[5A28Hx   8x("0$X&x(*,؂.0284X6x6x~!">@B8DXFxHJL؄NPRk"m\؅^`b8dXfxhjl؆nmX淃\!wxz|؇~8Xx(G[!(~H'p/DMy7W3qX>'2芚(XzlWuzz{}x}Xzw,xx7W0h8Mgsrvxhvj gx(88|먎i8hXuƗxYyz⧍Ǎ i8߈8|so|z96tq񑨨|WXlY,ْ8gMQ6i8y:0DYFyHJLٔNPR9TYVyVq=ٕ6^9Kdy3ahƖpjd9tvy=zْ|ٗ遂9Xi8ؘ1P@ ?  _Pp>љ p` i 0 bٛ™@ؑ5u6xxIyX  9Q؉jrqVI ПI ɞIxy;|׎z=NjT'|>I j ) 96آX/'hwXw̧ : J yd/2ʠX uV: {+7y>j;IEJ _pҩ\ySڠrz0̨UjyXwZڏ_J:cJFiln+ڢPz2Ȑi?**;_PfZMبcwHȑᨐ\z8Jp? V{w :iE ʪljz鉞ଫ aʘ[<5PJ骂W@㊯=[y ˖۰c{hi[۱ ە;W&w(_,s.2[p4[v8m:ֳ>l@6D[kF{JjL R;T[V{VaO=8^`b;d[e [UJ|p8t[v{xz\_P: XZpv۸ˈ[RppR]uG1HC%w캮x`8Iq: NPZ /X zXBA=V1̻' iĺI%w0U@V Lp3`+! ɩ{;˿ʺٚ{1Q0E N E@S@оj*jڠيu )Yu]:%N7*!kם/,s%wxüwv}**U*˜;,O'.LjJDEMO V[1ZL=ZzzyX|Y{7ƙZo|–oxk_jڋLj= C@E`Gp>I@yJr:q*IwGėi̡*c8%jK*wÇ5ǝ I 8:<>@A`{t^ \6A|6uzhwyj\ǸH6Ù1 304P6p.@,UW \_ϖ.!dͮΟy }@{‹7Ϋ<֌& $)S3z5aЛJ¹ʭñ,"A ED$)z|!L ]1lW6)\@Zͫ>Gah?9]_P/mch|֮ր9*U|Puٚp]tt]ٖ}٘ٚ;& .ny LPp/1/O@NJo3QoommϏ@,@}0-_/ ?;X A >QD-^ĘQF=~%K"0iJ-]ć5 y3'͜8w^D1(ÄE~(&Uhta£1^ŚUV"?4e͞EЦ͆liU X4:\/zA.ޅGRMXbV%)lcʕ-}٧ۙqob|FbhJC^!ZiD^Ɲ[ǐ%\x3|xr$:m6CWnxv5[w#2G79C聨'aUǟv <+ @C8t҉3B @xÓ6P(#1DL@DD1E`D[=PEoİ ñG2Huy܌pkO7*5! ) b *`;@zvv@hi"x#![L.L$q -*U%`&p (^Ii6Z 4Hǫ,/Dq$'*! #8$h.)u!W/^>|nq2'|_O}w_1F4$Kp?mڷ>qMD` !At? :$^w"i3iO ճŠ-p!7 -_&?J@`i2Ā9b GC:q1 f@. ]>4T‹_bB pL1OԢBg3^ hD:ЈK FTm<|Fdq Xu\ 'ǻ@ P,j#B@ btʓBͬǕic,=9ąs#$ҏ1{8HBw#.ݗG11I$`(hY!0 X3=le:3[&3J{< dل&w1uOdє&CXs!Vih8}4N4|mƷFQ|\f2Q@gO\yD$-l" Pe&pELKMz&t @C n#F3JȄn!_K|GPq#f$ӣndKUڐ@@8`:\Tप*!]=R"5XFp[N;׋4YkCBpl:-71DhG5cY!mKfQjv(X^J3նmnu[ַ-K;\׸Enr{۲BY=V]nvZv׻ߥ w;^I^ͻ^7#uo|_׾n}_&Tp_["nep%:pU` wEbn٫]vkm2Yeݯ,y-󝄄ψxy+wpux;yϗ󝧯偔0a bCpDzӣ^߮}T1yP~ tCt{دZ8*C!@ !`5^Eɧ_O̎Me` oC5B<(A+ߵ#tڊ0X˿63w>!ԾA> 4x@! Jh?Hra91p!ZEJGr)B"y{@>8=A AZ+*b 2;Bzf%T(CC2wb"/%fBr;<8.:dBd!XWXR<'>B@|D9BG\DNE Vl789EYd0CP Q%9A>\ 0?6 DS)cd\Zi|EMt?$y@dbQlYvCT5>)m%$l)GB(1ty,DMGDAtܱ{)8Ewx1032@᡽4HH5e;3+|?\σIə<93ɜ3&ɟ4;ʏɣ,TJcʦ\JʩJʬJʯ칰I1˳D˴t<˸˹҂9kK{˾˿z,KMᔟkKQdt̙Y]_ aṶʗ} 9['鯵ٙ:Ҕ!AY*kMB1Z+Ϲ͖MYrHތ42Qq豹DS5,Ȋ ʠ MTl N"-("*N:O4T'$ԪKʤMODMS,rj2P:9̄MhMz(O 9 / } MR9/Qp+"9[Q:N J$.EҤ#"e#EҧS%&M)RdK(E-.RX8:AL,r 4U5eSwKɔM4<=m_a!֬SL}!T4hȘ8T2M9qQ,TȪZ+,IyԪT؛TdLٜUիsՇ`e\ՈYy^M/_ݎjuD!UO OuamP,V)+oewmGrЉPLeWHMx#~]ЇRQkmWU[*W WViXZ׌ QЅŮe+}չӒUٕeQ2fEY' Y&ٛ]4O:٠%ڸ;Z#ڥ(uZkڨZMKڞZ&ZgZ#ڙ$ ۾=[ڵ5uQڸͳۻ+۪e/%;ܭ%/u݀Zu͵6\н%]L%;U]dJZؕΥ]{۵Lޝ0ެ0#]U 8^-0 `q^ ޓ %5EUeue ^^;`M`[f`^ . ` `&a2Vabv !&"6#F$V%a1a'()*+,'v-/01&26c+3V5f6v78a9:;?@"NA6CFDVd5.EvGHnIKL>JNO3P&R6SNQFUNpX-X*Z~eFc]d efef (f8f>f~dneFfaf8fheumFdl^ i˸fkfnF@PbvvwxPy{|w}gh|Ld xfvnhp艦芶fhk菮O&=VhFf閆vi蘖s.雖c j6FV.vꝾ槦jjVej1j&kjpF ^뷆>kkVkn6k~k~^k΀6FVfvdžȖɦʶl ( aўa@lφ ҆bV6Fhmmx m..>l&6Fn ` 0l.l~nflNl~nnnlfo^onkǾVno>l.lVGWglFoo>.p ?lf7oGlppgponwqpF\e !.r##k "w!z)or&_r&r+r%o$..Gr,)(-3wr11s",7s4(5s8_8/0w9-@A'B7CGDWEgFwGHIJtJCtN/NtQ?tLWMNWuOQuRYuYoV/S_t\uO_uA\^TAcvcGtS't@ghijktb'`v_uY/tftmtZ7n'n7^^WpT?yWwtq'weOvowWowatg'7GOt wx 놯xkxqvx/yxxGyxxyxyy|yxx yEgwzz'{{O{w{ox{ ox/GpLJȗɧʷ'З @WgwקӇڷ_}ه|}ޏ}/gw/} @'7~gow|`,h „ 2l!Ĉ'Rh!7r#HC,i$ʏ#Sl a˘&"h&Μ:w'РB-jTaͣJ2m)ԨRR Zry+ذa<(`jײm-\h4P0z/.l0Ċ3n1Ȓ'Sl2́ P@F P4ԪWn5زgӮm6ܺw7‡/nu@;PKK_n.i.PK8^EOEBPS/img/catalog.gifYSGIF87aSsRJc111ksޔ9Zk{޽ֵssZJJc1k)c)Z!ZR9k֭{{{9s1kB!RssskB{޽Z!JcJ{Bs!JR{ss{kRέJ{焥c9s1ckZνcJ{ޥ祽9s猭ZRkZ9kΔR{cksR!!s{΄BZ1k9199!!!))1BJJ))!99BBBJJJRBJR119BZRZcBBBބ991JJJέcckZcsckJRRks{RRRZZRsΥckB{Jcks{{ֽJ)R9{k{ένέ便{J{1ksZB9kZJscZZ1!R9JkcΜk{R1cs֌sJJBccZcccZZZsssBB9ƽք{ƽ,SH*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲ˗0Y I͛8sɳϟ@ Jъ3*]ʴӧPJJի-bʵׯ`ÊTFd * }N7 Z˷߿/Źs|82G)ZϠCӨS^ͺװc˞M۸sͻ N`kp*Ff'9(8@F#ߌONϿ(Nhךv&cJ>y`ek @cAJ)څךz'7<@)DYd ;1:!cWc !C ! 1 O ✷Ɉ &Y:eg~ʧj衈&袌.*'9Y9ߠv+xabwށwd2)᨜J*j꘷)Vg|4籘 6F+-2\ϒM>N9rv&j)#-on^i≰6G,OZ)h|b +`熊j/GoZ!0[g&,S,DmHA94:s9i,$=I2(25sݵ`A.I|7YPƈ۝3Zo=۪#)c/((ӎlwc[rl8/r?.<~N:q׸,:ѐ ǐd ʌNjnj)t:gJ觯}B=-1;:Q#N`Ӱ ff=Xc'H ZZRcc1O Q^Z,j@' gHf (8sKCZp;BX(G(u6H*@Gpsl@ZXbScG`G;bPB:H::혨7 IH L"F搎$'IJ̤&7N (GIRL*W y]J%%i^v%Ib/aJ4 1QX̦6nz 8IrL:v41d~ƞ'-ixpk|5ЀBІ:D'JъZͨF7юz HGJR(>LfRg1qAFPJԢHMRԦ:PTJժZXͪVԓg vҲf-Mk>YOzR⨃6X:,`j `KMb:d'KZhbȅYGlk[IMg!B$c~gU pKMr:Ѝt'Y " v{jN!r p(C?mo;|Kw ub c $ Co`uF CU+K [ΰ7f1F5k( 5эlxX@4Fzd[@_1 FP[oAH6_&L2yFT4#f3:y44u3h! Ҙ5qc̈Nh䦹30Kt5M|P2 f4 tns07հhQ\gzr=B0jU;nMj[sk^w b(٩N w|kز-6{`{#v ^[>ͺ;'}7^Vܿhc8%^\1=ܺ(Ϲwaz@2O.i;5ԧN[XϺַ{`NhOgFGJ1 ﹴ;\\O|s;~'ODFϼx{__COқ^o?W Ps~=?Oi;[ɞ];ۏ>ǟR+@/@{+Ͽ8Xxzw N@~(`hp`8ЁPk*,؂.0284X6x8(&q ^PN@XU&@  $x&VxXZ\؅&=gU`Nps Bihcn,52MҤf9&KV@Q(6 gx؈8XX `5ehH?d0m''Gs(Lm^hЄ@#m h?XW𱊗Ҍ%؊xsZDKLV_^nf(8Q O=p#x0sc>5AA0 Ӑ҈@ȐXLHrmfҖa蘎؋8! aJ@X6H>?D}b%A9 y8HLyI .scRy䍲޸ m vO)̵oAVӋПM |=k,/jr̙Ѭ,/ǟY-L%J}Jie*-Klel]f z|~׀؂=؄]6-ԞAgJ YM-kOWQ-,ǣcկ`-~LyW&}کiڮڮ֬үmض}۸ۺۼ۾ދ؝Ᲊ+ɓ9jɔ-MY|fX}͟ !]ڰjpڭ-ۨY=}=]-. /}[Sa}lځ%%-}X^ {c՞1b=J\E16>6>L892.B>D^F~.YkreNڥ-㯤U<^Y>WnY>XH^f~hiMpO˲ldxz|lE+AS.]爞芾茞 ǐ^~阞=~r >^~ꨞꪾ>^~븞뺾>^~N3.@>^~؞ھ>^~>^~Ծ^r2 ?_ "?$_&(*,/_5_ .>@B?D_FHJL0_2nT8` )` Mb?d_fhjlOQp4_U  _3?t_o GPp` ?__/Вps_7/ mR"@ 8 ?Ŀ?ԯ/pP 8 <_C_N op c` ` p H@ DPB >QD-^ĘQF:b ( QF-]vSL5męSN=}TР\= )KGM>թ 23F*HD%C%m@+Y\l܁sצěW^}X`… .  Q<y 䅏Wr)KD=ZhҥcݜtԧX?P(QH҄*)P1(QTmڶg|kx?]tխ_Ǟ];AWW\ᅤ6 KQjA%L-TD3M5dM73r‹*, $| EZF=ȤcG|$MFmD,F2 A2SM7JI<2!O6#r-Q2.'8 {L q}W_6XaMI1+@;lAElw[EETel 9ofޙݖZIKd:05k/F4![r;4EZ$ܹn}}m}w{G~x7yh^p_p^[K^/.sg}Y__d[eҝW̄gn xt!C`%7{H^F5*!&} 7BЄ'$H>7lRZPk uHCLyw NCjMG" 8E*VkD4] e8Px7Fj ߪ#vg, ('>rVd 9H5mmc{0 w4jh:ВL`g3ђ %$$zdM JVҕ"M&. $|HRg,#O沁 ({Rʟ-QQ%,9MjVӚ{!TfdΟ0@{&TyMvӝAi!H9#9G7 &d:9xԠEh+O6Tp=@ PVԢBQ KHE:RԤ'EiJURԥ/iLe:SԦ7iNuSԧ?jP:TըGEjI[Q6=] h@'0R, :VլgEkZպV'uk\; UHVŪVU &b >@&%aX6ֱld%;Yme5KףصWVհdl !Ӧvmle;[ֶ k\],g]Yv+OA![8׺nv]%_TV~5p[B\u}-N:k@c^&wަlC'>IF,ao^EW:⠇/LW"v=rCDqu \2 Ug`1hȰqa|'t,7Zf7:\4g2$(knr<Ʃ NbLɠv)ШN>.|7h9Zx9(E h]hgp6/kT'կ 42k>{9;9t@A d3d); \s?<ȿZ%9ڪ `I !S[&"Q , K3< 㧽@B39S9&p$  AATAS,!)3TE e'|BۉD  \LB뻾/4>P9#rDTLCk3cUYOO?@lC B#@<ğZԧP6f )B.d3X@Ӿ8u#C+Mjb:;Eedv_ϫGҳG : .sGbDhF#B你yt>4RE2 `Ȱx;H6Ȣ!vȔTIR!D+.XɎ 8Ⱥ8&4ޛISɠJjI=[JaEc4LH8\JʬJ>tɳ"D耲4˳D˴T˵d˶t˷˸˹˺˻|KIĜh­DB$4[_ttDŽȔɤʴL˩\lHͭd$4DTM rFJ ٤ڜ\ޜ̼̈́͞4#> ؆]Z=AYňLG۹114:.3=^MP A,<+=D6M?FdBJaBdEd-FGOn+T̶L6eUf+See.feTUn[W{XewQca& ^F~J,g;dNTvhlƮi^Opq&r6sFtVunvg emz,n~S ʼn Qh|}R]v&6hEFV͉"u.JRh.O/.ͯӡvi ib\C19:MRKf>Ÿ5k~iB2Vj_W+eՒΉG6/JM^$j\[6Qe_dW=X崃 5%:UUV[#::kV^fhVjl5DzV 9nvls%t=]7tm7ubLY%[|bl5@N -CXc9L6$]j5w$ӹ> f٦Sm=bmמ瘠ٷk6nÝ^ڼZ之[NqoZ1&Z=[(։nmP[k6NJE`!m-Eq\`M=f3o>: z: ?]a ] J %I"n<r `$A$?yt'MA_ q~}ٸXp^+^k G6k gs(}-F'^6rv`b!DL4`%nԵp'8_j9wC;t<q `%nq5F /?dM1߉;t[n[uVZ:nD &cPf$%ZԮG)~W7X7`0&2lu0ZcvefC^LlhŽPwRlf~IC|@F Q.Ն懗rWxDxWӏ'Z.xyVR虧)v'7oehWze蘨z:Gѩ mf#ZR{5ⴿR -/RrO07e 8%1C1;-wVTj§"A7+6.jJHo^/ ̟WtJkkM{kZk-}&W' w}D0ϯ66>xmn=InцZ3.;1vmՄmҿa;~іZҎnTDA B"!Ĉ'Rh"ƌ7r#Ȑ"GPq 0j8qCÆ&L`  Db˄Z)H1ct@Щ@M>P*X"ujօ[-k,ڴjײm-ܸrҭk.޼zw 'WI: Td?r?LCG.m4MRDK2ii6%XhْK9rժqbպWa:ڷs;u Hhc9svLL b6j 8 HkRK/AAM7-DYE EOF 5F YEs\H]u$"W"G݃ґ7#5x#9#}9QV\1zbf)~9ImZx%YjC J l/ 06dA1nJ Cdq]2Met8(z(*ZcNvz0)tz6T.i\:*reD`63iY9ja!!ڹ6w"U[y.z,*,ވ=d}bKB_:.咊*DMVkΩ'uq⋜ <0|@=%9e'RU1C ]Umŭ8W rS+#3=3u)|z|4Icr":[}S[}5Yk] 4aʹӭfAn]m6q)+kym*)1Q)wr~8+9\,{K>}j8{99奛 i:>;8~;3 z ?髿Z{>L0????(< 2| #( R 3 ~07>&!hJ{bH>o!`P<1S"-FbǐػP' hC(9ұ~"H.1B `?@ aE2, (QqR#K=|BФ,FbQQCG 0HNY:| `C_x6˕|fS'n dO|Ї)J`ђˆO&EcL˰ꞪֱRr` s`1jM!61S3aR@#HҦ7 p+>ֱS׷4͌e27.L|[nzZՈkI&CVɆ:!e"-V tkm.|{ H0f׺kا N{ʐx)7oӼU]A`۪mݭ+x!z"ՃIRE%540<גiL< hej"Ue߾u1|5ָ̖m\jU񔐱[dJ3Iܮ%`:pI+PMΗ#A'z,I@a>C,ZԦ -><$tE_]naIUHeޕ뽌)-vn'͟>Y-iӥ_K63TYQK-qn=6vnNԷnrӻ i\5uǵݺ7.p:'cS\86#s㓾8kqz&0C.Iq.9c.Ӽ69s\*7{=)9l:dc.H7U]*J".Y-r4nLc.f HA2"+ht?RZ_]%*%J"*vrDIsMJS󅑭p]I ! a M`YYMYYpZTYxP9R)Ջp)|աT`Eo ZYxslV=V i[~`mSBO_ER!W KtVH `eYɌ!S!}EUfa bh]LŀZLxAwpmmpڞ!&~aFHAW!e)V!*!+>zDׁ!u-4u1aw!")"i]\H`{(ሹ3 29ubW5b*Z|+N , =. L-/&O]bqX| ; ڿ|^1(6(ʡ&3&Vd8=񘏍Kc.BRK$Mr5O:dZDN ኛeGc-H$k !dLmY Nd32'cIK J&D})Zrpe ]V >iF^HjBU*IN]VBў$Z66S˔C rMfP%2)W]fUT%j&^&\&b^%An\Eop~Ib&c'r^[5g6=gDp v'y"krxggmRay'|zz {Z{Ƨ~'w|M}6}f%uu*M ~6&Fڅ.(hen(v~((ҜRt ݄EhǤp'.DE](h(m>h2ׁݑi)]Q-bg:@)1 R!]"8vᖶ)4u #S<'y(UJc]TMg#d)RќJ=E10콤uKf_- &,jxA|91_9:Q*_W*juLAw|*nh"-0DdjN` aެNxX Y`0>b㮲Px2P >_ *RYqIUS% RHYԵ*᜹՜]~aBpbqi_A76Λ)Tyfwaag!FF}FL!b+YV<:Hl9P$gdn"j,+G,GRj-v 2^˲*A0#MX*d߻ZT=kЖI#):F6%Bz(Bࣇ>ZB:Z@GEۚژP$HJe$L-f!-mBDJ [Y*.^崠LRjKu P",̢n /֫6]X9ުllB:N ȩ-$ ꯕhRbY/]ro\5uo$_$.NȯFN)0A( of0kk2/op-0Kr0 S0p 0 i K ǰHh \11'/1 [?GDA@hwߪ)+2,#h_-M(&AZrEFa-$R5`ZkMun J/,s|/k  &2z JU%$,6U8f&9kMUs-ˊ2,,6_M7b 6rfyg⥈,!zF2ji0tp.3ll$Vnrj43֫ztsNtG.B3FzL{ M72BX-zaz`52#^g.HGQK896 9[JGjM|oFo>-qM֠W-6jrQuN$P'>7SN T_>go>w>臾>闾>ꧾ>뷾>Ǿ>׾>>> K~λ; tȟ@  L?W_?go?w?????ǿ?׿?? @0`A&TaC!F8bEH@9dI'QTeK/aƔ9fM7qԹgO?:hQG`FOF:jUD*L+WgѦUm[oƕ;n]wջo_zuױg~:@?w Ѓ^<Γ>|ۿb PoLPl!P ) 1P 9A QIԯPLQ# ```L.GbqG1u$!R%cL'R)+R-/ S1,3LS5XSбD(9> P:ii ~ꭙƚ묥jN[nm~~[#.꿧{k'쯑^p!q)1\ѦO(Oӥlv٧n]e1$dfA+Cӹvg0z1]Bn=ݐ9<ѱ9Gظ3s=oG?[I]l{ź?{'l|/W}:yf=D쐷: a6Qy׏HE=w_}[%YH?7O4U$Ю/NҶ/,LYĒP.NZ4RP1oKӨS^ͺװc˞M۸sͻz*+_μУKNسkνO|ËE'}LVbϿ(H}3#4蠃MUfv ($h(,0(48ȞBUDiH&L6!(@?0TdYN9`rdih~&#g>ÏeWUa*蠄j衈&袌6:9CO;Z*hjꩨꪬ(N;<闟},Y&6,`9褃ꬣ:9,)l ϦA0[ R7*j[߾k'ˆÃ8DLWGL2 ,2B I8`ܫƿ\͢%<@sN>*rl uAWmX88p8Ȝh7pwM'q't|߮n7+ #D7 G.4gy wN.褗n騧ꬷ.n/o'G/Wo}fw/ei擯O`/xŀ: m@@ z ŧ#`0 kCA'\ M@ "kx"E$&:|DL!HE)>X̢ LH25] H@%pH:x̣> IBL"F:򑐌$'IJZ̤&7Nz$BIRo %FJSke+3KXYRKD._&.$3iVl6T&1qR:YvVӚf<)uSg5iN} =t37ʃ*D'JъZͨF7юz HGJҒ(MJWҖ0LgJӚ8ͩNwӞ@ PJԢHMRԦ:PTJժZXͪVZx4^ XzUe%+̚VUl}[JWuw=^ۺWx _հ`K:6]c Jf/Yz6lh3Ҏ5li֊kg=ٮZsٶoK\ɖHr:ЍtK7ȭvzw]q@Mz%uaH ͯ~+_ w!FXLNw#p'L [a}XcC x GL(N5 avX0gLNwEe+WRNxhNf5ӫhRfzxg:yL 1gЇDOSȄWf@Z|F3l5S̀VqAARh)LmjzUbuK=Wۺ0k}PxuAlbg# :ЭÖVHR3+5O!TZy)oO U:ֵsA!o\ΰ7]Y׻󶵯`z_69s:҆4=~eUof|KO|1 r3d(b`ٝze {i+'W /|˿0'ÆlFl@G|aKqer$w}x }؅'b8XȆm>=hBQ։PƉVeX~؊抲8VV heP ؋8XxH>؋8ؘHʸsl([p蘎긎؎؎3hוnنUIp ؐ[ rky;I\ّ -6"9Yŕ(hՒ.1\$9U6I[*2ɓ# :yBU8YYH9KIMYODUuT)UJyRLɕ)Te`TIZeZ%ZiikZjl nt9vruwy~ٖ|yWJiyI9Y}Iiəci0YE%TQuS@])] v_y^؛)~ayع`ɜ뗝ӉWcybɝgb `cV@d;d[PeQeeaƟY1h|ipfgigzFvɝfCHhhq[ifi+i4 gArun3s@:u&Cs9JjvǖlPxJl\Am mm^wmFn%wqOwosoF/wlnjGzI  eOpJtZ1qVSqvjqVvz_J)v*we,we.gs8'i:19:9Gt} n8vyj&tRqVmX{u ynjv'x7|{:wvvjxڛ|x(妀L&nw xz(5*{'Ƭ|gr:|g'}@}n#}gSH|j~#X{G{W窯X[ʀg}t z#Ww8wN( 7H/2A;.H1HD[I+QWg&Ft|ׄNQ8h]H`hjf贱br[Xwz+h[8_x趮 X+ȸc۹{ k8b7  8;+[8[ciʻ{d+d9S9C5֛R؛1RY@ {蛾껾۾;[{ۿ<0i* <\| "<$\&|(*,+ @\끦1:<>@B=]} "=$]&=  0P0 #g3ff.fİv@-[DMEPPBJNT]L]XNZ^`b=d]f}hjl] p ǐPsjmZrm^کDK|pcQEFF߫ 0 P {mJuj!z Pvl]!Pc>@۽=@ ܿ۽}9%-ܾ:]}؝ڽ=] %@  Ґ pIݟMuJu}کګm؈̰&[&ܺ  ~~~ m ">$^&~(H<P0Ѻy7zWڨw~ߪ`&PPE%&#@WZ^[\nSUNW>a` m P}%'@z'7} ~;N~Ġ- m&PMPVfe~^.~堾nnr vB y_q Kr7WwmÌ.F^^.ϞnЮj*x  `0y^`[7Bm  ~>af^i tXr.}PǀpfXm7H[(ڪQf(1/40 %0`1lPF0o15"1K@, P^_P?dWn[_naq^mz|&~Z?Qy?_/>i;/ @ @;3ol@^0* ,r@ @ :  ٯ ܯ .?2R` ǿw/$ɟ @ P   DPB >QDTĘQƈB +<AG-:h5mY3@N / P @r bĀy ,Q0+].ܪ`rEV]L0 śWƋ{.7FT3>D,Zl-S^9N *Kt]05mBP<.F!6P^9֨۟wysm]Fn;MޥG6j媾& DVP_ݡ? xK(۽%1j;Ls'rqݝ>F/Wq3%FO>y>_H ýf) Ӹ`l/; ȧANPRH.o RZ"u= >J!Xb61̝/} PЩj!0 d80k P?.] x HCaDpN'O'T"ET>Љ.3HQ؀!`E4"&E6*eI"+2MЎD8219O>? (HJTn#M!*!-iȡtғCd()"?RҔDe*UJVҕe,I)J` uK^җf09LbӘDf2Lf6әτf49MjVӚ׬-[}g8[MqeL!Erӝ ; zӞg=˹ETI p#Ѕ=t~8 P6 $:QVԢR>9Ӌ $4 "7xI^2΋W9szgHSn(+4 f00!1;gw Q24] 1:P^![pxӛ.q.f6 j[{"6C W\V>r2s BpXh^J*("ƺD?y'd #Av Pnv('D ok &4 9{·0"8~kL51Bǧ9)#<v`k^7iK&t vO`ǿ!Z@~F8 p{$,C<Px#4KqR ̿L,ā ˁH4+>ہ>0 61Oj3&-:(<J$B)AP`px1!2B'd(8CC8·K4%;RY;56${;C!Csr8m9?"Č5,KLCDMCF ILCn)L$X(@TTUdTԨ. RE:ʶ ^_`a$b4cDdTedftghijklFkl\|$EG+GL"4wxyz{z܀|~Ȁȁ$Ȃ}4ȄTȅdHxDȆȈȄuDÎH{|Ȏɐɑ$ȏ$ɓDIy4ɔdɖNJ.v%ɛɜɝIGʠʡ$ʢ4ʣDʤ$tɦɟTʨʩJIEEp ˰˱$˲4˳D˰ʴt˷˸˹˺˻L˵\IˆIK@ E]tDŽȔɤʴ˚$̾DMdtLF#  4DTdt<ԔN`jIn^UN=]` aM` _. ^ n#n%V>b~a!b<,E-Jߕa]#a^Naݝ2 8\".(c F]&6ѵb,b4ȀEndF^dG~dIdHfIdK~dENNeJdLdRdIdT.JOXYZ[eYV~eWeMdRTfSeVd]d_^nfeijebۍW湀dPdpndogJVepisgs&t.vNfexgk|}fuvvw&b聆hsggeg.hfn芶Z>XLfU[f[hkf6FifNv阖iZ}Q呞KiZij.F&|6fꓮiUHڀzՖnBϧY/VSw&6FVgfDN@ո빦뺶뾎VS&†'nV!f$iyO(sFTȆljsiԮOmFmVV&Eln4&?s44Gn2fnBDl}k.;v29햶n6Fk8;&.oyo&lP5 =&nn;^>FZޞo^n:Cp&uG+n:i0G;nᮖ WqG m^*f_3T rXG# OaG&Wq%t)Op),o/gn.7r0'Ԯ2WsƆ.5sn,}8s0r g;s s>tsmAGtZ<DwtLGtI:Jt%oMtP7uY+~SgX[OVĞY4]\(/_'JuR_bWv:vLevz.hvpmlknwQ v7p7w%jvm?uotvv$1zWoj}g|j~wL7q|?瓄ww@xwϮ[Nj:x}Gy/rg/y[7'z_ծ}Wzug_zz7zz'yy/{x/xw{z^{POGy{y?t?{WG{uo|_{w7||?ѿOzOwqg}{|ȏ}ozگ}}}v/}dgޗ}Wx}|_}w}_~ӧsp~~pg/n~wzgh~яeޯ_h_,h „ 2l!Ĉ'R(0 # G`*Wl%̘2gҬi&Μ: bȑd%$r'ҤJ2m)ԨRqСY?xt*ذbǒ-k,Ԫ?c׋hҭk.޼:^m d\_.l0O|$JŒ'Sl@ 6~<2`̢G.m:f}? زgӮ]kA: 8‡כ3۶ao9tGнrAs;Ǔ/o<׳o=ӯo>~.?۷kpE7 XLuفJ8!4Uom)P!zh$8]2ZT"\_X=S! )4 [$ -9%U" h=( (ey&i&m&q9'uy'y'}'  @` P4ji(Zz)j)z):*z***02)F ;,{,*,:,J;-Z{-j-z{- ʫ*ī`.;/{/// <0i|0 +0`@Jnr枋1{1!<2%|2)2-21<35|39Ϝ12!A =4E}4I+4M;4QK=5Kg;PKIr\0W0PK8^EOEBPS/img/reqcart.gif9hGIF87aK0΄sJ{sJ{kJƵskJֵƥ޵cks9ZsR111Jckk{޽޵Μks{RZc{B!BBB)))sJk)ZZZ!!!JJJ{s1ksRRRccc9sss{{{ބ999ssRZZkkkΌZ֭sscƽks{1k)c)Z!ZR9k֭JRc9s1kB!RB{޽Z!JcJ{Bs!J{RRk{ckRέBkR眽cc9s1ckJsƔcksBscJ{kJ)cZΌքν{{R{Ƅ祽9sΔ猭ZRkZ9kΔ{ﭽν1BB9ccZZZRcsck{Zc{{Rcss))!ks{ZcssRZks{BRc9BR991ks{BJZ{ƽZck,KH*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲ˗0cʜIf0ɳϟ@ JѣH*]ʴӧPJJիXjʵ6hӪ]˶۷pʝKݻx˷߿ LÈ+˂d˘3k̹ϠC  ͺװc˞M+2p Na +_μУ7"Kνǯyn}.>ҤO ǿy!W]#C4 6wc<VH=w/t ! h(,0(4h8<@)D<0ϒw O<|` :`AV a 3X!62s(ln٦riev|矀*蠄j衈&袌6裐F;C c :TΙSVy%6PҀ' w) j뭸뮼;^z IJ TYDp%^@s:jt*j.gJ kzn+f:ͥ:軍:̊j%yom2xjjgw 29P;@@4d$|.pVs,DmH' \r 8^ri8N"BpX\:k;O,lZKp-x }7ހ0 ^.'xи⌳x;';旇.褗n騧ꬷ.n랍6lkM^>57onyY=tv.S}嚃o觯3ן5S H36'.'@@a;! GHK ipb PH8̡wXP@hHL&:PH*ZX̢.z` H2h6pH:xcר> IB[#"F:򑐌$'FER̤&7NzRT(GIR%SV򕰌e W)Z̥.H] 0aL2Xe:Ќ3jZ̦6nz 8IrL:v [kXvem~[({^ja Urnr{_&KHQUoB%wͰW  P2,αIb$qi Ș1%7H=NXd3Y,{v2& 2b$6uT\sIL:1͔}xMBЈNF;ѐ'MJ[Ҙδ7N{ӠGMR~<հg !ի։< "F04Q}N5)[Gy 66n{ۑ]}o݄ U=n] ACqbO `,'.q Na4~s\t8Yr(OW;'N4% qL:ЇNqDЁ;PԧN[XϺַ{`N.G"}#:ρ`c~={?z}Nݛ~;񐏼'O[?{ڏ"[o;y D{{ջE:c?zg:gOc~Nt3+H~{ss{OG?dyk@q~'{{7~{w ؀R+ vv}@V"W".@%x!'h&n҂*(,)X.-s<؃>Bzhz8'q 8q#q!%SȂ:qQ9$HR؅)(@8dXfx"WofFlfzp"hxxzDֆ7l#CJt(vȇ؈H(~klh؉l1&Xx؊8Xx؋8XxlW8Xxؘڸ؍8Xx蘎긎؎Ѩ/njXn6Ć.9QvD؏lp P hAّAl"9$Y&y(*#pO mxn Yrq h< 9DYђ 0@4)ly) 0 P X `b9dHYJɔ 9nw7Yq ; P@ !!eYyđyNCPSr  ` qyA!iw~Aq|iى#"v@v"vI$/Dl)(6Ik!n 0 ɚyY}ay)#`' Sop%YS.9oȐɏ8 -@  `kw1y! Z9vpbTHS.05gc6mOxzĩ0 I ɹ pr0qh!BAڣ?D@iGڣ:RZN*KZIz1-PfzsPVgVM5Xp(`qztZvzxj"r$&ڐ  :ڥ>Hڥ)zʠQ \ʩjJ꣩b:1WqX=݃==#9=jק+'p)+`-6z 9 ):Lڮ *ZZJ6DgZEZOD(`?t  ۰ JǬZ*`ފӺRz@ j9륧گB#F{H{ga*@'G-Qk(`UU{Q+P{Y¹ٱpZފ| zڲ|[JK T ~[?kN*CGIu]Z_˵\SW+`뒋)YIf{pz|ୃ@|t -{j}۷OK󊼝 k#{؛ۦI_ٛ(p+k;勾컾)7Kl;pz b:͋[K٩+;#pk`K|('li),/,%[KxgvtQEjCE<;LlK3,ŗG̼‘5"FbK_jl7 s;vLʣ,k/۸PJ1k[|y;U<LZUŒL#`|ɘ0b&4bɤ\ʦ|ʨʗ9ph<˶ Hp b˪<\&ʩql{ˊQ͢˩|L,Ƽܼʦ+nD̂JL|η1%<<<=,<$=]} ̆:Ϯ=} ͼDܬds,jY%=84]6}8:<>@ݎ3wpHJH]xPR=T]V}XZ\^`b=d]f}hjlnp]jWԫxNյ }ׁ-׆}؈؊،؎ؐ]͒]ٖ}"tyv=nyJX yI PM<>&驡VҞ6.O!m#MբY zz ;[]>xW-4f~hA&Tɡ伴OY .0 3Z7z cn~qQދ/撞c^ ~㔾^ijMxfho*xj玙2NW "^՘־؞܎N~n~>N>^Pmʽj۳8Z/'Y mέj T]]Sm^#en2DZcH4 +=D_|մJ&;_T&)X_W#>3nEKJ˴I]&V_[}x~˶q>>7h_.?oq/PZ۹{[;r݄ԆV ij}S/-Z>N24/']{߽Ek_߾?Ow]U2+2@0H6lCx"JLQʼn F|Q#CE^ Qcʑ-]SL5męSN=}9PE42I%ZTK(Z֡[^* YVZ b0;\teܽ[W"4ç@wIT"Ȋ;>f̱1dSIΉl@MFZj֭]:(RL' Rɓ% d\x]a[i}n_;[pb:ܮ}2i/gԎҼeALo?0@ D&RbL@b DB /0C ,V{N:颎@Wdq_1FgѦ6D¶#72H!MCO41&ѢJ+ҥ70B~afx"8b'b/8c7c?9dG&dOF9eWfe_|qv!` 6xa F:ifi:jC.j:kkGp_%Xca((ca0֘:oo<\Fl%9n5Ԁ  5b?=tG't 7ay`1c.Ā`" NxG>yCG[OG絁m|9Xc0byG?}xއ?h~fkj=ib( ^`_5Avp#pAE8BIo!Ѕ/a e8C 0qҳf8ebD+5@c@@6щOb?BA u ]0,% #ԊVh8F2ІGٚt6@v30 cg1/ # !GiGҙτ3GjVӚ,x%ІMv DA5I0S+,899NtTeph5*0 l)1jpV$o0O_ /1bM67oc͡zY-m 1r% )A@2uYH?VkC|o(^of6ʑxe/yr*;]ϮzCfBoP*;7B`<;#q iN7QOuE=j?Az iV*d=kZzSޗS]iֽ׿x5lbظB"=f?6φvF^vmnww=nrk^սnv{ =ozxpo~o@oKxp7d %>qW x5|y;NNr'ye>B<.4ycls?/. tBwѕtg"]LzԟtyKWWձu'O]{Eu}=~vidw{2w #wcu{/1//qo%o}o{1kgA?zϹQ/y1{o{/||{G|?{͇}sz~nw?'?~'.'[ ~f??6ǿo?@?/ٻ?d@*kl9 @ L:@ \@TAwK3Ԡ:AB !4B)#TI%ti'B)B>-l/ /11$33D5$AFJF.dnoqg@srTGcvdwGy$zG|}GכEl,NFhL$Ȇ<ѓȉȌHȏtͮDTdtδ86[)|N<<$DT\Nd,LJ5ENTuPT P, % EUQ<ulݜQ R!5#EҲ$e&uҵ,')=(!-./01%253E4U5e6u789:;<= Rx8?RK IJKLMNOPQ%R5SEUM EM@U8T[\]^_`VLմT`4aijklmXe}U4K`&auevuwxWS&pPFJr0؃E؄U؅e؆u؇؈؉؊؋،،e{-O|Jr큑~Y"ٔ%YPYeYmYEٜٕٓٝڠڡ%ڢ5ڣEڤUڥeڦuڧڨکڪڑXdY<*~$0 ӢU۵*嬳m۹}[ۻۼ۽۾ۿ%5EU%\8Pگ-T逻|u۲-[eݱ2[-]%- z]%M]e]Dž\|\8WȁH )")^^- )5ߵ(__5)*u ={ܮZMp=_ 0_*%=]N`+f_n%Wڭ\ u.5``.a_F _}ֵ^`^>aMF#Vb#&Qi +b^^v1^"e`'c-WdU;8=8@;6d]B^ȁEfdFcAHVMD&KCVILK`)JNPe(VRTVDe%UXNCZeפ[]\_\`&b~M_6dVfDevgWiEjlfnfnpvar6gsV]NuvgYnwTyL{gA}g'h 6h)-V$Ѕvhvk~d hUh&萖g6nbV閞`v阞R攁fN.iԎ j j<^(j|AicijVˣˤJkpj8k^~뫖i4 v-^kvk.>lNjk&lvˆ lNkibiN Ӿ뻆jHƶlvll&kmĆmΞnlfjmmn^fNmFNmnNjnVnm6on渚n`ն^n^o~oN/(>pצp6p_^n nVpooGpw knqnpgnGn.fm^>lホ&nV% W6l*l&&L3WM WsL6?M69'Q9;Q3=P;?P?AGPA'CPC#_7GtT!nJFtj.nvtlrr3t!tV uM7wtuZ/URq"VnӶ!kn^/uN.0gqQl giwَkvtɶv>ogrOq=RaO#qxӮw/Q/N/'7rG vq~Ws`Rw/VcoI/vNw]q'o+W wfr+o%y rogw)xgxԦ/r|~uvoz?>ypn_xOqu zzxznWy7qmzqGvs{qU'x?7rd'vjgzp/r|qGu^Sۖ1_n5زg3@5ܺw۪mܿ/nȗ3o9dЧSn:Oطs/o|-|vKӿa#俳-B7 WbRIP['6jOvqJMHdAX|B%ՅbE}՞Y%5Z&[8#E"$`g"MH 9Va,&yeHbUeLdP昢`+iX`b95d}Ǧ >tgb t-: #J:)qEZ)jjԥz)2u*Ш*+n9ob`NXS[rJrB{,%k*;i'RazՊkڵ򈣃c Kf_Fy//f咺װP;],̚h{0ŋ[qkoK!3v%,'2^)2`35S59;sL=K {@Fг AL={4CYT{SDv--thvf-5 =/:q=7uk+bY"۞T{D3.6wo ኻiu{co.٩;y͑웉Do66_7ߠ:: <+o;/nKk[kkj{j6_PQ.o߅u1(en_?'̉n)i܃Nt)0 C,"s$2;Kl"(R9SXEw]9AFk[XExL)"wV$ι(&6o"]&--62S(XZrZKd:O拔;!yRQbe+جL텋lX6r'Y)\όʤ3)DsL1MdsެN5)NsJ9ϩN9J-ɽnV>#8Yfṽ(^\wN25(E e9V2y(K'ԇ2nЄl2_s s2eXPNj4$Q-e!5*3S:JUj+W ְVu#{$CkDkc䪛~4J$(FTuFzBЁ ka9tX$SGXFvC:6Vqdg+ӝ()Jv&ӡBtgmZkSK=*99s Ns}u[jWܝ]+RR{"Y*|6#nD^ 5Al'^tEO}[ۇlH%;fIdP̂T%/kz~0+z`Cj4ojAD MÂ<"qox9챏k pDV\$+|LMd6kعiu-iG{i4pv Pqw[>7[`: -yFAoz{n?838#.S83s8C.򑓼&\"-69s>9Ѓ.7| GAM_:t ykNs^:.F_vjw;_4~;/?<3<#PG)yͧ@߼A/_?} =c/Ӿ=s=/?>3Q{^oO`c_ϾC;??ӯ?/C?}~ &. 6N Y[nzr`V`  Ơ ֠   !!V`&a FN!V^!fn!v!. P!!!ơ!֡!!!  "!!@ ,"#6#>"$F$Nb$!"f&n"'v'~"(("))*"++",Ƣ,¢%!Pt.."//"00#11#2&2.#363>#4F4N#5V5^#6f#47v7~#88#9c/ޢ6:#;;#<ƣ<#=֣=c5 |>?#@@$AA6~Px?"$DFDN$EVE^$Fx@0d`p@F$II$JJ"cHblC:\GbM$NN$OO$PP%QQ%R&R.%S6S>%TFTN%UVU^%Vf%QflW2$4(Y*ZB@[%\e[]޲%^^%__LPLaaVXP@\>&dFdN&eVe^&fffn&gvg~&hh&ii&j~&f^fm_]o&pp'qq"@e,'s.s.0(nVu^'vfvn'wvw~'xx'yy'zz'^;PK“y<99PK8^EOEBPS/img/create_org.gif&GIF87aƵνJ)Z9sR{k{R9έƽR1kJ{{cJ9kZJ{cƔZ1!cΜk{k{J{R1cssZΌ޽ޔ9Zk{cksﭭ{{{111Jc1cks)1B֭Δs{{kkssssƥ11s){!ck{B9{1{!skJJJBBBJscZR{J{cccJJscsR9BB1BJRRޥތ焵9Jcﵥބs罜{{B{9{scRZ{9Rcޥƥބ{RRccƜJ1kޜƭJJƵZZZ9sBRckkkBRB)c֥ZRZ9{sΔ罽ƭ{{sZk{{Bks9kJ9JZ{քJs)c)ZkBks{޵ε{BsBR{ƭ֜Bkc{,9H*\ȰÇ#JHŋ3jȱǏ CIɈoR\ɲ˗0cʜI͛8sɳϟ@ JѣH*]ʴ) PJJիXjʵׯ`ÊKٳhӪ]˶۷pʝKݻx˷߿ LÈ+^̸ǐ#KL˘3k̹ϠCMӨS^mكkUCmUrͻ Nw ^+_<УKNسkν#D`Nӫ_Ͼ˟OO}(h& 6H mqAriޅfj($h(8>(4h8)t/z{>䟀*ui衈&袌6裐F*餔Vj饘f馜v I<ϩ賂ꪌTсxӏ: *찂*P&6F+Vkfv 4"[ (0L3=DD=@ȫ#믟=`O9QTR=LoWlgw ,$l(#7 17AhPO7P|ND'Jъr pTX j W`Gd#16-=2NAs}&9qqڴ7MPՈ!h C@0CHLh>]ISҟ4?~3*CPhMZQ@3Ev93ahl`>b

x61ccx81ub x/N2CZĒ-,eYHB C ֱSoLRn}61E.V N:MB z(FhE3:ы'MiJPҘδ7i ((LjQ:Ԧ/Vհ~!@4D8qU VMb{؎x$"I(^6&qjζn{ ijq{ك.vގ!$`[[Ȅ& Nt=}'Nl7! qs<ㄐ@GN܊;0`vb`th\sЇNt^Ht3=oi[ֵ^;`ǃ= hOm ]SN۝s1CߎO.H]'O[ϼ7{}!OWֻYOϽw|O@͏O[̟P{O*;OϿ8Xx ؀8Xx~ "8$X؁&*,؂.#084X6x8":؃>@BX<8FxHJQLPR8TxXZg\`bȅ^8fxh:Xj؆npxtXvxȆx|؇~h-z8؇XhXxs؉8x؊-8,Xx؋(8xHƘ،v҈8xZXظȄ؍@XHx긎&(8hXD؏9y- ِ;ȏ 9ِyIُeXLd$Y&y(,Ɋ^6Q`-hz2`:YOVDiPNkpQ N`\5$ aw8f%_kUJbjYpȖᖨeXiyx %Pdf_FZ} O9ZZ`I_^9YxSfZZe)gY9ShU Zb_US0IHmZo_ڱ9iɗ{fh֚9≉n0In fg*XpX#Ĕȟp:Zzڡ ":$Z&z(*,ڢ.02@⠋:<En΂=:DZF$MyLڤNHPZVzDzAJXڥ^b:dZfzhӑlڦnʦّ[`Zvz|ڧ~UZz:qs,w yJZj:t:;z|ک `ڪ"Zvꪚ !BZzr꫇ʫZpP*ª,zzz ͪZꭺJӚ,Պڮ Jjz,گjݺ{ zZܺ,|**%k#Zqǒ[6{E[$ {';-˲ ;Z+7۴N۱ڳ.۳Hۧ᪰Z\ b;۲. !*˲p뵞 Bx]۷lʰDk&z۸;,f+۶{02[+4۹{k깨+;\[꺯k;kkڻ;ZƛukL˼ő;۽{K+{[M滾{`۾;Kc꫿TĿ \#k +|Baݡw" B\KFJĩNŏ R\xKVNZ^ b\JfƷjƢnv r\]JvPzG~= Ȃ\ȋGȆȁȊ|ȰF<ɔ\ɖ|ɘɚɜɞɠʢ<ʤɎn!jgEMʰ˲<˴\˶|˸˺˼˾̹n 1!# pI؜ڼ<\|L knj̫Q(~`jɜ | M} @ glqM]!='m<MnB+} 8-*-/=1-lFb-* <}N AC-Em IK-L%7 UݾWIe== +Om3mes|m[l'x9]شu ؎V`]]iuٜ}V En +ڣmQ9!o:۴]۶}۸ۺۼblV9] =n |ڝCd9] t=X]^s; c- Fr}_]5}mm\^B L^܁+"E>&^&.(U0b⽤g4ή6K8^EkR cpdbPa;~v?NE*kkh`cO~=$$S>EkaZ\.^a^c!ݩM``pEnZmfpqsnun\g$lm釞劾kkuM؉MA}.cik~_,Um}U믎 p>Ͼ>۱hi bľn_z~.ЎBnR b@r^cl^^.b/zb~QR@.?C=۝z (e`+_E< 0/OgLm!ڮYe0~?g3/wj>qرm!a G>cJ.Uf_h_El߱{Tou]o}_Ի?%!L~ _̢?\Ȩ/Ȯ~e2r@p_ i'?_OOPR4L;S|؟ڿ_NHP PH0PҏA!.:!/j׬@@ D 2A$‚ Dxa!F=~RH%MDRJ-]Sf liA6SpPDx%M>UTU^ŚUV]~ʐH*DXDW\ufϜ; p` >X0>^Xɏ+K&X~ZH;(!0Zlڵm/<{.rp sVjxrŏ272q_Ǟci@C"E֞^zaK(U?`E7"9s:d.!vࡇ *`C? $CpR4P^TE[\3oajfrD2I%\@DH>fqF!{@*HA&todžV`\xN2ڜ ʜsl$9V ,4*cQL;̆TRO?%ՏWy3gy7n>|[|χ|gZۇ?~st_ЀM@~[%8A=w`@ vЃ%E8' QB /\ a8Cʐ7̟ qC鐇?<8D GD)O,8EY~TbE.n]cF2jneDΘF6*nmG:mucG>bm}HBie؂IYHFiXWI"Ah6Ғr4 Id%>0Mr*'C}BP)e WR$de..җf0mu`Z@f2Lf6әτf49MjVӚf6Mnvӛg89NrӜDg:-ӝg<۹ t#Ktϖi ,@@hBP6ԡhD%:QVԢhF5QvԣiHE:RԤ'EiJU҉TԦ7iNuSԧ?jP:Ti@4 @T*ժWjVUvի_S!OGխok\:Wծwk^Wկl`PsYϐPAUVֲlf5Yvֳ+a:EЬ@ *6Mmle;[ֶ,n_k6np;\׸Enr\6׹υnt;]V׺nve+ZÒ-C P!=F^y/?+䰗K,G4\a$`W~m{`6X6pӻVvoˑkI8ɰaa׸ƻq|#crGB|6'Xb wx3c۸2g "n;r'GyU$ O(x@0ʸ(?zЅ>tGGzҕt]NxYP$  + X$!#^ 2vgG{վv+]E,d/_]+(Y S@;x;]d1 Z–v.xg\DȋbtQհ5qs2zY^z@ zÌrRoo]xcm~.|%!:U2_ﶣ  UBڐw?( F-D?sя4"ILN$s)Y<?Q ÜA5a79ïؿd ܒK\A YJLє@{S z AɌ?1>>A@H?ۛhXiYyAH01BY%|&'()X,|/0 ui<2d - 4l5~=7\ 89d:÷C[9A$B4CDDCs3EtTjGDI[K@D[NlO.QR4ECTUd}rW̥XUZ[EK]d^EB`a$F>2cģdTF:bfgF6iDjF2lmF.oĢp)"r|sD%Ru*˴d*ķEKg˺ƻKj˽ƾKm$Lp4TLsdLDŽLv|ʴLy̬L|M$ DMTȓ+Ĝy CУKNzسk~]2O?_Ͼ?OO(@i 4W[JL3\yUW`f!bvXXc *&وaf≛q&ڊ,vڋ0֚kh#l#qRHl!f\rZX`zɧdFVخڢh+n^z.nzkJZ mPR +-uk3Ja)81&UIl'&5+ⳓEkIMkmfh )zȰA5`Ro_hm^o_q {|?yc?"Ww$iZ,>˯98nCyGf朋9С }FA`v@nK P##@IP5HamR– bC 2y,tq%7< 9 2z "Q (ь3Jw*pBJJ֠$6M8/8%q?x3$o_$/Ll( |@Bmv) E>t6X(E JQ.fC (m|`Z06% sD#›0!!&J񙢉4X>-fњ5I._ci5ќm<O"Gq9#GP~W 8ȄC"X=-m =8!P }@Orl e򔗶Ule+UBZ2eJvhC%SI29b$lfD(6ܴbyEjělXl~" ("6ƮVlIA'4"XJHyrtL%HּYT'}ai7p0-աKL!62uS8$gIuFRշԓ8j\TTժjVtի+Z*UF;`Z!=ЭdKf<h@^ ))(e)3jJ\IX*֕,L.#+]͇?p4N?ڟzFR$Kࠢb\%Fu}q+3ZoU‹T2.h: :ʎ-Pp8 x 2ɀ$I΋ʲ+i-_^겾a/}"5-IfeXQ<0hiE=YNג<'nRr[j3bAT,4 lqeYU`;`0>paoX^jLOu=Jp2Vƾ}sn-A;F F7t}P@s0<lE5\T}V_wfMZgָfc^5ލ;Ll.=%g^H0 1!K)ՠC@ (DNnw ߼_T^3*ߏwh؉8 Ӌ@PHҗ;}y-]p"v7'PUk/OQW4so6¹mug;@lK<.a?9r=*Z;h~8{u{=w- #ֻg NϽwOO;ЇZl/[Ͼ{OO٘rϿH ؀؀IQwi؁ HH(r!*,؂.21T*0x8:z` ) 4ʧ e𠀚 }N#(qjZ` g nz͙9^ٟ&J1٢g{j&A:kUZ,:ʩ':ܚ/i`ʭ Y:*vʚګ1F ɣJکG'!EJB4J{'! VڜpZ$DpЮ$*񚫜i:@ 0K٣2z:ڰOZ'QWDЪ'ќ@+j鴭ʮ:+;ٙ/[zI>j <:אpiFʳ ;ۨ& y ;˶M ˡI^N7&z; yy Jݹ i u;ۯ'ڤdP;8Y0˻ۍ9ʻۼۼ;bYK+[[+ iHFi -{ۘi{ ˿[m`T 9 ܿ\Gj l\\o<L*얞x+7,8 -9Xi»@\)FHILŽk),XNLY \b[ܾPȆ,~g|Ȍ<p[gzWZskhIk:?H0G4'+&tzl1@40>˻'apܜJ j ˼&<[,˖Ȕ(3 ߹;˦98 8 $0@=.'^Fػ&DLη,.A[PX`vbd^a⅜cll~+ ]~m ylۋC\.mZn#}V}ٵV.s.mާ 菮4:Ýt^!M\ oJ޽,þr@ꌉ֞Ӟ9 ]NX,0LlFc?N8,h{?>ξ\ h: 4Hs  0.($&3u"NC~Ϊ3!+7ڪl=O=:/3#pp<7ADv0mh ЋPم)q *?ɰ$ `|ʇWfS1܍?߉t_?p y(m ^ɇдݙφhO5U-pף+aHs \s>nҥڔ_;?_}ԣ}z[OJ`XηejO-Oݽ~љ p *}9OnVCAbg~a D=~RH%MDRJ-]SL5Q翝=y̆ lA,B\W ~(W 6%"T `: dg8p#Ƨ^4(.l{WcXmFXbƍ?#Μ?}ifJ%4&MᲬj֭][vc /[ƝYݝgleħG\rHG޾h 6Ǟ]vݽzn˜zݿ;xс>/z|0h<,=dAlM:ЛL=7C?2+/ AD1EW|OBFLh?o1G]s( ,w$H#|GaPF4D2J)Q**]ue]w߅7^y祷^{7_}_8`z1UI6e8;w%7Ys;=i/VY ۄE4G&dOF9eWfe_9fgfo9gOKcY#v!Agv炟s+ib5ubkɸޘQth:jVSզ;1c>qV\Q,Eْq5o2^6oCS܍4ca#zH#EwRCuXM%gFGSh}S1t:se؀EF(Gh~9Wbh6"@];YuΛ?*R+OV;(ltá5x MtP+PgsB2o>v6p"B| ?/B |ǹD0N ;G/R0wنy[!ס1C 30 GHD)uTH)ّR|<N/FC!c#W?.pz"g==1|d<(KVe$hU2/Њ5!+o!;30;_/H›r{w1rע˭'X +*rg#E/RX Ʉs"?=-#wކaƀJթ^aۑO|;c7$| e$9x F;o{HeXyJ"\eK,q9$-^1G X cpE^?|e35l1~і}"pqJ2|1=s߫C;B?[׳GM͖_qw[S#QYX16$UCiQkj/w]%<@7Q?kWe(\w: zVp <$~8č%-WƝqEnɵGv"yLC7GUqq@o;HߕYD܏?"WzWQ_^)go*_~3gU{(2)7/NS'wxPzן<"tR`~?|G~nrϣ=ZYK98k4Gտ~_Ze$~o)<+ؿ@8@܋8@:@(@9 |  Tr@<4*ld(7$A*hXA(7*$B(d"TBfa<2 $%,dB$BŠ(tFmh,;pL AFs n4Dvw4rs:F{tr-Z,~L|7[f WA},ÖaȆLy,Ȉ (ȏɐHMBA\̶=-M.GVBMHR5qAM>4*P:Ṁ40O?M^Rk%Hܱ4UT-}UGe6VeQMQmP$!`TlP\Nόb дOAA}NP,Q6z48m4VwCNɍ,VfTLj|%Cz-˷d4؏WmedGfIc \6]U^pR Vb?a^b-\[TL3eQv%bfnDM``MeS@bf@[nVN`e^@5ڥu #ngMqf0?`+ncPe7P0anc^F f8Nh.އFᄦbwbx.*7О+clltDVmB&}m=ٞ횊mmfmzmmm n=*n^Jn}nҞnnn6ֶ^Vnfg'n.;oo*ro`Rons6pOpAoFR '7GWgwω)wvq+xeqr:!Ϫ"'G(8r$7*%?&wkrʚBP)r-E.D/'9ERr3?s5gsvr5/8'77V8 =&q\&s@=XeIEgFwGHIJz)C糽NOPQ'RO1TWUgVwWuP,Z[\]^_@a'b7cGdWegfwghijklmvdt ;PKn!B++PK8^EOEBPS/img/req_flow.gifGIF89aQ533㹷ѻ켼ħԢNKJw˲g{WygddԿkӵBhurrvGmNrIu4fog޲izvԿͮoѺTdvYݏߢZWXٮiko|ƉåpopϷOn<9:kt~||~B@?ů@=>`!,Q~H*\ȰÇ#Jϵ3jȱǏ CIQ ɓ(S\ɲ˗0U͛8sS̞@bFѣH*]ʴ ~ JUaXjʵׯ`ljٳ,]˶m bɪuKnv ?R ދwÈK3㪅KLbe+kyϒ/MZeҨSY뎧_˞ulڸͻ7Iۍ} /{#_ί8)N=س޽m# 0 .Գ7g`z\td,w& x b# G~T8qc9_@7H0=ؠ JXWTA_r9@b\A@1MZ: |n @e%{BUMbNHG~x  \eזAƊi@v6VnXDu&/6,?EnasQ%<@ᬛ -fԷJz&"+uhC5J!cKG{!WSs\<ϵ*~, L)B{Zgyub biy,Ή~>o~~EcSΒvV6e5YyH|^h+¹-_~\?Lghd]#1U '1/:ւ)jPтEl~xe0I @L2Ao38O-|'I,x@;jS6j;A>A =`.=Ii"/aCuڈ~س)cl_ʈ='Obbl$>'r֛\=zd>?ÞpȏcIE22#9>Ru0!Ҁ#3)6$R$&9ٛMt%*icU,|kZ)Z$, -sKಗ%0ɒ_I2f:Ќ4Ij6S7!6nz 8ّqL:MK7b~xɧ?JЂSmRd422Rv(*3G1Ra4(@3RsFK%Rҍat4Cjǘi4;BLRRc !߶ß.zj>|Tph5!RBqŬjWeRZթ7JVF@EAªuE^ֵ4kzT Vlp,[ǟwD6Ga TBD blJێRЪTвA8`Y.GfTncmD%c!nepU ~-f`טVcl:qN2(xI=|5HMej.6bISs݃ i<Eǎmx"݇o 2`n2]X{`1fC [(B|LHj=R@lG!me{<G҃$1'4G{y.耜z1s y!%謢 oQ7!lbW5sS0K] 4T^Xfh Z- g1Yhd /#w/we)f%j7@w4EPvܲAѻiD%nCC!u{,r8lVkZ,%*m<П͏2R6.,WbiWR"lЂ{nwK[ {O(`#0&`WepQp.G|*Y604lAe`dF`KZ9Hm5ula(e l;hsw*ƶ&F9mYUB@@R  HXbh5+cd]B{|#hhh0ŗ p.(GP)0N qGڀD&E2 XYM~ 3(ZzF"$cgXr0_PR @Vy5H=(fs,%pqH9dv.%2\l;i K'|#x(He(]p@x*p]И8*G!NBsrA:9s!!f0&fI&1#g#:β. -c я 00G!B*D~g<8 F`&iG`L@/*@*pg@'!6!o hV841m!&F_v&c߶wPtuV'1膖4cmnQ8Ϙ'9#-P3 5#x `HqW )=^@J9|P RYNE9c~)K(#h`q@əw`@9uG`t@JDkJ&0\xBL8^)c{Fz0VJT jX.:jpph9iکDzuڂ ؒl 9>[} Av} Kjе]իYڨpùzdkʦuv*YPB%$=#y'tLBTڮЉ *%jᘯ-Z :k<.x  {Dp-肤 ܺ "!B2#rZXEWUrJ+k.+&rР6<۳):܀4#.s^.)p4R`z rT'),}eYqP)@JJymHBCc2Wz3@g`Hc8f*[{&z];]hph  `:KKm; Ii4(zpPa)G8\WSY#`{iF{D]p"FOt$]a`ݕ>F#':]Ѹȱ pv翆X<)V@YrB)˳ܶ*Iu{J4 ]egv"8;dk3ۙ{h˶]x Z6Pt DZ@ȥ_ve\e; \Gps|x|#J @p\f7虣ڠ~7:G, #ICjnGn"6 -`+NzӄXpU" z@ܳ>|1-@CT".jg!%ږkC~oow珴 !P>ۈ!0"0vi`O̭l*ж_2 C29D=D>!SK3Y9bNHU'l ~(>"p z`@sePdW(~0v^K#^yOUV BQ8ݰ)_j Ђ.wsw>ؐA+Q T @-9=]mܐ/ /[Oo5ܐ^f4'kVeDLv]=~Oc~Q S Fm>Sz!R\`lG8qKf?'i k0w/H.TCy@:ɦщ~O4\~~~-T~ĄDŽZu.?@q:DZ` QfXwfLdQW*))颣 -]pi$a,"4ŋ*N)T9.yԬPIN1\r$O)_:)3G pP3E9Sr>1e 5PԙQG((PƵa0B,:sV[KŅy;.+X_-:PAӒHmӨNԔؑZ8$SB73N~L4!%N)tꛇc' tH`7\X䎘.8`d?m,5.u DHAu*d|E >ןZhWW ~l@fPdu@X=g0ނ/Ƹ<]1x/X 0[ `;).8@G!Fj䐾l݉GI:`ޛ'՜g YkxaRHdPq`]`"LgA܇5J2@$4vIڑnj6Jbmx𥒄䒉HyE2-[#L$ /_ xyxũu޹'/Xy!w1f ֡D! @D ZL:)? -&"ګκVǗI,X,UȤي1D^S!^"1@A  |Z(q;6,]s] tM.梛.{0p )ykڋL׿suD  + x ƣ R&a,8++z!^D76O T(; +nTyԚ|=nu_ 0ˢK wKh܍gͷ~ &D- q J1ɠ(q.&dÄ*uhbcF+Qparqp? * YX:#rMゅȠE<O2x<8pB(PW 6|OnWu`o}#X0BJ~1B?odhdK@3p1"zٜSfǕ%4D`E a:-#! gACA!Oӂ<yBڰC\jAp|H`'<1|tv"R3.<6qjP33zB J!krB=Qd7ZI17=qC!,Ӕ(qQXX$).o ! Yȡf("0@Ӄc%\ ?D e-wA~&@ x .k#9)oS_q 4rU mpX<[@oD@SCprWML#Q~r52jU b@z:g'&[MdS*>׷z3+&RY~/ dB 31r@@T?5=Z`zJa8Ā]mhi,kjl-A",g;S罠C,ʠ0QmaBݘ/?Rn[DZNs5\^yp=˝  w茹ߴ. lʭVs2S Btȷq_GW?3fDFΣ\&8,m=ڙ2Mpa4:%,Ksf`88pN=7e5] 0J-wlVAFs8Οͫ"H#%%#y_X~K*eEۊd@_ Ϡzt#ӜA1kǃzOZft;Y¸+5-zJpONNH؆>E@qচ޴gͣ `S#S-ժvjmk51kn7;%fZ/O'YE(Xg\jZv{FβűJi"܂i%d:Zq0]% {!m)N )q@noУYrVC^!GOQuMIdPhʃ5';%hl?Zf}C-rʨ>uFd,4Hpwa]}YHi^ISWp xSvKr.gr(Dg yw|x%%Ws{3v@vgP{!qB4M,t\)yć6|' ˧|͗zW;EJ0v DO)%$uJ:#-IoG q~1!DVw1Bw0BWF\І5iWx4qGq2xiys2y j*3&0#2 18LrQVc2 `xJɑM{"G&Oc GG{5V tuNBQdEta*P$PQT+oCdB0;Q{,v!%`*!RfH#uj n{qtx('x~aqRr X}u㲈!f5YJ-pHA;?'Z&`B.du!Br!h``R1!U:OO@V/GpHVh&R&%cXG ~\~@  OohgߥSeB"0 Yw蘎2 v PtHrB'ՊP. Z,˶-ᩎ45 k2 ,Q$ tBfg`ne#G2_ɰkz*ʬ˵굯F+ʨ!g;ir)jpo9k#0[q M y 98d?dܕd(b úU Ț맟]KyKjeɭ|eh@pFaYv4*ѻ){u{۽iZ.;c۱ڨK+դkt{R+qywX۽޻a;cl9'pQWl*ȰCEo}uŋ]-WE)BfXf̢AF 6m7/^uų2=5!0 qࠢHMEXOXJiiRʵƎ~"qD0cɔt2˖.avn\9عK {3^*ûm*Vb+ĐTȘ3C:1eD]f(8aZ*ZsA̺57^OZjN䆌?Ҫܻ8ߡlydέYxg*֖|8 ݪ_Hۭo^宴xz0!0cA,R0!|Ă,1@\\4[p \onٳچ ɦR'W @ -LG '~"Pȉmt 2]-p_%.psFVpk3a1;i(XtE  .2$وBbX$+Ȃ4d.wY*ʃ.Kt2%2dESx2gLM3Cʼ&$$n&B69QM̍S><'#"v}TTg-9cs+鼧+w 'KiBϞ(YmUD4PUГVMB%Q5|g4;ʠC(IϊF\&Dۅҕ6)bZЗ^()EuJNJT)QӄT>>j}v*-7*ʪ>5>Q%JTT/g@.FDQK*OUR9zAH$Ye׻eke%_rZxbeԳ iğ6xld;{Δd]dۋ4U-k? ZղY-KjiZ+j{>s %]WFB(@P8 +N,Z+2愈BP8,0XWC.}g߀ ͻ P F^"HKQ &&~G q0LSPtd$SBpy+&x\.\ ,!/ݮ,_7F0a @:#YI=sf"v a3^@b(y @.uoqbOzh2Ubft(Հ$O8(0:<Sn*TOGA T@̅5sM!m( 7`5)Saf0|0>Va.t-k:ͳld H x %.&@񖷼ڇ-W]]:H2alQt\ L\w0Ƞeh ?gUSmCjf;ࢨo'(^ 3ܜ:7p hWn]cwK7gӝrې^e o׽n3~,Rldm}OrP,Ay0 B2Q`<@{?%]<Ή .0l g@}إpx2PQk/?+^f[l; ?y{\ӯ}מw_&HLP懀r`7uW8|f 6ws9nzG{hCWe~M+XZw~r~ye ~ȷu7n`x {"C%Xlqbtot]K hhׅB0z.z{}ڇ*@jDpe{}S~)`:cf[ 8GadI p zDzw):PlG%>a,:7oy (58|7 Ph0^q@hPXYp7iXGp]g7Lup;C>TmRW{Axr䈋@sp_Xh8IHx즌 @Ft,F7VXw2|X(X ]Pr.Gi OdFP 8q!BgjaP3-4{% >SI  `Md 9#6cW#Ј`_'bWg 9ovnx{Oȉ@F-h1w$t =`a'cVEg 7z(g6-Nt@$[m~cIMVaדph}¨xؗxS$-@@A{Gb9J)w|w9z;` u"(6:q* W )yF59b _ia깞쩞Y x Se`1(ZP CHMfy96i7#`k;X*lGfY`a!4*QX Ųt/r,0td6U)*F]) UɡNJP JɁd9gV j :-E5!2"Z!7$$ ʝ3TIDZPWUKr~J& t9qBy|yɥ@cNf "h)JS5b19"TBڣs<?pzB~*I9oYf J7e:ZzȚ٫v=*Bmvi:tjGpyb6FW07%*y :[گ;[5h1`,ǂ,*\ؚh@BP";$`7zwGh#I) Z28:8+:jkz ~X)ݩ0@R{UVKCO#*` :_*Ct#)6J,z@J ;Gqj3-5R?p+0Ř{Y12,Zq+at+d 0rs[{r+Oи»;H}N8VpF[*kKT <}b˷ؘSB-j>dTF(3۾[C{^++:Z!l{ 5Dc:қo++J >ԩ`,pUY5Fg[wT|8)oFP@۸v0/ص+KY ,;\ E&E۽=I뷋 :@4)%M-|" v`4z }]z_s֨(Bt <)Lj$…DjDyF{ XF1F;1В\'_,Ywʨʨk,%/`.`(zgf{ Gll bʼnNL *=QC[}p@mK[a5y$1D3 u*Ƈ?<πj0 Rz<e w0˽i|ɥP%S{ 3B]\c?:pc`Gez Zɴ]YH J0Q1zuY@zrYU@B}ʬvHgRgf0MMM(QpL=x[FD= uxz5-ľt@5ĝY =ղU7 ?u=}z0{F8 1!؇*/ M8y+@=Ԩmzp |fgC P}Wlvc{ <2.bAd}vX0k`LK]Yȇ3mâ;Y@- v5S/-,9:]7R0G79#4D{XM=Kw;cG ;o]Bڄ ڮLxMfx|&Vm{:Qg:%X ̌P ;~{ jp@;]t 39\8]QcP]4bI#̄7TCtRNa߇ =3`l/f0~* D|{F^ Pe]g#)7Ғ"<ȜХ [ђGD'g6c0: V?ň ..CWޚILGN@G 3*8`UNy@Ž;bF23,T5lp)Ak>\PaRN)aMNd`G}Ʀe3 z<.iGT=ګբ?,Gq 㯩.KKQ>)-ޚ.#ވ&`5 X; ZC4;E 1 0.(@qppM@MR-VV{DƃA m?jʎ0%ɇP~ )Z 35[xz|_eo,g,wzMl478}@7/C>D3ͼ//=^n"D"}lD: ӄ@B?EoH#OS/.^N Xoڷ)4p@I4b(f<ǂ5j_45b:/"{S,Ћh ~-~-~~-1-,~X-t1--W֒\-\ְ~fH(\8Æ"J0hQ9r2ČR sB0\ s(/QA$@ϕQXkAps5+q Сc#dvâŕ]l5葲ŲjSSޫ'È+nTucR=ʀeZxxÀA-z#4 #.Zu54!>"f֌ӻlI:]HM߿ZH/H} „ : Dϋ9~ 9ɔ+[0#)耐OB5gT~P bFkt17XTsX#,Сr|ֈ18:F#`MeE#`.0+` falPee):[0G?!ݙTguYD$ C3`DH$J,~ѷ Յbx@G!wp܃b v3X\"c6Ҫ뮼k~E áN-(ϭ ,>\تIuV4Bl0x|H7h|҇}5`b$z: ~ׯj5 %g,#QViIqeCv\qYآujxZ!djEZg{W|hN/0 uAS1\,"ǂ/V1eN"zch1N \䕠ʪ޾wn'ֵEc\md (05OwsDdel%6|{whK԰O Vg?t(թty~,xK#ңYr?F&c)̊gq{Xk#:^* <Wjr ?iC3 ]L.N^Wb m&H ZwH@ TqxIZbppx4R¬5m @Sd"J*i /J4"n8݌}"p'[bԈA xԠ6 Tx#[)JQh!ۉꏀ I"M401 sGD)ZrG[1" #g;Qj6AԷ(@YLDgnXa yvldjd=2pm@j1?c10VҘa9$yGoZ.Nlz\M! :b8Rs`,W1s! P!/WnͱQq"TytM3dQuM|`cħuu||c}'}^twLڧ܇p}se`fTOmx-^!S,g sG0 \o{셂y 7dyk_rc:‚5_u2Hf'M_ۢ;v=5RvwW[ ~Gp$GiCp0h1rk(y_,cHs*xȕ!%p1rȊ_ _iǗ|2(j|Rd9!Q䃉}o}Cp :de-tt5`*BOODZj]szՆ7B%#8XTu8oʷ||؇~ɘ،8[Ҹ(wh ! 0&eYA Գ>Yh Z >aaHf⏉ax5S>zȐ)G@B;D[F{?Kâw :ЊSLjŬ[* )d f<>8N!} 2Xu\`rz0ʓn ګ۽l˵ i+}jLǒPܠ!kkRE1Ǭlݰ]XPIlz0ɸhf%S]HqG8Άl>- Va ,w>y˝[6^gզ !<>A6 7స/% p* В Ëk50J]`" ~w Vi&ZQ }V RDTt 6*6 ϫ]n1p> 72 P}齺.7Ng ؾ&%cIAO;$NYd`ВQ <u`p0Awb {$zOoA@X!i=" 浠 pЩH. w p UO 8_E -t\i`B) )%tĵgB4$J_Ɏp8)TBJu)Bꑟ=O\op3opUo %}@n ~-~f-~]V ' mm!jj33V /`// V/Z7D-fxHД0BibH " =E45T +*㭉C!!,bE 4gͤIFZm!}7ܹt`#FEy2 LBZ+!HWI J`G1,fӪM+2wZh4kb޸c1iV-$5ueDVΒD{1B'S[Vu"Ԯc~sJ)Gԉ]৅ \U63~,I~tVzt֭7Ͼ}^۫ 鈖}?Қ/!dxo vAyIdfDc4$0(4h8X;hEhg\ 3$!pq qtThVD[o"YrEIVzeTu8@jQHψh2x|=".rgXGG ) 3@/ @^](`…Jbn~8Bg@ie$]WfH @B@(%H\)%rV m@d>iΎ[i14rH@ZBcʒ&!Tbe֚%ڪ\⇊jaj',qHԫg-ˈ,\pAt(*-b:L9:r%&B>$'k1~"C T20A]6g%gaRlOl-\!Ck&,t(m;qSt@Ew,X)ׄr'zW!\Ņ\j, ЙߞYH-!l 9ڢ@Ȟ%"!1SGn4s!gֱu]-JG c B,dr  *9.CO8#': X,dmB6 Xi(:&_Od8&#d lr !TX!f@ٰP8,#F1WR @E :K>!Z MA+bπL{a Y )0^:5Wp"D:7:bgFjBzvNAi,!/Y$r:kQHE]ϑcJ"cfH YTf6 y!R:!"2&$ r]ڜ$cӉ a!Y(sM QY8Hp:#4iҀ,<2򢁋eHίSb0dŢ S(11 e_% }h>=?>o`rnq057j% gpL8si@ _I2=P!b[DYm^nV4)Qb8_X_RᠬgMZָεwk\/x95meQ S )zh>MMj[ζmj1p>n&YUgl\ܩo1PiJUFռeSܻ^8~C\Aw!| _7ul" E>6A3ߐ1eP4I|M&g{^ Yg+~G9Ir}곰X0.MOxc='vIc-EwgL8lkY1Ru }R[5q@_zOZxq.w1Ҥay byg}T#A~*O Go>W=)uKX>V\!HhƷ7OeT +%-וم8߇"kE_ঈ(g?Ϫ|$$ٯN_O|7~w{ E"ؑjGg8}&zho5gG w%@SgGv'wzwt&1Ow['&G*F`!QT{7 h^6؄*H pya,fst;Rxw?Ci}v &/nW0s'M=L![aNaSo8 O8 *Kh= 1QX@j(B(P#CV&+(N iGE h(p  @00@r U239uvSF`4wp6AX ;+gr4hLf2ka63Č#AYGqب0* Uiec-tMZŁRBbQ I  I( H iF:aȇ~_X@nB Ha"893ȆB`*iXi(ВD! `ؔN"{&}f4qT HJIjh9#)&(`#F- bI!gq}~vPTg 5@wdx8 0'xɕh * )G@Gp*9iqH&kZ,ĔXeɹt I PxZp )@I!éEȹjzqa vzۉCO z8i\pt`@Iy*zy Y‚"#YnyA6 Ԃgy S9ihh0[ 0Y 1M!j.(*zvsI?. ( J\p&% _:cr3 à/PyVy#0XɕQz L`WJdp\vc7ZkFAShq|Vx;?jgPI %Y+P*0*^`$*LpW॑zzƩUcd̹m=jb?x:?>l* O0(i `QQ:]R.@QpJpg@ɉ*rua6?%1b,`upح~HcJ"z,K鯳pT=9~}(P8ɧPEjHQ O*%Qz-+Y Jz;{sAo1$8' B{zFK++X"[ QT۫Lp*K,ˢ6dgɟRz:s- 6Ya!wl۬*I (Z .wPKX_z^bYb p1Ca9{tS'Ky{K BK k@`(۸ g)Ia y:ِ@u+A)ت[ rȮdpZ껾)'hCA1A!yܽ#PaJ *C[:@!Qf|љ*%* ՛$; p(#P*<ŏ R;ZK|]p)>li̪VQ! y)KjRj+L ;Y̻ KDP*bIM̸cDD(tB XYbi%,,0bb5ABFu.^/r,a..%\T y΀lqN%pym@ձxsgw|Wry7Eb fOpTF(Y$DQI/88Dg V!)h "r4dPLAG]7Ioi$9ȏqEYh-'w 3, s-A_lh!j:!fY as<zqi_T&% v$&MjqWN jZǨRlQ Vj1"dК.\0g*@`!< `87F+?IĤ)$0N䖛q u[ jA( P(!pM4'}{(,3rP`*3- mE+4¬d<,u#X3k'u$dbJ ¬pKXd7Gxг=4Ҁ^!k 1ĮR#GnZ#5^ Yk Fǘt痆 أ olm駷܇07GV$=f C,@lZ|D )pEyk5de=Sپ{hAϳ Hg!n%qc]z*^U9/sGĈn(;J0[ ӥ߻^ @W6(p3 Jzg^ 6Ƚ+DZ&<. (E|pZd,2Cհ m!sP sajDx8Y=py^(E*Rã&J"VhI3*(~FJc'xNs10`WH pG;dnx@*@T-pL0EⳑÌD[hD%I&) tFEEp`4X`OyU i! `Xp KLMAbӛ*~-xͫ^׾ `;2E2*\TH,UqSэ` Ukw''+ߝh tڔ+>,ͭnq{¶Fkveп5iKO+`umNgZ܅.xpE`VU.mn>Ritj-0c+*kUp@ȕ/+7Wśn`k4o$ή)AIOŬ`xʗq!{ 0.r,pf0P!y%^ C(Gt~_ϗgn2/v8/6ygI[\?;OnٞtPGH5&D+Za8UhHwxc(v]zpVM]>O#CdϱSU]hCկVtmxDŻ ⯬xm7Wدuv= )ۚfPTچjnG8mY;YN7mJt7zŲ?6&tNpX< 03̒)^vM5Da\vꖻ1\s5 +v_.3lҭ7ʫo;2/yvab';!{ngL&Cݒ!{;1O3hO[Np= |~}eߴC~Μ, mh-j>ժ;nz/]g=Ǟg,&. ͓ZM)ᨋx^rs?~֑~~GooeM5m7zWzzugxӧs&{%%R&.׀v{g~~*bh7Vfz0pHNxsvԷ }x7EUy24~L( 02V|nt|m;x1|gs]5{Uqqf熐r x'uau@zhEG{v{wl()\rr WxBxh}ihqm(ՈsyL8uX r{|͇؉gG8HBP(z7򇉶xH`wxloHwè~vRZr؅hXq*Ȍ|m'u)؋/}2يSh8:I<ٓ%ه쨐6XD(GHKM9WOQiBYU9uy 郚9JX脩Hff"y$Iz&() F b)Ji9>v[~%9eXhٚ¥8 vH{j=i 9yy[䒜ٜ$ȇW yH-Y|Yb3ٖ I:N#9q٘֎ٕ`j9ٓYchݹz"ZB91&"ZyW7ZymQ *ѡ3Ҟ^zH) 9Z8t:S9!KF£vP%ʘ *YEꝼ!$*e%PjlT: !`﷠٠uI HeZԦEQ`&l䡀zm` :^*`zbug\Pʩoz!jШ8rɥIڢ{f3LE5Z&ꢦZz. ]0ߤt9y3`ҫ*C%ȡ  7 ujBFZ@ez'cpW"3 ڃ],<*WqH*uV<70E '衰;9=Z36Z)D=KDx8%خ~@B;D[F{HJL۴NPR;T*4P'\۵^`b;d[f{hjl۶npr;tX&6Պ|ozk~[ pgO:ZP%Ed-۹4KP1' (1p%p1cY$e H빈 i_P 0A[Uaכ%ڻ'_Q滰 %p'0~P1stqU 닑YA -tHqQ [q P{:+mЮ&, L2@UQ@i ^^ &&-$=l(  &q-5- F1@15rAWqAg@]LC  WAU~P(g c R lѱ%qs!tEa,j_\{cE  {0` ֑[Xj-bqqLt%Xal̩|tp | Ca ʀo )ˏ $hѸRöܷ xeTeà.!wl'LB; ɽ, ~ P%@z-N Ҟ-tm v}ВwTP DP (g@%(˝ I]?TXGݘ A 6ͽXa !ښ] @Dݶ़@!@qW&ב#M>^1 -ݍ8+(%  2L ~ rE\ ra,Ʋ+ K6zݻP \S~q Oױmච'6Ρ;jڮUaB0(t@R^a!&z< \aRX{W n>~gUl =Φ  ZY 긾} (7AJ%1-Pǘ [¹FЮϾQ&.h. 쁂@t/R[1T}`>'Go /^Oe}\/o0"!_(w.j-4o~G:'@d3?{ F`EP'8` )YZPBOwKY9#00np/3#`9P= !%~|(/nqs0cvH yXPB꒰"; _2P?cK/iz_ʏG9om?tH yO?/G  ((aa&##KH 9Y=;:з~~1=HKH x9PbU%Ç#JH۴j3jȱeu@u#^y.a(Q:5PUAee:*]ʴ)֜JJT.-nȑdJZR'L{53 Ϟ?aE@tѻʷ߿ELÿ$ Pрʯ+Lio P ܟsֽk4o;B̺P_˞M{$',vK0ӼDEX(^Ө@دνwbW~5eK-e YZR;;9ҧONvhlPx`-z\F'q}Awi I_$X݁(*S;4Ό)f#F=jq\h>dPnbTV Foӎ]Dh~$.Ip¹t։͔v'2;eCVeh{ŵYIԇ7Li) H馽駟vx\ e`([@$$hidHƙ)iZ!o:7arv(+~GF7)f+gRkࢨŮ (˞*fhjAmsBuKe%;ӺS\+9o= ȮdN)fK|PFZ|l<&r@B2Xn9vAZ-Vo5a?ouS jad+QKIb{5~7lT*dvt.? s̮8uŒ֍bu4տ/0E61|h38qk]&9W1@L%:'qC]:)u; h9< AJB:xZ DH!ݗߕe S',1m6L 6(-N~#ö':.WƬC,f?^a㨻UlhaWgH㍏^SxE7.b; H΅Hտ>ShH7!Dd #Cy9pO£$'J1T$!;OReri @qY (q+ YNڒ?F)ͯM`t eVΌuL2fEZ)A5Guj xN*3M]ҕ dYNsb0p)О0$=4|G6OZbhAGЍlHPE7hIQ ,zviVp<2,#1)S-Kc*dԦ:\N/tkCEG2[&'T 5)T[:ՙl `4{;,n95Z>P` dÉŬlgkvv^-t d'UdAh\"אe5rg[ږ%tkDmj*EJrk#׹e/+`+ȁ1IqVѲxK`׼-zAaX#ldZ&r?` 0Fb@@uuCVrB8*mL q,e}X%|I]MɍxъGXFoE5ʒ@r.{)L%<^Npܯ6@p6<Ё6/< qP CОP4{-kVK@9i@ӡsQ2ANhF:x?@ xֵu_a^jΎlt/⋎awLhkzPVsy[g!p۫be5]=^p|X&ߺT#>|cBޞO,JU3l@ o7(S|Ok,m~k.%t,IKp<)w9 q)NG 1nW" Q rt5 (x8Fحti\Q^rMXf7zӚLw9ݫ4:91-_ BT/,3nY8H@d14pzկ?:پ;={_>Zc##Yʐij| 9ɕ,qRJG鈃ڧ\U;HPM )%ɦʤ i9+o0sE":RA<#p M1ay㙤)yyӨ5R&v~ZK~' ܊Ao ^}Jz>VZ"#*Ej)0Bb|  Xd_H{+Kתɱ:{NvD,+˲.ˋK :z\+NaiSt@l=MOQn Q>MmFʨHJ:n.ڠc9\`MB'˴oqs{ߖy& ꗑ ٱ<\ @z;IQ{h=QR_P ʳ \>PRK[6GkNz={MڢS_P4} (٫ѽ{|[R0pja9\rp䂘ʿ*Jj@ WpRP0P 맳\^ ӗS egn|02zIaƊz;G.C^kP3 +KAIlpb g0̹m[PRиԳ5ua-@fޛY+[[;oÔ 2X1]=ӫZQ8m:m\0zM]VÆ̛Lݿ0טځ4*y֗-8}Ɵ]* M\ ͣ<܁=M &BC љݰ9 m9;Ӷ׊e +0@2)~շ @u}D+ N={]Pv=ɻpM[OZvK{^Ņ<^.= ^.1  KlX;ޙU6'M:na0\TY@œ13j^l9Nw0tPk ~^ KmN^ㆮn^X>ǀAN]R-MONp`~. ʡ~σ}]荭m H5\}[. JMdNMݧ%Pn;ԩ(> ^nNNk4PtF ~Ю]n}8>)?HP#}$~A0{\un^s K02=~{<J0t `C6 Q/S3/X- kg_~O?o?@3`![n_Xgr@n_mˊ:zh?+N̺g+H .AD6̧ykÞ Z eи$iW+ /^(1Av-!: _5%%Yxx hK#&a( 4AA|\ЈJ/#ˤ\%Ja9X i(pA8Z,[SUTgfؕpv jZ˵aC5]5b!hg\qN'ǎrH#@wސe$$ 14$Pz&,`!XPfK- *1̉P6Un!cti@#SrEW]..BR (W\A  1@,TZf:G,$)C|EL@˗_d:hlFuUwM%W*Rg݋6Kj3jGTkmf^%LRj&%klhNx+kޫ @lB&tH$%J=WBYD{-4B6N讪.bZ&Oɻ&(L\*nƢ8,.+(‡({,3U1f:`KɸQXcr\wOis ulϋc0IVtMĊ=yO75%ۺ^ns=3[5?w- k' -7}݄<ɢ7|92S .{7[nT 9eSsژ--d4qҥt"zjb+^{{=$|95RcG4GqLܮx0 X2%Ol݊ƬimZ擼m o?Zu0hG/‚5-r Tֹ "hu`NqpV!PH_H6 ̅Ex`9Mu_W$NG<At&~z@lE'? :cG( J#"y3 -ccȳOǛF7 zчRFB<*yl䓣hID~5XL-o&)P:±5_gT4Y4}l$ “ `S;HA n{{*_mqܰ63nN7Q-z{|?n;`p\ 738 w;c~7Hns\Uen# K  |D^> (3߆c_zɻu^nt=-b\A {ʭ)` Zj=Pr }~@|cȮvsa- Qz:icSz׃ >?dyn[?84|.a8ˁs]Q?kD˙-( @<ǜrr-g{*sWr8{u|]x yDW2v gvgspu2Gu%gz1PtE}×*ht]~$~炡Ƈt>x/:ssG}vQrt'r@Qgz@}C'Gs6hr8zAB@Xq w{7|x7kyww% x5u'1'H}zt,p~r,0t` G8hr7t\pr ~RX)' hpv_ ?nxnx؋VQŘ=ĘDeȌ8ԨXؘp؍XYxz(]ōFpa'wv/{<'}pJwp gq)q Rym8C7qkrrg}sqn-s~x);򸒉d- r rcrdGxp/HdQwG8GF8J;牾w$0 lWrxzZyzMLYct%mrGsV痂8-YDZvq9NGvYx.xr$Gy}@Arqh<`zi@r;rTG5yt0uxiXf!yJ(@rx),QiHD ٞ9hYX1EsYkxd Y`ZͷAuࠠy◈pym \qs{G{wt%Jvhu+Z@YGv"rtv7qp~ rh"Gw$rR:jr9[wpׄ)lU/mrwr Rxwx* pvFڠn&TZ7iTv[ray~r׆'ئ!~9G8tVٚG[s阷XyIڃ!z0> x x*GJhYyjucإW)wp1pt[yʛ`Ԋ!zJZzHJگ{\KYZ ;o ۰KR;۱ ";$[&{(*,۲.02;4[6{8:2@B;D[F{HJL۴NPR;T[V{XZ\۵^` ;PK-ol-LBPK8^EOEBPS/img/usrname.gif!GIF89a@!J9Z9{9BJJJRZ!Z!Z!c)c)k)k11119J1BR1c1k1s9BR9JZBBBBJZBRcBBJRkJZcJZkJRBBRZsRcsZcsZc{Zk{ZkZcksck{csck{ksssss{ss{քքބ焽猌ތ甔祭ﭵƭﵽƵƽν!,@H*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲ˗0cʜI͛8sEC@ JѣH#|{HJիXjʵׯ`ÊKٳhӪE맏<;a6IJݻ@[@Aڿ LÈ٣'n<\K*ԁ̹sϠCM}:^ͺװc˞Gm$sNz߶N μУKNokν/aӫ_Ͼp˟o} (PpР͑'؝?{ 6v}VH_wd8mQF\pEY`(,0(Eh8H܄sޱхU L6PF){HiXJI%UpVbveElNppH1Ee矀'~"*袌6( dՙh9VW TZjըWժm)fQ@g ,0&,T۬.Vk YqjޖJ)K.Ykhe+R\4@ E \' S@L{<<_|13lkJ&WE%,۪T2͚z7[7ͳB7t&S-Ԝl䛇.Ζڌ*NWC-4诟9n;Ѣ;Z9P LCs3'Wo}goOSo_rk{^ra|h YܚM/n|Kͯ~K%J/x ;'L Gc/{ GLbwoC;1v0gLE8αw@L"HN&:L*[Xβ.O,`L2wf3$4pL:xγ>πts6sPԧN[EGw j&xz8&>hO;(>vso^nxϻ1^;N#'Oyd`܋]{ͱ5·8RԳ+_ c?׫=2zƊoݟe,*OUϕo/}0{o>'~ثigo/_7~hx{q~G~Ra{} Ƈ 8S!zXѷ҇ H 8,.H(ї3h*᷂3x2x%ȀȀ+8@hDԇ!E~1CHN(xkw;؂58=hV8|=e e,ȃwTxAatHy}(u`}n8ȇ9Xfj}hhzk[(7k^ȁ_h8kx{(!@x8؊-ȊHh<(؊x8hȉ{舮XB牸kxnxȘ՘䨊O(P5R(oXFH(Xt؆g¸Ψ9H׍qPi{'׎XC(pX/ 8-ًȊh:H.iB/ɏyV]<) igHiT)=_iyHX9 l xZøx{jv@zPb ]ei~Y采Sُh?)eYR|;}V铤uk)Ę18hG9\iyy0h8xI(Gx)̇iCYIɖUI$ ibAA{ّ7H꩑r!閡yxٟ". z{Yvxڡ":$! Z*,j'٢2:4z/5:JyCp=jAzϱDZzףHJC?:MO:!aVzgǤUѤQ*]SЁdZ9OʥSRIڦmkʦU :f| ]q j?Zjx{zڧuJ w TjjQTר Z*j*sʥlJyZ_*wؚ1gQcUAZz蚮ꚮ)ѩ!t ʫ: ڬگ +ʨz t]^RtPbe`ڰڱe{K&FJ1JƲ"k. :`g?+BzaL[tS S[TH M3J a{ekdf[][#`+* Aigwmo%r#JYkٸ[} ;)[Jpǹǹ;p1ۺ[ʵ{Giۻk{»˼īƋ[yۼ{i;ܛxt ;[K[ڽ{xt;[KK۾w)<\w=BvA!+%.^'.⼽1B>mՋ}x;V>P>3.5&~&O^SU&~7Y!+._N.؆]ٓ5螮֡נ^T>͡P>^~븞뺾N}-P~Ȟʾ>^֎.Fܬ>^~# |NNՅ1jb? Os=9}~7fASa  ?^Q_a奄>i$^R*)=AC_` A2;~ QN8X>8^}U@O ;d>_!_k( bof>n_jtlzTb!YX4OOOhN(N`?o=(r?/ow&Ocvo9hNO?OY_RdvUox?h? _/_}~YN?6?O$(`‚ "|DBpx"Df(bȎ7C'J-]SL5męSΐz|ZF&^ESiL:ԃT6]9jT]B Ecɍdr4Y-HKVDY\# uٸU*X`… FT(Q N+WyrԩY3Sl*g"(#ʁzwgj״Lݱk?N_͝?㟋.}iOk[32'^z8{eڇ]y0#@{Os@uA '\i@ /0C\= ?G$DOD1EWdE_1FKF'pE6YeeYg6ZiZkMWbUJX$}`p0\otuZw&mLFqCܪmܱZ)8tiK7nk%YbKs_J8wx&o1\|592,>`E e/+y2u[w.-̪>+[37`;7:i:ڷ嘿b~ܘc:C{8-jK.!&zul~lI@ + )XKnj7Ѓ[kM+p6uɵ%̴󾜯}-Qҍn>~\%]m~w7[yп7^YW{qn<3u녕֜rl#@7` -k? a~`O`պeAlp`MB`0~&dvVCR0z3auCp4l 8D"1'B4bă O" E*Vp33ҢE.Vl`#T8F2ьcaů9 Toc8G:1jc*^яd ;IzHF6ґ" iH&!RHeLN`زJ$%dI+g ]IA @#4Rk"%4]&'_KX>H-Ք,_:_?/\UiI 2qs$\麹@LpM($fK_|YͲn[{wҧ3%DS=7AgeIܗ9 (>gI]C7"򄨏$$K0Ѩ78/Ag>%T/]KF3)*-:t|dB}ZP|%J T!/uj hAA"$eajB |aѭntSZS K:&..K%cٔ=l'Ոb-!̎Jh/TZFеmlek"bmn݃E)Kzn\uƌ\fͅnp]vkJvv@US 00^ E% o|;%d \Q෗qo|L_kǾLpb@.psHF0xIU4mBCW'> ͩr^ұ%FqbHuviŭKlb7'<0E o񏓼d&;72e+[9X1r5 *gQ~ƨw~s_g7,hFoۃDlC7y/i#ӟA=fTF5DjVԾmujro:Ҽ6VlbShFw}d7;ˎ cOҩݜloۄ-hSoQѽnt=vE)Xߎ }1w]& oNo:x5qkěL>'GyU܂I<,9]򘣘{zЃGG:w󞣛 @blS5O,C>vۜb@Ҏv}gCZ}tCw 6xz{bk?wSOb{q}E?Iы>Aټ;m:=so>^_z~|~)~ݏO4T~?_AgM-~~~_ :㫿d00DTd@ޒL @ 78L.3|9hcAYlT$BP!"4KC$l%dBAS;PK͂"!PK8^EOEBPS/img/attstn_req_detail.gifRYGIF89a!)BRB!k)))R)c9sJJRRks{B!Zcs)Z)s9{k!!!!J!!!)J!J!k!k))))B)J)R))))1J1R199)9RBB1BBBBcBJJ!JBJJJ!J!!J)!JJJRkJkJJJRRRRRZ9Z{cB!cR!c{ck!k!!kJkk!kkkksR!s{Z!{c1{k1{{΄))))RZ)kB֌J9ZRޔJ!JJk!JskJBcRck{JޜkJc1cJ{J{k{!kRR)RRcss{քc)cJck{Jkֵ!k{ֽޔ{{!{1{J{kƔ1ƜƜkֽ΄)Υ1έέεΜέ֌J֔1֔k֜)֭J֭֭քֽsޜRޜsέք֭ޔ{!k罔έ֥B)s9քޭR֭1BJ{֭޵!,H*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲeE4: F͛8sɳϟ@ JѣH*]ʴӧPJJիXjʵע0eJٳhӪ]˶۷pʝKlؙ ˷߿@È+^̸q#KL˘3hϠ9Mӥi^ͺuc˞ ۸_ͻ mw(_μ͑KNسk~y*ӫ_ϾY˟OϿ_h&b4`iD(Vhf ($h~," 0(4h8ᤔVj'f香*(ꨤjI_!0 mG7Hq&宼Jؕ{z屩jd6kfnkF+-qivfr jƷFko櫯 X0 ?Ƅ_ ̰ࣃFF?& SVȖ͒,nӶf4\38)n<υ+ޫ!+uWc=5O0SJ|5*CTl7dqtk7d#eȞlc|[&27nә}CwѠ'Ln:PR[:[5Mn { $_!\4$228$A{ ?ĘaAv+ޓMeO~~hVP $86!a\b:K`΃ksT&Y@;ruzi;NKaąbQȦ̠:`pN'=GdD^a>*Tbe7hb~?Fu:Q 1>R3B˃<5F.kcCaN­1 ~M,8@ l 6(H=VJ F^,_I?l\.k a+dȧfZ ]"eȾd f 2zc$iԏ {#9bˎ=$ iABJFQO9% )-v UsG=t T> Uƒ? *PD(DTsO%0z.b1ϬU͘&JVo,'8yrj)ׂwk^9OS'`곰)AlkCQJ E1 mG?*ddIIZnҥ.걆 8 hn#S5+{LdJPM*S\QU΅fWIEdՄW{ńLhkxy͵Wl8՜g+<rW6=` k8]lK`mAvr*R0lg'L!ЂV"miI־P/]ku ClX<8/08Ki1Ru&PT E_3{=H8^µr=gk ϽUu#~6o,`u:p`@1Xs &a ŸŰ4:%1H ֺvl#桃@`!xf p6n%C`Fu?NuqTSLjUirQ^*dz+̲|e0熯~_5yjAgt <{nE볟' _Z Mov8wW8H7#!X@,p P` 3BQ%, 0Lҩ\⍣zK1ʜbu{>eWەV& /XaOFevٝwmmGmF M_h{ݎ:u p=;x!m`OC5nj󦷇Gv+k$$]tpA~0\nsb݌꘽>X#+t?116o fϑCuoY:>KaY]6 VHu:b x@xw;5xb-Kw!Pa7}t }D?zҷB} zD>T?@_qo.`S^ xO|FWFWՇ}p}}}{~3g(w~)_~~~T218:<0҃=h{s'$ _ ؀؄1P(2??ym&G:c')4+H4- #3H68%DxN~7SUhW5\؅y3R'xyeHgi(kȆ/C~@(BvXx؊Hx؋8XxȘʸ،8Xxؘ$8Xx蘎긎؎8Xx؏8y ِ9YyA9Zs "9$Y&y(*0-R+94Y6y8:@4Z7AJ=:aP~LZVzOZ1:-b:dZZ \ 9`ʣepyhFlڝn*|ڧ~Jt:vZkʝZAZʨzړ:vZ٦:*騐zJڪJz۹z'aڥaj:ZjS ڬ z z͊ **ҚԺz蚩ښڭ㚦zJ:jʩJگ:ڮ*ɰ IjT*(ɱQ*2 $Y3<;,K.;0۳D[qYjj:kL۴d0N[VHJW۵^kPkRK_[f;Y{z!L0Bs[q,z1 @o $ѷgj: } K;x+˸i뫞1@[nK` ˻ ළn{[1۷ ̫p;q{RJ'K,4 + cpK +Ҁ01؋pK;zPnҰxK #lkk 1[ L# 0;Ę*JK[L, з+(* 8/@q6 N< BƊJjG{[ܷsUB,d[n{nS{yvl<ɉJijzl su ʀ; ʗ{ [>e { LJ\k!ʔ\~) \k\lΜ\/H|ͭ,Ԍ͇jS|ج[< ,lϩ]B}Х+А̛c$-! ArLs3äL!K|v x;ʏ,Bmnk8&&(0( a˼ncAS^:b],1 c rݒA=|}m,I^ąԸ4 \M íMV- k-@`ދږ""c&p @ְۛm}}QԘ1;KÃ*_+| IҰ-K"T,DMm$? T- }+¿LՈh ܽ}ְƍ qI<$+Lͼ"ر\:ʡ }߹L r{A,-LjcŻ*.ޤ>ʿK~ٍHʝG[ȹWLg h)n$Á,^!./n/`d0,dmܿ+I|LH]ՂՍ͠ ɐ =@pamO>sk<޼U]c Kɨ~w^1j^.ctMl ,9<1P>̋. Iٔk ѓ3 l:˽N^nN6-MZܬK >| M O?⼭ ]_j&Z,2o8JBo:>HN^˜,m *Tӏv{2,>d?4|0kZ_~^5<+*~{tͣ t^Y-{}.f?1t@OН) ?Q ݄+ݮ!;ܿm(mW=泞z~y硿v \- }ѵ?ៜoM`=Os׎ȏ_nA d@Qdxƈ=~RH%MDRJ-]SL5męSN=gP迡EJC(QJCY2 UVU+ADaj%{@=TU࿱ &WViK5N vsvnBiːf7#t`gZj֭][lڵmFn*j˻Ш~0^d'g8j۷׽w6!pb 7Q׎9J#c0gs=ҧ10z0@$@D0AWM74ߎTn,: k,BH`:> ;ҋD  iưFIƠsH.[3&1="Ƞ*Iu\K/3L1$L7! B@NjCĪGS\K-rL .F OW+JܨJS4KnѸsOHlT 9?ttuE3gV[o5W] jB8/i]E6YeeYg MԤVBP5c[o7\qIi}e`(Nr߅7^y祷y͍ZjT7[{8`&aa%`'b/&a8dG&dxc}RaO9fgfDZ }f:hM=~#wfi˔sfsgU:⨷khngF;m^{j٦nYɾz];p'^.o gqUul/z3HNWUP*tK2@Єķ$2kA΂ΥO:H(1C1oafQK/CD }Y!/&Dyv TդXW'F74Ѝ^#E@ " 1!cQOvғ=A6/>ThtHTGJi XH#aEvShryKy\%?H3bLdJIDAGB MHS<%fi^.\'}\Ԍyud@Ouk!*% J񃨉9Tzd#܀䣤V(HC4FQZ̢JU0h"H3/M"ԋRC"˪iS3SrT$hVJPo,d I)Y}%ZՅը*LEʕ 畜ظB)Qe lUu!az?N d蠏FC`(!ͽ$f6)ȹeA[(UlN2*Hӽk3ʠӷa_Z@Ȗ~m-Ga \JpO r9&YؖgB,Y ۼC7яVjU(hAҗsh.cӟ6-Eiԧ;Am/jTZhNoД7ula{Ma+̶T & 5;% A2[&ގv#lP}Vy$C LzjQU$Y{XF>UQM8e]?J\T-#$QN$x>Tc/K'5ƒ`I!LJ-:5F: 7u$`ߢBCoJ]dl=:;KYqh_g4_ w:;iL ;٘f.Sb;'w2'ã{@b2:Jܭ¥;BP.C.00Cc<1Kh=,I)0r:p!#c,Ҹ&`#$ӯӢڂ N< $(Ă[Q#

#{C5:*]R:E. 4Q4DBpj;o+3Ďʩ"⩤rO,k VL c5]ICkB)i+A:⋽%ؔҬ )XE֪k@ȒXL%P|QL~ T!UO8B.j-4DXuBVԌ"R9Kd/.=A&B6CF#>678NHIJKEN?aLPQ&R&bMF6]@f-SvWXYF`TVaZ^_H[~?ONq^`t``hifh^jfciF - `etwXegfwsw{|ev~;C_vhf~&>hiknhh}芦a>oOQq0?`tV$MiXifi皶d<6Nh>ji.vd qnwg(giH$…vVޅ* jݓNvݬ?x$Bfk1hֆCn~j~fYjiM迆~&V`Vl^nm&q~AlxeBЅÖFl.jl׆a]auFj\ii?^f.:i~iݸFn>VֆAe mn<^lhe(o&on=CІVomhoMoY(ꦎipm%޴\_b欮xk^qUink.hԦlglgqdlGh.ƄkrlNjvplq hh05qpNg6f.s; ]ڕxjsW&pFoP@~mFr_qG_V>7txknk#x-(X0NGuU:]6Xn<_v%TW,gt.o@>oGl.xPKhisMLXp'Wjeֆk?vrwjOw_\ep^rp$Z"X}ݮgiq^'xag6lQJteOr(WEvLxm.q쌇/vw=;4,M׆qUhgo&/poÝޡ kxޘ#CF7=z|4uoZKԐ1bZ4H~ ?\53?z@X0cA;5`ex F<"eW2(LA#9=i`uX!gMs17F85Rb8%ha "ǢW[ "t\3$2p7Bɗ4PLjf;'ʃ(qJU8WgV%T^8),Ϟ!z[7>0c=AG仄(RyQ4N\$+'dg*8~IцOd`51S,ϿRL>ɭweF/霾ŎtO rkd2!:[q{MjXt]bh(Njg'V4> Z@ a 95_/ouUgF9Ig?Z'NXƊ13iIVۊdzC_5ZMBWtx bg;t5j1yb책"DN.>pL!Zx -N!z bne ruM:{6>;Yʶn{Qa 7 Jr_m|f.R_MSYYEiyK:Kd?mNCoYfɕhf2JNƊ7!Tԩ'cI=.g.WS|'<ֿM\_ K?SN1TצO ȸyml S"E{+Ѿs=/>)>|P0_{7ֿ>XsFK>/~E=?w9QҾG?T֟?Ukߣȟ 6\ ^ f\,ZT i D- `A ~ QaU !\aep | NNN\aPX! RpzZaZ.K:H0?\ERNDJD" "."BbH#!$ʡ!% v^ 2"(!V"P"&%)D > Jxb""-R)>Oܢ$"+. G'>ajD-&($v2cBcMb Ƣ12f b3Qpc4:4"!tj:`$~%"*%c&G9!:F:c O$c.DAA@ #9v5~?V$2$Bn !FG~8jb>6E$$R[M #tc,NPcD$O%Qf M&D$QdQ6SOK> ?>U^e$Pb%XDR⠜Z%[[%\ƥ\%]%%^jE^%_G_%`1&6V~JRv%"~ a6c>&dFdd`Vd^&fnf[j&gT|i&jfez&jjklfa&5%>lo&pfpvpB&m'fjh irFtNqRgX_*'vvJm>qbbR v'zyZgw]gjq2'xfW'ZR&|'n|Fg[(w~!ႾE!I9b*z(J? cڥ< B燺rz(`7ajba!(E(BYV(N 0pRh/l(6B&)%HJ2 h1fDށ7p(r):i^)G<&鈞)rhNi)rhZ4LiDi)jhrri*)EC)l?`bDil*E0C2惤ClD~jviJ,iXifiD*.K.6jf0gnD>J 1hDÊJ<,E D+^ ¹@kN?ExkYkFkJDk^?dJhvΡ>>"¢E:H#tz9%cBJ)f'pzlȲ'z,?@lJ˾4Cʊ,VD͚,Ȗl)ʆl,F',̒RRiѪl&JhC>+rĮmJ3iCëN3<3-1mVxmն bFЖi ¸r&k>j?û<0?4J?AZ.S n.Br,uD;>#=Jcd}xbyn&TBj<Ԓ?/2mlެ/E/mvǾҎ<޲Nf,Вo"6͖Fom^o*m*n0m /Re[Z nr$¸ (GVD:> 5LVnjqpYn>xq(s1*X;t"48ƣ7ףrx(Cm/U &i2ñ/rVdm&髶o#-"+p֪r!o W2&s"Or;?xf42'i+"32m* жo2/Fs/sJ}#+r,'ɦ7U2(O%iZiRT1C.TV1,1K\%3\r|qtl?K?F39{9ñtqFaG+T~n!3,0,kv-+{)F 2KS(/0J4ˬ*Ҿ%slt*J[DO4OOos7[bs C8oWVVͺpt+S53mJ0[7s ps 3kD9;45K>3 k?39dS-_K^0_btqhstF{ti1+Y5 780bS mv IW66 l)ƶl_*sjq,XP*sX/-.7NpE0C*xxuVvVJu66pGw]o&83ߵB8``óO1C1psaO`KCWvBge g&L#ihO/Cv9T6t6?u8~7M+04Gv/0xPv˭; sKlk9S)xq)!:@0?t&pm".T3p#G2ʹ<4q㴙B|kgS6?_wDq18u^1njzi8o:eW;tx^B;rdi_/#PZ&Nhgn9ÓZiZk1<2)*u s[N+B [鳻u&\{⩷Br)/˻Z[uji+{v{?3Wj67Sצ&^E-.`0A 1"6k+|Rc:˿n#4/+[ttB/B2$B&7=K8Dso~^go}߹׫%g<l]G&NܳC(\YD=>>'/>7?>'^F>;&0s?/QZ=ڧދ cb_4;wR}Ջgf>\~]q?#`ҧk}b}IO?g~Wc{>&<'j[_?fHVXƿ;??'@7`Ai&DPaBiht0|`>+fԸcGA9dI'QTeK/aƔ9fM7qԹgO,vlȐ4%"xgSOF:jUWfպkWA7[tbRzUm[oƕ;n]-(²GjL{paÇ'Vqcy3)gּsgϟ=tiMV5iԭa~JȑR>xqiyW?:m%}q?~ͧ^t=Nnh7׿c#p:Î/R> P )L= ڰSС QLQYBiql%oʶ!,#;bg%CVca(%9)iR4%511)a#}Aނ|9NLMFq𘱽dNZ($EYSD6E4R!TM9,O)9-YjdYRF>5 M% i-yYTLiJ$2-qZDFv%AVuWтXSQUįBl8MsMw-,|RADe|Vx_UxLmf1A}W`M~YzI XaIw|;uI.uP]WY@fWdI֕uWE~Xueq-5F/tv${x\1EY뭹#YY--k&ZDѰ}yʱ6FPx.mjώch+e'իMKK3ot9)xGkgwx(\1C^&_L11r[k/p.+lj/##o[idwX˕%  P^}}\i&l~^|EcB^__4[P&gMOT- NX+C&V~ch7]uGW_&Yb@Pt~kg>YGF)c;l:Xp1--*n0M6CwGSB@`U}Tx۸)z!IbfmlY!I /@F=bKuvDillXjXO㕭(t[؜=v4npnp0bLz+kloN{$+`g 7p}w p6~cs|WJ޻*D4؇.9W.mVO729}}Y/B2j,']Ԥfx5t0}-ڽF5qגf]kƽU+FƦ{qs܁(“Kܴ@jɽg׻A`p=uϷQ^""MW8^JN}ԤW3o9ǻ^G]nȣFokT"%y{U;W\4i=u%KcV꭛WǮ[qvi>wfml_rʴL# !̮#khOBOPlKBތƮdBr&D#8 NdPK!/%ϽtJ4!Ѫ(:trjL$p7R J4 @L>M .-Č3)5M r }s4t77Lv=7J< 7#-396 ʒs(Jj78>S.9 l3kL {,*0uM0Bc98d#Lc6:rH!J^$ܬ+ XEet$QPQB}EkoFKE+F XHH I/9rp,T BC4tKK4LK/JBGG SLL4NtNgNFT'(t>ԯGGT4P P ջ4sG snbiR)R ,5S5uS9S=SA5Te)biQbO%O4RMU]UQQeOaVq5WgjJJhJWuXMHM!uYPuD|uUYZX- YkXZ[YBUG\55; B~5X5^啋xղ 5_uGDZu_v`G\SJ`vaHV_Vvb)V] 60b5vc_ч2cEvdb5cI6eU6B<~ v[ueevf ^OMd6fivgy8Zd^6d{vh68Lgߵ[vi6[V՚vj.vjvkg'i6l+dvl6mi5j6nvnnn6ovooo7pwp p p7qwqqq!7r%wr)r-r17sW( csAw- N6tMtDUt`QuaE@T4XkcvqW'T75jlsw7&v4zmx$rvu#6ywzv5Rw{50f#{{ww C||uwCuw~MwxK#~~7m4w[7öGTxhy8v86P-185x9 U$8z=MQ8UxY9꧅a8exim*uxy}8x8x8x8x#BTxɸ8xٸ8MIXz;PKi1RRPK8^EOEBPS/img/cartdet.gif1BνGIF87aƽRRR)1)BBB{1R!91kss{ZZZR1c)cJc1s!9ZZk{sssss11cZ֜)sJZkZRZZckss{s)))kss9s)1skB!|1{1sc1J{cΥ{k1kkƜRkkΜBέs֥ΥZ1sΔ1s{s111sZƌ{{޽ccZֵ޽֥!Z1Μs1sss1JޥΥk{s{Rs1Ɣ)c!!sss{{BkBJ)19ZBJksZZRk9sJ1cB9JZR11RRBJBB1JkZ1k1csc9JkZZcsR99kc))csRZRJckR1kc1RZssRsZRkcZZƜs1Υ111s1R9ZRRkksZ9޽ssƽZsZsZRsRƥRZkJJR919RRBJs)!!)k1B!kksΥs!!kkc91!!Rk)JB)R)Z1kZ΄{ޥcΌcƄ!!RJkcΜ֌ΌZ)scs֜Bsck9J))Ɯ޽9s{B1cZ9Rk,sH*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲ˗0cʜI͛8sɳϟ@ JѣHôS2P@իXjʵׯT$KٳhӪ]PL )ẀN˷߿LÈ+^̸ǐ#KL˘3k̹ϠCMӃ(0 _M0۸sf Nȓ+_μУKNسkν3PGX cOϿ(`s` TD p@!p%߆v ($h(,h {b)] J #,@,@06PF)TViXfeWb$0#i QUgZe [p)ti~@GiS晬 )`ir8 4i饘f馜viW/0c9J,‡U @bkBZM+kV a}2F,,ʪfj2JFJ8J)| "*[@"FE2e  U7U2b pd8l¾*TI ,$l `o^0",ªZj:@y ppUU6KT4 B_TWmXg<Ĵ5f .kmP_5F*ܶ.Mi 7Y.>+i,ef.0W5]M~ .Cc(C>D?"f bA. +p =R/>&``o+@4?BίxCLqH07+8kED+'H ZpP] GH(Lt0 gHT \@R\"H4&:P H*ZLa` H2qdOFilH8EqK @\S IHEy $$" IJ U!'PbaD![ȬZVyۚtZTr@V򕰌,gYKNj첗 x6R>0Xε(l)QybAMU8@p`QMk'1%*)rL:{cK  ( 76j2!8M@IP* &&vL3J2ʪ-VMO>Mmn48U0Lg vs /0P8= \|\S?MPi`8GxoԤӪhr-lm 1%HyJpI0 DMIy3rS *pXգd5Y͑6MbdS7 +ϺUff$ &<ʀ `7k>?'6'uIOy >z6 eXxPmV;"'Jtf6+ʓ`+%)^y:Omܬgx栥A|'kXs󲾡l^S Z2ᨯk= X8Npo( Z.;K$fLL>$Opp' =`dG88qYyt3eFzґ7sk,P׎8U*( _UβeJdVƽ(i5Z2?252Wdp-\[.  ! : lhхNȍs6$@m,1] ^va2M&L\ng{*gMZӒ|g(g[pF4 T> Rmf١ȳ :ù϶[ Єv nB7ܑFȤ3].s뜦RٵSwys$Ox=':;?p>7̓Es{\KV p;֡8l$OZpm#$ Ht(p9M;^w$oy9R䂃ߢ^>xo h)@KOm gwa%ۣ&t4?xDXN;~; Pj}w5 I$Gno}̗ӓvtm?y+5ѳ@ձ`?+v >|Stjk&Q}}݇R/ĀXNPh8$(*hN f+Xs"X2}'6x8:18>Hz;B8D HJL؄NKXE8TXVg0Z\؅^`W8dXfxhjl؆npr8tXvxxz|؇~8Xx؈8Xx؉gx؊8XxT8X؊HJHEm괌ͨBHJlڸ60Sȍ88 X긎d.-`SȎxg1! Auu x.`P`)HbA /) Yc @ 8` .qq &&` A1ŏZ:YVN P)Y@.  0`(Wٖɓ> 1;q9:',YR[Yc]Qy" n1])u207EJWs DP p!uIw| Ae)V*ٚuIgɜ))9VXљIɘYCAa Io900) qYJىؓ xt@;}9%YPT  q0a&Q9 )(ښaY PP Ju 7`!q(ZX @ Dg\jMReP^([j=z rړRvj.uYjzڏZ'I Dj "0aa*_KvVKT1V: ^~&Dtv4cމʙJI5Dg:Yh: o:? FP 簭pG)("ţd*y^ &jp)wyx`~ bˊN:#(&*kLЫ)d !R;:`|՚J: #j7K:q0 K` HS* V9*4]p V &AK uڠ.Pzɗ'ЗOYG[ IV0JhڱC۵O[ʸYM;(ŸkJgk窱JK֜˵J k0QqTq @o P@ 0@}`MJ@{ֵ @UdἄdY׻p-}.}Q}y<pDaOxֽfRQtQΛϋ^dֻd^xG] X p6;Y[Wyв \_K!!܇+FFo p 6 @ W̻] R-uMҋd.G֦1IX ıa`JDg {(ܿQkJN+U+l{l{xu ] ,ZtvO<&yL'W^~ ^/ޝIxcbBlp0g  إ,.02^= Pm2@x@>~HJLNPR>T^V~XON ' U@5 % 0 cA inQ8npwGEN4Pw8Az.3>^~阾\pknOdQ̝t~ꨞY.Gxcp@UH2vl 4 j0 ap몾Ю䛞midcp5^ p_J J0p)Z`N QoT@@?]s~pk:. Q|Sj A XU~|x~c }HJnkJi SK"oP G%3o5o|7xb6< ZapLc@PZe?8M_kO4W^QV?Abdɀi>;CV9`5PyOOV]! "?N`d>\*^,1w_C?Aeu.'-/djgNYio4leh!Y@@ DPB >QD-^ĘQ@|RH%MDRJ-]X`L5mL=}IPEETRM>UTU^ŚUVD=VX*eDVZw.uśW^}X`… FXbƍ*Wdr϶ŜYfo+m ҥMF]֭][lڵmƝ[n޽}\pD\9?gN=ݽ^xͳ>n]Υ"u}bמ_y0@.h{K>l=B%ˏY[ ?1DE- Wd_ Y 1܎CD `:-O& ،t ֔I;f$26k=c3LfS Y.G{[@1LrN,R,)xEd۲LGRLI'͈G<ӴH AM7=61q!yb3NO 8eR]dG|TaZ!ٔX Q@Y!Y`U{u#6Po%Њg =m `wSMcQ-4_"_T2=-5x\xb0msX <;J8֍'8DHF9"HWoe׊GWg@}rӵ ysS]xa;zޢ_kT`_.(ਖ਼#4?MR7C}<^w,%M]Lkƹ]S'bђͩb&uKwɂ$֤Ҕ  ›,aGo ӱIb:JvҘd2cElʆJjVsDVU`r7:ErB"kFP'"N'6STf>edElb6ֱt=hBЇFthFYr_Xf4s fa|zY +}s8կuizp_BZ$~l hlf7't}el+ S$v,c,sC18ZKß, 7V얐" q%`e81oW KY01B .Ur\ㅥrfsÂ1 dP4?zerR'rBLPWWO,KF\0 `r c $4DTdt $4DTdtÁH !$"4#D$T%d&t'()*+,-./01$2>A6;6t78Ê4$ 4T=>?@A$B4CDDTEdFtGHIJKLMNOPt< CQDTTUdVtWXYZ\EP\]?P.[DR\RC/dTedftghiA.>`ӣEdRT bÏHoTudvtwx@YF0f$XPhpFCX?DždȆtȇȈz{0G ]AHB PdDGCTC& D,I>Ȣ4ʣDʤTʅG>J}#PHG J@ H=$I!îlIqL rC BI?\ʼ˽˾MJ>JC[1G 9I\Ѕƌ[X^(ɑ,IJ2ɌKBtɳɴZZhK=dLÑ `$KI4NM^H`ǿi m|A@L=IC*@N(0N&dɚ|L=|d12IʀDPΌO4K@ps?`?͏ɟdO?]pLPpN˞ȎKdL(QN OD4Q(Ld MSI?@.`D!Pt'PЙÅȅH:mMRRDMplГ/S/ e VU6 ,. 8ɏUV2Yu]>;`=B=TF``?Ȅd#PU U Z68Onc xg.W.P+g=s ; R Ļ U564VZUYՒ[5WUuV^G]eauX+YPFdUd 4S ˃z:'Ʉ*YؒeuRxו(Ws֛1i]UTXXӄ:ڇZʓXNe(A#܀[4?؃0Ve(5ȑh?p۷}ۯ ۹@ 躯L[HcR[=\%u\aǕ-ȥ\@%5EUeuׅؕ٥ڵ^}2P2@9DU奈e,jm ./ %5EUeuE_ ޺^&6FVf>_u߲ ^^ &6aV` ůH b &kaO`1xC0ᓸab)kb8c;bxaN띄(1 TVU^h *=1OFeBq* =>eNdUcPd\Rfx@N/P*cb^klmnopfO^#0ff.f<f^>gqgMnexe%181[.rf ,W`5T>TXfN>`.䊦`TpTp00RFVfv闞1ONX^h.eTNyֱ{v&}nbZ[&h V?FeP.)Wȁr΁>i^걦VfvdTegvjgXbY@6UЂc6h6i;h68gT~c I励V2p`4 (N+1n.&ndž2-5FoJ9^n@hVFnNpMgh>jgӂ2jyje'Vjwn7njMtVp  2Fm`/oG$Wrp%anv"_v-.ω&r*?0W5gs61w :;<=>?@A'B7CGDNJMҽGHIJKLMN F%"R7SGT Ruk)iYZ[Vz xb7cGo&@7*]Ou. =xxx= _YH= Qx 8 ,1 HC/pLXww!WQ P< aNP_): yszׁ8w0#4'Px' 3G(`0Zyڐِk's 8xЃ r yXn!R(p&'%ѓG8Ё炟߁=x?@GzHzHh O$p̟ iw{򍭧}9ϏM aG8x.1x05IR#ZyhYߖ7ߘ_ז`~n1W~ zQSwȧ7b 1!Ĉ'RB$ *P}L0D$R"2tr&I RLd0O ABB$.y@5)鐡pT5\$: g! S3ҭKz/_$.< Æc|`0^p =sɎeXE]CpDah ;6QAosyTPeacq>:jQ]C\vj;>/o<׳o=\ġCg ;PAt%L(H|xv$} a1I @ D Eagh c%Vq#oZew@aWqn~vXk5hIo9TX! :D*zG4Ji0 xDz):*JD7 # !*R)TҬ>*TLDGHÊkN C-tmn8D8LL֙u'Qd#Wߥb;$-a! D"t f2 mv<|.'=:'*(|Wrh$K/!FCz]D37H}4I+yb*>$+0Tu%\$\-+F,l$@&XhAikRCTpD6I ds k#oL7pu0N.L PD04$OEfX^^tq$&0pj\Ó/K/;swsIA*:>~'$F&y+BJ{kJ]ILbE$pS BWۃ}Yu%. B8D [\6peyETvW"DOw˛QB!1`7;rB0}ʋ邈'I" @xdl"sW410%*U'3&)ZS¤k|Ĕ|xZ!;hYtj><$"PO?9xM-GD/ # \(`Ph, .<D8B,E]e'EY!J~)He,ؾH..a"!(I.yd$@xbEL<>k'<)ys&\U 0IIRZU(J d3*.Cp>rʏbe@ En KԒ.B.]5*3`մfn@!Zv F=*RKžAӀ,loUUW̏"<򁉮0xEndrk :B! 5#tTK^ #tLʫDZ7`0 +R%柦@9_ ̐2CdK5E`RX.1S.~1c,Ӹ60,X>$  82 $3N~2,)SV2-s^2,1f>3Ӭ53yl~3e }h)[A @P-YӺֶ. fB gQαt<9Bs,+)J0 e0 2/p3[ӭu%C \ px Ch@/ in'g:sgPʦҖE++\n)[SֶTe3:K@c.:uz].wOt+` @#k#H 8y1o]Tf6 '9ߛ xӽua m):v #JIPˇ@k r>wo߶o9(}І~v2Wd?[-d@(ޛE$ GUHH֏ީmx^NNEݡـY[A!q`_ɟ `Ş5͞I]U1QdNeT \ɍMɀP!t `MAi ֡!@*@!aZ%^"&b} ^ YH(ȂxY@#Nb  y!a" #)@!NE ѲEN aݸɠ!  ^=\Aj]@,*A_1 c <dC~Bc d`%f"GvG*&ʪ|b!\ .`~T ́KJ(*ILJ͂P#֕L&LV)eAѢ0]M%"@]R>> J"2_3:_9d@#[Z76[,R:BL @Ō% #=ʣ=v`>"?C ?"YAd\Fc[*fb"# "Y b)@Fb}$l]ӌdV$AM(JB\0)NT`,dEreT Ui]3cb4aYYYM$z$4¡6ƢeeAQM <ݑe9h/$R[޸)cRPʣ+ ""/c" !Y~ |tB&9ʦ(9ϕ>e4gd^ogd4`dsʍQ@F$ )#*ٔ!`Z kr @"3@.>M.4#5 !dj{Κ~^76!T@JP  @At>§=F*S)'l[v_<dW&}6> u[ ~@l a#n$&Қb$IRv Ԥyg(&tfu)eXQ)*MteJ+2&)w~ a ԟ 2* ji^A l"[΢6[$%E8UI9ӕrVk6Y.+˶5kS$a@_&@pggpY+BY@X9gX@PN mI2&d+'Jm™/,Bl:zM @l*z&~6z(ʙ'8Ug"Jz}v $Ϊ,9D+6B@eq"e(+BةT"xr횾Ym-Zـ.VcZ./o͛@v e. HҮY Z >nM*`n/.]om4sMYtmZ&N^Yi,0GWYn_ZHLNuoLm0 00<؍0001X,17?1GO1W_1go1w11111DZWֱ111  2!!2"'"/2#7#?2$G$O2%W%_2&g&o2'w'2((2))2**2++2,Dz,2-ײ-2..2//20031132'2/3373?34G4O35W5_36g6o37w73883993::3;;3<dz<3=׳=3>>3??3@@4AA4B'B/4C7C?4DGDO4EWE_4FgFo4GwG4HH4II4JJ4KK4LǴL4M״M4NN4OO4PP5QQ5R'R/5S7S?5TGTO5UWU_5VgVo5WwW5XX5YY5ZZ5[[5\ǵ\5]׵]5^^5__5``6aa6b'b/6c7c?6dGdO6eWe_6fgfo6gwg6hh6ii6jj6kk6lǶl6m׶m6nn6oo6pp7qq7r'r/7s7s?7tGtO7uWu_7vgvo7www7xx7yy7zz7{{7|Ƿ|7}׷}7~~7788'/87?8GO8W_8go8w88888Ǹ8׸8縎8899'/97?9GO9W_9go9w99999ǹ9׹9繞99::'/:7?:GO:W_:go:w:::::Ǻ:׺:纮::;;'/;7?;GO;W_;go;w;;;;;t{R ;绾{l;</<7gY m@l>'/>7?>GO>W_>go>w3[;PKy6B1BPK8^EOEBPS/img/org_details.gif+GIF87axﵵνJ)Z9sR{k{R9έƽֵR1kJs{cJ9kZJcƔRZ1!cΜk{k΄ޭR)cZs{s޽ޜ9Zk{cks111Jc1cks)1BBJZֵΥB9{1{!skJJs{ZZscsR9B9sZccZZ֥Ɯ{s{絵B!ccƜ{BBƜ΄{sJk)ZZ){!RRksssskkkBRB9RRRs{{cccR{{sZkksBsJ)ZBksc9kRsk!RZ{BscBkc{Ό11s{JJs1BJsRRޜƭkss999JJJBBBJscJsJ9ccckޥޥބ9JcZZZ9ssRZ{9RcJ)kZs9Z9{JsBR{Rc{Z,xH*\ȰÇ#JHŋ3jȱǏ CIɓ(Sn,˗0cʜI͛8sɳϟ@ JѣH*]ʴӧPJJիXjʵׯ`ÊK,hӪ]˶۷pʝKݻx˷߿ LÈ+^̸l+yLJmkh,D `C ӨS^ͺװS d۸ Nȓ+_μopKNسkνOӫ_7x"ӑU'-(h& h#@m܄Vhfxѱ ($h('q&d8̘m8@)DiH&YdtPF TViXR(\v`)dihlp)t%/88͟l9B䡈&I` FnYVj饘b(馜v駠*ꨤjꩨꪬ*무j,j+7_GHsĦ񓍢ӊ=̶F+>ē[:wʷkqh+kj@;1+H(J /,PkJ:JS+ /K+,r0,4l8<@-DmH'ҞܠhVs>2'(+ C#=`lB 2} $ .ޙ.߀.n'^8;P=td *<0TCڨ.7p+",[/oCƾ A Kw+,c>.BN1w/}ۯߋ#*VV0$ -8Ёq$ NH`o48A-lw GH(8/@;s8׾ 9%/KT$D!b @ž4P#0A*=7eR6p3Å/ v!pvQMLb>ϑd#!IEޯI*CI n QbP EӘAd%+K4,hKR+k3sL2f:So8' T`:C'%&çM#~\$=K毉L;'z~2s Np@UnЕorL j U,[B4(qЌ29\xHGJҒ$0 j`6:ҡAJ6>SOFĢ^~F5QݩHz*5k2/LBp%6/ &G /ҬbeKeZzҺxk6tF7o|2 )`t4"=smj=βkN$$1 ބ0%.UUW=Z*8lWV pK)H48ָ6f,#hufw}*Sǫϒ@= x W|xb kYS4yI^75('L p%:qgxÒ((p!(.2 Ba-~1]  &FƉ#Yb71Cqm|7PF1s1<B0!C ^on<&̱DKrnEp{;xγ\DC@Ђ&t0h%3ѐ̜3!ziMsZ|RԨNޮЁVհn1p885k`װn$Mbs8 rh39Tn{;9Nv !a8B(mnAC=l g@C} N7F0> , g80K[ $hxpd,W08Ϲw@Ї~%*HOҗ;PԧN[XϺַ{`NKyhOpNwxϻOO;񐏼'O[ϼ7{GOқOWֻgOϽwOO;ЏO[Ͼ{OOOϿ8Xx- 2.a.w`lpvp #2$c2(2z~P ~ %~'8,؂glm'A %7&6p#7tc7x3zR m%)sfB.RHyc0bb@k%AD]"b&;S;;B%`X`^\"R ` sQ^v8|w1P 1jnH&d&!@d@@ @;XirA.~ 8t0(^Xw01X9HfVEZ\x͘HȌˈxx_(Ȍ88hx&lb`ShiقdJԆe(Xa8h)&m@ cyyؒ.m舌H'IPHYx&OPSؑxH;ؔ(&(؎h:ɓ=^c20ًߘ;^SUUWUU]FwY*yl⇀Є ` &IPyɒzYhɖQUZpZՙՆFrh ( x ٘ H%ؓ:&e_Ŝ_vɕI8]ɓnHKɝ)sP)9ٍٞYIGeVeZeZe^0y 9mP& iBl0h xifjGhUYupȠ&zdmlFm&m֦zm "j(ڣ>%ZxXHGoGo9 %N?:Tjxq!qaP^`b:dZfzhjlڦnpr:tZvzxz|ڧ~:ZW%ڨ5&5D >PzIPZ&:ZzJ&Jjj&:Z*ꩠj:ȚzʪǺڬwGD:&5B@Y:Zzj]@B%:Z麮bj㊯^¯ ;a ;ڰ%K+گ;$k/LC]`RߪA>@%0K2;4k;Xг7 %9+A?H۴  N;+TaRLIE f{hjl۶n*]Ro[v{wEKx۷~z;D{~;\·۸o[¸[{p+r+ϔ\P>kzۺ\[+[BgRQ{KPۼRW5k/>Pk2[޻ [ 훾VU>+%[;e\% <:PB!D8AaK!\ \#\I/q@M1vZbvg!]RB=@ܿ!F >@0Jaī;8!45P"J2qZ<\L^ `T|V Dg>HMN 4},mjM ڼff`[BX 2 Ն7-օ-RM\=Q-؎Պؐd=2mؖ؂M1لڟ=smڂiԛ=گY=آG]:}ٳ}Ԉۤٽ=]٠۾ܰܲ٨Ӿ}ۢMqܒ]ڐ&WxmgEWqB[}5P]}@ ~ n '~Zn" ^>4>+(=.:^9J *M3-~~:ⶡ4^Z)nLʱ{}zޤmɡ&NBndSE~g~Nc~>.^{>-ڡ萮|.n`~AnTycHO.dC~QN~Ni~ͮⱾ%ps6[rn[|-F,:>a칮ꪎ.ߴN燮N~궾^.奄?ОٱF _NOϾmn&~`nEcVi6va;!n.A>@DQF=~RH%MDRJ-]SL5męSN=} iQDEETRM>UT,UV]~VX1 -VZmݾWBbW^}:@`… FXFō?>R]-_ƜYf|ZhҥMWalZj֧%SYlڵmFnޟQk[x'æ[r͝3>\O>z%>^xeg<9v^^|\ 'qo#@D0@bM=l?]i@C?m*|?&d K P# )1Fg-đuLb?W?~dD"{4G$ Ō^F)ʧn1,1E 3ZH.SG֜ʳdM7ߔ K%Tr:W4 suy@fӶwgrg&Z-+*:i䘆:jrө:뗪Uka&l^l^m߆g㦻n;o{oo'\T G<7Wqidq'G0r/Ǽ<36yOB~ytl觧Ǿ'Ggۇ+~?`8@Ѐ `6?`%8A VЂ`5AvЃa38B)TBЅ/a _H b3* tCЇ?b8D"шGDbD&5L 7(ЦQYV"(*M"Pō(/QH҈5l|3ds4xǎ$z\ CG@rDybE0Ricq"I1T1GGԵ87l3eʨ`,eK̦lAה\5w6t02ox;^׼EwT׽v{K׾m} ׿̮*/j%On5L q7iW⽜X*54L1VPXc^\*ԠT@ d)< NhB\ 3E52TP(Nv2,)+Iq! ӔVO,! wˌ3ّ1I \PB N uqJO6ߚw[Tz$L  d>6 #fB'$cp{]]JA Fl= |V޸oL[2#n-OۡB;%+piLc@ 7Ļ'qe$Y fU~﹂Ǫ%9(O"󏔀 6Fz?|cZ?xQWKzuX}zلu}.d7{݂v=-lw{wם+t{ީw)|{x(7|yx7&/.bw}E -HB@7GYqe?{}Չ:( V s`IUL/_.I e8}W]I "5`l@7͵gmz$9lb?:c @/P0@?"b~:$bR@,,ur`(@8@{)+ ī~Ҫ$K+QuBXh  32*|Z*˜5ju$.8&lB xXy5}3;t6hg4^u&-O;'BE  x74),CXrNܷQBu;^z8bE7@ 8LDcBbRA\zZ3Bz@(4*CTBU+k\+XriA尬H 8`_` ~kEjF2hs718tEvlG8\+Gi{ɺLJt"=3TG w TC\CrEDolDHtl%Ⱦȩ:yD I?T*;AuKA5ADEBeԣ\G7GTJ KԯM-LMT>PeBP%1S}TUaVMWUY1RU[*UU^0*c`]%ֽhcViVe fmּ.V.pVoV!muevuw-d$ {|}~؀؁%؂5؃E؄U؅e؆u؇؈؉؊؋،؍XPِّ|%$AA$$!ٜٟٝٞڠڡ%ڢ5ڣEڤUڥeڦuڧڨکڪګڬڭڮکY!.ڴU۵e۶u۷۸۹ۺۻ[!`YB!.ٜ@5EUeuDžٚM%\:[#%5EUeuׅ%J9 i[k] 5EUeuۍݍEՈu_pmYՈeI%J_ _߹Je)!!V__ 6`_ .a>I`(U`!~_NaYɈ5.#a`!_a"6b-&a$$'N_ވ 1+b#cb.b~c23.[-# 6>b;c:vc0 6dD"nc1c&&LM&B>b be7R=FIKNMYDXeVX~X`fae\d]^~dfvaufijlmfo~:og!rVsFgQu&vvggz{稘˽J1ɣ# OK|.?#? FIZFkKrѓhP i靦МF, gL-bPzK'Ԛx Sd !,#LB8j*Tj+~:%B<,ЋS(34,5lúv ~BT뒢l54̫:-~rF~+xHJutl ʮkZNCƗE\E^V^?mPPnm>Aw1q$GsDnjЊF,En*+1L nMf^|ID6 ^ V INOɞ4* ʖ(Jpaqy6Agqq7q"7: !'=5#$W@e&'Tr)*rz,oT).//,s 273Gs56ws8U5;<">G?%AwB7(Dw/2guqGHtJJfMgKPN'uSSWOaVWWuDYZu K\g]u_\v bwcGv!eewvpFh7fvklvnhwvqr7wyFtogpwxw͹;PKcG++PK8^EOEBPS/img/editcont.gif7 GIF87acksZksZckֽνRRcֵBBJ19B֭!!!BBBccckkk991sssεֽ{{{ΥZZZcsJZkksRZsk{s猜!k{ck{!s{ޥsބ޽{{,1C1\11h cH[G!Wt"JHŋ3jȱnjq(1(S\ɲe EM2lĕ&33HX:#)ҥJ:5c3Eojʵׯ`ÂI+7gϚ%Vlֶn߄9 1[87k$a N2cłclŐ3.3k̹Ϡ?<:siΧCZhڼM֘"lxGYjÆȁeF2УKNدVƂlowg3F 4j&"Lvw3Vx)A,qL t /4F(VHaw/Ԡ0z vh@@)L<‰ č8 K1C7Pc . ,4PF)TVI%NOb\0[v$[cziaD!!}dp]YFVFq:aƏ@@:jd P ZD*餔Vj饘f)NrpJ)[i^łeY'Tgǔ;g ʩ6F+Nׂp2Hb.>[mYhE^QpѬyFSJK!< 1<,!<`' 7p1NScQ SPQ y1B0;34ǐCDmH'L7P'N<Iv hlp-tAis} `}o jCxn'81tG.jgyK8Q6+ndSL.{ٲn߮/N@{o|>}g\x@e(\h zƵs Z 88f;Ў6A_ץ V`lcѺ&1 kRzFv7XZ\؅^`b8dXfxhdžpr8tXsvz|؇}~8Xȇx؈8Hp.wxlÉh㉢X8r؊#X8xȋh8Ř،HȌXhڸ>8x6X(x؎(戏hxhǸ89x >y8 9rHɑ"$ɏ#i% (ْ*13 ,i')ٓj>pBYkÓFY;PK[< 7 PK8^E$OEBPS/img/user_and_admin_console.gifGIF89ais{{111ޜƜƵ֥ޥsk{R{ZZckZsk{ZZckkk{ckkc{c֔sΥƔ{RRRkBkk{Z{ƔƵ{BJJ{{kZscJkkZsJZcB99kRJc{cBJcRc{skZkZR{kk{RJBkƔ{{Z9JZZksƥZcsR{ΥkcZRkZk{ZR{cBsZBcB9JBJZkR{ƵƽkRkscRƔss!19BRZRJk9cckcν9Z{{{k{Jc{Bs9kBkB1cs{sZZkkRsJZZ)Bs)Rs)Jssks{!9c9Z99k9ΔΥ֥Ƶ޵JZJֵ1Z9Z絜ƥεkR{Zs֥Z9ZޭZ11k99kkZ1ck1kJJZZֵ{cc{{RBRccZsRR{JJ޵΄ZZƔΔޥ絵筭スΥ޵)R)1ZB9ﵵ{{ֵ{{cksRZ{{Zƽ)1BBcc!!ss11kcscR!ksRZ{RJ)c,iH*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲ˗0cʜI͛8sɳϟ@ JѣH*]&~jʵׯ`"tpHYҦgAflƵhѺlE߿/Mp_?:hجܹǐ#+׌U>9sHgcvk;ӟSOFX݃x){wD naaaEK\oУK.PChCk*lr#3;HJ_ax~mA[oA;vЁ:W uVhBBS!Y%AiY:Ί,9-95#:w;Ըb~ԧD:n8PQIB \(`mWuyhYnR&$em9V=x O 1Y\j 9(>@3WBF&{9a{ p{"^ Zo  &%v:]\v*Ё:PCцɉ[D Cx m5jB<c {N4ZN3i UٍjJPmY ߩv, $ W[[&w0_x!po'(l۔8!|+13=|Kj;:*/-c.do7cX^C!\k] \D@*E'=,"ywvmvd.+wt\`'v{Ǫ䔿rͼa^sv vs9<0x{&C[hcY(;y@:>PVY Dwܒ#T ύ`'t}mcs޶o_t9Ü̢)sa=3B(ShSi@3ug A$ /!3GƮ/mRsAxa#=O OY!7!3VZؾ#37qVAyc7$I)&0AՐFkw`|f$)'Y9q@1djdF\ "[,Ѐ|^@&9 Τ  %𑐬R9J~.s% <摏R>QCA(0GȗjځeT \? qo ׂ̫eБʬf# <A`K5#Ir'pY˞y3ϭffpxo=Q{!ʌXFC! c@0vJ4,ҁXS:WyiN0%$m0 Q!0]LAVRDj)t49TπMBЈNF;ѐ㼬1LҘδ7N{ӠGMRNWVհg=h ָεw^׎KbNf;ЎMj[ζn{MrwwvMz7AuNO~X'N[7g GN<8N0̻r8Ϲws=ЇN?ї;"OʡN[XԳ{`GNB;=jN;vϻkG{;'OGϼC~{7xCOқޣ?Wm۞ sOps%0d'?w6?mtm#;׽~/G`'{x ~l~V{m'~ u}Hs rWz 8_Ho؀؁VP 2xlB{G~LXn7~up_ؗ;}Q~G|_c}2X-jh5_Hh؇rPepņ`Ղ+{p{^Xׅ|(}K_ad_x{X| xY8~P_{zȂ_ P|}rXww hXmQ('Ƨ_ ~|P}w⇍_~{㸂׈ȋ~8xxlHبgȋЈ_瀀hxxw~X٧{Xx}N8"%Ͷhx|w+X|{(g}(IθPHœ_?i2Hf|yhQIS a>Hlˇ?{PIT}׉m)]i_iWb||}gxY_sɖ^c b)W7Е; G~6WMIW~*{Hl7؉C8ip \9|IȄ'X8p.(Ɏ )_)Si7Iٍy| 97멌 tyY|Y{9 ᙞx؜湞 9: 39} 9/ؠ-Hן&yוؓx Ji?l噁/ڣ@|茔٠UȝMډ NPʠh*KY9_tJؚXI}{||JUzϙlE*й)Z(D*|)ɚڦx șBhl0)}w~ YE|&X:x:ꫨZƺn{ʊ_6\e_ɊBى P\ڕZ:*釀aiɩڭ>욙ǃxP*mj|'橤 {j D{ Ʉ+{l˜|Ȧڒ:)؍9 +5Kbyi~HDpt y計~Lʗ(vxY,{x7d;f}uJ}ZV+ Hd[+zIp9PǷwW[8g+[(״S{[q z[pGI[jq«y(̇QۼΛu;-{q֛۽Kwz{7+w窸iZ~m p}Hfv9 lAHǿvgg:knEhvIn x\mmP&|(*,.02<4\6|8P_繿ꅟ{uv`_Dنlg+p'w)X9z|tC87`h\jVm v|xz|~ǀȂ<Ȅ\Ȇ|~; ~OȺYFX?*]{KHۏ,_~Zlɹw,ʘ'5ü˾<-^Up9[|%+\ ax9(T(7} }|ۛY ŷ]9͉KGVyʜHΙꌝ_ Цjp =]} y9,|5zK>˗ΈJl"T7 U` ylm0ELNPR=T]V}XZ\X0U,o"*4>ʩ/4K-jXI .:hxs='ζ^؊،؎ؐmoK _ڌ-]\{ktMp=)݂2̀+b:q̼۾=]}ȝʽ8`݄Yx*V굫ݛ8%ljlD͕h-ޓӕHΝ}Ӎooͯ:ƦG\m݃{G۞z֌n(f\\4+^)rig͆e <D^F~H^ƳB+&gOک ҥlqMd ~\%ͲFC Ѫ8h^pJo^~芾c-o}K4ۺ~Y~~ß{cIm۹s͵QL|AjcLy8lm}. ~Ȟʾ̮ݛ˶X&^~b>>+!n Q.Tv~l.n?R>lo>e .!=~! 8@+u2?4_68_ f 9B?D_FHJLNPR?T0_I !>@`b?d_fhSƦ]oq/Kfw_y/o?/e{j__2O/POoDA/?P Ƿ_IOoAΏ?/R_ 0/_&1ۏKO0/ hA@ DPB >QD-Q#./~$&H%MDYɕh\ %ɘ0Yl˝UT8H]'2 ,`@VmݾW\u9lQ݆"VR09(PŒ/]ZfQʐ #WfUfeW4:lh([lڵmsśQo!;S]|#..N,mVv̜խW$ `a↤^]uݿ_bn4ȍ?O20,1o9c M>p`x5Z:ġCFdPBWdE s'nq8L80qF#E(B0Q " +5<%3L1qD3M5dM7פA{n8 Tj 쉦:O30A}NBD:dQGJ@b6 r RK RSOE5UUWeUW_5VYa-s}*3\ܵW_}Mr̃<@, (D$<*0Ba6jhVV5_o\s\[u%%Zd+@M4Jhg]7`&`FLne\8b͂ն!0KGxǮGYbg>;Szx79H5(@g ! 4>|^=}(, Aޥ~HX%`&YHc1W; D@lDa U6 ` e(+*(9 P ̂hmq*H" n_cg²i3DcTC`5)iXJ\ؒ,XWh'n}ph+` Z $yB1VҒtfsѓ r7"hw,/ "@j2'>viGa $ؼIb00%*Mf4"ʩ\%ZA!Nc@jE^ʢ)@O-4XHMq!/} `m \f> C!!>ɨf.DhBwFܐ~$98"(K5Dg+ !Z;w AO) O135 hL  ')RbӀPpq|ba9(T AӘJv:E+ ›'/_ւUFIo5}kP<ЍF:e%Bdiir$hJ1JW5Za#?GpҜuM]ב/{o;ܡFJ l: Q^B@v]t0/E;VEoE겵m f˯UEn[Ix$Z(Hى lDfR4v'XŌ`wLozp.t7!{R~:+$p}cPʂS,lJCV h .XM<+nڶmb2qTz WC&p{)ꄈ %Kj>5]:ZfN18)\g9c3L\ؿ'3 T}lS/'j7C(D>)GۻSG,沢0x 9[꒓)DT>sר'9p4!!g@ٙp;(=%.QTo-ZnT{]엿MᏲegJPDY2%;J61 7< Sӷ!|ey7?;X}ݡ%?:+P67i4T?_/|]ZΎ<{59Ss +K; `y DCIUІC*u8yԙuÿ=/[ 9+>X+>t*[!d%l!Ӷ$|) ,$ T #\޻+_¢yj7Ai8C?.(#¯*A$@t5$%dF4 $ ΋sx;4p .A #0l1Fz8:Z?KEJÀҥ+DC1Z`ftghiF|klmnopq$r4m H I|ƚwFGxtFyƛa-؂BQ! DnH XyE-*iftGGFfHH|H|G,ILsȖtɗɘ_ `5obDFdɞɖTDYF-"ʢ4ʣDʤTʥdʦtʧʨʩR.x'Ȭ) hŚMR0uՖS243MlS7LMwtR V ;S<=IJcA s0ԝAT]$ڄ W0Bd|SJ=IK}yԙXWgTO}`48:p"CUu*'CՅYU&dMS^!H9b%/6dfVSAmњy8QF=4qr%Yq= ?8^ PuXy]R&C~NN=]}8L޳eφUf؈u 44ҒtSMuR))sdQ\%hNYjYNZY:Śц5sZr5e-ס]9פEZMs_ۍ=ҶЩ?CHTQXp'I?4(ݟd[}[,%6]%O Vy:͙cEY AٳAԙՙ] ]9ݜ = E`}^ݪWk] QU-ΰ}'TECX`޶^*E ^vQ Oe-ւ !j`e=&AΚ9Q!>`zimN_'0\5Z=Wd+^]-^shxJߕ aMZpU 8>7 BA.-cLc(aN(> 4Udh P%1naL& .>EOdTaR6 ; Ufe=jhhh$'tv?Yn"6iJFiΆΆm>9u$ngL~g6TFWi4jF@@cНSIZ<klk5"k޳ n땦k뻶ߦl 9EEbi†yFz9.%QZ==^bmPgm`?^/=mHmXmj;djw .j)&ۆkqsm=n*iVS6nHn~Ci 9n)P>E? S.U@Lkn!B -mGmnd&bU~g _Xp4@=Hj7A?fye&;DVoHmk(^prQ/b 0&5s&iSo.8՝9o*c&@&nh@_@A_!O 0tBD_t'oߎJpLMs}P/Q'5Gn.VlXo?8 ] >?v_vbϏn[=d)-Xnݎ5ILLn/owPwQ%4oMw^.^O`Vy;6Czw^c}"ဧ#x #pfWGotuvTKl.gzv p0WQG) 67QwI]s/cy2ny&G'wvv? wz(tOxQlȁ@w ڰfX7Q:Nj?{{WfCvotvv/ x~A KRÖv8TS_?W[t }y2XwR#YoW< e1L  }OxjZ+h-B2\Cʠ&R5 7:`#Ȑ F,`A F6yɁɘ2c6i&:9<'РB-j(ҤJ h:)l%rPZ 11#5Jp,ܹӅKҭ .^]M+<0/N1dő'Sl2̚>9p4iL>Z5օ_*%\oG [ٶ $h0BHqűT2*_1$v%gh%ONu"}͛:g=6?Tbݪ0BaE'^QZm\IT^xׄXg5@cވ؈ b`!%~"1(c6Zi>fk;ڐEY[gLpWA!Ws=EiTuفL %,%癔z<^uy'Շ6U(^-'C = @ 4)u]ҵc5b)(c:#zkj8ɣFA5lVJv&pQS%rf)sEeu)&ܙJt҉&m'N9ٓO5  (V u%o(k|lH+zuQrfXf"(2*+-2 ov#i8I,l6LdgJi-Wn[~;ݗʍ+H3xIL" zsr6y' [Uug-  Y wZKLWƠpP#e:([N9,ü9B9,Tl>~nܔ%- 6OSW *29׌8H:g+g{{ϩoC6je'`mnK%q8~I2P䪓Js; 7?˄t;AWBgr0 x 7%(iQW֭t j9V*dkI,ty寉 )mn@_c}K7.Ή✸?23щV41"K xVٙΌ4: ,L<Й*3 7dGjQ鄸Kx绨1:` P@F0PA hD$4s(g=vmP]F1P&Q0|#6M\s2{ r '9vx0 DU;$lZ;Ux!IN"Qp2XҒM0Xu$43^:exF%a4^12b0Ι-4CEMts66k o֌t<ְYNq8R!aC$gGIY29\!.OtSӎ c€0} 00KhBhkCJ`le pKN&VIH ORDA|P%5n`> Hi2WL.V(1]Lc6cx*d}-RP0(4a=Qi]2nLS)2+܀/Qe]W 4|I P)GjrČ= .>= ~U RR 4+p?iFRœCcT¶ïM"(bZT%wɊdDM P7Z(ŀ0E1 cL#z=w0/ipVTV2-gy0@"P߼ط~b(F%l|V%w ,m ˸a@8-hZa81f̡{{o4qTdx2 09uX3`iqy3d/:@s۰O ;/Sֿ>sw{ftu?;\w׆/fqIl<-۟ bb,AF (`hA,"*@ 霄AB@5\ @^IYYd.!6>!FN!VD-_f]FqޱX(UVtL/d,!xvUP@^):[Ŷ \A ,4b#bbp ā' $@`G `OqHT)EeJ@\%#11#2>!R B!5 PtX4XB-4L: @E~ l[#n[ l]@ c?z? $Œ  @@J <'%@Ŷ݁ A mb. /TPn2NF3 3Ea5w܀y20C38C3$2<|e::r# p!b#"."mc x!$^@ @cA`D@4lAFf۾ ֞e}dR| IRvZ-]g?ڧ?@B'`~X%U`} aH$*\ B3 h>և`^i\&&VHd~*̨O(8A#]rh]JO)$B"(̪lBtj@: !n$[(%ec})|#v 0f~@a@`HNe"(P4letF*[D d]ꤦV/(e(6쭈*Q6QRj騪sj"2*0 y+&"6►&|g _gVkX A.d`0 @Ԓ+ X\Z&lJbAZQuԣz(ixڶE݁mnn2n9 v*[.YkMcƮjr!lCBtE؈^<,zFbݰ%{ޣ{By@ %}$^iX ,] FE@BzegX yR$H%@ P(a$]ʱ0-ZVe\eAG#  0``@AK*<9Ç17qƀ15?1fjԐPEZ"F $dVj5BW6[lYZ`ƕ vKI\ @"ĉh qcǏ!G<ܸ]RּrA>7:tiӧQVukׯaǖ=jhAge(U&Wys D7;zub!P-o .hZ98ႀ" !F4,Ō-^X##I ThI$*8p "a >jZJQ$ -H@-+2H+5 B/;L1,H,.#l̳nM)+v&lQJ3T.:k9)!ࢃ <ȑ- * L-'~i1yU ©\.h!!ĭj ũ+$lFB2.,a$Q޳63#4wٍ[n nm#;{_._~ k;;a @a&£[0患@6d EO?}yAF&pYm,pj~yWH|ں ` zt "0G~"^{6O_sχ-W_r'G iDTQ h):"5"%!VT#ŨF37,D|{)8JcڕzݚrSSTKPITJ@e 8AڋR=yvgu#UB] 3K5[ݺ"2: Wr~U!`CYL #H8@k^.;=wkfvoe*iZԠek`ms&ےejc@!pLW9ntA!A!\X=kTx&q Mp y R`$`d!>ֲd/yk.Z>Ѷ g=}`6N , .K%s\W!:@dOZպ43to.Nw7t,n1!A큇k5|M`Hteg@k`ŕBiv<(p(&pn PBp!~HBBfIXp.`ڼlHNyHJ/p P렯-}v - Kc  - .` 4-  elHOfPa h 0q)RBx+k)aR@ !@0 dB1jHQFz!v*\{!#g18|0p6"#M$O@%U#Y$[&]R&Q$ CC/MQ@<n"Nl (Ih?igvzp=&T, P`+Eij'bW" i aRNa Tb 3j jҭz "k@=#7#$H&-%c%g2%7s%-$o'L'A' GðaV@͹J$dL*2fr+ "U~C'*Ri>CfDa 2DR6a:!17!NaZpkDvL"Ͳt/N2#@4@t@ @ @ t$O A$A@!A4B#A44EsH3AA4DEtDPT( :@L@g")RD7 o'I'+)ZUВCWH8KSj ˓/ |˪"c L"U`$I4OtOT2IAϚ+LP. PPQIC7:T7?ޒTT Qc,JPtPdf` %b=* I,W;!J}.PuYՈ|4/`gDGMeRqFĀS$-u2OAuIP^R#u&Cߵ_@!RtS8S;upCb~6G)AF^&dGB mV&x5Jb"J&ȫYmYI: BLuYN݊H" zIa ]=_j۵j5^_#_Ul a@n```nA0vc5O&~HE'd Pda=h*V:XW&!̫s=*+Fmh/nskڔR (  &6wIju7Ob löV1Hw@Ֆ5a?PVl?6dN?f"\TWAb x(lp` pII@ ,)7D>`)sHaX0<DMMzt.h jwww9Awx1_l?=` y60>>&;TsUGa&$$HA  w ,+&d~ijrTʰ#@ s5lD F@@ά"))jR=8 4YkAKxI8}jxMTm;1v (v'T%BRE&PZJ(w)`JyrO+ Z=7Yj.@ `z>`Ug$j+h%9yԏW# 9yYn xwpم:@"y NQN6d 7wT>dm8!D&~)@ *A@ET`ib:B~DXjA; ,mgYѥYQvsL15xYU :z!,uy9_J'6Coy GEb | vBI *!bE~w+H$DI EFlJI =A \!xZQ"+ڲ ,w?1;)S=[lMx5vx7[wyPVoVybK$ڟ#~ptԆXIٺT~~I7-7,|n//l$ex Lﰉ!x[BuWP+?VKo;{<| C{t;wQ[Y2>` #dUR&ok @ IUe((.IB 8{baWB~/->ì[6dp똰iĀv;پ|˹˽<;7FlR[!V ovc^fTD\Ap_&(qs% K8qXE$1x[pE A` @ȻTkTX `Ib)gpDofϷ|zS\ ~3Ћ:%eWlXݤe ry*κ{K>CIHqԹFeh֟`g]F7>{ö̅᩶!#.&J CG2*{AdTS|)ew ,@rS7+}ŌF,MO;{yX0EqY#;]k#I/n^-^ќm68 Z0RR$o*8CffB ])j^xlP]`7hZ)8ҝ `ҿ"049/ X߃K]F0{)FdRHDD3y}%>,?#caj^;DƮt*5'<ַk(fVjh&+$_} mI@& %E E ĈѤ.9tiN>  ƍHDǍ$CvI2% @Fx 3&L< 9y 4СD=j4%%8} 5ԩTJm ֭y 6رd˚=6ڵlۺ} +׹t | 09p؉8 s` 8Flh0:k :4>cc>&vemnjv!!IR$?3CW'L $5@ `A >(qS'C#/4YR(+_G6LO>aNS!aHaUWVq}b"HblubVwE.cBI@Șc{AB $`fAgdhtk6I)[i[kDAp%sfsn1DqvL@ ^BM{IDIewgF 9F`L8-HjVa& k b(؀O+8XK YhxPdfZ *dmU1]% jHE;-gi&o)g ,`SI\BoE60}R.xQL (jˈj]_يr*r. s.2s{ $`Hh6m1kZ ak%0 ^d yܺ&!k;oQ~w^$%!RK*RFr+ _ 9_TJ2y%E̢Nz馟s-yJ3=80tYVVmcl0X%1`u [U.r잙m]o#b7xF5 `48Go-AqxRu XEu/ N.5K BŎ1CF``wgh`kk ޕt< y]ZĸQcP6]j6K q7="!kđud瑹EPU<  71q܀59($A7 !)?E\D*2ET IP1%܃a) )/o>k%A,cG5`J D NA .(SB@xiEh|sH*K9.&^FȔ2T'J# xev0]uS',v, (8)xMjn%5,[4)MȽd%,{Nܥۆ14.R$pyEt\Z#IDR2n +ƅ p*>wNu곝Zy'Uʬ\jV2J_jjVgVyyOd?4i 0HdiI(נnդK}&O](`rL p! /) 0=%*M 7D$"NY>RJP}[ZQ;$#S!Ժ*"*#2u.`XKg]dekn"[U,ʍ$bGM9Ь,)9Cx+[Z3 QF:``TŏDB  pHd0*Q"QZC:,.(sb0j4˒K*nK򪊹4'U=$vլn-+ ^Sf"V*WYnWJ]+s[v2e*u_.eZVW|GX/Ёh5*1oߋJ ` hzjLX1r]Q@^{ӯAɈ7 bnm3nrQ'jx#k$]瑻䳲ի]n]limjK6m[6meku)jj>$(wQ!mB< 45aWSxA^\KWG9͡V_WHLZ#@3KL7GօBӀZW#t7Tr}a#TDsQDodnr]m'sŽvvӼfje};/t҅o=J@)L@ 44&W hc;bcCIXEej_3l5obTlcw0d4#tA~nY6tcՍuS(vWgfFCu~W?@o04`hó5_QC6d<GD .Cy,vyPyM%g>28gr^2UD0V@{p?w{8{4G zw4.!jed| |)gd]w~v^ӗ}Luu]~mև}}Lv|4WyGwf`1vnxhhgjlxP#&E9H^!C|j<qy )ᑉ^с_H.WMa1%F8zV[2{Bu1G߄TͤJ? $|FI϶~Jxv\epvKedv[vTufVV7jV`fեfm(3w6ehhk(xcцHoed%00pkP$tPɵHElGux:ONYAP9Oso}tgt8hؕdX^Yei9^_zI#0"ITtry (zG$!0Wy'z%XV@Vb39@4{5))Q?E"G錐L9:^6V,t7wf)YG(Fh簖a&q)>%@@_ xɝ4k_ 阍)''9(%.wiy(FHs1c9D$t$:X eP 0eP9*eđɘ{zK*mz4689J.goа `× 0ћ콏{{<]L9]:RO*I}=*!-6a6r=ׄ D} FyG ,?80" "G6{ ør۵}z]că: )Gʭ>OA/b݌q,S=8m^K->E8MiƄSѧMz1p3Ӻ3.%8^,%`%m>ơAި}2Q)v!rT)wxI%!'~#)n)MP1ɐyb7>cG[/bP0P)8R0J%X]cl%l[' `R ^@ @bbfNi# ag%~a{޹|~~>؀N#CuQd1i֒^"aGƲˡ1^>S>T N.9P~sf m;^us8׾*~"֎]؎tv+ouig~x}h}m.򫏗cP#|,ێq=Q 73S87^F.p1=?aJAX#<ы-@ opd=~3~nFOh~8vw]󂭺{J*f?8";U=Kw JOMÞ9gSCi+7Ff-W:!Qek/Urvy3`ϿMq,č>ǜ3B?V7g再,?ox}X$O |RP A X'8@G!E I <pgb kYBXVmmMx8q;/ΜyС?\yuh w׿?^y՛/xHt /_b4* < 6L %cZAN Z+ 6 Bb)*-"bz1K.`qǪqa" 0 K :s F A,6lK$a4 wI(@.hm>5yM8s/<<>?O:,tEQH#eo IO>$ˆ%(bɾ@Ӊ xhY2UXpĖAR%h`'OÑH-HՁJdCڒq++*i6jǵj+ǽ"@`"=r¶XI aJ pFA3. x¡L<@)c(6MYӢ9xHNjn;F 䑷ndUNU^>%n.R{vOOH//TcQ=?O饍!P@؁X}>GV\.(bF٧Ykm͵mlǪZoՊ2.t}$v/$7& $2F<Xx?d%b8(cd g{w޸:ӤϾNi汦衐g렼V0?V{t]UߖmK} R$eE])^v)NDb\9"pOu%%sC@i @"0CBdd!+lݎvrw OxDHq={<]DmO^ԪhU ǶYek+мMc<5DPQb˵HP(xY#`#)x]1#a,w+ `[hJh"A@^ΐ!C!(D\R-#%XTew3̲E1TE|ZHO( E8bMtLABdCqF\vcHq Xb HGNJZR : 4.KI(_/@< W)!|,9jZG$iIM R4U9y̖jM<$L1hl5Ӂ\~1Nag;Nxʳ 0@:,鞀ɧ>!iĔdEyIT! BPANp 5G=8T8)=ic<2h Ѣ5Qj,,k4 98뫕PbTTr:bĬzUh,#9 A1`Yq9PTz 4A \ hȯ F`u YQlp Y509KSnӳ3gF*~Y<Gpk_fPS8YpoxUmi /+])syr)ČUUtpX7 JNSPj7T(h e @נ!oWr#=plD:D^TYRϰ]ڱ"5>dZKmJ6=-OSA[Zvz*9Y9V61N<,?nsHsנS@w e!+2{^RR$؍A|kxCİnSy_vϴ==6"ET6ne‡n!i!Z>' @iU7[z]Sɨ=XjZ=KW/N0CXk098OV:)T9@ N#`@8v2XuQ(} `**\K a_kđlt}[8Nz"" SQᆏo|8 ~ㄭ^uEzB:MOϘIyKcjO&W`n/>?r?PVY~`2ІpAAxcZ`|7׮YԡzgƣWy`j:IQ¸ӯ:b&PIs [~.S}>a!ȯ 4w<TPA؁2  XmQ@cp !=hً= @%=ĽYX @`;s HK>1- s ˱Vø|҃#=%3ѵ[s9h !0/X.p 2;:j |9@ Cs=࠺83(A 2$ Yڊ ʨ蓘64A|8< Bʲ6Á.&B/P!@ /L 3A P9H50 :Pԡ7T=L; CKhL*?䀮D40SK PH4;PJDKlL7Q;OAQ;W?82T,BU!pEOS;'<[T0,4& %$?(胑xȱhC|FFFk;CFD??< Y@ 8GPGjB>y/XD}D~>NdĻS8FZ(@2`H!8ĉ|Kl9T ^| x:X:71PfCD"BI%j%y,+ ,ǤT 3J[p ;;JK ! (89T%;M55Zj#W  L , 14HU!V7=Ҟ]ҍS\Ϛ_Y]֝ahF9R ҎYC۪CϼVD78}9}Fd,JՄPW.{/ڮŲ/v`[ڍU؉ C*%\NXXlWT訚U5]c]a="bF+UAA-Œ{\Oo8P誡UCA\;]r  5A]]ݳXݚu[O8KP(ŀۇ[5ҿʥ%\UEIC9_ǽϔř+mǍ_fLgMU[]t  ʠ86ֵbE4Z~_ÅX+SSc( ZH4V^^X=^9(V}Y@`a_E dG׌2ʭ5 MVwtxa)].ā0"H*.aXEὍ!'>L1?b_"d]\cUaU5_Y@\f:=c[Vr4$Vt$ PZEeQPxQ`-Ec.߼0O4^1?ҽ#d3$;btLPWg>gtvRCطāTOHH9Ȃ c,`546U[ab6d҈Va@J&_iZJ\ k]SMPx$>h~9@2*g"X  3 %xHɰtgmh)~hja6nMGz k ]n5nDݯs> 2{˜N|ij|BE!X%8&PI“JYMajCv6fkЈ"Zn6>xd);mQ>UF˾N/#lRS 0"P(&,l.alE.$j=#pb"du5 2P1ZfDMWve>^]<=X0Pn8&! @X*bFi$&qqqqq^"Fp0-hWZ1E1H2 ! ]* 9`gH:36`} 78X q+tZɖ UXatB/tC?tD7JDеi~(koBr (>SkG/. 0h1/s0 3 PshQ̀4Hs 9!8 TOa5JtfovgvhqImtGo[tv0 Ntt1n ;R7uw',H4 7 :6u /Z@,X<+ vas j"MB P@XDG х0,tS-CZR[}Y`emq^:5p A۹iqF;㖷߷C#Fy0t>+.y`qS IwD`A LVSꩧTBT1{ ^0]z'I Y,SL$(ogwuYX`r ֹX/}QsB(p VPI B"[* sڂ7<-A  ]-,*"{2=AnK A@PI:>8 pC>$_غhC"R4$6 Û ~*nR"ƒl1 Ϊ:b:aB$@p|wb9!8GQ o* §\&378U e &ԌyL$ΆP+D(B|X( $.W qd\TIUq"4k`6h>v$X5!ԒADr0A q[?Bx pN+XA=E$&S%:I s̡@aJ]j :4 p`*n 7Gy3RL%" J@Rj tp*=H 2`W < G)UlEvc],cET*S&D(Yd أl7_P619EN|s< h<3m/|8&p %,z6uCيNAO<%!~^$\.<0¥ 'e8Bv %ǚ|`^z0Aи0H4V`N@Ab+h恳]A-m /{_ .Z$0{Ef ٹf  s12aIQ0S%T'`ѴޔKc=!f|;AvWsdL$Oc2:O2pkLXsZq[c=(쳟hVjFMa2n& ZWw5-EA'h;yxT"`m b.Gwrah-Ue}̾ m5)gC;<]k4!j)S+@nmu\ш,ӊJn( '1 !?j2 Np"qBs J_:ӛC=R:իnc=Z:׻=b;n=j_;^=r;n=z;C2a;^G;xŷ_yc><;u$|/ʛ7Oz/QS۞:!O=u{>_>OvjGө{C^ٗ{_{7>}'??W>zү߽[O^9_U轞 ` =&  Bm`F z`) ` q_ _ "a n!` N`]aja2j ` % n!~a`a !aơZ a"n_bb&j&!-!:]^"" ab")vaR,^ +_R` &c100#)r!$." 6Rnc-2c5 7"6#8R1;c%#v =#. >!0_ >0_>Vbb!@V &'=@F R >">@֣ "Ca$LNOaFdP P2MQ"eR*RʠQ2SBeTJTʝSRUbeVjV*UrWeX%Hք XeZZ6%Mee\\ҥߕYe^^eؕe@;PKҍȍPK8^EOEBPS/img/sysprop.gif -GIF89a=$!J9Z9{9BJJJRZ!Z!Z!c)c)k)k11119J1BR1c1k1s9BR9JZBBBBJZBRcBBJRkJZcJZkJRBBRZsRcsZcsZc{Zk{ZkZcksck{csck{ksssss{ss{քքބ焽猌ތ甔祭ﭵƭﵽƵƽν!,=$H*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲ˗h@͛8sɳg1`qpϟH*]ʴӧPJJիXjʵׯHѓYM|]˶mP,ݻx˷ߥ~9KxbhExs\XFV@kiH&{PF$ T6MZb[IPՈh!pEH1e`xygv򙁟z砄j( VZ6:Y5 i]2%NUTiU)KqJje^u)U~iP歷Rf ,&,M۬.Vk*Q(j`~:n ժɭR^ꢺ-jksp K.Q4;dwPqA1g1kpoꨤ**i/o=, tl83]?#ҳ|45gձK\tW=cK(ࠄ}`xww{w 8'>z7>u)-4Ϧ&4Ԓk5r^ӛOw9Tk:阣n̺~9ٖ^zSWe&7瀏{0 IݚG/cl_}"p܃}_O3tԬ_ {d_.z+S5kG-~as`6o~ Heexq!.  0"aa#H Wb,/AX8І5 u(Cڰ@ bX@D?4E%FAK(E*FPlE%f`x1fRbx*2ьklH6Qe\hG6:XtӨGB1t"8*IQhIMM,`$ ZSRDeJJVAl+gZ̥.KP?L񈠻v:2xlF'`"v39ZPt@wLe3fƉ;I%%rLj@P@ `,(`~h9P^A1І"t eh@' PJZԏ #(F<>;jH9n1 WFC‘m#F4)L9nT=)PkZRYJҦ^l;ǀ M.A0`V0S P*8JPAYf7z hGKZaj=kl_Km]W)6MP^1:Ѝ.iyKZͮvz xKMz$ặ5Mz `@ͯ~W}^uNW{=$[QW{ΰ7{GL(NW0gLőЍw@LdKHN&;Pfr$c EXβ.{`L2hNy6pL8A gx:πMBЈNF;ѐv&MJ[Ҙδ7NS:ɬԨNWVհgMZָεw^MbGxJMf;ЎMj[ζn{MrNg< 1η~NO;'N<8`{ GN(?yP `XygN8Ϲwgנ=`@|{HOҗyнg7XϺַ~ i@NhJ.wC;pNvhlzu 8x7^7OJ2Ear_[1z΋Q)=Rz+EY[xڿgJ%zo|}z(Ƿ'/s_t_]}χ>?ϾG/ܷ^g{X{h{x7GK}}h W({Hh&x' {qpi0)|#87CxHXKI8HDN{|S1؄^H}WW_Ax[ȂLhc؄痃Qai6iyi1.XyQP(w'Vh0hr8嗆p舞de؈`jyWhzxXahȈ8|zXl茠Øe ǂȌ؂،ȋXj>~ihQRHH؅(hxG؏(ۧfxw8XXhȉ8(XH 9$shAR() IX;ْY؉ (ؑUQfyw@x׆'XZHF*&T9爭:)ZȒ_v؊HqɋJLYiOi}۸  (]YR ay\xy(B)7xY9`H8޸-5ٗKїᑇHfI # ʹ"Uɜy^Sٝ⡝BǝYy!^@ٞZ Y)tCwџz1 CРAJy&zHG /ڠ-J1SW(ڣ>zʢ3ڢC*,zD:*t9HpPVkWWpശR[G`jljf;sGipxz|۷{+At;pg~{K[v;iut ۹ ttۺ krt)ۻ*k,ȋzۼʹ<;ۗ{ګٻ[xw; w{[v黾ut;%{#{ L<|   p_P| "<$\&|(*,.02hNy<yMnuHJLNID@L:kx(F\^`b|&Dx@OkT1[GInDhT^V~XZ\^`b>d~wK~ onpr>t^v~xz|o~沝 xP~舞芾>^- .Șݚ˭uP`y>]{Qۏ}]%޽[H V~LľvT.~nmw!ڣ ^~ŽQQMŮ?^ɬya~m߸>߽JϮ^ʞ?$O~~&(',N|q_MН%_#/Ⱦ)R-_Zfo,?he"MtoJo^ `!WelԞ3/gTX?o\O%wo}GoO?XЮ/O^_ˣ?߭M>n/h/ko/rH_ٟ Ma@4x \ C aE%t!E jHɎ]RYr!5męSN=}TPEGATi=xQԟ!ZJV]~ېfXe͞E`ԨLBev*֠tnWޛcXOK>-VYg-yԀb['89 bE՜UXb0^L;&8;s9ߓݗSme i}a!=gm.X]j8]YꕗeLjVƺfV`Λlo(ֵm&Ydlu6)pEM;Owtm)g}ih_ ; T`_lqܿt\?xc>z駧y{ŽF/i'|G?}W}?Oߧ]@5^Ј@6ЁTxqE?`5Av`t*$mɄ'Da UB0!sUp*.!sb8`iqP:W]aC^AVZF00Jŧ`I.Yۿl70͊X\3æi)bBȘE}WDonbx*Ny0w$fC"6tX̑k`%-ɝ<3+HAZ`/TD9`KȣMfKHX_ .b zτf49M,5ʹ4NNr3v̹Nvd0Ozr bJ>z/LP 00P D\껛 hD:ѳ,'l22⤣q4C#:R4,GkHNT")DM:S0avj98D@Tjک#&Fʱ2Di:i7M yQS#h&_ Ju"U82mAR>1GML:W5'dY֪ZU-miBSV6U'NWB-XŬMTnY=ʵ/Ee3چl(* lR>umlַTo۞׸)q.׹isۜN׺YDeo WA5oz^W0uo|_ַo~_oAU }`(>,]W10f.2s1NHZ)Ɋ=b#~quc<9ْN tCd&7Onra#/P@e.CYTL20sռf64s逛EH3e6 y,`:ЇFmьvCOMK;tӟt:eQAԥ&uAiKEִ}9U:ԣ65iVߍ0lbd.v SL[tCmRs[=n8H;3eMnv̷ζBd`iwo~q k{Fxpz=%>q|3/İqwy?nCTr/I>a)yus>0m>ڔDG:^/MwuNϵ՗u][B7˞̮uwugNSݤ ;PKP PK8^EOEBPS/img/idbr.gif'GIF87acks9ZνֽƵέsR111k{スs{猌JcΜΜƥcsck{{Zc{{Rcssks{ZcssRZks{BRc9BRks{BJZJRcZck,..Ϭٯ.lmn3kgg&C&͙QïÇ#6hŋ3jȱǏ CIɓ(S\d3g,0C3f@Fω} *hQ"5*RPJJիXjʵׯ`ÊKV2dXXBƋhiiWeJtoٿ LÈX-T /ޡN1|W)̛^TϨM[:װc˞M[(e; ʖ1 M2kr}x֞N뵷孅.[x^sÍV;FwXEZwy|'܂|߅fauSPQ[TVTXA((D(b/c.5"5x2xChH&L6PF)TViXfeO@E^ &R(N@#o9mf[矀*蠄jK袌$Vj饘f馜NyL*M8馔vꪬ꫰*yfj뭸暫4+k&6F+Vkfk,v+kr+kb[o,' 7|/G,W,gq ,~L(&0wr484k`'KZvf7{AGZnp9xW%ΑlgKe"nwz]c[ȵn\\&+tKZ7g$8:w olk]mMzwhs\|Kͯ}-yK%@N; f"'L \.5v{ GL(N/\2,n0qy],0wc(r#b[G6V%d"7P.֏ d%rd-G9S>oLf'yB2<^9Xc^f_o~3L/WaZ|g;}2=#|64L,G3oVJ4/J GE|ҙK'՞|wOu{ 7 b0=yys|}OSѹzE >{_{~ ؀zgo'y>g>KׁW~և#{؂.0. Ḃ_xcX,x"X#ȁAX*,(L؄NGug'v;X6`)@__`Xb(d8>gmherRvx!CmwLw3'p[(]a_HȆfxb(8؈x[x[gL(LQ6,CKtutN.@sȘ'$t68Xxؘڸ؍8Xx8WxB78Xx؏9Yym7렌Y0 |vG09$ vI(%0 'w)ِXŨ" R>3Ɏy = IL9ACi+ 9钢M),(EY! OLETKfUZٖŕW-9QQEnȐsuyTjHCY|ty}əaSSb|bĚQ9@{hiyjhHhI)鐺iYΩ^ɑiϹ;iɝYٌj깞ٞ9q9DvYyEyɜYoiSiiZyH),94 zf9Oiɡ* N  &*O`+zТ0jMgkl dJHVٚcDę %`T}٘CK )Ieʜ$bԥZaϩŧTyVjEZ`ژZԥʨ :GZnJ$z*:c<:#J<9pF"j  Ša*;к bIzؚںڭgJZ0Ҭj .jZ٧Y@Z-ZJ=i  -* K ZriL"K@!+l~YZY(*{0JWzZ)ٱh >H@[7-, =[ڴG˪ Nʵ=f۶*)k6v{p+jz hk-筆{ٚI-[[-j;[(:۹;+ u[nyԒKJ[;  9 Un zɦF**~;yXMڳ I"sKڋ? "K˛I˳~K -+T;뛿0ҿŊK?{jLgKZk͢Sv ,Z,.Š.Jkm+k(ʢ1=,;ڻ \K J,IQJ lY; ˴$[UĔ e*I[̰Kţ{ $ ,@\fl 멭ƏViWܻvڼq{ *2Ȫ;iȭȝ,Iɦ, 2$L˥|[ ˴,ܩ[̈́L<ɟY5| 'R̮pKɣ0|Hϸjijl<ܯ<, -, ]b|ͬ=ʞy2][ iEJ(M" ,$ҴM\ˊ>V7+9MԂG V[<-@IjՆ 13ZMAK h< d]֟lmn p=zֽR~׀uwԆ͡؋]^·[הݝBM& kٵPξyDz̻̦ ڔX={L4=P,;)֞ۨULԾ= }2ݻ̍]k`:3;1{}ݖ+MSɬ IKK-КPm؝m}Mߓߗ~ߘ+t4>405p ">$^&~(*,..NM4N8:<>@,."5~~BLNPNNbH~J)[.^`bTV~4.cpr>^g,t肎vi~laE5荮[>蘞隮ny^~>.ꧾKnNꗎ.>=^^~>^(nǮ亞~n^~.7>^..^z^~$?o >_ B'ūv:[&(ϿB'02?4_68:<>@B?D_FHE?މVqN2R_FV5Z.^'b_ Cfjn 21`Dwxz|~?_ot?_?_?&@b?_ȟʿ/f؟ڿ?_/ p mot!8HXhx)9IYiyɩ9qAZZ:`: +;K[k{ ,N^n~O>ұ<!?//= <0… :|1ĉ+Z1ƍ;  Zt)dʙ4kڼ3Ν<{ 4СD=4ҥL/aTRE\M5h5رd˚=6ڵlۺ} 7nܧQIR5"oX`7( aČ;~ 9ɔ+[9͜;{ :2]&B@WY[WbƲ;ݼ{ ۻ?ۿ*_F *HtNg]x-xiW] Ga^anaWZ.r-x 睃A#Hc6ވc7xigrw9 *靎N> eRN!qFPLK8!ffjhe4Xr-^`vr7fkg~i^Ih> i'h惕*l)N jf\j(jPZiJk+kKl.,ȚlNK㳲Rmg~ nu枻-pn̪[ oQ‹)(7қ} -Lۯ*T(l p Ϸ1{,:)|*;2z)lL/\3<39|sq>7ےw~ŃlUWxC_Y107nѕ3=ir3Yg?A.u[{#=s'\ fBILJ _ p4RcpaF Qa$GJlbxЉ*!ԍ/؛ b|,,jH_-Jh|).yWWw?aMdղ2a ӝƣ:GOH)y[G$J{Y'I 8\BN+UWRAu%3GM^p^DeQk U9RFdQ M')?lĊ.K6ӛc,[YGhӎ+l$NPqdY;{3̦+yeNr尨Y?&BOzBT +Uv'BdCI$ V(SKđ:|R;/,iLiwt%[)O-uWGԤ˨BR:-(ބTQIu(zi SeTԠXꟶaf dZ*Z 1:Leֵ\( QLs̳hlx>Æs\,^gMnղ4e *Y<S-Txu#iU M"vԲlJx!׹]ns7"umO[ݞ֏v]QNmy1Y+]s%eo~ x>ZV{(k;Kx={cGĖ69@l<0"f]Q lGCf;LdD"0fr}`"V2um79`2 ' q~_0U7Sdc(7|Y m좃^.QYN{6-P>8VUQ;\5pɕO\Fş=܁93*#l|jt|]2/3],Pg x4ki;Zm-wz~ zyѼx?3~˝|"[/zV<x nh& ,=p7HB)g]g _Oti=~^{tv >v P|S5o?Wo>WˉOΏ~sCkרm.9Bzijzzw=/2mm_4w~=Az7W'w9w@G|g;1Gw#c 2C,*O'ZF5d7F;d==AcC#Fb']OBQW6QT:V(Vʦ[肳l3ÅEke5gY^fPYulD{T}<hSH,eQĈGT$DhOt(pȉB䉟C(xk3B)AHd=7Uw(ۚBD˴cKekg m mro k[nls˷|~ ˸븏 +Kk˹˶x빆۶{y˺뺯 +Ku{_Go KkNjɫƛ +  K٫ۻ +Kk+ ˾ k ( ,Ll  ,|l( !\˿l')+-/ 1¨`2l79;= lP?lGIKw,@UlWY+<ŨPcLelgikm_,sLulwy{} ȁ,ȃLȅlȇȉȋȍȏ ɑ,ɓLɕlɗəǁ;PK }''PK8^EOEBPS/img/usr_lifecycle.gif.jGIF87ao???___///```@@@ oooOOOPPP000pppdddNQT\biUY_>AF|||ڲ욮¦ls{JLRGJQkuemw-*,# HKQ558LNS`elAAF⯻ț97:NOT}uw|>?EQV^x\bk769qz֪QQUDCG}йfhnqu{EDGhjoTSUY`jۚ~bfmZ\at^clGHJx~蕩q|w򃋔Ǿhhhܴ赺HFHθ˹GFHUTV,oH*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲ˗0cʜIMg8}ɳϟ@ JhH*]ʔ*JJ -\1رGA1ɓ(RΊ,Xҥ/`Č)æM:w#2hǐ#Ky %3kY ֭]khB !EҼf+Xf 6qG&NjBƬٳhԒgУo4r?s:ԫe/p7Z53 %Mieٵ@ehh\%jq%&&f R |&Hxv|BftӢUAJZ]¥ (yev&ɏZz\4nr 6)jg(RHft1H"̷œP؊we]|I&]o =f36=Y!$bI!`L z(yx)ޔ[N9r.E.lRv>PI-3M?s-tdoVў`+ 0Jt! Ґa.SN"h1`b%A1%ࢉ%$LSI" q038C'MEkv$ R"[Y "n E0*Ha,#[&]+F==|Ћ: -/rL ̳xfGpD"T !r=f,p~"1<@($\f"L왈%䟈3% '7) oRk(aqJZ4""pP"+K DxCup **a K Ѕ-l gģi A ?NK )hD"Ո# `5`l,1 q$<kH*Dp]_.XQVBM y !8>!E`a#4hX *fs]Lgsbf q ap&gYġ|EaP/ px!+ ;`G<Ml8K>mfJԠj U lE0gC*,@@XNs:s>#F`‚ؕ#{RSvf*yO~2" 1*p>ي =멞fԚNR0Ht&BÄfPRɤ Xϙ5H6XZԨOYL}hX:"O;p^;$y2H}M{ͧ.rd^v 0҆5 9ۨ6.fpZ!l `]b[ށw|o|Y%@8Dx}p+|rnx pGϸs$񎗄9$ b9t0(k@4r9x ` b~h D7zyh !@H@@@ u}궬d L@`@ @0t}p#s@^кhvPO} -NON$I ] Z@@?x$ T׽1,O @o0@v y.}!2 R] g:+߿G}8'xf}txK$bՀq}( LAK o< $%GЂ+d0GsLBn$hLƃL(C!;KN(heS؃3XK W,P$]8fbXK0lc)_$;OXvLnMH$b`z|hJ~٥X8oH؆(f}Zf@Gg7hzg|wpz;tYfK phgs{Wx wXggv4wKH1aPqzЌ3'|Wq㔋xWW'j7t@jWq tWy`HfG0Wwz>r|tzwKPq7!BI{PL7w04k};GyPwvg|g|p}pz/Qh@~@';gzB#~H-a?nXgWRrؕKbyd)@yHbl_)R6ᖝvhsR|9e\0H,ax)֗t)' iR+qxy'0Ii'&њvRYaVbɚ)R9Y'ftI!uf!Ml$:6Eޙ$9 uQKrmY$Мy"pٟ& j"*x՝$q@%b VceP%j <jcATJ-:kpcaأ? V 6J Axl*PI~Fpaobg/ omjWk! ppʃw/֧",x!lCpʩ }UK*g_0kUo x0RTR1P\4T!u"!$kp7uVKLY[%_(8Z+w0/"$Ϡm6j *]SWu./,Gb)puPʂ}TU ^OU&9b#!Ɂ qkToTúRSaOq)&oR$PCDk 0Nk#ұkR,${ a-Yj3k5K7;9˳ & {b@'D+D.[% 3 ʱ/R##[ ;01G"Y"_`Qq`M"'FB 4 "*)|;e<>AB X$1 ˺[1۴Ȋ*/+ q»{z" '_(c>3b(+m+i&o[ Q  +%Ik]N+!WQCT B r_P d {(r彴RLN{cB滳 )uB" Gк0r +VP+b, PW&V|[+Wt%#Uk&/5 dDyGwEyܲ @(z(QѬ/u+QyG]LœV 48[B 4;Kn $O// !pHx xi7^ `l   XƄr 0 HH Z 쿃3>zzawarv(Qb,@00 p ip Ǻ H (33{iw{1Eyew_ ` ;` 0I?U@6 Ph# A8, wwsUyPqNܬ"D p0 0oP(` ` Ľ)LD&S<|D9'||wsG|HV{9g͍TD0 > HII 1-D5=) @8\i@ Z6~8NOwؓ꘍^w)HJa PR>T^RN -P` cXp 0=;D'y@yߪ}wt=|&r5  h p 1N p.H `+=)=C 8 0$j뺾`|,yW|<Iq-}W,%(~؞ھ Ys40 0 ?PFp(@ V` 0꩐ i{OvGx^ Gw&iAvyx⧔w,nP .500 4`0 :ƁP  Qa ` sQ?t)xD x4d0!|AG|hrGqiv'$ VG@  |}Ww`|~-?Lr⨎ٍ(`K  9NڐQS r? u.K`Ӏqבh'Gʖi V2 y Oh_.İ 0 nIᠬKXQ:?GI0vH'%!J Dx%0fG;0sʛ'PSfTXl.՗0bȔaӦ;|HA=7PEE)M%(0Tx@  8@\UV ־W\HE LW/A-`ĘARv#iD"+X(!å/`Č&;{lsϞCj ,Qi p@`08 ^W9¾nc@@0N5U*gѳf.Cǡi&Μ'm0{km?$CL04&ȉ@"$0 ͼh F+4{ϵҀ+Ab9( p#Ԡ+CξüI+яV2K- QFX`h1:0Ί/abc0?Tr( ˄lh2!.)C͎L%6=LO#~TSTUKc ݫ' R9?S49h* PXC@4!`կYш{P$$aC6EN٠aUwKM]y Sփ:ȭ@n(8fjqV#6m鳗6pZfmuH3 2p=,ܒn *ɦRl3Ȳ /t63f}[nrJk5"nR z$ (F@`Қ<er>{WZpd\lr.sz_! ""~7ˆ b7@sD`/5ЁS_\r58_&¾d~>uFA0a Y2@І7auCЇ8<6.p@"E|[5N6 CmT@U_[ dgDҸF8@ZH9юX:cXDi oT&N-U)K.LxۤBV٬:ɹqJ /߲@^P@>Y,CL2p(PVs"Ml*kiBό-%Km38pR  X,o S"i\-]  b\+ݖ Ȭ\Rup) ^v rw!y ܰU]; uG˶w=-Zֿpy `f]gwN8.T"Z-0R0 `UZC\u Ӷkq2Mr`L-aul̀i'DCq c& @d`)]#3UUQx fѩ 4Fn3̬+u.ʗ,fXJlX8D(<9/(cwTnwt%ۚ-= ,wȤv,j6J3Mh0*́zgFl\+k$Z`N0y=FV@٬St+l GO ŀ mqV;vƵ,o:.JE8DzY<&QE!,z4^c<< S'% =hT>QEmj$Fr90 KS 9$*s$ l|3 yFs p 01"|G~\ PP0 LKl +",>H(9>9c˯Dp99sܹ(=4ǛC<{:$"̢8LPI>0 L=LıԍPpx T:ϫMslȰ88@MMD,$ٹsc>NtK+d<܊ PHKX9LHȊ$OI9(Jܸ XM? ʼ0]C̻ Js̱ ED@1=tdžLQ<ͷQ =(x8<,$e.L%-!.Q"2I'}C,;-R(Ac.Rw1b/ "-Mͨ5.RLMUIŤj-zFU-'8T^camEc=CL V1ʀ]V*Q-zU?RE٬)YW0`Mւ0؁dmc-W^բbS0@ݰcNl85ՋBjkT%Z 4 W"V. -EuܪTCz֢BtljC#[57XYLE#h >Uڟ$ٗm&~u,{Z%" [ڤ8گZyi%`չ@T괆+ 5 ۮ$WU3%S۵#Uٷ[zOe[#}\yqUG)E\ޜObܯEYK+N [/UeuׅeP`؍>X(\ݿ" 0-3 o0(MZ_8fhgxi,NPъ&dSBk% <ۙY&Ж ,9^dgj<#hC0Zu x_兎FA_@f_i`<b#ZkFpƅWQaao^@`aa ~]#v#% Pթb)*Αi+`5`2;b` Ƃ!*,"Y6,u\ܘ^}ym>?@ XZ&D^dj(d"7c%d陾6^6PNhW`ifie"]e/EgE#XXP`xSxK@% ga0&~lfB(dH`#Eyw*`!88`gPmVggmh*]dHhd`WOS``eȃH#pgxb5eU\hYP]^XegWhfNZN. PR@PSЁ0aR(SPb(bF,^HX00KYUac@ɦl .&FkPR `RS3P.(Ry[\]^ dž_n.̆VW8ώCHDWGȃDE wƐG@y΄pTP[d[P ^g^WoW.n+6&W8xQW(W@nȐF/Y & ։fvf~oWokOODQ R`'0E( 7gTHLTXV`UP^VrN?_# ,'BC8#XDHEXFCPFGHxEIP$+KPKxp/ȄM _ ߄vr)r|]gbba &AM)OtZta!c&M!p(A= uXRᘀ!7M dQ':Z_V^e ha7PdQ>>`v:uaᩔUr)8n_`q 8/ Eٙ]Ρ!AP Bh؛3(mb?)32HvəE!x\T)! 02820oy?@w  hxBџ 8$ ve 2r4nt4#&\Yį3%sW…՚&ˇF-3Fyֲ}DCIɎNu,}SINHqPW0>{H+Q =Қ̏ޫR/lT<=SI4x| `}W/k89Ȋߗ( G,h „ 2l!Ĉ'Rh"ƌ7>̰ 0`@D0>HIAəR'РB-j(ҡ `p"pd H(*4 Iײm-ܸr& @.Pr n pɹ'Sl2 >6`ٳ֒8@0+6q H@S @3ܺwm PXpʗ3o<Sn:g;Ǔ/o<׳o= ;PK1 ..PK8^E"OEBPS/img/self_service_console.gif=cœGIF89a)))JƵ{ZZZZZRRJJ{ƭ{sRsBsJc֭1ΜΌ1{kkֵ1k{{BB9sc1BBsJ{RBRRν99k)!{sJRsk{R9B9Ɯ{RRks{!)BskcJRJ{BsRJ!RssRZ)Z{֜1kc1kRB{Μ!Z)ֵZέֵƵsJ1Z{{{JZ9ޭ){ZkBccsk1{!Jc99ZZ{ZZR!{)1{kޥ1JRkkBs{֜9ZBJ)RsccޥJc9k99ZksJ!)k!c!{!Z{Bs9k)sskΥJ{RZB)B){R1!c1Ɯ!9Μ)R{)޽Zƥ9ΔJc޵ƽ{R{{sJJJkks!!kcZ!!Δ֜B9))RRsJ{c9cJs{ε11{Js1c1ZRJ9)9)BB!Rc!s{{skkskssccZ!)9Jccc!!ss11{BB, H*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲ˗0cʜIe8sɳϟ@ JѣH*]tiͧPJJի jʵׯ`ÊٳhӪ]˖طpʝKwnۻx˷@~ +V\`ǐ#K~Xx+cEgCBrc\b(@#pۚoY}E .CJ\)_<7\KC8Sp{ߕca¦8_ th}Cc!BFvUnn#AIArPFi&ᓞt t"sdrϊ8^ ͸=d|gPw$W"I!UZXqW.D&V^FkJTw@ԄI,=|獁#r{grKsc c(<pB0'餕SOi 1I #Pq**ЫeNdĒЀEFdCHlM$J@q QwB0sr"r)(BZ7zA7jB*uV |<0[EHeA>{_r JLb^FZ|"f)LtI;EBm y{q/$.TY ٣&$v o{k= rT0|idD ]4ʧ2[7mn8ìw9ޚ7`.:I(GZɑ 33;i<y;K^n|MPeܶO~哿>C@ZG7=w 핍ЍȣVC|uJ9X(B`R!J8`aEc,e`洰 cϋa iBekMZUq>jK\ D3<Ɉthq/iXGcIXлbF-Jxb1L3#85VqXvDf$>5m~, G?q@!| DBI/_ d'_i` V)G ŁjNyR%I(! S( ѫAyVLK"G&u9&$2E6bvȤ]xG}sx:՘MXs\cqsLVt>ulGBTM3I fuEm:$~4qC"JMjҔg7˙HbbrI8Bz$UpA臱!U8AMdK6/7Z$gfG~u{J;1stƳno^ŪT)[$~G:@>l$zRN=4 A2ьJMu*-TPUmjS*daRt >t*ϲJJչ IBYъh*Zw1Lgwׄm<[^7|KƱ~/glAj VNu1$ D xeGn~G<@Tki#M[v.)6ⴱ0OfB)?VUs:xͫc RidDkge5z#sqIS/'Ыnje3z'X} 5_`, Vp0Y-'Si?`!,+R|QJ4#/Mi4L0ƌ#avs" 8`UۃzaV}+뉊saHMsj!V}n\ju";[i\{$ۄ\aCnґE4 .,ܨrpP'@?o8hۛ@'8|JB.?oގgjה k:ZmY6:ZvM rH/LP gEωK.M9p3tR)t&TddyV 9zk`Ajou9d!/w"\T4{a~ks#?9Q͒/9v3en/cP>07|CqG{% "қ HHb񭏽UB/s,w{#Gc)O>?$~_ϾJhs_%Ї=/W>H]q8dx ؀ 8x؁ "8$X&x(*,؂.0H!64X6x8:n"%ѪZʿbkXZL,򛮏{+Z=\ ǐ!Maljl4MPŀY<櫺tKv*R\M`m,ɴ\aɈɚJ1 %1љŇa{ʶ{?|-\. ì,î<<|Gy7Ќ\.K9ϰ*z1ȩʨ͇Ή\!ܲT@Re\ƱL\ z1 |Ӫ-X''@z8:<}p x! q/h==TH~9MSR=T] XCϕL?U}Uؚ*O͙eQjl} ԬGeKGKN=y֤b}fNׄ]؆] Z]4Xxْ=ٔ]ٖ}ٍٜ٘ٚٞՇ؀ש{]hڨ=ڮڰm п$ת2z/x|e==zmګڂMܿڱmXݸPyMivM}O]ܛy ƭ=}]ۍ˫a yc}ިZޞ^ ^]:zս1aye z, } II6Ι9Kn O L~"n  qRo82^03~b]~cfHA -uM~OѼߛQhnYn7gaad~hn[nNd3nt>Br^q|>}m NQ韙\^Iꚾn>̞NNu>ޙJܴ^sD;^iG7N~N1^졮n^ O .߮n~ $^Ayd0~0^~Qa9Y oI O~.ȝVR(^I ~MdP 2_o?t?<~>쉿G/Iў_ .%!hOaIQӁʬKQO?1`v4(`B>QDw]ubE=~RH%MDRJ-]3fH@N=} '= @@R tIpԞTB}U*խPV,Ϡ–5Kε;עvY;1ěW@}3X`… FXC6q^Ϣ< Y35kϞ 6ȭNZm]oe bރ\pōGN͜¶խ#x0WsݽC'+lji]ݿ_|E.{<D`0;J/Aꯧڪ\8.0C 7C kvoAOD- =Fo1G92W$$H#QQ$dI'2J)J+2K-K/3L1$L3D3M'=QI#礳N;i74O?4PA%PCE4QEeQG4RI'RK/4SM7SLNSOE5$?BSW_5VYgV[o5W]w)kbG4R $I5Ye[#_w6ZiډH7Z dYqU<=6]ue ձ$ )q8^wF8aW"a8b'b)28[`H"%DqR'w:,5D x9eՅo9g*Yf:3hTK!ߟR9楇rz}֮iB k;lgb* fk:"8z9b^۾;)6n9zN׻y=o%sm!x=7"uRPJyC`Xu@ :?1[4ؽp'$=D榪u6\.w C?_7Q.::v b F'Uyҳro(N$$IQ[-؆D1 "fC۠ ǻ=ꏇBġ7n3Ȁ AZbišL3J&8ENvғ'reOPiҁx ^j Bі%.)aE2 dtY~"Ed`k'~k9ZTG 5%STh@z'T`+ zW4- ",m`^4cOLe&S4(,nCC!<,@isa@N!@PO{b2UT6թOU+PX2Cie,ʫN%/ ̋n4,GJ֐d$5i وQ-Dp;|`7iMN<xFSP'uI?CVֲCZ$ͬ;ⲗ-Y=Kִ>)O &aSc]]:$, pqh!#&:?6d?X!'qs,mH_ C _s-mNr+ݪb&["_8w6Hg5Syfxg@Їv%Oz3&Zҗt+<94Q #XZ *,{jV՞䴧qpj8$u=zUP} mjW?sd' 3Ә2:XFw]$c2 "DFYsxkڝ?)(@v@c8q7 w5q|+^%* uX 8e>sk{ܮqP/(A 8 s5c\ScNs761Ώd*@ztҏkMt.gGn\ 4 id#X>xy7P l F2BzU+c<`h=M_xַ>E6_ tǽ4,K=U s0 A^&L@ao?MŞDp74_1CoЎx#- @ {5;%R","$rSpJ+*W[@ l+#>+*gD< k@ ePe/& B!LdB;d$6+ܪS* c>,Pg`d=b-B#8CB+&k{BxCH_ ,,"W@`f@dW@C B6`D8DKL;l;MQ5T*ʮ(SD\dЉ8F,/ |WEK,^ 6Nt#A+(@4E ѣ@,dH) ! eD!%8A_FCFHF#F /r>I/^\uW֚}pŒȁ$Ȃ4ȃDȄTȅdȆtHr(.* {Ev Xtx$\HJnǓ35ص;+ "ps dǛI0I+SIט&)Ydʦ̒; +Ӄԫʭ4l>*Jsʱ$˲dJT˵ lz1?њAAJ^˻Ld˽K5bIa1J ,1ĤLTLXpȤÄ"!4D͈ىdtׄج<| 8!%̋MMҳBTdtJ\DL̩'yBl TL`O\L93Y%5E]r 9 *y' %ЄpO5 ]e$OO":DmJD!xRy282!$;(A)@R D,?Q?$C =L`!57\ ı0( %%I|-$zR)BH.X/%B0"R3ŨڰQl6=.:3B4Z,=SS< hBR -2"S2-S EDTBBAbd%J (0rD-9]#9&2*Q%hu᫶$M;}> ]9ppݗ\.*IN#iQ\}{=2%"I_ Y;~{w\q[0 R##6v78c$aZK\`Rb)",4>52uRuGHIN:~;]cPhchcT:A'1O2dAYQ\fl&Tfb(off:,ew7GL­&a1ŝfj k>agap*<"J5K5VvJy5NE$([y\z6LN仃6s^ŽA-"cdE*1 \gnhU&f/^g~Kv>TvثExyYܭ3"Z懖鶤FFӝ* ZFX[%[meNCޯD=G Z}\VWF=Ygn^Lv=|kڥ(uzڠ֡gE\f\{E0[F]+iM(2\&kľF.gYmu}){9b 1 \U>2 #`X(X`Pv d..^ >;N[.p `& %pRG]?(``.$06gOؾM^vO2F "`%VbrmC"G"[X pN[A81q#s(!) r)(`聛"$Wn9qaW^?"q 1tEr5!(!p5?D_td#˷sqqN&PQ?M#/5Jx`T_V@,ϻ,utלMV 6a'b7cwo=u_V?Xfv`vHsr[s GL!ײQdcvwwx?dWe-_|Xw}wqw0'93v[6zX{7p?W䉯d@+A3%s?:Ix7_4ARNk(,*(sßO"Qj@mUl.r7zÞH: iTGh5nhv–nnO,b{ HݦSeM~֓ٔ>#>qg¹_sQ(Z ^ |Nh3׵ov{Ź[a؝۬^Fk7ܰNjv|ðcDƷ_lk}gvz/a J? ,u5z'BWFƎowyne=E׹UU  8 "< C'X1 1̨QƏ'$ǍWl91 0g҄IC.w'РB(ҤJ2miR:4Xbǒ-[l]wYmkٲ wm3.ޟ5Ҽ3/}l0PU+WLb3pmƅ9|Hw]xenjղgM6L~uװ55@1+osݞ ֶjǓͻȻ5k 񮚶T]3q㞮uUx * : 2!Zx!jzaxd‘EeCէ_r%Gs3_ݸY:c4)$WT"M:$QJyn(RA/ 8fdcDce)%y'} em]^/:lr ic s&i3֘ݑ]݉知z*TV ^\--뜒R:)k8*[J;-ՒjU.:r%`-q+ɢkƹ)ƬV// <0T0 +0 ;0JeJiI LUB {DJi욼6)tjК~=3A =4E}4I+4M`sQ VTfYgYŸRn^E,6: 8i`k1\q=7u}7y7}7ԅEUk^܂׹,Kё5߫6V/衋>:饛^/ᆫxq9e~g,ڃ3{^X$/I(P- Z;3#Au͋T?O" q!iB=ЄEH2O$(Ijht,,@-Ț 2sɠlԇC( D+ZYƈq"ܛJD25d)) }@!Gbf5cDEѸd"(Ѓ#\! ؐѐQ:B8j"o^&9IAI%U`xpWCb+!U !"@12'ƱDmmѕ%R eH@PS\`M\+Se1} {LfD0́J3efA蔘ؼ#7Q)zES2@ x˂2, zp)Rad?B}:҅3eM̐dEl>IیFLYExd,R/t%8ڪKU3@y!Q>tO][%Uƕ9+Q R.QK̯2 ,bv0e}:5l} D:jZse]j.9+m*),tV0 gDie-> HX uE^ኽ> Fjyv-V>e;6Ksx+Mh=/zӻ!OS%n, *@؎]ھ:^4%{ǽKqt+%pv,ru >1SG c@ XԷg+Ųe/q̂,>g,`nK*3Nfu`\ pEmaNS,f;΃Z3WM[& se{vX+AͻE3zM\ V3'ўt|3C;qAUOTD(XӺtP`mz׾p-]".6--a&-iٲ&5Czms6-q>7ӭugѦ6ՋBˋ}7(Q~T>-mE3N'DạQ`*7C. u| W-0,Wy'?ڢ&u @g>9L^b\0G!.s$} ]oPU:9s^:.f?O^b#tzI}t{ݟv"jO붟C;kr|U0_/OwHJ:wFeS|k~c}c,ONw_ w9{>=E/[vɼے}l*?5}:}+{ЭE⿿1~|g'<]y\`__茟_m u_qe_f`)`i y  `!`UtMΥޠ 2 V! Bav`n!FM Zy]QT^!~ˑ@ҡΡ֡!!֭֡v]b !^& !-T QU T(!R(Ja)"a)z!aA,^.."0.-/"// b13#08./b0b2f#4f,"9T\!`D !b(2<ң<֣>c>ޣ=#?<d=?@ -֢ݢ6n#4ncD#P#X5fDE&FcE^FrHHz.zHRd/ZdGVG.89 $VN,B"B>AARcB:eQbyCD$VRJ Uc0n%Ib2ve$XnY6IjHeDeXeLդMR_2$yHP*%T%RB%S$ada*P6&bICV14^2"#8Z[^$YfGc4z#2#%hhenJr%Hfldhn1f]M荚$M`@bS"dSq`drJHU݁&qyvZMMZbNbDZdb'owv|x熘cDZLED {N%'~ڧI^Z~!XR{29(׈\Vh\hFJۇ蓉(܉[Xeec4(6fh1)fo垡'z(Xu)A~)))F)))֩eO8R *B*4e\rqKn)T0))**Jꢆ\hKX0@F¡"֪*檮**x݉NS0(B)'NsXʢN+V^+fn+R^ΰ|((,+SAJu+ƫ+֫z+ k'dp$0b6kbAkQNkwݫ>,FN,Vl++Y<0n&8V.nNEGTE@&of.//fD*/,,Y@@A%XB\&\䲗//ϯf/S~p/ޯ0 0 nB(@DB$APbU^0o0GW N @T]$6u,qs011p>1V1.` @(@o qq_p1! o!3O2%W2jډ*6q"#/[2++kn*'7q.2";-+1`\122?34G3*0r 4o37w:n&/hE9X)z3<dz<+8rX,C3?3OA4B'B/4C7C?4DGDO4EWE_4FgFo4GwG4HH4IISu,7\H:L7P8kV6$OCqsS 9393 $@XҜ.PWUP۳8X  4M4AXK4LbuVC1\ǵnJwuK/EX'u_wXc%la[\ӵ /696c?], .R,A_?HXkA.ʰVm!0d?K9/o6"8>6n31޴B6pPu&7r/rGNWXTX vSHA@5JV$vߦ6@3U̫l+ж@Uw܁1< 88bhux"783sO+tKPwhAf3D@H܅m۾N-K߄L6Y@ȫl(|{|}S}@w=(,@@_^xW'7r&7Ey4ee^u?Kl$AAwi7͗dcvn! Ӄ ߗկ{;7:Mk7HA7}=\Tu N>K@@\ϤA"SEW@Y 2dY0`؁C'ZcFA9dI'QT IJp>gO?.*%I$S iSOF:jU8K^> pWdB$!@۶j$++sN\m܏B(0JQ̇61Nl2e7Vl 8`Gҥ4D+Y8H0華f;7֩}CQä3fC|dխw4 p Ai /H?X& !Ky~ˑ3I ,Ez%@t*)hb)P 9èJˬP,,`Hˬj>, - @Ahc2ʎIB6xK-K׸́fʉpKܶD$)(BP8X(N>O1#HOOؓ =&ܴSA UQl`fjO@])rUYiuwڊĉd.Q V/r, X_Whb ) <؃6 :''"+6 IJܕ wkP3x `3S<q[@ViK+B+ Myl/#_o'=]gx3q;W:#>+>#|ŏ|ȋ>uk-}}w_?ˣ_~zP=~- &OOOb/oa//N"OSo d40WP`Q$/#/|w0b0#Pv,P !P 7j /F/ ˯ԏXp ̎m~pg&hM膰o. d P ioP ݯO  IL 0*0nϣHB0i%l OKODQyAOpQOѐ#n\ewQsQ =]O%P,Lq$PQC~n%dNL{+C%'bW=d" 11̜r')".~q\&#CAE!U; "@ž R%耢b2'upr''}R*2(B$- gB&>@(yj**2+r+++2,r,ɲ,,2-r-ٲ--2.r..R,GQp) |),ѤRbil2)2-21335s393=3A34Es4I4M4Q35Us5Y5]5a36G3/q/!]e   *p&1cr39s99s6G6юpB`b8 1ɾ+ 8 9s=ٳ==: q{gؤl??4@P="vABAAA!sH2%LC5|8~k?ymD,s-vAF_)d4F F}G#tGyG}4*&BQB7S( VJ`;S@I#1QJkEETGs'tFKyLtLɴL3HsPVf't'zMJъkJ)Eo&-rPoEO E UPP AO4QL)R-5&є>Q$*t@\`tSCuTAUTk*<<K>?DprZZIbVOXtR\ XWuP\{Yu^uV\n\`___K*xRuXyXgTWaUX#Eaѵ^16c5g5nVd`h^DdMvd_07j52oQ']ɵfv]uW+g[g}gcNMqCX\` Vi6ia`e3`6ӲQ5Qk5R#FQOb6mhsM?`SnVQV;6+Yvp W^ZI +.pe=Bj+p#q)rp `,TZ-7g sA7tEV0$'wtoTua7vsYLq @vmsqwwywtiW6:{WxqK#N7RV$&zw&Ww7{wcWlV'r$lR1;k{}WY7žV—fT@ ׿F4*1;S}7$}}7Gzy"RV`` )=ufxM᳁Og;b$UW4<MS^G '}2߉}߃=w]䓚Me]壚]_⟕.~೽^e>i~蕞`>Տ#~^37>~뿪'M8~y}=~{X~g蕘վ qw^C^^>]^=V0)'?+>1!M}]yy^>}*p_U_!"~'߷_?y_c}^B 6X] (1ĉ%ѡƍ;z2ȑ$K<2Jmd@+kڼ3Ν<{ 4СD=Ԥ@*鰢ԩZfL5֚-_2dJsرd˚=6ڵl.e:`… Rj|&X >8Ō•.z[N ء`a/{ :Ѥ:f V. hfՃc۾;lOL n멯y'9{sǛ;=nMNɿr>R'\2vۿ|\Y~W`7@z E`hWanȡypuN`]*b+1#BTmHs6cz38}8J.dy@Z'56)HeZnAy%YVbYfj֓)fUdՙtމgY3NOvJhħbz(N6 ih9NfikV 碘zE^ŗ"$2^U鬶ڡ~(kާkrJ"lJWl*^["]ݎKniJ9jՖn n/bKUN;lPG' q8-^>,qD1v"r*Lrr6/Y9 t\s^ J߻0N? uN.Ko= b 5 kvn wrMwvߍwzw~ xNxx/8x#dO.V ךoyz袏Nz馟zꪯz뮿{~>EU3m|O||/N_s35}o}~?=җ{3O/\߾ p,w?EMJJpK@>ϮwE0$, OH jw% olXpKԯz+{⑏y}߽CvGޟ?+Ͻvw~|'ww ؀xghvǁ'{{%')hw|~+H6W~-h,*(6XG=u~6&>h직OQ(Kǁ!X}]ǂN>h~$xG~jihAXz7zkȄgc؄`(0H{oSȈxjU"(WH9Xwxb~|~헉J8g؅HeH؉r7舽苿٧ljhyx؂8艖XA˸'gȊ˘ȎH{WH'mx脈Hn8_hɷﷂy~淇iިx~㸏H8 3!)#P##{#Dž?jGk4z6I9;ɓƍ݇'uAwדGIKɔMO Q)SI"UiWY[ɕ]_ a)cIeigR;PK'Bc=cPK8^EOEBPS/img/layout.gif<6GIF87a  ֌޵ƭ޵{{{{ֽ省9Z֥ƌ{{ssBB9Jsƭ9sBsJJB9ƽ)k){ZJRRs!B1scJ{Z1Rc{RJk1ZBsc!{s9k!skZRkBs9ZZ!cs֔9!sεBZJ{kkƜcsZ{ksc֭sޥcƥcJΌsֽ{ckssR便甭ƔƽΥ֥֭քsssJkksskkss{{{{ksZZZccckkkZZcRZZs{css{ZcsJJJ{{Ƶ电ތބ{{JkJcBZ!RR!R!JckJֽ֭, H*\ȰÇ#JHŋ3jȱǏ Cl! R\ɲK#cʜI͛8sɳƒ'_ ҧѣH*]ʴӧ$J%ԫXjʵWR-ٳhӪ]ԱbʝKݻ=߿_E0B{ ^̸ \9(0wn\&& Өw`9rWXBM4s%bܸسi7_ Nu˽oz}ӫO]A b3`ȗ{w+ @?Vh_C@r4x0JHօ(bWγ@)0߇ %Ҋ<#R3=/c * !2dB#lfDVS$a4rSO=f>i⛄j(q~vny z6 iiNJx覜آ |e Ӡ} X=hj鬴R8~1㘃ٯmfN ~&P6F+@;Ucث1 I+k9﹀N:N;c:鸰-Bi +<(FvlyG<WlTy¡.,e]+gMptKX8. 2L6<tHߋ>K-xu·Gn q<`{GӒ_[rpyDݍv':'𧿺^݇xzg}\zӿ[&@Pr1+*.>tӝ7Sot==q\Ս߾񒟵k/GO>ȿ =mzS?-GS=pZ!j9LڤNPR:IX-TJ,ʥnťb9bbglڦnc8 g"wYApv٧gIz-RjMPꤍʤj:+EN:ZO |ꨔJM*OjA@ ` Ӡ ЫJ ِ P ؀ 0 Pzؚ _* PCAzz)@U6gTꀞzگJ`V^ZK [:Dp 4 p` $ &kАp.p j4['p8:7*A DKJJsJ; ;+T{ZW˯[q00` 0 p r+ 0 0 z[ |~+ B` s;s{ p-Bи;?;,QjkF[~HJKLs.)d˵ a;ں`K0`)P 9KJ ʫ { 0 [K&@!ڽ.| j@˹{[@} (KV˺Nۿ[:l; pp$ `Dˑ6M",3p'@.1曾xkě0Gk凿+ yj k w<>,d0$|1͝L͠ # p͚ͽT)k"E[PΰII#]I`&M%mn-M*@Ll "3-0 ;1ϜA$ K-Ӂ1F=c,f|ctH  hj֮pipr=t=גZx3t|{ׂ |-؁|l<;,ctHYTؚ,N}ؠ-ׄ]sMu؞d+!u۸ۺUĆ & IPǝM- ̭ӝ=[[ԝ܁]ս= --Mެ Yձc =پBEH>^~V n >}^>XZ}ʒA  ..ݽ-/~83TV0^_,* B;QONPU. UN_W7.V>>2^_nZP.VfN7u!^ ,`N>޸ZV.[难GMM >^~븞뺾>^~^D^V|.샮C#>>1~1NYGpN..^d >~ ^NonE >n^J74Y8:G`>>B[H|LD_(_"$&s73 b15O0`lnpr?nJ*EtzmJ'g|_>|o- m.2n1] igK))!e ? ?_ fdR(FXO.6G~Ts 0 c@ P k W0ypOADw=` paJ#DcB! >QDA&@1B=~thƃ'Z A@  +,,<&&DTi>U<}Hk6ZIDѺFCϴSmZoOؑ? H>&C"9S2K-D/K1Z^R/XFbcQN=y-8E YFb03ha- /JH11/4ԑN?4TPGTROTSU*^T3۬Nr-;O_{dB- 97(+ZG-pUm[omE4aeOV6]pukW]# {)aX1X"33jڳ6b'b=3&rcl]\x5{W#9栣1@T7;IAҔsa%(.ir:&zҗaل!$f YLb&T3LĒl&5Lgf6Mkf8ibsH9IyNc"S":YO|H\qJ/`ӡ|CQ~+fD'JQB'F;:RvThIݹQ: nIШr6TK tSԧ?jP:TըGEjRT6թO*OXRvT?ҖzT/aW:Rc'ZP֘ڲ,(&BF.Ԯ;UU5y^[zՕjUaRv@tcc5S ey7]YvֳmhE;ZҖִEmjUZֵֶml;Ց6V EW5+nR"ַ%}l9vs6 ]e;]V׺nv]fv!D҄)0_x˗2RxY/ _;K! 44,t3Fp`7p%t=hBЇFtM+[&+rHsx^4{13/,N͑enx[ UjVկuhJw[a[pZ־Ʋg Rp1"6ۗK5uO|rYSkFwmiGֳ5g.A/.Mo76wt ltA^Ngx 8^iCIqS -^G)A𐷜"w9{`^w\"'k^s|)܀ܨ6xeB@-x:gzF9Fh"wejc[qa>9|~;ջ.wOsz^:l&ID,kGxznwS{ϻ1? ZjG۹u|p'_K=z-Oχ:p:s!|3͇}ǞW}`O>?+{c?;\~|G,O?~W?S0DTd<@s 4/3;+j:An??+: ;AWzT$IKs{ ԔTA@4?"\AB$L#̾$T"d(d>뷡{34<-d(/0/20C3?Hã@6/$6\8964<> C*:,;:XDTEdFtGHIJKLMNOT,RFB@ T B%BTB']FF?GuCTDUJLE7ƀxSSQ::5SU?eVuW},TJT(H]TZ%UD]}T`TbԐ#8]URU hV;klVGc$$QoESoVJWp}qUq$P3rEp=W$reu%T{Ww]o5~{UwWeW$P,WAׂ؂5XWNHkS Uh-UT;}я֐ّ,דEYzeY$XٖEYwٗٚuYٙٝل٠ړXOݢj%ե%٧ڨe5YYYmYڛZژٰW%۳E٢Je# ۸[ۺۼ۸۾ۿ%5EUeuDžܹ5ن8هח\\ͽY\z\ͥEuuԽܱم]܄e}Eݔ\EVo NX=[Xȕ,i"U3u-ɸT϶+^@_(`m_^:n -͓ˣ >=a8!X#navV6Favaaf~#_#a%%b(vb-b fփr-13@*5as6v5c6V9:*=?Fa/B4CFDVEfFv䘤!#IJKL02#MOIR6M.#R>UQN 4ګ$7[\]^_`f? 8dVeffvgf+8fhkfebloNm6#cFfp6kgI"S`S5Md|"{N` `gb瀎߁6EWqgxg vۣW坒} V%uxE;  蘖鈉)bxQi j8V~璞h?HjFjjV!@Vfk+v鸮jX6깶k&5쿶j6~j&v&l¶l>Ᶎj&˦l&҆ ž>kflʾ†цk6nYIͱiAn,mlОnٶn9nIncinmmF6mFnվ/lFjmkmpp=b   e~flh+j_=q/p(>Iq^U/+,-rxh>ro_rn(6w78><107~F%?Ns5kB7CGDWt@K;Pd= =w>T?tAtOS4ہI J K?^LtNgjPYw54 v=/sVouViX'b#ȁ^tyNX`wa7l!PvטthO_GkwulugwowWo|w?opS'wP͈{W}W~uzWn@xfSswx>'wxT'xsyc?yw>xOyb7ܗ_O/xZ>xx(W7cxw8nzGy{v{1zW!»|9uygi@rZxz(ɧn@HgZzlب6H/X??' .kf p =? R8P'l^B(f`-! wz04 (B Ⰸaox;y峡8 /{(-"iE.aGǼ*0b$b0$GkbAFK~U E*DDPy?0Rr|&C9$M %EJܐy<'/"j_ KҖ .)֭]v1,!F>2%3N~2,)SV2-_Y)`wnE,pc`@,9ӹv3=~3-AІ>4E3ю~t7P `bq[:c6cԦ>5SUծ~5c-YӺֶ5s]׾5-a> yjd-iS־6ms6-q>7˽lMӮF-yӻ7}^7\»>83&83qC8C.򑓼ߴ+,|c.Ӽ69se-L\.˓X2ԣ.SV:ֳs]Mϸ5H|nT;.3Q~t(OIt ?<3<#/S<3sp;Vꪬ*+q`%)? ǧu*>@j6F+B@ 5!)P{xp=kl>*kHõA@DRAA/)Pk'A0)wSɸK nq"o[-.ܰ nN @JЂMB0D'JъZYF7ю <GGJҒ8@HqvҖJY ӚĔJÒN@ PJԢHMRԦ:PTJժZXͪVծz` X T@q̊Ӷb` 'Bv׾ kp2%w`:l]PX0vZ%z -j4;@L٬hWֺ icܕͭnwum}K p#6ЍtK],=%mZ xKɮjRveGKAzD`1~WWn*uXVGZ`{Jp*&,c&2q!08I^lwcSM=q!H,J)N#V^q1|,ȬH)B0 b&@ȩp)Vp %Ω LfSb @p;'!!Df?Y̅1cB'x}F17]S/ 4)CR*'LǴN.htM-#gM`+z׸&=(@vznGm{:]F[:.NpLkهn-K5|]xZ6•P :I*q#эmV83 atBfcnHD:λơN:r3.S} qc1 mu/=Nq|pߨO43 zy^KGhDId :ENЁozhSfGA=_+a6Ͻu<=d/l;@0, ҩw\8Bu^ۙЩ~D^8<)È;aU'{7TosubF&gPm8l6v7{Ćt~Vf{"Qvr&w`|-Fz0m_s8fV@>¡s6wg}9~J}x xQqGyq`%'m#Xf%wt''~ ~f1nNh4 p6Ӟyy i`g* GKB>Ĩ 9]НϐÝ0`xP )>@%z Aˀ :EJ)0O (9]0gp { $)&bj3Iʉ  h cgjmZos d* Oȁ3 5ptσ:JDJ [PZ_$iIIn:o @AZ|zP:ګ]` RTj]* 9y( /٥qHnJ1*tjZ,joZjJDy`P yZOGj/M zjni] w bsp ʐ=M A@i|u* ȱhPK = +I&*˲ع 1PM0DK+ɴ2GX: `$Z2ɰ)톭yºc˲kK{v۪& <*i/3 91P/XJk*I ^Rz [&Wrkۺ%;K%[ۻ[$;{kȻmE!Q+>{B$*nɚF˱CJoԐJۛx{ZbۜY;Ús+Főܹ:"I$L>[i޹٨ѿ56ӟDܟ9@y6 0KpơɁi EjPj$?,>,袭9Jg; 7:LgHxd =䙤g < ]L_\Zť&`[L0` D\6)EڰII/:;/Ԫ@5`ER0F 5ʉ|ȳYܤe@G+H=5Z>+&rZn6 r,R ڮ}[S\ Jhk˙oa$J@ 7;Ksbn˦m$҉RJ/`ȝ/$,JSENC+LՓ[>RժD.ٱͻSbrˡ2{-kсpˡm>r tsd}lcV ^;I閞ʡ7 ^1Z8KZ(ͦ+@L~" :륋t x~9^⧆^ǎLĎ1ؠ/z/ݾ ji+M<"Z4ҢP>* L`nzU|~qI찺j́ݐ %v\*ݩ4˞?kM:̭:J%"$;:9ѽʪֵZҊm?Վ6/왫M~q]len}O-$1 _Y<ݝXc>܂-h(jjy.Qˇ:mC۲Ҟ، ,9㠟%Z a/)ytQ.۷/è5eؿ'?%e %B쟘qR_w,Ϳݿoš D`d xLD4 -Zl!B&."lBj8C H!tiR3męSN=(SL#16\̢C>UTU^ŚUk&J65iL)5f0-̒NjW.ŸAdiQ,,K&i} (qKf `L⍻=ZM}xmRY~:,@W\"gҦ Yj%}Znj5yxX6R#s9\= 16‚|/5lrL*慿WҚ?0@B @D  ,3,I3)+0DG$DBPD\ACJ upų* 4-   %- (,PHb륖` LB )T*+5a˲D="pa#Lp| B_[e{Ѯ:A0='RK/%JQe(ȥ E-#@Х.H|uЄ OJ)&?4`{[G 3d΍8Y00LLOA5 =4&|DѽPIe]wߕ+6! Z5T5HnDdPir(ci/VMnXm2/c8&ky@H,3eHBBO~)@50ҐwgMj HpPb Re $8VZ 18,$=uI+ZٗIbmpmiʟw6Vsl("HɾCJp+WÙ4@bD&6щOb8х=bHq}`D*ьgDc -эo =$^1wc9я"هuQDd"H>ґ g袈lD#;INvғe(EA$AD%)MJ2e%in W!B)*pJ>."| & rJV6Ǩ39Rj I`C6QjzX%+XӜBjZ *e%NI#ĉ+ BHjb`7f@UiU^s 'B:ӡ_:NسshF7ꟑF1R>g%",?  @d͠ ((e+xkaH0ap pVY 1i!4eYʆBԭo}DBZZ+-&Mo׻ʴ*-= cCp1̴M&&uVb܀ DB1J^,A MLD|M2vV11NTja;pv" 0T٪L׸ܓAj,dhK*Ϗ:ObcZw#uX]`&pdQYMLCl' 2PBk 6 5'A59[fөL-(6[&amq%/#; E}Uޘ]jЉ/ PBnpKNMy$CɌD)pr5 >qǸ\>8@yq|*Er /NPx79+cs+dd7M&97Ozԥ>uWWzֵuw_{>vgG{վvhw>c7wGwz x;qK%?yV;|'kw(yxЗ NHzַ]?{G{|u'}='^G~W|6~?}W~}w3 A}Gտ3`|q?; $4DTdt @ $4D@ۿ?S Bd;>d@%d&t'K(+,,"T#Ax-$243DB$048!˽}r[+S= #0W0CKy?4@LA,SDKLRS B$DET ?|=$D % DCD\D1SEKdEEO$EhDxI @Xʨ4$īF B*D4MMK܁ԜʔLyA\JDXBtټl84[dDɽJ\.ͷML?t M,ҴL @M$Mxͅ0lϙLشܞC»LPE {W\lN|=ЩTN΋׼O,t%Z$J<Ĥ$DO ,Om܁5 E$E}]"-ȫQ؜NeP<҄H"m,SJB+Sګ|ڬ@X%[Yڲe۶@e& C@)3[u[I4YEY \ŝ[\|•\-|&pg.P@ƭ[g!ȍ'˕5]& \]lݔ] \ ]ڳMmM^]ٗu8^l'45_^ZuDEU޹Zi=?\fB(M`E ")؄_.`8́(xH8] @=am0`u]m\b*6b$ %` _`߃N`*a((]8&,>c6d ^$7id'?N C6 u]I䲸MPVҭ^IdBaA)Qd!deH%bAVfaPIYc9u]_,HPƶFB5F66e`NPdjAm[rN(Υds>wus[r&fg [`zuNPgA~ڵ .zgϕb'Ysn:^灾`ygs^hhjghhv8h^FCkLYf(hw''vgxVjg秎6ϝYsaigfd3:~b{yv6警.z>kMkVktki^쾮f8܋%?n! ,3,cŮHhʞll0lM<KvOlخe^,9b_. )˖Olm3&   / m"@63n5ĮnlmnN?n0c=`ՑVmmgmEM ^`'Fyr].vo0>X! Y_&^$&n @,!qqv O%gmJ )x5 Y~dҸ + /'[X`r% ' 57 19: 24 ;Ǟ6W[tHfCGDWEgFwGHIJKLMNOPt,ZQ7SGTWUgVwuTiXEZ[\]^_RGY`'b7cGdW4ìhijklmnopq'r7s?@uguvs)Knz{|}w~W~v Wgwxoσ)<.lGYWgwyj8B#*,jx[x+%z?wh$`;xD`pBD8_}W}8x|'7~iP|)P6voo~ni'`>rnbcc,Nbb"fPz突&`yDb@  2l!Ĉ'Rh"ƌ7rc(@ tA˔/cLGL򬼉3 Dfʄ SPD-q2m)ԨRRj*֬ZraʉUⰀZYI)Lqmt Zj'ar Q xbJq<ㅓ!3l02&0Ccm #ܦLr3%U矀{-wq ı0UJ|Hi,' ؠFpJEV &h1*Bi36Y .,W3vh1ae-1<Fv%Yj%WQp'_]4f\ֵRx<7y'yg (QE}ex`aǁ1Aw$w<)QtQx4C D'Kir$ifpxdhD Yk99ZA]J;-Zۗ9wtW2N=4ҩu.oej ͵nęSL[JKȁ": sul5(c C ) \Ʋfqvg%hMaPO*$Eʹœ 3z-I+tjMq!E|3Rs 3Za=6]@XU hͯW+׿jpLbSnat)Y_Ec,IrNDF`X6D>9l'rdsB-3=;۞AxJݽ$p‰w &K*weK?=b@şh Tooeimiuq}=sC*)oNs?Sg."š 2vX R̓ @{5EA{DdKE!ވOU Y_SX6PHR%f$%()R1*yȂ n=|q/.0eQỄH"2n|#sP"G! ' E9-aԓ 6A5Nq|$$#)Ʌ"3M *@<`(r(dNډq$c)YY]R+mpC, oH*{WF|&4)iRּ&6mr&8)qfClI\6R|'i;uN @*Ё=(BЅ2}(D#*щR(F3QR(HO<)JSҕ.})Lc*Sg6iD>)P*I4"%*Rԥ2NԩRV*VXT5^*X*ֱ2dYJֵn}Mv+^W${+`+zD a_ 2w5,CJXRR!,hCKTpV=-jS{;*}-lc+[ݰV-nsݖ-p+֖=.r;V}.tFֽ.Rrq+u+׍-/zӫ^w}/|UܝƷomޅ/,>03~0#, S03 s0C,GD@@߈X1s>1,!F>2%3N~2,)SV2-s6qaQ۸f>3Ӭ5n~3,99eNc"~3-AІ>4,0sdٳ#$Җ43Msӆ^4D߆0Z!+\UqC\}ꈤZ!D()rl yEMK׬>6j܉9 9\[[ vbS6lV*-B!)>$!w*BVO l;שhYQxSH"k2Co\k!P)h$` 6ҿm 'Ȝ ^9xjya,E tڥHB]׺m[!bǻM]/R w?;9omS z!.챛O`{~mb#&}ZJ7C@>W?ӿ?h=^F  &. 6> FN V^ fn v~  vTi˨ H0 `GD Ax!&.!6aݠ}_#n!v~!A!nCaA!ơ!ކ:Vba*YA̡ "!!"աmaCa^!@}H aHTm] ܘ'""))"*"z !@ ((A @Tb"'bb.1#2&2*ʘRr/.v btAA57*  D% #1&c pA cPA d.<.?#@d6G0"CA"PAXf#,t$0EcHHj# a#InB p#\`$D M$Nd > Q4@I"%!'Dv\B0Fe &"'D $JT%76@U~#Ue`SY%Z%d>c3%@5F;BDBqe.@S*eTT0xLje.bT$G^zXZN&eVe[6[ \`B&p]ˆia@h j`A 0 fi&o"S\ veFB TBC.C`(LB SNu:%pN&ԦwZo&pVgm{Br]+6NgTE ZpVЀ{}ŧ~e¢}Jt^~RJ(◀|P4B"@hF(:߄N_((((ƨ(֨(樎(())(jfF=)FN)V^)fn)v~))E-irn)<Ʃ)֩֩='D*j=`>T0^*fnj@j I(): @@@AЅr`Gl\Dyz++6 @4Pd˩RǪ*U,Q$`ThLTGVjU󨇼ZŹā+N4I( @`@)*d飖!@j6 ,@a tŽB Z^@]Dy,D΢,IY@\ST+^6KXAhAhAiH>@P00 aC!F@bŇ ( 02J`#CJ\`j b`(FZQBd(F' z"T QeHd+Y e$ lì[tJTٯC#'4B 9ܒqcǏ!Gbh /sA (" (>=C0I1PLQYlaQ %@5Zs M-+M826[n"D m1[` @" z.h͍,S=?S!hq\s- u(4" #R3)%9RN"[DJȓh@ls@-5"L cMVe lAu-2`5B8lv` >ׂ0%܂M@LǬTTSұJ(!~Ѐf .NXe4td-T9=yTRUif@4X]YnaYf7ALAh7 F!4 QB"%T aCʈ qC045t yD!q>lD%.уFdE)N1NE-n|V"F1͋7јFbjt26ƑucxG=ycHA揃4!B&l"II%XILn\d'AJ%~R4%IyJU҄d+aIAWƒ,mK]/K`f1LStgN3cf5c]SMqE$9s:Oyn='M|g?PS&A g"T E&C_BT%E-WbT5%G=NT%$IMGS-%J]S@T5#MmS8T=E#O}T0UE"Q%"UM"SBUU!UbU]m"K3rUem Y͚VUm[WUum].U}*_حViX^u,Xl*{YͲ, #YѲ5mJ{Z*u-ZZ(j{[ݪ(-!C[ʬ5{\*uc\Z$ӵC{]fWnw]:WUnyk\Weo^Wo}e{_VUmkZX&g |`&Xep%`;VVl-\X g8p_=ἆXu%qzbU+Nk]\V83qWm|XUqc 7UCNj\T$'9KfrOFY5rcze,T[Ni\R09c&sG|挦YesLe{Gby5w/F2g:KphE/эv!iIOҕ1iMoӝAjQԥ6QjUՏvX?3VpmM`\z`# ol ȎT9[@fVnq6ѝnuvoyϛo}p7xUH qO1qoAr%7Qr-wasϜ5SWcXV @wtE7ёt/MwӡuOUձuo]vezH`$tmwwϝuwo_;PKLi;K6KPK8^E!OEBPS/img/delegated_admnstrtn.giffGIF87a kkkccZZRRRRR!!)))91))JJJBBB991֜)))ƽssk֔{{{!)B11B19BBB9BJB9BB99Bƽތޜ{ﵽ֥甌{k{ƔƄ{甭s)k!))Z{kkΔsss{cckJRZRRcεέε{ks{s{{k{s{{޵{1919JB{{{{s!1)!)֌{RRJ!{{{k{{k{ss!k{))!s{{scckRZcskcJBRBBR{sccRccZ{sk{΄{{{{k{{c{Zs{sZkRs{ssZZkss{{{!)cs{Zc{)RZk9BJs99)JJZJRc)B9Js!ks!)Z{csk{֭ޭ޵cs,1(*\ȰÇ#JHŋ3jȱǏ CIɓ(S\0$JH͛8sɳO@ѣH*]ʴӧPJL3#f5aש` T@ٳhӪ]˶۷pʝKݻx @È+^̸ǐ#3~Cz3k̹ϠCMӨSAװc֜  NȓύpfKNسkߞ5W +0O<˟Oڽ> p#d& X`Mx^VhfhAv!i7 0A{!~z *(4H_بnQЀ X^{*[YI'x橧^gu6p!&&h裨:(h#fnf~JvjꩨZ7SH^֚jr KȲުkTk@vޞ*^knZ֦nƫ$@/kE0f _A Wlq _gØ>k, +:(,x&|'ǔz16t5L&ΐ<0B'tiA/]%яM/NWm^M_$ԋJ}.Z-v[Y#׊zm.fmvnӈvj_vxW w*΍h-'߄^݆7ގ_1CyY9㛇\|봳z>ך \y Doh1@gQ͎w畁ےĢ}YʦUqOV9?J~vz,  0d a00edH3 NF+Ө}<28f 9i X3T@r  q60$< (6^Hz. <KZr##1QF.k泴ZZ@ڇN.-w5]{zCkջ^Ɩ3@Ѐ8 L.p 38'@[_Z(@(NWYc4`&vw1>Qz~@Û8G9P#eX7@^D`Γ?0w=r;_d pL:s0\>ިMBbv ]؎|IJEJ[ҘtiNS^0/NWL/#4-V5Kww8zwNF]N9}>-z \K;br\$ mJ;/c b@/8+lvۧ>h"-k+*.\sXү;[/wM.b)O9ʓm4ay zGztAA]εMqO]ר8_"-'ӷ+ݥLguOF hPXp׿Ұ3!ĥm[}m޷.wN٧Uvg, GO,z"vH}=al5= A==yʖQ  4jg{I>O|[3G3k&E޾TFO?V_ ;,o׼}W_3` 8[ȥϰ~xw_E׀W^(*,؂.0284X6x81,ڝ0&a1:Bf**F5bPH&s\;-#:G0 V:">QXJ1Le^) pG:8j#ZTq)FBwJ@t4ҧDhzao j 2m̓z!p偱񩙚"J ªxѩ&Wj=uѫm+2ڈz1چh1sɊ*zFեJUY{!joH#Z*jU PAߣ,@j:$ jIf$eQbm֚[xtZϪ @ P_2ڬu)'%7%"IeDPAz> kCn)@ $y .%ffK,d`/ AvBd!1fi#^tFpѵAK)CG-ƥ%2D_dB.YY[{][\T Jo C9RP $~ CeQ? @t$  "+>Q4fB #`#DCL\B=bWa?d GJ`K%# +dkbS*P`9&B"lI7DdcOD[8D8Gy;Zuqtz@P=; PVԣv9 S @>{.\X| PS 02\ЧM9 US$ɁL `@8 '{{z $7#vTQ $PѲmZHċGs۲lƒ('{=I;Z%+ L ?4$t .@rfpZL]  dXdHI5˱ p"L"VEkdy\rͶEC$TU| PH۶yf|Kcq$\i)" 0_1€b?@0 p MpIdB- F+3V҂+IB크@_BRbdQd@p EKo],B}aBiϢErѵT"C*1'zq"nHg!^[B+:jKqέw3kȽqa>fqg`܁#׍ibuֽ]&MRk#}c!5&N nQN#UA3%P.#Oa12$$(/O*",E܁4R6#:AO<^r2ءTH^#LnS>NN!P3RtZ#^.eM bk>rn!ryHt~!v~!n!e~AjdN!nFN!>rG霮ߞ秮zX^豮ϫqiNDN>DYLA, 0a^` @ٟn%@퍱 a0 ^T%mpp Z ݀dN.%| F8 *}Ŗ*ݍDM`P2h_@+oJ!/3l B=HИC}͙y~9MO<*8_򒴯`nr򧁇?\O~OP PPf3%`30dQq .ߑr-" yp Sٛ;R 63 Y`QD-^ĘQF=~RH%MD q1{)]SL""E3f(8SPE6 zTRD S0%*PP RUePASv5¤\CXO1 сSAj (%.`ԩ ^耊lBsFX1ě] taRǕ-_vY"Y̝=k'T4 |M2:> ۲ݬ@r#* O)0"\,խ_{G%]ɟG[nABv-l6QTRa7vA쀀8\mÎ3 ‰+20D]OQ0M D ^Q[8`x `7LĄL4+a A9`-G5d7@@N\z(aL O?4PAT"eQG4RI'})̀1+ ^^#^tPGAjjN6AN0'ED)uo~ajh r&P+PPPʈa΀R,T=#;mHM)_w__&x` F`fxaa#2@ b8TzAUnd* = $01 C#tu wYJ|::%NUYb@ E 8lD{szdnm'A8voяAmLIr6v$LjC̣!Ғ6JINvғe(E9JRҔDe*UJVғ ԤJ\S <`ވ|B `OBڀ@ (+B D <6tJ ˕g+s=O~ӟ%"yɒ(r&@h2<(BR *3Im,QnԣGERԤ%EIURԥ-KeSԦ1 (El&AleW tcp ``P^\!B -2е(R)&u\o29)Ip|s yu<SMr:V:^=qOIdOLPn g()ի(5&OyϠ׉YH\oz T/Hfh ⯭zϞQ\/{A>Gm]^k)?Z@;>80$hܪ Z8?ZN@XsJI 51`5tX X#@<<1@ 5h5!\1)BX[D)/(K:B$[p& )l<YC;C1<p/D\C@̓6$@A , 5:=D ICF0CD [\{P? ^PUePeSTP (%D tDXeXWMsR|EE9GՀ[-ȷѓlL(U2IJ@/Y7eC\E M hQl,v`ҴI&g\  O XItNUzzgZj] hmgMS,g 8T eLh$-B-nK&> V5jZ[*pkQܭFxeꂀ݊Z1׭-]O]-MiyB (F ދl5=Nk ^h.  ' XY;YzDl O;] )0 ]  /~_hQDl}iRXJpV<g?fs qgos؀7mԢne ހ^Tvԭ`]]0ylb ( >Q01RsuuV,qF?@Ovd egcƈY% !UԦٌtH!H٤ ^`+? ge1\xd >Հd1edetĀ p9b`Xg IfPhp3ʱ^] hHa9[#i\ny߈Lфpc1U.͆ecHRg 8xӃ}ȴxBzcGV?Q AVoL:Θo`{`mβJJ$l2 gl{WE{8}`H`bֵL4o|}@c xˇwL]|coĘΜ|<{<1H}(~8}} ~L~I}|~(}O~~ˈI<].W~O,h „ 2l8'RhB7rHPǐ"G,у*M\Ė0g^I&@1"F>JLH*])NP{Jjuaի0jI`'ЮIZl*֤ٳj]۸kHһx1݋Q'\+$,ءN+.L1}#cMI3kFq熌ӴѡUnݐskخ7큹f`O-=c#d|lџ3mgN}S?(;/_|d5O~׿|y'?yGـF0n7iQ}pYx_B!|$PDx")"&B<%h"=X0 @E݄mGζ$rؔm@"$j%]z喎TK.QM8&"&qI<`AGRzPFg]FV\8e @$zSn2s|7(Iƥ)ZקI: dtY*6A>E `P& e-ZҬ͠]ŅΔr"٪=#;k9@>eku+ҷɊK.Q{o_M,~0I38 $8ul З]I'_C-2TQ3и4x6( еEDktH^ A P `M^k \䁫 Z~T >zp`)^D ĽKeS[T Ec;N Ogxx#:QJ?$m^+k?+x $qݦ;EtnsKL`Z2+wvliy{ #" p`AY`% ⍂D 2R$ =,9  H)sqop=H`GЄHt] ,{9ra uR=AbhŁ(qc(;P 91RgnW 3yyb 8PoBŨOj*#3ӆJ(M yq5$Ő j[{vn D -ITOC:0/V0 ,r=ӱ'nB@ 1\8fm Ppൺ@gSdH; O*Az~][` 8pvt`@ PoȺ@^1Zd/Bv<}i_]|SM DjW9Nd@\F|:-텸@ p H @ErO\ 0l` Gӏ!FN!V!BОv`a WY!a lB,tB.Da*GY!*!dzYAXA4AX6@ d8!#6#J DA="&>aN0a B0') â$b]dX^!ŝZ|t@*Z!T+D&>^(tb.8a 1/lc$m/E$"`$UO!A|@xLޡD uD c,o D~&|v@?@\pm 4> )G>\RL@YXO})$8^,$/dl Fd]\@ DAtmL@ dAX 3YDA@Q(.b,|mB3x'@ :c;–@> 0R]@\@P A+$G<F.7deƇafrZ4 o1@4@Tel@Ƞf.M@)$N4` ./D@q@؂&%tBlHYs=NuB'A'P\*ؗhhr{AVq M^ uet*\ao a"E@ DQ. !y~igA hG@@!\A,BM(A@hʼnZP|8?dX,W,ܭ@. DqmRȂ&,` 8VWyii\&y XyA<*\'tVY@ZS-+BBB  _x*sDz(Etl\>>fAO+ErF&I"D++@=^td°&D"~. l9&@~i, @]Fdl2d|$$6@'% lu,@4KDAjF,fāIJm,0@`]Gy- y8)P!ƱL%"S "$aB$eFmiW| t1@P@\ ϱJ"(] :# `_ *+9"ݾeأ\PUOabވ tJ(*`* ]"-#B|LAe !rEvemt-AxĪlCdd4eq)oh4Ax@ޤB@#:b6V%[6%PHZT%(@,. D%@v, A( 8"` ;WM&@ $s0CB XR=$+ xL%crGlYm"DB  L5UW\5VgVo5WwWW3 YX A 5\u\3A  \5!@!5AT2.vEa&B DT˵e_6f_X_uuufU#!5!YZ#B0A!,iA Ԁ`J 6Z"`BXA$BTu _vWW66 isig_6"vu B5]{7]_kA ,A_v_" @ @K\Qkk2e5vnd A 4?DO8W_8g8D8G h| ܀ A C\S'6^p@@GO9w@ AS9Gx 8I֑[Őĝ6.~tw @9{A_yw `QwbIzy AK7-:;{eǭ^/;{fl߁@ AWe|y@/ @{7;8gKg?{C{ #yp"b'T { {Eߊ Ttۀ@:;kρ scÄzcq D~B,>C*?o|#R ',?RE(\ K~yO?Q~wgk>3 :g_?@h3CAA&TaC!Ft8 1fԸcC;<8 H'QTeK-]PpeM73PgO+:GDx4iӎFt:jUWiU<GX=)ZN!yh~KsTӳ +EJ( >Г:?5z$<ȴD5(V2ڴөB NHUOYQoZ _]rZIjDg؛ 6" J)*тEY \k1:#u}v&e{ň˴v5@GM)^V2_8`Z@vRB w"趣A 8$E)c\{ޑay5&`].F Y@`J*eܠ[΃U9b'[ :%v~wc:~9u ࣁ=V`GJai&85fb|]b o\Oag-k:e#Wd=2)E<3W`p2`t&NT[=j2$N rP!o"b BD~:@ \#`,C(p,CФ,a& o0 Ob`Ӝˆ4dۂ B0O>Ox*]* )R  $|Kxh PF" r0!6)O `O1 F֎M᎟,dL) /c-R>#* <(Lb b,1^x ) Z/$c8Q.& 3.1찵(O˦CF*LXDn|m 1Jb0 d" 2$&&0Ǧ,/%!!`Q\R!`B+.@` 8-̭MBe#{g4+<`4L!н,2)H /2J!˅Q" "i(P#B^Fh2oz4)`J++]QƊ~lSS2:F:+:/:2"’2ʲ\G4$-(@>@@-@ $`$ E0/*?BǰaU2FKM~mP՗T1)h o!5;M+;*l%./RKv鮶*tr VIDLİ * NW)jTIL˃ In"bYkPP)iJKb$G+3qZ#-aKa)IO76W'Ʀ&P%걜,}+!hʑU[ Z?Q#(B_?hP_8tLv* ֛Xj&"u:lfc+ Yad.Ʃ 5\Wl-KlAF]_!֊V[) x)bSb\bX mji5SJkZ3V"vdZSP!,w2m7nhn}eoBpBupi$jYYr3gsG,IWLRP7)XVqu`wqkvxwsvOz)~,xFw(\)?lq\vyyy"zOu|dxz#{}{w7Ow(ȗ؂W(.Ww~~~"}ՁC}Wvh{ gD~ X?'C7y!xq0u x7fB |CX,$)X?RxvO{W}Iˆb+I{Bk}Q؂cF8.'XȐu8W}.Zx邉}‰ŽXz.&9؋Hٌ]m" +y-' .}5f[bWx*y"qbݢeph-l9[ǔ/y|ؕ9ab8 >cY0HߺyY/ [.pt8ؙ  9 6Ý8&&9z67 Zpz%z3J֚A䤣=@t,&`DQڣA\bHq$H S@9zLhB%ਝGZS$1m`5s"+Bw%v#f@Ƞ Ck2ɦݖ^fȉmq,Ӷ: 'exf"mSZ׏In(lV,"۲{BV}Yx` h%9k#'5Yφ--^1{e[9&.% J@ ⷋ$rۮ[vm[f2vE puB݂"{-̻{½Eb{;&bl zۉ۹ͳٻ } Jֻ!1'U>/B9oquZ?o=W}"`/Wkl+l)x%t٥׻1{ۭl $w"T}ٽf@Q@ } }]ԙiuɱسv Z="̽!މڃ YKdU)$h LLx>=vUK @t&p} S~E [>O PdDB b>+zlb֓e p>E1ocJY>"@3%6"*Z= w7~"`PUHƾPC;ae &`&op]mo4@9AK ~B]@$T>` b$<`R hH2lzu:jƞ/`ى?!B ,P tBTx1;z2ȑ%2̘ Q0"ə4k0 'OF\H hA  8Ō?h )?f!*O)[vx“ @A ;(!A '_n0ebHW?{ۿ?-P\#8C0`PC 0X \PV\G@p0QCWvPTQxPQ]C*xD.c2H#H bH$G,č5IdFD- l 8@͵G9@%QeP`IPKI@]l9lP@p!T^B" B h|ha%h> iqavU$lQn w y`T8`f IzrP>l@ll.{> A1 Danm{1#P`ein%P=YUow]Z` zـ@ g@Éy?OLq_W ,bf4(YкB88 ~Ԯ @ MtFtC ݚ 9ø)MuVSu%nN v%oV@1Iwe Ao $Rb x}!x5CtG@_5Wfܐ4#)0n7û5pu'@ (:j%z p]CD]@0Sw%^B$0zfZ@e+N~0~$e{He?@ tP %@)@"uqjh 8-H0@Jk8! 8X9p`[p#`V:(qpD,"" (0B J T SLE$LyK琓,PFD ٨tq3HYjc p6 "Hy["G| *"d.17J/,)FI(dB8,B8pPYPG&t5y25I*͋uf1(('/ N@,9y Sd\p2#c IM({q\6v& .ZM : Ґ1]E4@`| &l2lȞ 0+с*R.t$ڰ*50]Sj8TA&`@*{ @',!h hV0"dًD0̐d;yї޼+4 &-a%1]+y$P9F 1@ 0(Ik]zX& ;ij4akܮ LeU|qzs#0:P΁h \[@kg׍F>m{%K\R`}w<W.}& LQ0lKP N1O J,n_ Pj lx<1Ad:&M{$; '8 `(8TV]L=)x˂)1 Xd0mjY=8YS0.^ =5 A0ͅ`g09ьn4D̾ubr9s:ы޴}=7;A{=)uiv:ִ61eL= Z1n Uúֺ5^P:FC@Nkk8 sͱyt.x?wc}|rذ%[Fݐ 2 pہ +׼qc\3?l`u~hkn$yݻ!__}+Ekx˘".ncnczanKk bK= `E*@9ovjo9N>3Hf_Jx-),VYRVdz' hn/,+yS=q !l: +34P-ry#YOHPE:_]I]E^E|),w.`ps"Ѐ @RYʤCow;>0tE ӎ|Je|H mr1WfX^tA}{u>AaP@K3!1S. A&9!ڑ0Xxd\{|hWup?(3׀wb^Wq1zs!0u$`QpP 0~BVT0j &N%Y78 el{3لM@M 8:gQ7O gQ@Qс}h(=<SEPo0xԇ| RFxp$(22$(rٖ78WaC%7&`'c/_\%xz؏(i8 (<^7)kG2OS(G[Gٸp@[UW\U2]㒨@pv($>?)| )p2w=Z`9W03!7$y8qMT^5y9m4x}gy G18YΖOm0z1U0In&i|Y~ID{)9PPrh+<[b9]膚 YuN=)l RШfi8iCשQ+8IFRQQ3!S%0e ÄXЉs|y8ֹꓝ sF&C" %R)SH:4!u i)8!JA dhS$Sh2A· h1Sni8 Z3G{A}rggqOtD\_*)q"Qfyrm9}ZJF1t:wk0U$[MhQr08Cd{*)yKrjo*QBJZ1ꨍ¨ *:1*: 1zq^ 8Ѫ00Z) ZjRʪyj1*ۺ(Jj)>Cښѭ*:(J!گh2yH0$ZQ(  #ډ'[#{Z}0y3k,%0kQ=8{:C2 tG;BkD@FqQ 0Y[˵]_ aaJhk˶makI1s c{˷} ++5V9 P\ᣌcdE +~vkXJ+ +KkK뺯 +Kk4˻뻭D+˺kNjɫ[뼥{ k빝;PK ffPK8^EOEBPS/img/delcont.gif GIF87aLsR֜ƭ{{{kkkkksRZcck{{ss{BBBcccs{{֔{眜csJZkΥksRZsk{ssssֽ猜!Δ΄k{!Ɣs{ޔsޥ{便!!!991Jε9)!Z91cB1R1J1B)ZZZ,Lú°ˈё׬}/ H*L! KEŋ3jȱ eᣭOԨ\ɲ˗0cʜI&͐" @J П*]ZL:ZӫXj[@l7hӦmSlDR8mVߥ~)Бvpஊ>. l.#Cr8pDϞ+l2 2DoKQ=:t ckĭ^]@ .G]>mП'&i^77tճ#߭G:uPwJOh+v{yZRy\popK!R%A hU"o*x"q'F\t֨cJhT.(Gv\ :F\p|``b?;tA,v5boDI=bF@FK~$_H?qYɟU#R(fo1G{ָC*JEU_"St&`HURzvQIR)C:;fQF;x+Ѯ I-1nĹή쾍BFpAl)aR~E0S>,#  p:U ,$l( dp95ɲl8 |8+H'L7PG dY >-pa20 4JpRgL6p(GF!`+H*W02V s,WX򕲴e,mI^r~Y@A`p&-0/}$L@5uPdnd7A0rzȸNsܔ PԀ $ IL4eJNtz.Y]6@ъ dEAюZhFCFѐ~e e* O(?P"UдPC9Ԉ^ 8OS BN*SJUzժ9p L@W ARC%tcQϸWr!KXlb[XÂ}c+Z4 p`'.梗*sUA8^7z@- pK\,h ^\-#liW vx 2 KMz>.S.ݥL e~{]J *XxK&tږ+^J(p7w >]ۦ'80 o.uI_pm֥m7Ȁ68P>1 8Ynr6\+-Z+崁9̥s6j^ 0` `[,0 V<H E'Zt ziC@N{ t Rw݆kQ!Yn!k^`v7tm`t{# aA5M^𰶷nFDh{f}a[fܽkx;nF7#~78nCnx!q|;;PKp?  PK8^EOEBPS/img/expbs1.gif)LֳGIF87a7 cks9ZƽƜcBJkZJJZRZRZ{kZ{ksZZƔscέRJ{ckν111眽ZֽB19{sccck电ތބ{{Z֥99Z!kZBs!skֽR9cJcs1s{J֭c9cR{9kB{ZΥֽޥZkZ1Z9sk1)ZޜތތΥﭵJk)1BBJZ,7 H*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲ˗0cʜI͛8sɳϟ@ JѣH*]ʴӧPJJիXjʵׯ`ÊKٳ1 H۷pʝKݻv+mķ߿ L ]̸ǐ'˘3k̹ϠCd MPװc˞M۶Lt NfG+_μs <𭰑Tسkν]Rӫ_Ͼ{ ˟Oe M̿(h`ނ 6Tg߄VY(P# (Z(-Y&Ph8<@J#hH&A0b +=䔜1 A~<\ve|~Kihܓlz&yrR@= @Atʟa%@] A6^ 坓Y霗i @\?erʕ%)tftڊRz미+ZbIʲ6청0 D^-nv;->e+#If g;lm % 怒0dKj q[ʻl(#4+/qk0k`Z@-  t+AtL3P' SH/]Dw+d 3l /;)sk)h L^sX 8Y ~]KlW"u1rܝsvDՂ3ꆿκ'8C[3h/t|/ kt |m/.8װO-o}/n٦ݍ| y/CoϿs Gӟ@  Z]k7AD,EF~0 W”4[L`8̡w@ HD*HL'&O-H*ZX̢.z` H2hL6pH:xc#'8 IBL"F: ,JZ̤&7Nz BIQL*WVdN*Z̥.w^g0IbLf,CLe:Ќ4Ijͼ ips 8Ir &E6Nov%w~ DaЊ~Ơ(g**&jhfD:ђsi6!jҖtJ%edj iG1CSD)DTNN9:ӥZN:ҎP@cԫbRՌNjխN>EZs)ԇk\Ѳx+H*֩⵫N+S*t=l`ZռuUe[On5EjXX"+b+ؚJ݌gU{Ԯ6edBvRln?[ޒLipz&]sW:דesVV.U]^gk]w]yQַm.hv|Żₗ~dz1k *ذv`U,}gjr ϹYr(ikֻm:ܦ#1@28c& ȱ 2\"PLefXβH'` #/H6p 2xfO πgH q3h[tyИδ_Xh`AjC ԃ@Koհu<:#rXQjUծ^Mb;NOF k0XؗFr;e{jfTAnU4և<îv[n5c˔LC{췾N+f ;|9̾3݆©A֖%s'9r{۩/|awD'o{DO78q8| V]^ |W7%>aOщv{0 >7u[''.]| ^Sp8տ`wO;}Is'~䌧;Noȳٓm6#ۗ_=śt'f9yШOg/]>޵.z>s?GF7j*pK˗H^pЗyipapfzW~ȷ~W{W|H|rr'{ɧ}!a&$,؂.0284؂:<؃>@:(!g`7~bvJWts~gGH^hvi g~Mxokut{uCiȁp~vhIHvaz|((QGT$I GBPvdqQ8H^ufmb c8S:@!EhDh^?e(HXZiЅhLH 8\GhI8! UNdl긎؎a `Q 㘏E V)@%&GD P!ߘ YD C y8iTx 79B+C,ii2S1YEJIّّM5i4I6Ya? Д8_9_yafID.ul|J)rIRiYS̑%Ȓ)g:AID Џo9Qnwv9SyQ3ٕMi)yj yRyL987cA^)DNysOYy@f7yM(zHI(P%RzXO=i5xF `b:dZfzhjlڦnpr:tZvzxz|ڧt: Uz^ZU6 „ ڥ:fKjPfOJfZj:" :XbACa.Ҫ\ fa j!V9ߴ6ʈ MԊڭ:Zʃ 4ڃڮ誮 j*㺬Ҭ*b@6P { M [{۱ "[; ([ k+,{.J!;&dCE2{BKJM[R;T[V{6 FG+JĴ_bKXk.bd˰c E۶#{ )\_A/`kkg{io۴{K{f[s;ګZƷp˹c{;K q{A\ ;^ ۹+tvk;=P{뽺;[g{۰ ;˽@˾5;Q>G+dgLl  L| "<$\&|, \| 2-6|* <+5/(C\cM4MK; L,7\^`PWP\QS, LZ\glkLw<7qIl^"lpȊȌȎDň\_Ŗ\~<*0#`V@ިylc m^PڽR.-O#܆߬ߕ%.v"- O >]=P[nU}Wj.EV^`̝POQN+MS&n內tY~Y"n%TR07~?@U`WPyEUG}jLMYRc(.[=Q@-MmNP@9|Tk'}JNF0N^'K-~雁9@B0=w@N䔅WTWA}@ $@ TW[z|NqP_K ZԂp QD-^ĘQF=~RH%MDRJ-]SL7higJع3I =x W$='zϠqB?/n8z!@ƚ{ɼJpA^2J)kF-2DԴQE*Ϥ3m/1"8 #s*%KI'B3QEe4$0$1ü6ČLLAQOkԁ"N3Yꋉ& O=I""E=2Ы[:C(T_6G$TMexzY_xD=>zoz>{{?|'|G?}g}߇?;Vww=t"$@ps[ĻЁ`V6hqD B` I<8O^Da UœPp;ك䰆2,` MA :0kOB"ш+4*=s``>n@x/tGc$6jO2%)KiʟnCN:vƸG>$l}< ӗ8mb#Gn%"91 dzΨ6,! o|G?I#}:*䎮c&eYDPfjT. >.~rPռػ[63Y #gg3QS&:Q)!Ih1-2!|g,9]T2=9)MI_dizⓟNu 2O ϞolTQ\; ?TU=AI+Y3 {%:Dtlixij9lm[߲҆ӝ1$y:UL:]UaӞuaB"61TbSaԂ j\f%sF7klDn_Bf(v LslеB3j^%;YF kB6MntB_v:pljU[ٽq"7].sX<cIV]mpihZhoqzV׺-n 2=;^ϼEozջ^׽o|]}״x/y=fWTGJ7oBn>9Aʹ2wlkB ʐ6ġyhaؕu҇eo2z3ٵCJ9Չ wBi'U.l$OٶN5MuJ`,qaQ 㪕jVE%η辘_wQ,U<:-_.7-nW1{nxSu>1ڶgE33LٜIJ1Z ck$>d~ny=hpMO5C> b4@im6N{0αueOMf ٶ-ns9;TΎ%?yC}%1E '9Ysmp_ҔG} xVu]:Pƃ]z%$̓3&VD}w6χ~?}W-+?-/2.6~DO; fp[~@!2@b"'")"+r@-ðU32C DXH#6B+#sy-cT]Ӻ\ PC"6K,0䃥AXNc>~L D+nYTAdB|6݋(|5nB´58RC)a|œSCK'icѦ\;C\Kc'rz8AܛA$DM{20Ѷ70{ij79s+tSC2 Ľ#E;+ij;9V&0{Ec;zKEIC?+F~3d춢'[`B)pQ*s4Uxp$Ɛm:9g9;KEWdǠB;CcxFV2BZcB ŽAzư661+;"nF}Č7THI7NJ,Ɍɑ+*DK-Ϋí9b%̼=Q%S&>%ŴIaZ iĮI];}H+5b 'DrNd1$.6cÌP\DLs$[DEvK +drQ1ilƬ39mEլFZtƖQ"KQ"#͍B =H1+ňj9oǤ^TP\RA/5tE(C-ӂK\ȥ+;+S ]м.S:lk(3;O2̈́`I3,ĒCRɤNlSJ|ɁJU%U4UTUYRU8IN<"Jdt\UV@UI̳:R\lfE]-?9mе֚ sEtUueW׬!rW"x֍0&cUqzX$RNAμ? 3GC~EVr ؇{5 o=@SkbxK"؏- M1pXWYy)c#xN,׆}٘@SXY N"N#D ,c-dZY3:,Z&BZ5.$OF,-@۴Ղ-Ȃ,@P˩ͤ]uAPP;$SCЧ0Z[ZjCCt!h 6JZ׻}dD#QOH%]%H#PeبuXm`S҂O,cQ)uEE(}MM NPuBeTץ$fUZE=E8*]bN ^%^MEVm|7BS>ơTGkS[*Z-[E=f TM A5K+ ^_ _[]Dz;Ʉ_];TLĕŽBjUxUBVy V?J'Ja-a^]m]!b!bESE# `ŎRQsQuEkNvνǘ8h?]gu,'=D]kRll8,E'Fe?f]|jj$e_閱f-k_6z|SVkdfk)v}>EH}s+@mA}BmാNf]>_ĶHT쳬+L鴫5i14IF]ԷUTh{fh5jmt~r_W]LU.ngimy!͛[Z?Vo~eC-f{oN=`.<&7Gpo78簾 n͌dopWqgm͋-el.lU>enPbߤegpwppgp@ wu7Ymf(rp"f$f1s)qr(r*/gL[;ڔBvg/x&[/s es3 sƶ@O˂܄.q>ﶮHIsG\,huFĀծiM6-u?uNuU2o¹VljEB'N';S-j2U(8gjE]rdI3gvimϩ'jvg M+#7GGUNXJgwɾ~zWU>qr_v(d1Sw^kw^/0''y?yK vA?z yfzK]I4$/sy)ygw\waUF 7;{oԱKUaezb'xTpu{T{~=abc`?prF_ɗ4M'7{y'}4pp_}}*O qd|ݗ|e}d"%eؼzwtsg YVٜotͷH/M}}/|$-A.Aqom6wD 85,h „ 2lС'Rd`9sh)vS"Vn@'E$BhΜ:w'РB-j(ҤJ2mQ((jBOr+ы`NxUVXæ#ODP͛)Y|̇5iذĊ3n1RJeɚ7s^*Wb~2~Qw3V %L4m4‡/n /@ϥnFE>wƧE,hIkQ~u ۷_\VU\s X *ւAq`s>iRLa\ UXq||A94BwX-"1\fNt2'#e#Bx)vM81W rHQm+H߉]z%h Xcaُa y&Rx9@WkCFe|Vnm⚉*( 9(aiZT`>VA uF@dB#zWng=]z+xC#Q+HeYz'G"$%4{$& XhZ,{.ty$?LTb#(zY*nN|0 +ܢ@6 Zz=Xѯ\%|2)'0,i5\QU +h#3A =4*DK=u7X}5Yk5]{5a=6e}6i6m6q=wKtOL2}7U[dt3 ,ށ;8g8@9!ఀL΄L䩫:Q'rQS4C 8Ӥ;Ԩ~<+#wG-8C~qݣTz<>wv1G0xG-|(.v 2xtD~t)IB?9|O_ ΨY,s"ilq \BUP6!B!H8Ij\Кf67<o|8|b$E`qSP<33 (<; Acg=X%"w^q:q'wf1NJ b! 5>P>tDt24#90Bdu:cA$@IJLa{Tq?:CPNwIP'?2xJY2sj%4yȁf'PT*8UVժbтࡦNa:mE/G A%PCֶHAs2['B&̈́H}EY(S%/z _W8P6čd(HyϐZhDW"6],c C͐6)Nӧɒ&1YB7FN)Rj?(Q/h7*nVխr^*X*ֱj{Q=T?jյL[ ԑ4d[ƵMM49ρwfkQzԽ2+5Jw`:TJUTu,hC+9[G\/{(#9VϪUmL[:}G@B?ᏜEf岓:5_19p$-*Jҹ:#%)o4'|TŸg-hZJ)o{wSYyA8!fŽwwN8, /YE(e& 8s2S~Ǿ/mk'dc]sŀ$Dgb隔zqAI 6aNϩ0w),Q7ERg~|3 &H#ݙM9Ֆ&LeHTU.j/F(bu˲g,q}sZk5"56Ü::W}q,o u)IwEd`*Db4Vo{Ƕϝb.~UOeF3yZNfw).o a"'+c.Ӽ69Su9Ѓ0s1 rQ N/ 5u6sz;~:G(]nΰ;WYqӽxdUyck}n w?qy'^vw UzrCQϙuDZouvŲ8A󬐾<{. +mZe?YcH"ʦoNɮb?s'p. ؐ fOݤ #/ 4Vu7~#88#V!5_66wIc 权#A"";rcJ"Y`e]a*^*f">$hcW(dO]ef$-6c"$F2CV(jY[G}d$J:Fbd5ppM*c$N&J5D5YW<םdN"v,N]'ri^  ՗[Q^IGRꕩ>SFYƂM_UQZA`%[Q_QYzYSSB׌ $MM]"^ CM%4NLY!Y *VV^]޹=ZH^Z&k%a Y eiifUɒaRғQTRIUnbijoB rQgRgf'YO782$33VMIH%x O>bx?Mb@ɣ\]"{( IbB"EE[Q$=Z=JwI lTHrQv ^(FRqKYcWWFh]i EgEE4#)&Wn ho )rЊn?J'oRgniM)Ui`]a%-&A6Ar.*9]VbΨ(OhGF߱VHVtt&*}K>Dq/֥2T :ddpPFhf)fjJ l]UTԽU^ jMM*IӦNSzA[Jk*IzQJ3+eX%6[$f2&:҈5qk-. n@PgZh'gj":Rwfk m (,Ukpi'1D@0 tvl~쥞j¾ZV069zA7S#,"A][ĖE} Gr~Fb:B-J-J"ƛEJRhԶߞ"ć"K-ک͆Fn.DTimcPIdzlJ. 6D蕞ji蚏.Ʈj.͛kBn re6ފb?RV]f孏N(V􆯢ToC~xd j&n/jo9^dq5ަ-߮mon)tPo-~Xݑou>AXe|V.(>03\*0z炯Oi(VlQa'`-K+ٟ7) CN;}'k SA\`"aYo;7!,_ qj;nlbNoo?cqk\,:,뙮k+lvvw>xay!ӆ12BpJvF"vS?Yr 3p ;0(?*WQ.D٭)B&r.-Ӑ/.bB..(""l2g#ƨb2mk9G9Ƴ<3=׳5363?W7c5s;3q?r7?./:D?ei@DtˎVj'4K-B4,3rIKkw5sm|j**'' oN#LgB$ueP2ceCFUDV'G?;¼d<0sAD% 7PJWÂjJ]ŧ2T+"~+^wmxoMGkD ;BeɺO?f' 2Wg G6N6ee+C$Yj!^q+Ħri11nr[s\#k z-p;s!fŻ|&xc!OjwJ/wepm^G .}6mJ2*Ғyxs5A,%yQ jk֦ `?v}-e+',m5w5.S|كWbm04yuL ]EwAHs*.>k>sxV4ŒeI?+Jv8sos<{t=O9Wpw9//:7@?yy{9xBBF;C;3E?nokys'9@4yEL߯dyW+:|1V u۲+ nSĦ:eTTtY5a9-Yﺆ&X,q-1'ʧv=|zD1"q#+Ix+Y{;_puf,w{v6C,}?7XAqw2㴽/Jf?,%/$0:'qsrswSt]C|wW2~_Ҟ'{{{; ;sI;*K8y>+:9{D4-|Hk?k=}M8J!n.0! " lAx8$rK}KScs#`A"$ 8@#=ǻ=K} `ߟ;"\o>w~7"= H>~+94⫘퟾!G>)D#r=;@!DyF$8@Áh89Cs7оG='/LFz@8؂ $@!F0fԸcEA9dI'QTeK/aƔ9fM7agO?U:P5B#g-x"Ŏt3>Y{ZǗ?ct~@пk A P@(a.{:j+/CE C PfqQGLp D &Ab4䤘̬ " -Ds56e;Sƪ0ƚrSE]zQLD"&p"((""ZNmWaeIB5@ADt# tX*XHyV!4K bFU#HB%U$PՑ^U3VuٵwWy{W}X .NXXNs݉)1X܈7YI.m츢EaYi6IeX^y矁f"(裑NZ饙>jhr驩ꫛ~i[습vN[n-*Z# k\pU_Zo!\Or69Y@]I/Q7Y9s[]SG_]'~pށ/v܉/t݃OVVy}V0xOu}`M=ӱ}[ a,0݄@я_ @;t dpPt4s@ :o@9pt+ĠB*R #Bё8! [ u1Rî!a@.BX:#6z+F<tk R Pх#"(F9DhBFН)X: 1tHԱot$P:`$J pdaJ0N4M") W-8bj˗t+5 Xn%)YeLe@ arD&[͑4t4Mk޲{4gE Nxtv쌧i{?P>EϹ! uKN59gQnԡGARqz"5I9#ء-u$I]S3MeXSiOAHU(JHT*`J}(ȥ:L*B EW]j Ve5YњVmu[WΕu]W}_:(5]a;2uNt,6+Y͊gA;35mFӮ3KD[[ٖI@Sg[RLRnw\Fo\)=.Nյu]nw^񎗼5yK<@u{_Η}_`6`/ v!a O1a oAb%6Qb-vacؿ#ǐd!E62@x.K>e)OU2$Y.Zf1e0e6mvg9SY g=zVshAzjhE/  iIOҕ4|iMoдjQԥ65Gӭt5jVӟ>qk]X 6gd/`vv}lPնa(mY^ugtVmx;Vo}o{e#k ^9AxFq'\-1q[ Ax$OO^+K\1w-q=_toC7yY&':͏Uձe ]zs}bٿ?e'vl:ճw&!Cx@tNݟS'x~_x1yT'3zя@Pzկw=zϞ}q{~˵c{W}_շ9No?7?}Wϟ?|O0 0pp#!0p)-105p9=A0EpIMQ0U;PKBBi.L)LPK8^EOEBPS/img/search_org.gif?`GIF87a^ޥބ{{Jc諒εν1111ΥJRZksֵ91s)!ssZZZƽc9BJk1ZRRscsR9B9sss1kBsJ9Ɣޭ1k1k)c!RRJﵥބc֥ks)k!{ΌJRRRJJ{BsބZZƥބ{ZJ!{ZJkcB{1sc9kZ1JRRccck{B{ޭֽ1Z!9c99ZތcJ{BcR!!!J11Rk9c9ZZksks11!kkZsR9ZcsJZR{c{ZZ9cޜ191s!s΄֜RcksΥ))RZRB{k1k{R{BBBcZsJZcscB{scJskcBBJZZ{)Z)ZcksRZ!RkkΜ!!Δ֜)!!!JJ91RRR{,^H*\ȰÇ#JHŋ3jȱǏ CIɓ(S\ɲ˗0cʜI͛8sɳϟ@ JѣH*]ʴӧPJm իXjʵׯ`ÊKٳhӪ]˶۷pʝKݻx˷߿ LÈ+^̘KL˘3k̹3$8dD`0װc˞M۸>@3dpa%r+_μУ{~É;0>`O<~ ϰaE` @/I`G`& 6F(Vhfv Nmx\""1c!<@)Did~#LN |xߍYc~5^Gv`)diI 3'lk߀.81ЀiZ Pۇ>MrcK-pʹ m7n騧~4Trnp@$  p7|9|?og.hV⪱vo[o^qonI X1d:JSve/ ̠7# "MGGH2ȃLp( / 8̡w@ H"HL&:PH*ZX̢.rq$xΐA$vp6pH:x̣> IBL"F:򑐌$F11Iz (GIRL*WVƑad6ѕ̥.w^ 0c, i Ќ4Ij^$p>L9Ӛ 8IηL:v*ViɗZ%]v]ػy7N1 sK"06ul_?3Sj6Hv;)[rt )oo䯎GOzN  z×SMϽw{nOIV5_Џ?'wAŧ[?OOW3?w3O۟{7|X(zw ؀ ~1~Xx*뇁؁&)cF;;`)-X6o!?A%(A(1 L0 F0!`H78Tg982ԃo 1`'`1  X^h'01PgXr8u;H8 t[E;`(d @Mil膆 Fx7ehvWOٝۙS9YyIȜ wz55T6`yٟ:Zz e[HwQ8"Eoڡ ":$Z&z(*: ʠ SSa?_g5M-.Ywj_Tbuy=Ȟy/ T(ì%% evJfBq¬K˺ۭ>w:P-bjV0/ɲ&s`|LZ*M;l<#Bj Ǫ&! ˗/Qztl."|Lhɩp5<[5u̩z4uu,W4Bʪ܁ p j0qw@~7\|,z[yጽ<\sؼϸϗK+Oie ݙ| }  =͖dVû9і˼ (Ҿ;ѽ'|(=*QB~~vѬ.>Tjrn3E >^þ.ΒI]ugκ~؞ھܮȞS=R7w! G5y^^j6~Zzu-\z+2k-}x+˅ݰ)U[ZܵɎ?gL:(4?]+ޫ;h*˛ʩX9h׶^ JUOxg|KJmz~a뱬Y|ڋ!ԝlĵwX]]k?.̀+A1J}pl| pk1B޶_^/NZz/79hMHٮnn_vOV_Ɩ3mߚOQ+Vu'>ҟ_8qBQ61a(Th06>QD-^ĘQF=~qaH%MDRJ-]|H#.lpAN @PEҀiҤM/:t5"^}A>*UXe74VZmݚI&Ν<}5(ҷ};- E{Xbƍǭy3gݞ~՛c[|ZhҥMFZu釫][lڵmvYn޽OB;yg˙5F\r͝?"pu/k5aOFyێxcJ~YeUQIc.$yR/u衎̒6hzh.髣&j멩8^w~^F;mZ8mݖ9{ocY;y>p^ɦ8'v@?}ӗdwcWWVٗ?鏀_Ё?oXA >tTJ76lCa )rfp}_ cA 6&Cπ`H0|_]C&RJ p9kPgթЋ>k8F2Q8ϘF4Qdd#(YьwtcG=u#7}# (5}l#G9rzT"GmL_eZ@R1;RJIc4h%)ciJSΊ%,UYR% lL^җt.)S &0cb沙df5[. }dOҜ%7չNvֲOgosYdxN@hBP6ԡe :QVThF'zQvԣh899NOҩ'AA҇r+uKeИԦ7HJR?Jq > 55GTbTڢO:_WjVUvի[W:VgEX͚Vխc}zFUk^W{k`WְkaX66H{BNuLYvֳmhEZִEfKZֶvumle;2N'[R@XnpCEA\J$ 'ޢ;gv]v׻ox;^׼Eozջ^׽m]M_o~_׿p<`Fp`7nWp5awqEw'FqUb/q\b7quc.ա5ڣMZHMM[NXOx=S<=TD5eRuKhj]fW*}5}۹4Rq5W.KeSn]WSΡסN1=Kw XSDX/7(8xpQLdURXA؅R.YhY- M/Pط4AMtO[\ebڦVYТZeYUM@ZHM*E8THUXU؃=8]XQV}} `*ι-ܶU`\[=V{4}ܡ(S5mW F~$,BhB@X٫ߘéNPRXYRY#ݩ5 'Zpb''}taY5%Հ/uZ_%2^3FcUb*(JNO=P6Q[fCf}')N*V߄[vM|ҩ<.`DV` &`)  x=亝dO.@6 ?},QӍ\ddHEu`Nd &ج`Vf M@:J bX(/1.^5^̋c9֋FxxFp=ZH> u%%deVR7UduEF6GFyLhU*-L6˥MW~ yƥh&iS8EJlK],(LȄbB}؟PMfanEh&h.h9Xe^$Cg&hJ#0b]]dY& ԰w.0̰;<'<Ѓ=>) +di%5kݰKxl @AB8XiC8D 9D E`j֞f Fxgn1(&?og1 203@e K*ߩljudlE6NM1{$E*`67l,,-%pO-8o9o9j5^b:m 6nVk4{'(  p #!=M3|Gn+؁$ւWoȜHHo6./01 rWdbw5{ ') X "(B!#PX$H%0s%H%p A&p7sTs7qNu=OP73,(t8D?/1ŁI'A LtLMdM-Q?F?L@_1UG'KWd&t?[Y5<^_u]'ST\v[Cd_AbO%Jijklmnopq'r7sGtWugvwwxyzjZ'z'w@%x'yGWy9wyW`x}״[gx'z'Gz1gz_yygyx'7GWgw?7|'Wgzn~x~'7GeOwׇ_}ڷOٷ}'x||/v|'7?Ggw7oxz,hP 60l!Ĉ'Rh"ƌ7r@ ~,i$ʓ!GlǕ aҬ S&I:wbŀB .lpS$<`!֬Zfp+ؑEǒ-k,ڴjײm-\8ҭkݹx Wl0?M)ԨS^jYW M3k .mz,Ӫ^nײ]/^X)SRzw̛7wmȗUyYЗKnnmʛ2‡Ux<"ͧoomg>nwxT\~ w1`iB8ZAd!h!W'8[+7axI[evbyi-CUrd{3Ucp<~#Y!٥[_Ic mHᶡwNcV"Ğuťgtxy'҆vjrT(gA hP{BPiZeA!bn秪a*z&c*xjv*)捹*+ 0-Z{-j-z-;.R骻..K.{//vl`2 +0 ; A<17,k1{q <(0p$2$35g3Ϝ331$ʸzH0(4M;4QK=5U[}5Yk5]{5a=6e}6i6mC{؍ ]5;o^xY#dVB )P + bХϧp꫻~s&;7>vgoV~y{9 ^;ɇ<|C[{QGh9s9 ŷ0zy֫|޾ǏcOK޻W<~ h*Pg 'M_P;}r/ W D"a*<H -@0! _0$VCʐcAD$ƄD {aP(`s/'6m;7vt G#}#=&yH2zRHD񐄴c/ IRd\dJ/r KpF@q|%C,)@zd K>rK^m$(iY~Җ%0`>Ŵ.M_Jt5mLgjդ%9ɩuno&4éMonČ,bjR-q5ya'. jOG겙4f7 Qn۠ĈJ3~rOs m(JI҅&E),5)љLJORtM)T")FҟRNeNiRTKUqԞ%6u7ӒrW](Cjuɤ()%ӽבZ5b'V ؜"$59Ųћ`Iɖ:9'S/{TuQ*LKO:՝ff٫5+DibtSBiսRU -j6G JZt{r56J5iϙZʔ +nZUr"ѝn>%Uv+x}Kjw]^7/RRmޓRhX^v7)_)1nN%T~,z`j6&|sڰw FK<^uqkO pyK5&I1E'ꌵu6x(]QY0-@a:NݢBZζX:[_{ v">swn9C3sa=2Љg4!zXdz5ε huX('ӛ<& Ji*cF' oZ1XD̉5;imF^,-_WM5vD|eTg9xG["nF6YmE^;۱5mor.6le:©=ЅD |e^M |06.+18#.S83qǕ0O 򑓼&?9S򕳼.9c.Ӽ69s>9Ѓ.F?;Ss5riTկ^_ZKRb&H[n﨏_~˝p 4   .'Ю۞w#}C|ߎyˋ} @Gnr%Pvǫ=E\{λq+~,I@z;`r#@yG;/ eEWr.VbbSPnş&]oMPpY Pl5|[ 5^S`ބx, Q`Y_`  Π fݠ  .a!P0_"aVx@ `a !!` v!Y`b.a R!La"!F"f@fTt60!Ҡ ) R* P< &ֹ!:a"Nbr!0N"1/cTb9hN'2'`(aʡ,"b7.`r-J"#R.*>.c:$"2vc<3&R46^5>aca*7.d"+aBB9A:^; £bFr$.#c%E< I@@^Faa+Mn_N`Q*"Ba!6!2/b!V.=6"H.%""naIZ$E8@Pdqy\ٙe[La`QbdYe%ieHMxeXKY^e~\!Yh%^R@aA&c][ggIh]R0@j5 @X l&m֦m&nn&oo&p@Z؅ dڥfrZ-s@ @$,w*x&q^brr$۽^u^tvtBe{ZgVndF]f`f&{'z(0h ߡᝀ}ggafsjlyp[$fzX !u"hR|^]TXFae6.$y NXb菲OE*ƈZR%I2Z4bZfSGN'&ܧF_V(Y 2gqdMn#\a9iY`%I[4YCaNǞ6aRS Ba£*!&aG6eb2i;kjScB#:+#Fi2.jP'A*Ш(2b DF$6$v*C!*8V_6rkaJvB1*"S!Fb+.d<ޢVlZ,^ry+Q*Zckj#Da:6v*n*̲~#2RnR%bl*֪ђ+Ӻa,>+&-S&"jyUR跦VezelPkDͶNd̎㽶kZ6llӊ*##cn>*n㢣ZF+iX-3mȚ-fl(#ץ+CfzD붬n*Rnj.N#/>n:N/(NI؎Ȧahkz*9-Ƭꦲ,r #FJeU.,VmQ!&"Q.%# ,^l=&pJ%%fRiي|金z-a>r.^zopzb f c/Vp^ypl nW.g.zp0g K*111 qv1DZ]pG[ '/k~28qqF(|q{s$2-"/2#g5rjk% 1(>ΆF+(,Cru2+$Y0 )ʯ1^"#4+(r%5B.^+2ˮ36g3f34Os}8o4(7j059ƯҮ֯B.A"*tO/{- ʪcRV0;/Fj;R-J,OpHb0в#l1X /Oe-m.kޒ#mKs4/b4KOO;E~IK-*>GbT6 )p -۾8B;C/tYUS[GFWOuXgtL+G1Z4708鸾5PPj]ܶb.\mcOvG+6:0ckcc0cNdr>ߴx3)_8n6)Z7V7]nP/̲Ej/Rpnn>;=eo_m'z}lruAf"-xk7R*¢j?tovpwI[3#Bv{j4smwssgWrlG wjiZY4&"j8fj[8~08m/?ϱ o/'hSXZZ7Ҹ199r%9/-'2wiHYjs9t719x?r zgu**7j-?g 粥1q+k@E:gSg@346ka*;)&;;3B;x=oxh6Kz:h.]s_{Zx?K/ʺ׻[N{WY3s6Z;g(O>2#t*^6V4F4j3V6|#nFcZto-;z0jpJ+W5}t4:w|fL&@/6uws7'.5^RBr**.t,{w}oU Kcri46~`Lt/3ϯft+5v+vu?=#u,_Tiy>W?@"E %V`aED0ĉ',paq 7jcƐ"AJѪ֭Z:ԲX5m[Yצz,ص`ѺջoߌMW_Ç#mqcǏ C /;0 H~pa̙%Hx9@kׯaX`… Fpt1d߿#&qoǑ7kɡ/]zӭgnX2e˧5s Z4iS=*dDطS?_?[CP\D 0L> mJ; kOD϶rYl1]-e:q(pB-Đ 2=FdOl'R)+R-/ S1,3LS5l7ጳL)D4\/ޫM>>M-F|R$4Q:3:DO5$|-nO7,M5JUEV)5RYiS!,CDAKMi-Wd[Ü}6@NOj3F=SUpFG26ZL\i[m]% V_IEкjE܂krB6Ab0K(B /5V*z+J>reM6_}Io#*P;X)12ZaD/ 1C^yy\K&cS!mԞ8~(wf"bP;o;( Λ#k**+:K2Y'ﲋ.:᲼tW׼cvv:t?ofi.^?M;m}O%}v~+.x<&zVڷG|'cץ&k.3/(G_vӷs_6ve Nw*#w/omX[ ݾ>D A8iq —B$'S! |{}R"ȿwuE̟oW@@WvA䅆R:q[ȼuЅ/# xņID jɡIFC/.w!SEAMPX+G{@^8 ԧԩ[*&̭'ݜ .ʉmu[WΕu]WʵA)Z.^ux`IXʴk欟LkIq+|K?۵>kf`hZuX5J;p})j Z5<͂G/ jinsۍHA^[&G2 h]< DZygV,9shv\a mLkLAf:d&e֖;`N8@[ `,DޥFhIqI4RA|?%'j.MQFw8X H aOW&.J}vG݄Г9W8Z.qcrF3nU>^}[db/.E7-rS29AfP4{nbC;D ;CEȿ%op[{axt'?_Jf}d2HFso#:||U&h,()IkHwy0Ne[^7j)yp7Ty GQr5Vg^uZHkHλּj&[`{Z#SДkI*cG[r#a\xD`}84#gf-1T?G߈dh/gR*?t@D  ijz 10q :G2IU<6CqG)s78$_I%1r" _ dLtG+1E/0 ׌++7'ROOo6#3;)%0 @QomHTС"4![0#JȌ\Ur69;Vè$RRCQQQ!U5\R"=u0бSXU!=XT.zOmZSJYJ[qu~L\WSUS06T)u+U.^,u,O3PG1 s/Pn5W RrfL'6/3NMR^Z0FO41b1- JS5[WU;[u=_5Ay3&_P3Z?duSksFlYTl ll [?]>5Kvj2O$dp33qwqqq!  7S7VooqsqsEj)GnE=݃=ov56wtqt u}%s+YWB]7ZogrOjSwSw]kǖwax[w4`ݒeAE>Ƶ1xv ^YtEyw4D7x2-Ɇxuvy{G,HE,QIv[1} terW[sϭ%t(5`KJxL)M]u @TuNj+7vzpM~vӶGc>X7 UnpugIH\wŒ&]bi3}^bZ& 8ːv-w[ uaVWVrXxWXRݲ+MSgXT5XVx^GU,}x@7ry n;*ˎ7n\% fõ\\D&U#9c8mcu@0jeWU7$ E0ZUKV\MYf R*8+9shYidu/d?OzϘݸxwL,/KӍfلK8qLf9XSgR΄YV7X0axiwv&[qٯ88wvwÁ0JnLXGEyuQ:9/Zzׇ?tCYui0_dBSSk"rz::zqIAsYPvBٗXg:ڨtwםz:AzߺB;ޙNPXHm6I}Œ!7wE{ X3hzHݺ8;GMU%mV0f58Q1rm9\=ۆDsX߈Iw[SV~ VV\-;a%Q;^y85W:Uۂacw6c+e^ Y^cnsiڿ񒌤yRy];j9xx"5jZ=W2C;9ǹ@N)j㺴{,VP.fst|ۺ/g|/)Zt,:2z06g: c%/l}zn|~{΋ϕE ύg<[:Vy 6;ۣi<лC2A=E}IMJ< _7kO{wsm]տzeɷ[;}K:yOzD-q!$]sҵgGSG;X~:1h۳3=瘼Z5ĺ+˻ }]yܳX_}Z݉ pܕ K3XߝYg^h@;TrvǀqWko%U9<O>aY_QHUm~/2s[pK\H4aW7[=V\^]iѤQ~ǫ9zb1^dm=C#vP._Gl}4kqVAgq>1\ݤ}Ayzہ}u>r1cѡ5ߤN?%-I^CP=]x?tH2>@޹+`Lu?ߕ2%H@;ģ?U ,x… :|1ĉ+Z1#Ą;z2$B$Kʕ%S| 3fD20`! <Lp0`:0(C:} թ)R( -ZHKd˚=ڵDz}-ܹҽ; tfs`"=ҨNz5֮^ 0]x7vGRf/Nvza낳]-m;wIrݰAp! E @B?U+/׮҅vNcm]`zdqN :c7tD SiH.ںM 4s@ PrDg;β]tƄKd#)g@DY, oyz袏Nz馟zꪯz뮿{N{ߎ{{>@ (@ ,PNE}w+H\}o}~O~柏~~Oߏ? @|r{@"@k:3 MJpT6$`_|d%``@ 0n@̍4 o갅s qD,$*qL<(ްTD)jq:ĢF*rqdYC$JI x@ѳ N)e& =#,8 el# HB8%/Ljr'? JNk,)OT*Rl+%Xr-oYWr/H\ s1H`*3Y.R@)&j#HB q# tsl;uxv=)|b: Js}2( yF'C͏/7 8Ug@OҔt%5J t/fKYӜ47ENmPl"G02ꑉF%HA@̬ju\W ְud-)Ufm[ ׸ut5kP1#4yt8R3 ȣ7jGJT@ͩWc JvZZjvlfel" Mn2a5 j7((h @m/Lkzݳ? j5szԤ.5C;zլt_=VzR'!7֏tDFnEl o` hKیhD㴯j[&po l {ٓ0Q""+|{, Roہ#<9oz lK|/k|?|$/O|,o_|4S~|< }D/я+}LoӟK}Tկk}\s;PKzD`?`PK8^EOEBPS/img/assgn_task.gifcdGIF89aa!)BJB!!!J!Z!k)1)J1R1c1JJJJRRcssBcs!Z)k1Z)R1{9{k!!!!B!J!!!!B!)R!J)R))!))J)1))1c)1)Bc)B)JB)J)RR)R)R)R){))))1J1R1s1199199B9R9s99B9!BBBBZBJJ!JBJJJ!!J1!JRkJcJskJsJJJR)R)R)!R1cRRRkR{{R{RRRZ9Z{cRRk!k!!kkssk{){)!{)J{R{Rs{Z!{c1{{s{Μ))))RRRcRZ){9{J)ք΄֭ZRތޔJJ!k!s!sޔޔƜJJBc1cJckJk・R!c1{!{J{!JkZRR)RRscs)ք֭c)ck{kֽkJ!s΄ޔ޽ssB{1{J{kƄ)ƜƜBksΜ)ք)֔J֔k֭֜֜Jքs޵޽k!)9kkքJ1BJքs޵!,aH*\ȰÇ#JHŋ3jȱǏ CII˗0cʜI͛8sɳϟ@ JѣH*]ʴӧP2իXjʵׯ`ÊK6ʕ]˶۷lEȝKݻx=( LÈX̸c<"KL9˘3k>¹#>BݤӨSF=װc˞=۸sm .܍ȓ+_μnHNhνO_ľ٫OH/(h8ʂ 6F(Vha-U\lm5me(׊(<&#c8f8fَڏ@FېDۑHFܒLݓPF$vTVIxXf%z\vi|}dηߙ$ ^(t)g*m )$"ER Bb\)&+㣐*66V;~֣hAv d䨻5ijRV])Y& 2JI yVKnE@RL跋6h8)xiz)iZI꽽oqr|eG魇++'k1Z6ixSJ(깖s0RС#,ѭZr yW8Fй4[fa.g@Vү ܿT+g\gb6lgFhiqפ1p7o,h[(p8BP e[1uA.E-sXdYYf:h:A./m6PA6ԾUW st`'v}dgv'6mr= p}wZ3m 5?xO~]D@<3g@vt:΁0\!Nvݽl*TFxZ3,>KGCMN՛dBխ%7he :l0`P-$,΅_AF kd#AG:PY; d2#A@:]] |Ƒ$HiFIFN!vAZNf\m 2JƃofU q%,]57 Ė$erL*fMca s?fcS )2aLze%0K;h6l@%@8v^ѝg<)G9-sY͈3s0nFM= IHRC[$UHUred$G F'SRNv)(SIrw|eNaSU%AtIJ,0i%a.@*ӝ+AE|Ϟ*9~=hB Ёu|#C{$ r&tIGGJR~d&SҖ4vLo:S@NyJ[ZE%QTY-KM&TqLdΐѳꜰ zO{֜6gu<C̝=GzSu%\E`*Pk,D' YFAsAR-5MZPili;ֶwm.w[\ n [HLU纄?F{8İ%PP @`o^k/揞dk_~oa f M3XAٿE|C+ГVtTIt>Q7Zκփ+}U"҃7حXLxC*0dĽDtϽF7? ^?~`p_=<:?!lyY K!Ku_son{xSLJ|ɇ$˧/xϗ'}GU6<٧}o}L>17s{3{~@G|$H/Hh*8B  iH6Hmr>h1aEB8DXFxHJLH"zPR8TXVxXZ\؅^`b8dXfxhjl؆ROh~r8tXvxxz|؇~8Xx؈U1,'Qx؉:!h]f1؊88)qX؋8ĨU6dW]،8xbHڸ؍֨CV蘎긎؎8T闍Xx8U9Yh\h(z2ّ7]ɌY&y(Ljx2 029蒔H:<ٓ&a >9DYF @yٸGٔN;7T XZ\ٕ^`b9dYfyhjlٖnpr9tYvyxz BP9Y ϲ 9шɘKI)h јɘ󘑝)ٚ鉤Y٘ y 陻Yyћ9ֵiĉ9ȩ$ ٝޙyYqߙ9i iYyI(y9 ڠ%ɟjzU١Ù  *¹"*ZZʔܹ2:HZ J:آڟ <:D6Z8:ELJ>@M:TG:IZU\ʉOz']:dJWYJBZlڦH9tZqvڧ~ jjzuة@p" P?:p p@lP7P QU7Aؓ qʩj 8 APB꫶ zHJڊ*گj?:A: Ⱥ 0 *e`a@n` @p3a7p7z5(p1+:JD+1 7C[H6z}*RJ;"@Qp i jpj kz({]zS۵<˳p@K +I1Ю۵ḎݰFK^{prQ1w; selSs˱jڷJZ[J˲7({[;k[ʳ{kڻ{Bˬ׋K`J۱ *z K{+Sҋ0ʺʹ'++˳[kOT !ܴk,zZl$[:E{Hl;檲=|0-|Aл=;( kml0Kf\hz>̦H)Q {P`īZM< K : MʷV\麮^\jʚp-<*u<ʊz\,칁2`hPɾk jj;Ljϼ97*(Jy̢:Z} =L] Ћ*Ѝ$}m% &2ݝ'Ϳ)3Ӣh1s@ @ 0=A}ԬӚ)N͞CE=O]ՆkZ}QmS[E>b}c?n͓dmt-5 Ju'נ|}f ,Mkͪ؈ ّ*ق-~}U.>7~ &Nf. ن]hqChܟ-=./؁^≎w獮 N{ym{N-^:/ Y-#Ncc~J/Kh z낎޲-3Mžܳ>N뺎^ =.r`?0=nF6>F޸ipnJn=]%^K˺ͭްذ  ! ]̜dpߋn:=^.7-ܻ߿}] ~=DMO2MߴK_d`^]^js#ϝ 6Ш]~VXezڝX{j\uśWފiV]6F| FXbv^dOA)6ƜYfΝ= 䅕^Zj֭]|lQrd ~[n޽=ǖ-`qqF\rPG A_Ǟ]ϡ Jm͟G޷S&o"ǟ_S#8 >)dA˽87 /* CWdq$>n3Q+@Ѣ}DHq[2H!F3Ƈnѿ||!ʺ^ 1f,@đ'yGlnL}V@Gv]N;a ͽ#Kt2")wf9e9 ]a;4R1qB$v 9?eFnTRUWe5"ܓ> <;zDEG)[6X;tF ]4jŨ1y Ixi G˼UXomU=¡D]o T4I\y},3Izߍ/M`He` S/҄a]x`d39)%bEF97ֳ V9f#6|xfw]>٤hY=(Y DPJ5K/3|j*_f|h/,;mtۄVxr?iPqdgGQw]7o#; \4wuTZP5_;t٩"NSg@՛Ruv]s.v1E~v閇eydEu[9yϗyMt9eκ?#Jf@6rW+ֈ99ЂC`'@]Ѓ_[zLBЅPKY e(<L*aBKo:PxCшȃ $X6 ihOb8E*VъWb(HCA)aAgDcոF6эoc8G:ϋJ(F2IC?x;*K4YHF.2"R PJVҒ$ f1 E98 A$&UIMn5rʤ|ϖ)[ILr,.]NQ~f-;]B*\e2XQ}$ -[~&I]0  45S0^aQM4QFAIN3M5aÐ( PeSBzә7LMC% P"cLF ʤA0vU<4]tB!Q#'= xp?+8p4 8%GJXHL-ә#Z"zGg@<&ɫSYoICg>L%(!z ! &U_ND#Z}HLcVS¦j]AQ`g9k o=MQn՛=1Z~-S9XŶƪ*GlRjA&`BVϴ3KUFu7jLq$֞wzFޖðjqX6Hse*9IӲlUQ4=m9^*v0H [{>ۤ %~Us\p#A< **iq&)"@qV\WkeK}ԉR 8Q HUԱkP8"5ZkwܕVxʡ)WFX%4YpbaF,csÛ knn>9LtytgŊ($!Ww/ hQԿ1t⧘"kPӷvI[eE{v=mj?vmnwۖs0F )Mne٨^wGk3wL}UAFn |lo6%~8F"yE>r'GyUr/ye>s7yus?zi[zҕt7Ozԥ>uW%'Iqx__{>vgGг!%wH>ww{˾vԈ?xGI|%?yW_CA61,CxAHND CT On@E0eAWE{^ ESAOv0x  $m{Oh,lёb1JDbJj TB@ FLd9A0xLJ?rҳͶV9kXй 0KVPSskoVgգsEWP-VmUdMwWWqUx|uUhn׀e#pS؅e؆uXA؉؊؋-؍؎؏5ّ%ْuG=wBJeٖٖ٘ٗٚٛ 7ٜٝ-Xw;%Z٢EڤUڦuZeڧZEY{mE؏Zڭڒگ۩ ۱5[ٸWٲu۸=Yۦۺ[L:vռY\5\-Õ۽qZlHJD+{I`Ȅ M\\8'hᲤU܌[eKRrօX]m\]>ȝ\܇-'ݐҥڞ\]@J s]\M^J^ە^ݢŲ]-[g Z_ j9='ɅlJ:c^ޑߎ_%]Q\2SQ*},p`-_8Ka`_}*8_}`ҍ,S /`+`ҽRa^=(߅e;ބX%-sJ_5R)&>)&2r-`/8]3/'Mczb+Vߢ&~cbb7^5n3N^9:9c&>`Q٧Н2O/b6^bs܄__RʥB/Ťrbv^0IYB=PN_) e}ecK:]bNdfejt9fd<(_JgIcc5MeU]#ne^"Na4ys$]lc_Y/f>Zf0߁&enDdcJe hcߊh0h(gZ\t]afAf+`v>^i~|>}ܕMbN+o^bMhv_>凾Y6i~zf {Fi6?ܮF]Q>k4gv^_`6(xI]M_sRcec~-bߏM^'J'&惾^^%uy$6ƤPV%&vciiBcHngk%m6mF3>gͬc\bde`en紕Y2_eƤ\΍mh\>fsNa,7&i@nZf.:o ejۆiކ^i49*=Ql[gv pX[bZuj+Zoqizg{;G\%?\gru'lFrܓr,\.K//sMs1b65wsĥZ;+r;ZEGU@xB7CGDWEgFwGHItGOq5s??ANBPQ'R7I'Ft~tSYZKT GVWX`a'v{Huc]_}ubhHu^e3efgoi?vvsVtWowauj'ktv:Pwwu9a~}_lwWyzP2*UP215X|-xy sAYw}RǐАux_e;⏫},ț5XhKzթ}`h1z4(yx8?T㋬A Ѳzyu?rWv L+ٚ2Byźj 8y4Ay]iu+W@`Jxq7@||7ʗx@FU(؋aNLo j XmD67gUZBn,E3k >Z 'CÓ%Ԫ팈r5 W9&O8wl-1QڥbS6ӁP7|iӾ&t;n=ܽX4z[ dڏfwE/?0 kU uq6huP| iI(o6!m!N=&Omщ(?,NbUW܋\L @dz,AU8`xG.AT ]~0.)dp`g6td^c_7xޖUD9_R]')Pxn&V"%$a\6Xb4Rql(7a Z=uꪴ+aդr*{JP*_8:u*5vgjg~7ۖ~D?E Ů">$+0\*g)Fk!;ŌBd/L1Q ,"i'@t(0:Tsd$C[]4ң&4dь3QZM@{tbr5،}6?-5ikh[s?ke8;Y\<>:饛~:ꩫ:뭻:>;~;;; O{U.7{9!$2ըH5LE>#'@OjAqO9I?&gRGES4]e%{iRER,1}V;T>pYS:V Z^Ajھ0εrդ J1OUثP j#`'X'| y156d? kY;fnG \Aj6YKuAoXIvU-uȾԶWfO+RKҵIY\2Wֽ,xΒsI=#X@O\$dS+G,U51Drlw"LY6ep}NmLa]*R3f]  0xWk ㌼G-'hx:j֌|<$.y)aFX"7[9,cq1bG4Ct~%iz^b}/E^d'dKNM D 쀮D\wiHG|@KlPॽ(N G]x09ip\f,ycl/v*[gvD6liCa&mf۸]͵<zܫmQLqm^ >'ZH{w߻^Dg＀Ncq Kɜ虓_ q`|6 K[,jLν|想yk6F?:ғ3N:Krf^u\"ui}^'-s!׋7mlbž?@7!|qCߍOLwpV{{pym";[='-8_^igo6Mw)s[X7 8]:Dx/q I_| @˟c"[YTxtl̖"-Du?f8YxV^_<1Q((]؍>@LqXGrtGx Gv\@ _tz| YqVY>8C`} `T:ߝ`C _u̟X4GERZ]<zD7P-6ӈa7!! uXD-84MƆ}Vuh) ȩ}a 8_h0 \Na (H)Ch*%@E^x-_uU8"Le_n_qrP& F +Mex"\#(+"6b7b8r7~T7ʪa"W` E(#r_曵p4^a>b;֢82b`$ ͝dJSL `TV#f@ GFIVdOzG&ư#:6]2 ^^N嵬EaeC0$0LpK`v"21̞FQƜYR"A_ieflxÄe2 LbUj>Lefpq kFXe셦&R'Z'%gƉRht%vx gy*]sBwF՝C4|f}zvZwRwFmf}}瀦]~Rg'tfЁN=(FN(V^(vȉhz\{g~ʝ~()(g$z((Rhs:cD(i \*ӆg(޹1)>`h(V)LۙR^E३2I9zdMmj~(dm&YSMN¸5XUʰ= R񓁡X6^eRdi%*juNaqIpmGJQrIf@jΐh+3 T4u6ٜZϳ5@idnTfWzk6}D).*$)&k.kNVUIIU> W}Fa}\q* _JY'mfO(Fi$:j kKfA0gl-:YBD G/qkvsJ))[[ cH J+i#њ[3$b"%S#Q!ÍQ2Zr&(m) Ud+2,Dz,2-2.h~ h/o&P${$2yާ/03 s urzWg:,36)21?0"|j66g^74'!}':; &L, VnwNB%yHp"c=vuadwgxwwsP-w<07/wu4"q+b+(5/?DQ#`#?P[8E:I6c4ң=>o7:-XqVV76B28IdPvw~GJ7]8/4%eh6]LQxO6@$EJvw waa߫+63\e| ^נLZP9'_ru$%D6IySxXy)y!8d̵ೞvIy8#f?Z&h@ѥE^az\vO*BDu y@[δ`Kc9h,Ed&d'T:SԬͦ*;0cry&Dk/1;hsڡqRDŻ_Ǽ+boDi3kGw_sA>_'7eà D.8sJ3dC|KV{oWv&GDsxbK}S=~G~ty3~_΢HQMRe[Beթ@Z }~H>vʩے S*|n*jj1UUsI.۽ f,Y!UP K<|lo, N+75?ֺl?@8`A&TOaC!FH?cǃ.y1ȐQKRo[~{YѤP kdQ" \'Z=+}&hxw*QSkWTu+NXjb%:5йeE/CE)NDE-nVF1$`,~ßҘF2Αr2ꑏ}cϨ4&0PÙ?.2vd#!HN4c C4&f L$+J'ԉ)Q-^":bl8] 7qTe*yK]6rZ9=M1m4PR̈́"3M>2AzexHODrɔ#MqgdNEP,f@[7yO}J]J*to4d'Q1H@F.R@n E*ZE4]1t(D +?1ёT%IS:GC L"H7>ꈙm(tl'τrssG TT4*a֌ģ(M7dZ5wɊ-"_ +LXu]לկJica V@pHKWT>5D. ĚisTdbuX;ךĵ?2ےX(H/ӡ=Tay( ܲW$i7[bAdo[ wm-7墅!s+Sl1Ea!$aG˖x/,6HJuzۿºEm0N %< ӆ5 Wu1XַM%; ',NT2.;n jHXu}g괰dqM+ӄ7^&)o[3W#;#G?ko"7lYW*k9`1U&lr1jQ۱447% 7}=kԚ2;ψ}͍}g*EKy#t|t{2uFH)IW#*0ާXߝ3鬶)7w$ B'ԬEl|Z,yfw ۃԯ>$f=-]KD9I/^{{SK{cgdᗎM@ѿ'LO_+շ>_xîwϟY}Ciga %LO"%PC*(M'6ɐG"EOJ0HT{boRpcMlo~VtPxP|q0 5!0RP 0fI؉;0\pӰ -0 j#KBa#LxD9FOgs=D $NF3g =MAL#Z_mXethmm0.id-8n*I`*ڦ jA̴bEg~vBh˲v i퍽!"&pvfS UwPeԛǐ.(+ndZ+i6#m0nv$L,-Pǀm2^,& jS p'@ph"W$l* Wj)M^g1@Bre+Z"AЌbo' b!& $@ViEwq|oKxWtwqmR myEȶto24RI_O_Hڒg1bA~o7Vofq}v >.l~d-{77m7–vd˶,O>QuVwmYX%NK-Z;`q 6am0wݰA ^ cSl N B)rxʇcMu-n2PL^sD[wzw[ [+ F+,ʼX80oHi.\[ˍĎNĀs7O7|Kz㋻?}S}UagXKx Xu-|auMeuVI,?q!5%i*A u/ك2R%%+ȅQ4@%%2!$oV| HxO6uz[2]F0e1d`dKG1*{ܛD!e`1&-M>\lϋ%] }9c@ND+sgϝ;KؼCy-/@!<ʯSHW fܘ5֎^rEabk6~ Ȕ+\n͜ Y#ū6Y1K̖A~ݚ5ٴl tHNı> UԨ[\=(\*wc)zr69_}??<7VQN8p@ M›61T[I 'rU\{%Z|b;b=yW. 7 shDzFp᠀sRzi(:k}`Isr(nA 7X8@1$08:Ya9}&"u%G"a('j.Y&F6ZۣNjۙ pjf )_ | 'R钕a)Z%魖k„7ʜhÈpj*B%ht薵vkPظhJ觐('&9BC`6 So>ֲJq@+1_m☣xx!d1$oec( iA׾z:9h+7QsZ@=[R1753[5zryDKv~Fg=!AW_:"QspOiR܎{{fMk_NO,|?}OO}_}o}~O~柏~Ͼ_ WM{ߏ??`;#ڶo,ײoüJpU"G+Qp˒1m O&̂$ܦpKgp|7 ]ȳ qW?n#o! dT⹌1|[4L|(!0(#,fqz]lHC851zm _Dma"H許أlA~cB0$eqNPaMy7JryXA h)jTT#K]Z d85iГl&\b=hdy4ס2ɸKӗԤ$8p xQTE)otC02DmBg>[ i# h)ʃ2D6j(8g-;*ܒB:P0pZ)o@ rPd2IytAi(KSÚ 7)TvCA*A_Kk u@8v1nTu,+IMӸ(<ڂR̨9Ӎ8x12@ɘ񨏓RH t&XH "ȐH莝! y"Ad/9[3&)0Ad=? A)CIEiGIKɔMO Q)SIUiWY>E92f[)cIeigikɖmo7sIuiwy{ɗ}A)Iiɘ阏 )Iiə陟 3;PK&KccPK8^EOEBPS/img/qbe.giflGIF87a6ス111ﭵ絵ΌJRZs{1{BsBsBB9Js1Zk{J)9sBsJJB9ksޭ1k1k)c!Z!RRJR{)k){ZJRRsRRJJJJ{ksBsνB1scJ{Z1RRRccޭcsB{Jc{RJk9Z9Zޭck{R!ZBsc!{s9kZZ9ZZk{!skZRkBs99c޵ZcsJ{{{ZZ!csքZZ9c֭罭9!sεB{Bcބ֜RckJsZJ{ksZcccckƜcsZ{sJZckscJRcBsޥccc{cJBJZsckޔ,6H*\ȰÇ#JHŋ3jȱǏ C,P0(S\ɲ˗0cʜI͛8sɳϟ@ Jџʢ $90 JeHJիXjʵׯ`ÊKٳhӪ]˶۷pBETSN˷߿ La}ǐ#KL˘3k̹ϠCMӨS^:vP@۸sͻ Nȓ+_μУK> ٷd0OW˗@[Ͽ߭'|4@ 6F(Vhfv ( x6 s|-^.($<@)& 0=@#B SHXf\vy|  &6*WT^YtXqbO96 案&袌**&i ִI(|I:ci説6(ꩦri*+ƪ6묈WՙNiH*>kl5ז nR&;k*&l 7M"kgK a `c(cs zn+z{0/"<Ǘ0X#C='J,LG-:MXg5Vo``bmSl}n-ܰMx%߀.n'7G.Wng`-:ץzw.찃|֭_p/X`uFʝs;o|˛{Cx<3`">&ħͧ/_Ӵd' 2; teAsFנgDP hA}]6Ȍfx dB46H4/>.RmA82 d! )H (cZB ,5api;*2R̢ NIA*CT p>a\5D5< q  0!!6b(0"(ޥ$c<)bWK1Z"x3'`{l @ \BCT"]/2HAdzf!>hO4'& OzrkTDd ycݘF1ѝggARIHv P? AH)JS$thPNhF2Q :bC"0me9x7La3wtB:hP@.BXFx>HHL؄NP2x| ‚Z\؅^`b8d@ejl؆pn8tXe6^mG۶E˶>:=|O 2pK۷rK˸U{B뷒븜{j[[qQۺ*Z|Kϑq+5 @k"ۼ;[{Ri۽;[{蛾껾۾;[{˾k<\| , <|  "\п9(,0/4\6|\餲>3B^~ 5v5N5BR)5_N &".nLI /( .yO*k.v~ ^Nn焞XE9=>.M]C.Nf;>칮nXR>ZоҎꞾq>nꤾsߎ^繞|r~䠾.n؞¾5No^n~- c(No.pDo9nΓi^~_'Yl!ޞ_ȮLߛ+R^-Nq8Q?_.H.9R'yAen.L>n>SVv(X?>NFoqwiXRɎ6%_o?^?_?E"?_ȟʿ΍?_/jڿ?_?_@@ DPB >QD-NQF=~RH%MDRJ-]SL5m1 ;PKsPK8^E&OEBPS/img/bulk_child_req_lifecycle.gifGIF89aK544԰֮Ԏظ}йۼDFGssvᠸ樾ҊިUY]̢͚lrxӘ&''gddÅv}X[^߲ˮɨ:;=/12MLM]cibfkNPSgnvRW\Z\_ehlPQS͜7:<㧶ŭADFٯᦣХўεٶ䟷εվݷ۠δ림ؙ̚˽B@?ZWWڴطڶ,/1!,K~,ҽ,,H*\ȰÇ#Jϵ3jȱǏ CIQ ɓ(S\ɲ˗0U͛8sɓ̞@ Jњ?*]ʴӧP%J*jԮ`ٰ!kسhӮmQ705붮]l9V\t 4/(!nYĐ#4,F]eز#)̌1h@1װ%M{ӚuN\-Rp}w N}0Z+ߌKr&Ϋ_"dɞ5wRGOݨ_ݽe'|}Y^n_vZ!amnt1n|g(au 'b$fvwȣenH ?6ٕN"d CMōS$`Q b TcfYUYFI[gYel.']&@w:IJbWր&fr(>jָ%:ZRlk>觩\i bj~kM*D9j%yj:"mHnk**Fe[z.CݾY8 DҢl,ۮo:뀽 )꿵gD/ [,&V[wr<ܒ2:l#;l=1\rjӦnB8-+8I_4}> mS{Y#0]m6a[4# Z 0ZE88ycWngwy㴹1}tQK8.\|㴏>+WxAFU4|P Qdpe`Q6:ZziUбcD1P[CU\@W,4@Fї7:+/!v_jnN]~x[^٫V{={G>O}'?H緳AdA J3.nK Pv |<xSCVoN ӽe-|;@Η}_?p! "耈m3ʐ-` chE|HqU 3EJ !E(Fl'4B64 ;ⱇ ڤG@uL\!y<(rj=I ^Z`1A6A  ri\ (C8p8leJ.m;FP@^DCy\%0%L{V`52a̞'٥jjtac88ڐT 9A:P?ࠈĚ.xO|sg=c̤37 MJ%)#jJnVj Z2D'@).U@{n4L_&SzԘ2 gp e ψRnT%FCW(49+uA9(i\v^:Vug $YKo](P*Ժ(8Y2 9: 8lUJ1j@@fȬ$IPKzQ %hԹ^ڜhj@}`iGDЍt[s- +V PM4p-uSv3 g@:ze:8 8P;OBP\ oZ9܃B>$uI;`بyM0k?}l;ǏJFXLt @`>JY (qD@.{`L2hs}MLCśmnNhX$D |T*>ztSclJf WvB|3X upQ^5<iC _d kHA6@U9 5mX8063sqV: MC=M)< Uȅ&hKÀ h!fPW4 PsolgKQM,3:8x MoI4 - ڐȭU17{ߐ ޿>k pNB|1u{uW8U+r *T~Sa{7dzDsj :Vp<;*aUǶ[P   Э@:7WNg*{K?oֽwW۱dAO/rghJ_s p1 -sg;vD؅Gxy?"Љx%~t^V6oq3WhYo_7'vchvgjl{vwmJhwqyuU8}:(x~8$h0: 9~,1 ]flP? oGIдW:`*\QeW0cK˘r3E\+`EmǰǠ</DIJ $۔)۸ 8%YFDЫ:7r >.RiE ]Hkڪʻtٵvgi:A+Ab cl{gr6m,? |+& Aɾۢr1*YD9pn >.{ 0*JLJU0SozZ8ֺ  !( lg mgs8n dĆ&۾nr3% z> #):P8d)aN9,‡1HwoS@`ahnyYȾgߊ,),&o Ix<*<ò&'.e)v,/~; P<^*׬<llPU]`x`[48)d@` IxM^` |d'؉2"~9~֒O` -@^~nڠ!!9~ *0ذ?.܈t&onbx=RR,>ԁ-Υ陵 o .7`X'P ު )e=*pb @I.b>پ"2S@G%[rg *,@A,;{Z ` ZQLN(ie=0#^AB+@-̡d@xáJ.0 @@~LPv+&d ,{(:A@;}~PtOK:p'Y.m*ݰ>C,T,TT/o&,!00.*n GWW^ddUU ;VV(NaQ":[_\x>@? llb%5:2)2YZZ)8)D8Dh]#Z~>%++121B ŏ2˒ 2`@'(댕к@Ƌ# v`xqԋA(%A!,iʀU`Ѳ/(;FB, 8ぷ dHAj TG:ЫJD1_(0 PpV߿ LÈ+^̸,akX"׮_ŠEQv hk`ӗ ?с^)LIB"8KeBD!wWݻd\:@òB@E!&*%ۻD ҼY[=} 6L42!A\(ka#7ݨ*:1= :xx J?'H*r 5P\}`FvAGD@|T . YcfA9qVK=TP-H}1 PӅElP[W_U6 [ʼ\uizߡ&袌6Xd9(fTghkFmb1pr0(FIuuC"!B B#TKKY}J}<.#PǴL!`6 n}9 ]#`AlV9̹BBt9=P1:QxcFuHeI}QDPL Aĉ_BU SgV9 n*! _4b[~R\cTWmXY_Y+ i\%~[d`.@ :U` nB4i߷[~Ā +nY5!ΦmjkԀ?Z,<02$1s]#GEбቅO<% }a?3 8tQhaBVyH? \n9v ouQ b6eq ըȤAXGlUq,iǿAJ,gmq1Ӽ <@:'n|LPtp:~nuY@ ،f@iDG؀P5dP.L@?@ֈ% W<0@ Hnj`k<S>ig(.:򑐬"!/լp 1Ot%APCk9:~Ejr\褨>WQ6@UA2j4T$~9!kzSvkPĩ 2$p*TQ/-@s+pw$;+tJ|O k=8~=e:'laب1Np"v[&3~Գ~A0Z L$jw%8NCIvat(B(깂6^!RQ P (lr}wwT$xPW "s(x&w}_ +TeE1-QOQXe I, 1F,S0@1@ AӜc[Bn30cǮ!"ݯ>eԎ8b8:fk(zW2ZB|<侺Ypo:X*}gJ"vhB*ysL@D$7KԌ)/qj@pu(kt429Bk XlV^鲓θ>gofk[ kgɯPSHeSin\lmN7,E 8 4c/g]*< Z5'1hp[CAAj"0J9' IE09_ 20{r"%U": 6C@ ~M`)"Izɘ_ %zEYBKט>d90@9w™oY"f=7:j1"0 w"l 1] @R0>:, Ɖ{rf]Q5uYwX Xs8"Z(tǘI" i!)@Seo" .J9V}J>~ Iʀc0 c:e:# @*@Abib:CN@E*hyIlƗ؆Py9-9q vz3e'6pUFoZDPS`9P0pUsȫ+wa="ɧHa ~ DhYa @G*\"Xp;阋eu`F^H:JzꩅN͈ڱTv@I{aaXaؙ05B$r2)ǐIpQLJ8P=hKkj7z>9T9*#e⩪wLJ8g,*pg*Q"zhRh){lZo3KN`<k۔.vc 6@TeR84^*oB,02:#_~c e[s8O`*( ?u{6wQTh+h0p'V) :?2 :703D0YZPj!8E/""%p=cw-#Aӵ gf`@XPu\pJF PQP&t&A@oDJF&rkcYpMLP&ud[ď2zu[:aŚǷi jĎqCyЏ]2[r9* 7C*6C~w4! r9*)2'VlE Lz@Ȑɒ<ɔ\ɏZɚɎZɄQsN\P(;-{/Znqw:XaߗkdqR6x4#l ˭h]hԭ\߿}he^zv~m]Gu|yNz{j捭p>].e㗭萞ڍ>z~~n.>t>rVm.ԱMԘٰw}Ե.t~Y}q> AьMN譞R׎9nэ徾ֲ$Zfn.n>1. 6![onN.O /gr5 'm\k#0B^/-^\&.6H|6RR ?7_ 9k WTgV_Y/݃7`m >| x_-ResOk R`\YPN*/]!Z`OZ]63H㵏늠 dr`vK`F-p_?S`kp@G&//Qpp,~~,nRR]`h]]ʉpʨݏ㛹h`ͽѿ۫HUy~+PVsԱװŋaL&pǏrfi!ȓh500]0PDI&A6Yu3IL gu"sӧpB}kl, -F!T)׳hO[նpg 4Yr-f G*C;+mSm.kvjxs͠5Mrdb+%3;k t[ޱjz&e;t'}z2RGv ;務{||-8RL2ys7Ox-zQ[j o߂G F(VhNv5 z+^u߁S&(ˤ<@)D9$6VbYY"@ 5a\n2%*FHviKf$+<5ex>e2h6fyg!l)`{YeWVZȞ *؟iphmezu vZ)|bk 1jFb٦le\z撛촭+ KB*lŲԚl-%m6B\ ,,nKe.ҒnZk#p gƗ#:q҈+R8fU *dJ. `!z_3,*jJ'>_@^Vq,9p$Pه=[X/;ib"Q+ָxN%tl+Zw-``h7 = T*=*/vtdJw2 v$&=y0 X5COG[w;p^І6D 8ؾ ~za-"XHҠ%*P!7GЎ`̀sA1pFQ#%*TlGkcG9α ;U`3ܑ2ɫ@ca߇H)(*`$P qo< IReh(A#T ϗiC pAq조#"82iəx::fЙ -d&* YF./@"cM1RL 09J?:raBMDAT!w:WS) `mr< OЉ^e((A?Tѥ#Rf,TҌa>`쳤f tafRKX`8`  9%@h\$iZAJc WծjUXnB7 *8*FpXvzfѼg"`R T~өQhTq3`Gp*4;>P epŋ j 0\fU 2 RP`Vmp2x GX VPXszu{fBD6e MVv4:r ? @+yڧf7 Mk_mo\ Cnjn4bbĮv]5/z0llOCv^ՠ@)K6ՂT2aʖŭny[ q x&FĢˆr2MzЈNF;X£'MJ'$077pӠcdD8ǁ1e5,^C3pn57 j]?ѺL)Pwv;oLws7q+&Să:Ŕfx<'^όw|!om2L>7Y\(P>i 2y9kYWϺyz([̮sx6crtp߼wySVWk 1]7T̷sxw{ {7wcV'F+"fzz^/px 8{ǀ7psKsSFC,f|TT+|x}!}&uda7Gf7\2lyv~eWmhm7v'wwww7(X#]&ygy%FHze8zFkX'҆w&X{(hXтdI|Ee-9HZF|=e?]AegA`xfuKuVb`7~bmVHmgwmvq|hQ-P+"WV@{Ezyb؇hXzHB$({xu{xXj8:@Y>@|:DǃWvk]%SZpWtlUajbM'Vv凋ۅ~f~imc؍_`ȈYx(x؀ب&I}ayH+ 蒃ȁ)z35Ɏ7i{xsXp0ujKj: 1 M'?A: ݔRhh蓬66bg2֑Wvv^x9QPCyۗΘO) yx@X()x帔ؔPqVxY]%~0)QkQP877p8kٖ Y@qI}'lmgW{!Ѕ7,y/ɆL6SyyYyfFٟ(ڙcIؕ`ù) )@ : 9@2~rWҢ/*K|q){gڹux IP(+vTh~ H=ٝI)4)jdjfJ:g戎Z^q+pաyc BP7 <: #PA.:5 7*:`%7 ZB0EZxJ[M:iR*lGVzXJyXȋ9v8vג,BJmo)xJgB٠EyHɧoJUyd fs!# c 6#@F 47: #*%P1jZfI[g^g\Ɛ|Ʉj7SUإ홅ؘ : Z0>pnV2 D08@ٔb %P'ꔀڎs80{8 x0 ʭ*qvǛdz9+ =: , kC<"N[`ʖzرuJX8Y٪,˥ 2+4[ j@c7?$D?$W`PyITzK c+jJ}l2x)%C+:0Pz)%zԩp^gS91Շ }fuɧƺ˺"Ʌ$XˍˠOR@|ֿם#+X̹ Jv^:1묎94:bN$Fq(ڭ>Â,cx^˟[,`F!R"|!ۻ̦R+7;Lȝ ܵ`ze׀7E 1̂Bf\ˣc4 P)2 D 8P`A82r1 'p0"|X<^m9#{R$zy΢ *Ϻ5CyB:@f?"$,4¤-<]wZ6 m.l:9YS<@cC(Bp F̨HYEA+SVf|L8F^ Q P Ǖ `u,PDt lցil@|CRpz| + -\[{ Lޖ״@37"BZ,EmH3e.(@&Xp=^k[m+$_Nf]08IFtK}[U@h!qX۾%p2aETAm a:]l򒏲i‹֨ކ*j؀ߴd!&!\4CvXB" .@m H"o D!eۛLtf!Pn&n8\-ǻmC,F Y'Wb20~朋  _c"9S'Q|;,[nr* ̼YaA-g.эU>BVB6C!N!HWBWÓX5ٓW }ᯬ3H.tF#|Nx^͍t7^ eͦO A++@CNĽ<ھ9-䥫]ٺ Т>mDp "P ydc *9Px) 1O86Ϻ޲| 33 IYL2GG´NU/W?h`bOdg_YNl0>O@40T*Oz/ ~@E~,p GWW^^dUU ;VV(NaQQeX[_\cBBb++ SYZZRR]`h`]Y5bllc\_[XiQaNg;>]%p&IFE?,…‹XA3"(QVNb֬Z!l8!AE~ ah?:&=!C r 8P׮ <@< hj]@4 @ŏ@)@7Q~)BFIHTWJK".5݄ QB5~0\ 6  U]V]=gXb]AY6FP Z\s!&^4[mT82}b&(Y0٠yVԙ&ɤUkyi  ![pDZ\9af,Ǚs7Vd\ u[&BWJBd 'X``ŋ/ vaSL@@XbX,΋|͓Ռ}`ct9(\(g@!HTT` ++8, pYkv9f,IM8$ SؐCPR U``Dc)H` Kq r-XmU^*m.wkEƶ. nΈ7:q:sщ6ruE)З|w W)ܪ-tzܢ+ \!~yo*҃Jp0~cCYEb)QD פ)H120`8)N\ĸqt1LY@E *HDh0HVҐPl).^JZA&-MI3&?!jrZT t5PJe҆mD"ZQW 9 TC̨Gctj::Ǒrj,%s*Ư 9 KtM4N)Bqy [N>Q@ļd&2 (9e jGGZ[/10Fa98ƌΉc#CJaݔIO!ڳo>tbSb誵QkvN;GJҒxq$' &#=51C $4@4lEPpЁdX( Y&`Kvyg<(y;`w@ϸ̖4LϤКSMSg†q-P4[6Ӥx P 'mH#&o%?OQJ1u}G- oS,n#F@@" Bg4>ѲˬGڈ4p~0# 1H_)#G$7 :PQ^lǞ:^͡XE yT맖8)5rb])FNAm:q[JZH b}2Ls}2N,<{FhaBa$V~16blz`Pn;` ^D"c:c7)# >EoF 52DjÕ@r:Rȼ[o M5[{_&~Sv}a `Jǯ`e@H c{6V  w͑AX--;40@1F5xW .E e6[pv\"K";jPSYenSaYށTҾY$X2 >t 4^axνK} H ҙzт D4 2`Z; aHĘ00@ q(`p=RЃ֢1$(^:tޜk%E4֨ i)=ŶX1׻E2HIewGM,n<&o[ϋ"H!~p \'2wݝJOh&/.|ם]n _Gsne~'K&qHp tٴ"z`8>#'KA, `xpGڊ5mޣ:S9NUc _;*#bl3U23Gpwĕ {R!eަ!: k| ThIFn6ybVy%o1j 'zog7_g_izuW7hdhah.{?C~OK7 @ 7| #D*0Q9oا_`~0C &=0wP9R~t%uQaaup4j;2dHr. Āi0NX8pw+w؆\~\0VT08Pn# @"Z64)]12f7Ȋ4zU4'pzDvppMq;6qw+T{  @\(sDu O}" Q"6;t(bcAtbPjiWG:kt:u-o+^$,<0/,)<DvHmd\*0@*fGfyLyFo֓Btfvo>xzgCؑ8H_2pD{h{𔎭+  X9 p" K>I~`B=~`Ht~)卐6[/Gy$a-!0p/`ȕ= S}Ghu!IY_ "MY"CfT38?V^ &D^tաhY*"::j(mQf cΉ;=JyJUVy)!FPL fٍhiz嘥&usX)05 QGa91]Q%@Yd`~Xdʊ~a[,Qw`ʙ%@MJ) #ҋ8XS)wӹwfWyZ dWm9oiZʲQ8ujOըzN &W.{Z[3X+1 DDR3nKTS2}fR ~;K MO$׸ĚjN{iiV{JKMKZP[uT;P;+,m|RǙXԚr R3"KU{ڌP[@g$ W;ޛEY۴7ƾ-ܺ V뷴(ʿecLR^6zE9> Pb 5P:`t): ;ʼn`[P*Rkɸl3&jL;ĜC EGI܈!+|Txe'7 3ɧ-=\EPMu9;*vl >h!'0p6959#IPPWh@wh{ ]|P~ @r L؃]؆m؈}]@h r@٥~"n @~!>٣צ^Mغn  .n|yHQ硚8 c./ v Q}Hi˰9._ $_Yp ^? rNɣOo8X#<< r*?,O=.1-4o 78P?TorCYLdMiURj%Z?FHamf |;p _s^O9P~?1/Guwou &^?R/cKٰ`OJx"X^/bOPpۿԏa_0oOc_/Pr޿-"Џ|GRz܇˘̹ "-q!SA^аc,۸ymVoG+%׹w.mcrҭr2Opt'ͶiF٤X{9pI}68F(ᄺшo(\v a$_zk-U`pة] (c6#h㍷H݊ץ&J ĈHH^ c|_TcdXf4ijPj7Z93;@q`"XJdvgA\9UI衈bp YihVz̢<ƙ8i (Z⧪ *rڢ "(Z `&6FlO\ݯ:(lqe`EupH"G$$ X`ƾ`Ac],…Ӛ+b.u[@-B-n 2fW\UT@VXBN1_rH$< 3}s'$᾵3 M7 ؀*@8^ R7~ pR,y͙H d L=9!+%M``V[Pa!`9#9&A@Xxڕ wC*h(@JR@6Pf 4!X3xlQ;ΦMt%A<AH ]$!]+A@($ H(*r yhN}J^'cch1{P?tY耒ym -J#J` ]9Ǐ=mj\gySqA%PNqЁ`i7wR=$7'/^ֲgDi['w}XZ/@lu`ϳyo)s|b|w8{nTBE(+~|wS'O}E~dF}[}8_2eIQWPs{?YY{@QM$D5>*HUPWm [wTnX-,00ţ5NEms2+z-".b.b/ //0D020C/0VA 1c8 . 2426@89:3<>)@) BDF5H3Jɔh T B,P,*d 3Y79ԓ_0Q_pMR;ИHYBp 9P)˙&r\ќI9Yyٛiٙ&虞)i;/IéF9:# Y30PI2SZ1 * Je`+ɝޙȩcBɠYyy1M#ԡ8jT j X )Ii)jҦ?%z3A")|f9hz9 c3`ک:Zz U:"Y [:]Z_zaɤ~A:Zj{m")؅廓ȋ]a>q*Djx} 1@J$*3}C)Vsi4\:M ] 05)Y6S3/D^?$լ]*jJC3G^j8 `:eZWpa꺠:`u j Ia`ҕ k k66ag({{,Yz?Z3=I0O I08 *+%pDyy3˫zZ:몰4A =#zHۯN;{T˰d+H嵤5+I\<4q-teP*kz~02;4۫z볋 KDFjLR \ukb [{A66~0ukO'.2SPGtP 0e)0x+'=@=C<C`8˳+EKѫ۴\ ջSVd 1[ʌf;Ki)i AP:1tbp{i:pA|Pe ]& s{`y9k9ˆ0G[¢O[W[ä\8܎Ъ<>|@ 3'puP7 R@]TܷPv06pyB95dw9f7Ƭ;"$ I{'L=c,4쉮[XEeM8њ˺[7lbʺ;)@F ~ViΨcQS0Jg,αnp k0̍ǘǚ06<,|ڨbh-py[ΚbVE{+"P~p:ϳ쫵\+mqs9q9FP]PF:+|B'53;==ػ<ؽG IKM} -Z}=`՝՟}*\wڢ2z0Jg@ @ݳ>Լ\nH L \3_(QўȀȉ:;u㐪J-dlǝOQ0rLn A #^-rb== {kz *9<O +.Zb6B ^؇݉M̋O}aլ5'9Hj8nGۭZC>TK ET~ 'Q}Lُž⍅섨ٖހh!*^*JJnr!BfE롅Z0P/Ge=軮>ݿÞ_޵\KmYnȎ}[>j{ IJ{ ,W&Dn5.*1,MS~"}-#A7؄}.荓A0"0CߺLm MD]VOmN&@&e)Q@_P'(從ڌQٺPtvC/VC3g~W?,gbb ,&6aګ eSq@ [Xe ~aN((VV Ud^WG $+,~~,fj WW^dUUNa~:*eX[_cBlb+ SYZZR]`h]RRZYSS 5+blB\_d8cH(!, ST*ǏhXH 찂L0(sB6mV7ΜtG/{lePh!D|y (*,B!W.͟ r EńH F%Qx9 ly#Ҝ;M). #*ClE!C1rI%6uQGڸs{./_32ٲfxgB@H 9H`PH:6P"@8a.aH 6|C՛.H$_*R0 !S OL 0 9a!:@#`R1B ǃTTwWh'oB+m`\,Cjo**(x`_)`vXb[C6z"tiPĈ-V0:@^="<$\'[ mSJj饘fo5\3HpU#"802$ZJD 8HPDlg C )Ёz;laO,-h ykHFծA'YWK'0 Q &V:AVu - @@OBTBEeece4H`}\|_ 0?a/0 3 2꨿Yug@ZmFP+&PQk0k)L2BpjS ! 6t tBtGP8z)׉EZn} \Cai t9蓺s:`Ah>2U:L4D)O+ Y@d\YZI^UڴLkN:&LfM62AԦf#4 UB!#ҍ'*(7Mƒ=:` I@ZP5rZg(T ~өgS t&wD yX%E 9lGxC׉JAG-d_JVzeY?` 0N:0;n5al@ R-&@ԯ-..)-cd* Xdt XGtF) yH@51׃u0eUaZ %A|HDnUR@r h !H(Qˉs ( v)lFQS62zDTbFH T$C09x5bRׄծ >STP&0^xXM{@2#+D` R @15`F C/& IA "cG`@ "'DcG3 (l FǟP6@V6 J7dM\ hȞ,lG9g4M@?puL 804ԁA ́Nref @Ka~h&!pRYpFNgn;9́uz~ B"lck͝vH O诠 EḬh─|ء-hwC)EZ@[!?(;iqnR@l.8xp) I3!G=t8E?fnMinpPT85 npS:LA@T~gZڍySg>P^ָ u+"JБ-cPTKh:ڰ$I]dCF:2O,eKU,;}a/T `%P{wKzg8'1z+O9/fTgv57'{:yR)qtF{KYwGWcI=Kwlζl.@iB9Xz1SvII?ǔ({x.8|S 6 )BX)&當h~XwGlT)qsٌ/qHIrۘ)IO9)s)aF@C0iӎW8thtIHTy$]} wɅhAg&%ry+HYݸUԓ0FM?`^% % >P#"E ,+ ` p=`Yg}\IYcɗi"iLmYB1W0q :di8 (Wч XLXX**@~b,C40;`dc* PGz#-iZ:GHd9[Y٤5[RjY)n9\J`* Z*JfqPJ9"x' 53Rb)+X 10)湪@ZH*K*W褽7!ixVJo* ꛓxzy z ވijJbp[!90qҬ*_huzl*ycznʞل隚eJz /[:*.9I0~P p㐱KyR80i*-{FZ1[vIj8;kQ*xpZHJ˯nشꤵʍRʜfJȡP87 Y@ 88@Qt@jɳI?9Eи^ cZYV˹X;JĚ!= .B_D/P6s#BP=*˲*z 7 Ki x˻lȴ yPk:9x`߫f;*ze`0|¼ì 5p_SGA +H}˩D+,Y6݅I純۫\H8^gpPɈ)< W`-Pۙ|WGH$Ɩ\Ś2ũ{yզNU&4ª+&ؔxLl̻Dl k˼3`=]}Тs }p"RF۩)NQ9ȸ̻4"=$]&={,=Ҥ"mXMΘYː0ԵB]F2-64=J{IՓBZձFa& Ջᙇ 1r= T ޛ #ہm; ؜ -Nn2~4nj[:<KB".rԧ}kU rSTޒ[ ̽IuP\v m]rp]`yR}+3wuNu\=-}LK_< a!.4P~Ȟʾns^Ҿ̸R. *e,>E׮UUW8w彾~.~T﫚˔.~ ,01pI)d(|}߾.o4?SDVIQޛY'o> ^G!eZ6B8_j?3'dfn|ppoBr;?=,O ~"4:ohT/6^nyO]p6/>~/L64OwCHXҏBLDaQLh "4NC-FTy&z}if7^Tk=" e=vwZ "|CR`֤װ{Svy{`{ޡ?}\ԥGwꀗhX\rg}3o=4|yEo޹ǃ.{OmDlVױ~Xg|m/x[yV^纮 f"s'TW@y\_ڗ7b@t\ hf{J0zŰ 4gX> /}ēh)P`B0f_2|LT# 7:~=x=#$Q/ HHobio$SIJr$NF e"G. f'0lF\,M"}tiO.Ye1UrlL2fFl#(Kk1ua9aQa4`u0!uH[B8)=0i@1.(BqZWV.u ;;Ű؄| IudI 6z hGKҚ4jQ lot ͭk[[ᶷ]*o.rc:}g+2ֽ u];b.x{(=zg$/ k+B 8^__ !0^W6//`?(8u`m/yUP} &6* O q/d *&X<@{ fAYІKcL*8& T@T1 aA  ! l=o{xMpP~ ڰ# x_gfwxo']i\@?eYX/&6O=ϣ_~1t! ,h,~pcDw׀`|,b{{Zmy.t'0f6WrGG`hkkց(ult.hogFr:C3~/Fc6oæ3㠃opx'x:Gt:$ bV(u \^ sFaP`x~u@jJi8_v4|zx؇ux1hmraxćxRiVx؉8R؊)XxȀ^$w 8XxȘʸ،8Xxؘڸ؍8cӈhOTAq6^xh68(Dyxv?h)6(Yss()Lygؑ3>ѐ ="$)3&@"ɗߴħ¨b)x¸e4)eJ6,o8ɓxrqAYLN!JI|!#H!Nԕ(b8:q@`M"hI|&:PtoLf"s~@KI+]I}Jui _zsⓐ$vUYr)Lz gLx#a9yXx9uL>I+,6䖙8&IZI5p5 k4МY#t@r vhq՝r ٝۙ)9‘Wٜ͹k ĉ)39șѩY癝9@)㹝`WYrٞ f0@¹ƉʹVSJy٠J:t ڟY p@rV U&WU[9_ V#MWPWۢbRV XpX QNUSuV@^0$3$PG/ci5H` Mγ%e<(5 yZ kDC*쀤L 4ZX0cUVWxå_*5b1YfکXkڦoSvZx|BJFZr(XëUKRХ 1ˊjlp3sZ0q}JJ:UzU:z<  5e1 {6lTi[Za ez *ʯwJ ʭ:Kʲ⪨J4:6kȺgiX@+@ p K kڰڨDjĹ=뱢J"3aMOۤ +^e2kZ슳\:JگFnkOJRJ誥X[z뵂zѪeKkmpkr۸zxN˷[VNPphkP벺 U7{9۵ʳ۬b۹EAt;ZW+Z۾_Bkk Kn#\eKۼշ kӚ#[ڽ;K{kdA;j K0꾶 gŠjC ;<+(LS^246lQ?+BK ;@oŒęDML :j=Y[\]_lsc\l!+ȦۿN8 g*ȸɆ Ģ+- ǒYۮ̾S;ʦ ƥ|,fh%v %K޳̎lxl|LɞZ <_Z|͵|Ŝ 6!ûx|[Q|H,®αϳ|L[Gܲ1d|<<НH{w7vҢlǨ̻: |RmХ "ؖ~{H7TMͿ"0 ,i^ f G @F|!= * j%:PQ:@  Ҁ+*L;&Է Î ?@ }5,N\! !ar9`=<}@ ,V8)Fа} MUK7 d͇<ý F|I0; -_(O7- s]]:}1tC$q<;&/`<@52=S*j.-7 ¬ͅ AlSq  P0R+ؽ%RD@:P#2@> "P &=+ .3 !Mh_  4R},2;-8*0.ǻ22:0掞 PN2`% ?@oN>+` 2PA|ĉ݁%NX, XCO?"!1++l~ c\[XeaN(V; Ud^WG kf!*!m~1qU;V(aQiX_":BBlb5~SYZ:D`D:R~ZSS*2b2:?Q( d *U@Z@b_EDX!$pE+~k0رd4{̴jײm+QOxRiO$C6C\`I㈟?'b:cSP^ʵׯ`ÊK6?oXpD[ d̜A;f Ibj;!ApZցaY7!|$%:}JTӨgUq ,^\Č!S%i1$c@ ođ3NvS&q9p`fuĊd]qq#+~,J-_Zæm N]HE%QF RLwR}@AW-Uy ($xH< G S]xW__(!逘b9CM1 "=$\IhW`uKh!Ak5vo:F3X':tM8sN:KB$9܀ vTjw!T^y{!|nRD~2p% 2NR;CPQ1$TSF݆Vy6JF<HD7޵ qg[4B@k+/Q+*T1D&ێpDB@z&'s[ (O(ʒw0+G@sUlp@ 9 Y (~@!h7lÒ0A*T p]9Ǘ_\ ~H +$4b:`J@[fWz&{Yp&*n Aq}p-\C` 5L`T`S^嘟0Cow4l9z*g1P4mjL`rA`$t $ &2veٴg3,YG7߄ _r .Ф _>@י,t9]%5@ia*΂Cjpo~`!1:!2Tyl^X(>=}ޔ>߬OAF9(~ Z' mgfbf>+IQ+ƳUȈ e;a0 b:F*'L ht1iH6`oZZ1ّbrS>wHT;7G(R2^x@-"*x>2njABOM|"!+<$8INT/Zq G#3(Q2e& I_F!rSXN4mJ&1d/qfüb1)b7|+'PM}ф$)J7^3<oB!X4P6dx q-;'$58IⓄDTدй0`(JAUJ+)pY͋hIԀκ芡5ST':Wt ̫/Y,oudͬf6V S s1Uv/ +ƺٯr Ρ|De:MQը69WT1IbJ¶SE,ڟZ6F' P@z+"i1L/m[*-jO6.]+{uI5S!"%6{K"WeeeqcQo:'/08?`lq_ VA&;yɪPTX*.9؄b5E2W$pJiZӅ (@jq-yWKQR@ RpuJFL x&$fjHճc{ b:*8E[]V!mLZ=w1iJmjrQ?)PQ{ոx/b0bXGA]՞3m?EF4B8diqt'n@؈T٫ph\cׅ )AdHO@Or= M83l@7 9`ާ] *#0/<%* 7`3\@kP7l qyyps1?bH1l# PSY@0`t8 *聆>2{m?5|jS|`NhyT8 }~=ta %}~2~:2Ps:91Pof^bZhPT4( !*`2|m*`'֡ u Brހ!EpI9٧*'k%8q(([* 0JI0l|!;:w@xPG9qԊoX pP|΅6\hRTf."x8|0i,"&SpKs(~CC8l`M@6d0X*PP /)xHp 8"0  մT >9t?:@8~p'`%I>Cg !1 >O`cp?'EA'0 C62 'SVQXo2nADe9Ms>*t~,R ~y:,D 0z:uVIJ._) y6N#Xc"6 :.y?~0B`2.'vxFi-(x;3yُxڰZ)2EpGٛXBu[x/x38JYn=W9fNqXu=x2:#Yz4.3$rnh2~PM9`d `fpiufCYPJ,!@4 Ir9Ψ 6` ;G> ??6r8Rpi"T YؗsP( @60Y71Dx6*B%|:C'y*9~ѰW'!u"t9V8ZM)0$.6`B9P'=H8P&xBiq wj{ 6rb;"j@X7m䕷Jz#Wwږ`']uZ":{L3V nBx Y ~#`KQ>`+@Gʬlg9AU ?'pp7 A8.o:&d:`0i0fx 0z 50"P@P <&'FD#:`4)@u=@0= hrڡ5s`B|eXxal46i*Svd٩BڱU.5vUOO?*\Dܹayr^r?&b:n H"Dr[\xkMz;ծmBE[HƸ;`[`lKJlWԹܰ4^Wk{m1Fgs#og@ַ;;2te|vB[qA۬•;$% |!Qhm;" lδ]k5%u$E=%’»q{KkZfkYpe`fۻra!lruUWR*䋏>&pT(,j\\".l UpSElWS)ATrfxuŤ+KMqC\k!VWxŌ\_KƵ wÐlnlplrcErGrIl,"< ,ҦiqurL MB? +@ ׉Pmٗ} gB&Q`Aj}Bsu}r Fۀ-طm&؋܎ ْ 3 ɍ 0"3P}]@ ~ + aS/fFe^Bw"b*.N$&Y,4nj3^|du8@n@:.vJ>TIjSawLoN^2NV~@P~qR.TM`@_Ͳ匈d|4l&foh>NM&nMoS sz,N3~s.Nx.)^8,s~+X褴j&r Z^"!ʴn^# >"! b|\~ h멱^.^0" C^⸮^N^vb^ > CEy>X>0N`^[jaqR#b ؈ۺ=0YPq?tM9h|-$_|؁M9Rt@S? + / 6 4o/,A] 7%O'M,0FOC9/Z@D9/COh1JM{  MPVYm\5Z@,f0W@_0mrA`|ɤ=/v ^ -5' D0̠ ܤs pO'OQ`֤.Hla_/ . po,R,@ &RR]`ZYSS 5++lBB\_[XQNVV Ud^WG kfͻfj WW^UU ;Vg(NQeX_\clb5 ZZ ]bʊx?(~ҕ0)*PSCv)8**F" QٙEsc h3JL eN/ꪌgPvt)tXzUʚW]FY] Ҝeg'VxĠЁM1mJan`NH@Q;N‘ͯ~Q{  &USÉt\-+uVm\]ktZJ7 9@8@g, ࠱F}T0"%.6a ʌAe3^da Fp@ N/N`ӱk-R-%0 }4?jb@Wa~#.(n_|8)`Kbs,OSM x, ܬӁY5OKҵoTA#( 6\Ă$ đy} z|WCD~"tO%`N5SEWM@{D#0Ivc FMj'E4v|'|)o.vc.%ַD}V&l& IE%~~W~~#dF~55y" ,:01_smCσY@$4L)p@:W8YRW'\a&|EC7p8XQr:tweb8~|k+xI)KS *$E>eXZȅ%8+d15! @S<Wp}YǨM(bb+E|e:p*vf!?%[T8:/bȦl>B~$5QHSx+8k- y9n4nC t9~pHS`PzWM!4茟iɗW\`L(E*Y-Y:Q:0np!~=O;yE~gyd%`VEptxD`Sy=_`چ])gpf @Jc`fǖI8JGE #2Og'-p')%#n i 6)> RCx;]VvafS*6fZ8p` `Ir<V 6Xa@q%s6##爊vy vHy"ٗƝy3:vR[УR{! hiiy J*0 ~jC`z?ZTB6*n \k7 s 7Vpad<@v"% G#?_pDځES';0M5@Iʤ(\i饠cJBfsfd`Z#?^E[ 槵4o21S0r5o(8b5~ق<@}UuI7D~P*` 6 #La49yidm:sjsv:6ahŧ[w-=ԩʗ*X9::7EZj穤JcSگ R=l_J ;~,;I}tȬQ*p6ڌ4J>)o8ʲ:yQP4{H@c89 *E{TKՓdQ;lZt5`mfvբd;܊++-1376pzrD> >\LxH0)pxۼд =` W%nǚyj=0 = {(gƷEҨٶk9]X:t~` {3=S:9O`kAFIL* djU{R[ w U7 n@xɾV;ij {q+Pa`u.Gq{!uTWDFIt#q 4>rFkH gw~Pd#ZkO O6y\D+\4j;2rQ6WLFL3xzI\"<lprs 0Ol"A%'?pPP#PSG'4 3`hbؕ=:fBVnT{)jPBGDd sAJ1I Z![<),gn}<ѾwNO0+ xtA6_&S: A~?e$?4 i,;ٕp$ @jG'<\9H]OP}103"RКq0E28..ij8<=~3~)5"` 79f$Fmtr0Ɏ*ؕ @`a|u͈\g RB4?+czOWGjгL=|z_PNiNCЀ(֌JĄX'B' ͢o tMvM׀O1%fIFR=Ұ8:ͅy1=}1#xxdMͤ~, RLtA D ֻ޽6ím7ܰ ~:OCjDXD}`XB2*R҉  >l衐ޗmVA .՚1Gl9L R;*@BdO0๭z^$nk' }ŢLo}Ď K΅Ϭ9p)`dFڤ:R=Sp.`z@<޷NPA՚6+PcoS990P*?eIe g+-+懈f ^ @神s]L 6 t2C3%_pNIOM{ v?ADDߡ;Ka+(0F[*sJ?Ulc{)yxޣ"/ёMwpzm}KH=Pc7Vc۾np*f#O~P@G ~@++9BB~ _[XQNVV Ud^WG kffj WW^UU ;Vg(NQeX_\"lb5 SSZZR]`]RRZY 5+b\AD&X(RFE_3"3慌2OI$lBذ!gnJuRڽf^{V'e #,lxaԕ/j[q [pce"dl!A1(R:qOTb |iRK6ujTSaCMӽ;vԬaƍ1ǭ(w.:ѳ7>~6LS=,@"[ex! i%mcIyy$n\(QH2u TTe VW2VY}lmY\"蠞x :D6ebXd,7eeƉ'Lg * 3i5F֍ow Sqcd/j\ X]VfJyi9Ӝ_Oy2KP|M Tz(I*%nM8j=:"*1O 2ցc mɸY`Ҫ$(1D!9,n;)K_Ņj[B祵֙L2ݡH8㾙z6YSgQcq.5 _^o6: )C*0[[zޠ*)N w9f .rf4vJg桡Z3+p63/iL)"Mt`LW )X.[` J!<\/&k9[w\_\^)`St| 4Hs*  MPh&(IQxt8T@*yvB y+Mk T'o nI l:ł|! 4~H6D | "U> -}|ly;{׳QNV! H"Wk&$ @ҐpS  3-#a?` !;L= ;QG.tF&@)A" \" @RqTdrcP⟠H/KHrFon"ߤ-1SbZgD5&gcÄ*7+9]:v~#nrc$E {G$0@! p̙GYR0IV9(*a |DH`$`RA#:P a %C 1Eiub(̋45:h6 ;Aֶ^;ZZك=g dH%@)50@ BX)}Sc|cSNtۢU)Ŭ6x\ VJYInk1L^y4k@wU D`>(9lDHJ[@ bN HzcgLA~L`"qS FP"0y#Xa/X ߚ֕LJ&\ pX@I> 8 /'ն@`Vd&{X^ E3Yy~$5q3SNq1smn8 'C|*%rKɖ]qi]}bip6(vqx#q~cg)@#KRPbY`*u u  ^IVrjRG`ȁ:=]G#%QK5K0<dvjd/s\pp\D]QEC HC" F:Y "Thh2`yXxhx؋Ԇ@S,cwkUrN#ȇF'苵 P䂈r\'IupM>b1q2o2$u2V%=gxk9Xy1:r:h9-$،J  טq؈cuݨi緒ui.9U0ww'bEIH efp ^LNfڲo(,ZY3,yx%b{eəБrC֘5pI^3Hcp']2yU4  dv F%s{109?:-9^Y'Cx)3Iǂ3^q`9t隄&"Yxɍ⍓~߳9֗>$t^g}"#8~E`lC1ԡAfYki0#)YI,ɕi4e^},əɖ19xXx8:iYɗ{Mjg(#rYfU@Bii)٣ICZGJF j j~;c_'a{8rgBlʞn:9A)Y|I*/ z@Ơ4X%IxZڬ1$Irjh;6D 6z3:&x^:j37_%*dگ $::£˨wʭp%Z${JEFM gԄT*xJi5:8ZiN [Z5m)HȫZ~ɨ_$XaUjdʯ,[©1ꐡJX4{yi9 :z@{vtjGv u |l F+KFZ  ` 1\P`i`P%i{ f`Gr}{ LR `7!|]}#][K빠 x 9Q ۂxiXP>"b뻉]$ R P ;;#jp0| [®P")<<).fJ/<W4|L9G &<ĹF~@D|J=t4K B, QT\^FUBOrMl2[ S ad OW\%Ʃ0Ʈh<tt9nklL2y,ǬwJcǂSx{<2} Rȅȃ|ĐŇt9Ď<ɜ+ɹǸڒɍ ʨl+ʵ"wFbʱȬ\ױʶ#dʕ ś|\:M˸"b<Z?\ \ j iX4pkdK)-a&Zp-l"aP J+d -pe]ߢypjP'>΋f  >y㏠xɈμ]!$n#&i 9=-n/N68 :<ޕ`)!.lXlWUW޼B]. _>gX'.9>u>O[yN PimpNH."θcM֧mP~-n]^N^~* ŽY^\~씞a&~Ɯn^ڞnx&CE .޵=k[../~ wF!N瞲Κ.SX.~B^VN>v? {nnJG#OOnTV?@XZ0n^6Oݎ@NʙEq^#?QPϭon/;Nj?BRycj!{?$WΞ򭏧\oA`ߴOo¿svO졏')+/<8[V(aQi[_\BBlb++ SYZZR]``RRZYSS 5lc\[XeaN(V; Ud^WG kf4k GW^dU;ViXc+jtJ )STrI6ʵ@Q@Q1+ɪTilR+cLnɳϟ@ JHK]w JѣHaĉ`QNZUjM0aČ!S4iFI:uG^|5OUaH"F=~RH&Qٲծ锍۸sR ja|W%Qb 맯ex6[+lXs;y}v.<ǭ@W EVEeF}i%t7Oq3MvJ'SR\|`?\u(э ur݀mqwDŽTWIx}(7Fr)V&~2VffH%8Zi"ڐDH&MҖSgp(qKʧⓛ T*T,5#nux>ddԑ_#eah-(d 6nslj뭸9u7=z*ǧsVg#vwr5ڣn(z%y):cy*V6`f5[j 4jĪͬJ׮ؒ+&շB7fz=ht9Z];bՃ#-"Rw,W\.I'RAbc zt ,0<#y@1ul:#Gߧ䆪f`50ZB{ʹ߀.4` *V}YK ŁuzH.MФȍ-. ,|y/;ϝ/j@҄? B >`(8C@D8hQBfݠ D/0mr>|Qgk@8@ lp#* |)Bm EG˝nSt/]w/fHo8#XT  Cـ AP A* #01)C `q x'H@IP(m+:{-x +01t`]u-ozDstwFp\QaaIØqOڄ;EuSaV-53>즆c(?llsީ̹?7h8}{xs͖sȐ*iyȌ茬|qE(ȍoqx{IS{+eQ~x~Y0)2in͇zوtM6yrXQXnY-/ n1Yn3)xӸ^IH2b铮Sل+Hhx& qɎ}MVY5)rBȕ9kHdNjgXH&;=1peiXP\w0"B P `ϡr ]h8@8` 0ѩ r Y`59wu`0rF+@ɛ  b@p ) ҉@]A  i#Оul㸖G1A402:4Z6JTTp<ڣ> y?:D /QH'J,gTgpԉҚH\!Rڥi5l h_CmɦtkZq"ᇧw桧çe)Jڨa٤* !CUjȩZzᩁ/ DêNJ ګ@aa* Z.jĬ/PW:$~jګ<<>̪UBr譼:!.0lz튪GۺWJƺJWoP3a{Eb i {5*:!s˦j$#mЬYZz~Э0j+:sZʰ`:;Cۦ.{B K9kOs.Z;*^K_mc;mrWyfpvPc)jȩ˙ ɝ  ⩜ș+ $ +@'9y }k i `ݩٸ)I؁VvKsgmkuf WpSH2tq_ p p=" pwHѫ" a) P[!a:9cPl- W{'ɳ?׼+[כhSн盾L̛`W7q17\ы;ȻJ+k+6;h 8+L µ@[*2qaÿYlu= |lpGLl NlR\ Tl`X>;$RƅqȑƁ%*,wp|r|at48?K?,,ćLĉ| čv L|z &b\%'̓401lwLbr:þÁ,̄lY$XO͕,|u^@$l&Ʈ̱\3U9 ẇpCϊHѣ̓<Ԭ L"ЛM̏  mΨӻ~<π̿\+}HTM3\޷\L>g@=BMlqs\ u|N]Ps%\)M< ֔\Ӗ|<:Ukkgm=Ʀ l̑)J!Ԓ|҂X],.݌^ ]VЭEkI֗]b pMr t¥-˧y yTVҴmط14=֘!j!l{l~ԛ]]7ڄb״׭~-ս M؈lĶ/ ػm-e=ѧ\j|ѝӍ]{ }n|] ՈĹ OێMА ,[=n=߃ <עM/|ԝ⸜B-pm4,6MGI`CIPk<[20] o[]Ic5~g@Lb}A!!o} feD΃~"ӖU F1DmI #^ޜNឮ-[ MpdLn5Vf!|0Pz],~‍qT=wXRhgMVoKMIh,@\ Yju`LH# `i9E9]DTEEG FEtaAfMN\8jH90nRE#DBSEQ\g DIePt)T-? =;M@\8 H$d*6Pc&c6#0)L\j1pC=LM޹/œ<0e^ A+f CAD8 0%*zTV-H1]YC^OWM~hLVgQD S0L֩ @09`=SC 3}묭-ȐnAt OaZo~PoR ~SS2:++~ ?~c_[ Q:CV; UU^WW 4,~~,fj^ ;Vg(1Qe@I\BBl:22::~D:4` ~tB:D !:X @N΀U#VU[ɲ]B[+Vđ+Ő%z!Gѡ"!C9DhKDA,aSQNd2.am‚kXbr˷߿ɮ[q$y; >)gχ 2gP  9:0PFÇ'Vp1Ǝ;<[Z\J9!Ave34C͙q<00 ): *t(]u+6ӦNfIEmn^owF]xϿ- 7SbN;5! Ј@9Hu!(4C= ӚFpHd(ߍ&LӁ(!A`"E=q*HdtPaχlwBHwye)쩄+L}g~nixs9N1 0BPˆ9P*$k/ffm4ޖg:j#p@<@ EQ~@OtOU)"A\(O!Xyz欶9҉3荟%X O90T٦9T!SpO 2< @X@,B!:cjʋcO=cOQù[":1>ܬV7{bW$w'~K^WK<,^b& {^ W_7.}Z"8Iqg9%"kG?V0s rj ܰ 0nwPG!y`A蕉6"` s!*# >L{abp>Qc8 xC O,b6Dnt0rmǶT7X;.^t& hܜ8FLض;"c'I5^ iJE}k!iF#ꯒJ$5+]PPQήL%Y)?WF\;XK7#b:_7JP|5$2~}?f#./äLIT xa{*H2).|IT P :Alw  r''P2QQGq:Tf4< BVyF)ѝfj<ZɥGs<ԧ>-bE mTNU>jA3"P%3MvsEY]7s"ǭQ0nWU4&ȴ i`i'^@MljX8C?8)Vf7 vv %HnAϵ:VXmR3 *}rH*K%ZJ~bxǛF0+{F ?ƕrTZxՉWCr H LS*H8E%O?AtJ{H B c C"ĸrbx 4nn'W Wv#~(l:9p#@2D$`dfcבqoB'tvq@w~|{D1Sxkp_A@ 4DoTC .~xw+N~ ѳ96{zo!۾lH@0@q-R`F) cv*7dZ%7}~tt8&t E *07VH~ G  /flwCm  d\dJ1 ?`p+p'%`ER 0)@EC2%`[E2CJ :QxDfz$Wj2JE_cThm1@R !EPdhhX?jȆnFM#tppYUDc8$CWіvɔca?P}9ARNJ( -" v*I-z27yTŊC8( pe@#pb:׎Y3@L-?!PEP#8)`)  07@ڂђb5|鍈?JhW)D`JjDCA vZJ_5HcNk@UQZE!4hy*?}z-d98J+{2OWQʖYZ :SIɑN٩ } @>hD*9(~+:vjXX L3 s9ɺJ:j*Eq;*0)Q?%@-*zy:$K C(;(?*گF *M)s)WTotסѭ57sȮ%p̴S|'в/ z: HZ:^G+V6 QSZvVkZb>P7*.0D USk+ipkr;W &OlppFuyK) o &ظ1 Haq;e;8붞ٳD ˝L*p{F R(D[u~+ pۿмPEEh9IgדԶ+R[鄚%hAEkJ몸U& |JY? }[g ۑ'uxEQRKD8"uf0|+j9;ŦVKZR\}P+KƄe\Fj)Ox5ldWyTI ;%iL],I[Μ \:i| 8zY|NlC. ]X7ͬ4ѿLť\ Ԑ N,/Lmͪv]%]GґKH9:mMجMӊܰAD\ί*ٸg,iMYt,vl6V Ӕ-?B-S9|~ȤԦ]-,-fx)#ٺ-ԣȇ09ܧ+5އMS`;t@r !]Php}hPL0-9P.  .^ nފ=:P %n]Zl7XD. TTP}|ۭR GSL>EN^ڭWP`YC[~]c leBgio>n~.4!zH{ݝ~y-莮^$AݗɠNء@cT@YRN<!.UQsn Գ ^9^ .PuC>LĞ& UN c.\ߞ~{~> Y,`4 "$d&̛8sNYn_=-w*e+ϠBK3FiK7̚H&rK?=< /]ƪS:K/ jEz$)WRjkX_ ^̸187Rhnu&u)䛏jZvFDaEb^MmHk:-FNA[|"^ tOiЩiMlŰKΝ1hĻUnM jZG4PwMyEd'cPh{gO`}~iǟhBn!VT xxV,y7ㆷyW6&4)z.tQH\K OB ah% GXYf'nh98oUbP7]T= bL!cf* lR 襘js>ixb'ċ*;"1A N"d)tz yG*s@ j:V慴5J׮:ZϖY8 w,Qf(:kn8k_fBt3/LTz&뀺)ދȊ* ၽo/Z=*(ۮ e l"0񺝚Ljle׋a1 ˎɌ5!nX0lc;4:_ע$; J=tV#\i} mtasAw~vj/[<"LKkx7|S>ߐ"|a:ma1*=9cqh.;MS\Q/[~B^ܡ Cw<&/E)∲HHlD˜D*)#06 xb5!$%9# CTV$8HuJȥt ?PXb)~e% iʘOa\IN\0e-k(04|$5a2]Nj/|WΎ!h e7ǒʇrM6Oujo=A6NC#0: 8Pؠ2@ n?8 XS}.πj/" j *fʀ%I JО(P ;M(j&:iҨ^b  AdWIݥHa0*YЁ L~d]xaO_-4:A?t@ EFX"H@`@dp)=a H>)S2Į JZ5  @$d@_ )@)he@hhE+6A& Ē>Ƌ2u`+º aHRo=\@jN  Oݺ~:^KeM``Ep]Ie}G\X Vp 妡h!PXxV p  Fj27,7Xhrpxu .l@ik`ؠ?CgH@nr(pU5%Cأ_ ԝa\)`97<K?G! exZg5$xdzlPsW]:TP8/CK.Y- pQ4a ?D4{*xv)4 }sӠr 5m0pZ z^A loM0D !8k7 1,+WwWpG@ hE[`-)C [M@j[kS-p?xwA *`o=t)ٵ@ SpC"{Cx=z@1 i4w""lgUSv'u5r6Lว=>Zk[xNMB wR{Fo| ]_ǧ&`Y۲Z\rd`u8u u~O>e53) 'iQ1ve#xO(|'vpAh%s7R#V(pB0 03{cP{`{^TH25fPrT'~ >~ rIFD2MFUXm(Z \^u (|Eg@&>cCA=TTfx| ;$vyI3PPJP3JX((UP8zHC4ODohrHrXDExPJ!Oċ8؈0PH^hdbf`=bH+ӆ8XQ& XƇD8GM؋(P8 h 4 BCD懈 0) Y%WX`t{C{{,YNn`1HD#g=79ɆHL7  x)`8Cg pGt(GV '\y&^J`4VP0xa4v| Љ." v)CVII3mǶhtANP'09 )+ə䙟i HDB32  )uy? ppƑV難 3K$sVɘLixV Qp Dn;pُ9)"'6lE*DP}ZP$z >pB ~ yV0{$yٛHiu3ZR@@p_P//J *z #0w 2 oJ z]))Q9-T z١DV @dDoGPl^[Rp*_ _'=8VF)}zy2OJM%'6 kElE\9i>1@Xof! 0 z*@c( %"`]'ej 0N *(% 벞@ZmpwD @ત~YN28:%RZ`@5w!9V(ʹ:p W׺ ڭSU0ʝ*v檱bl \E_V11  ZصwX_Z[R)X9le] tecʠ;˳ ? A+CEڝZ3Dab% @*{ƕEV%9n9 Pj+loMz("iUz |*+ƺ[~4kS)9K[=pu+wWyjPH ~tja2DyU_\zir[xʰZ{ nKK);*R4 0Mf "{~{R`)@(K׽{k[0P5n d{*‚zt6`mƨU5\RmUb`j1PegҨMkmG`-slJk:0rDy;3+Afͪ]n_ܐ y8A@6t$nE $3 D>=3>锞$~qQ>TᚽH I @ꛨaQv%;tF#(h-jfjO* NsmGAZ{yB%AIRp*n菾:羾 U.*vy.to%?4e)PPp0Np1Nps5DN %#P~A0`ҀCd?H/=Mm5H?Olp :W%nqZk(lblm%̺\ZvmA< &W߱M ^}`kۮa-@pβ3Ik"*k|ye]y|0|-|>Z%no<=I:(VV; UUd^WBn,~~,nB^^d;()~*C Q ~eX:"\O*??*Ol77* @*%#FR#~ F ~|@Xc 2؈!1MzQ`@BcD' %:ѣHq(E@ 1ahYfU\>h Hxd7o:IKtɗDF0 cR_$\Kf\ڭI L 7pjlA5hmtD| ڀP,]PAh4w馝zEu*@_߬q ӂ[Q1lgl>+ Zk-]`-+^~赮_@C$QQNHtIhWnk1n*KrG M\ Q ]iĈA[@pm\ |©j~B@0` ,$ %'"\2)P( " X81uDaA8 G2[kɉWnpLOeTJN%Dn$ >P2gzP+8TxT;lLw~'Le h [B Da0Z( W%@z8\W,5ВК֏Syv0ή<*g^"DkH`$p QRթjU\YF6n`Pi6^`XLqk*WVz_qS^#PXȦV(,mV,YQ~W~nU-X_s;xC-e#K܀=sME~Kè >W]bOY eZwm䵙ypW`}-[ַP_T (>S.h MYqg}N4QDWNuLذZP.-Wҵ-=^ ;lӔzi, :Zc=^1=qmq]5oVDT;M7e[ⶌ.bi޲&XutcpX{-r Xsoȿc"dQkz_zc[pW;+g0<{@(xٌpR&b /nvlbhEݎZ&%}ۦN?GauՂl-ѭO.Pi o7BEO)bCƂ{f4^EZvOT<z\ v2'DSy^"  *}W-7!iY}D)^ْ:sI s8tc03%@fA#"9PAuhj֋U9 `Y**ߩ ntyך~2"^іԒ.9ip801*dC(EؓS~@}rRR2\[ &#* %JA+r nP)$w'w`h)InןQPH:Pw вt]hus#`gfLyi*Km BoLʨgu x*ce`uFdYX s  ;rZoס :":WyJ&^96ZzIЫ oJ9Ŭͪ^RjTuZh7`"ǭ~c/Jگ|)o ffJJ!AA*{dmp+n/*Z:i ^ Zoc0p+ o:u;u {+? B[A Ъg(* <w3맱ڭ :;!+ G<0sxoɮmRwUex-8% ,T /mm@^깶rnrpKp `Y+ !&v[ %Yj~;X_ صV[*G˽m[&fVrr7n9Kck+ <@!`hm` +}[&۴zPZ׼EG;[ϛ TP*K0+ml +! A #<"Lgl4k,zkl8 : ˢ' ſPTpT0!`*P£(<۶-L߸&4<P,0`5T@&@dlh l@ k f!{=zV|\ɺPŦjf̽gS0lLn̾o4G= ) kpoPKmPl&s˴Iȇ [0C ˙dgf| 0!G,0fj i0,˷b++.0j"PϢ+Lb۩RI0 lռ\-U|m ,.Η sū̳̐ \#A0J,rΆ;ѡuӜI%=Ў\NEY0R>Ԛ@0,5}8^=R8/p 3+0`<7jB͜ {& ՝Ő[kݾ ~ճ&z] wM f]*ka xӇm n)ܧXc͞ tDm}Ԕ]QUٛ ӝ٠}~ 홑w9f֌'=ے-Zcٝٙۻ=ѽZK]'ڝڿ05 ؏l B mZ}n*<]- 5@흱ͱr ݏ3ߤp&zכ1Š6+EM04 jWެsuM'r p\u5P|ఛh2StF1.IY7Dr ?A^!t4iGn&n9 5Ubnn mއ"\{4f.nl^Ko }9][㸐-Sd&niމmw~&,.6m1Y⡎]昳9}-.N c뷮 Sn^.Ѭ n=ߪ #Lh뙣qN߮.]ݰ撋K3Z^UٜyMhxO>Ksv_Y${j/hP>^WreT!OKk` /E38-8K nsx C$.UNLR4]`$FR.vM>i]mUY`t_^Ϧ`bzf@ځ/\s?o` f2cQNSߥqP Z9\Jvoxo_$8sӟʿH'b&@ɶ/GO ~,sn,~nȏs҅~ӷ؊͌迒 HR!tA%#Ə C(dɃ4TqeT.,DRe!3s idO(\r'/[SP"T:jՠ䆊D*+#9ҒJ@ Ѧ:NkHP*;Sl#f`_l(wgq[ˮ+oh(#CER5\+T0XΪ"0n/c[nN˯Q~[ alܳ34Wf.wG':PTѽPӮ%mtKMXG w-dL_5E-wFfCv"M܀3r7.^oa/6l/r|p>vFbWS.:,3]o}1Č\c7:6RA:h6D|3P6AtZLhoA8 !N::Dxԉ$ijəm@c HKw0K0Y9.r|J %%Q G„ &C%*DC9!8R[jltN$@K00IRkIG/M󏹬ZNuJm;(x 7Գ"N6 W*O1/IR%M'7IobS* ڀLVT?ϸ 4"3b!ďŠ$&&j1XI VF VՈ@0fTՏZUJTTY >ݒBA]i4 M[!Ҭ] &7[ޖ=m/Qz_z.Զ:.X%x Epj<֗kkƆ9A_aA [S~,h K F?`P fKat, 1}kjBLFjsArxeVibPbjXp/\ Uhpp(@(P.1 Bx[)L@0TY}K,6A4@98v _ <^K,3^DyyXFñyc FFd(@T2x|f9lv3Lg;zs hAЈGGl,61{{y-48C.򑓼&?9S򕳼tZi-4:o|< ]C'zэnvs}~ּxmā;mC?-nQNYnW[d6sm9߼-lb O q:#]]@B$*D^d۞wMs:ݪfw_Xinwo_ npe#\~DIʌIT MEnBeқ"N9v qܦFWwZg_yqr]6=pdٙ@d?@R  DK#,I{"MZ [$<5Wi1*0x~X`-"%!Bu۵8Ƴ^yw=`yMyj7}Nߜ:ww$" *FtLB\))%'%k&ZU$!$!~wHVuDWq)}0~5Hq?Duguuq\y!ybWrdrv,Gzkwz2v5'wsswP,Ve{)G^*P0LT$U8EqEPu<RS^t775Vupuq[wy u"ycwrfhwosmzpgsszv{(|'(]T%*!!d\LFPI[ċ/eZ}ȇtBA`шmy惌hyuv$yez(z؄ljQz8Ww;w ;\.@X# %%T Jb؊U`Q* %~Z17Bzu qZǍ78GXL8swU $#֢\]t'<{k#!2>I$}b$ՓSK#Wy P;%+˘,x0'FHؒKolz2ىR؎(x*Y 륃DŃٸ%~BD7wz TVx0V%;YPi28>ט؃~A(Xx78( (R'=H=byeJ#3dc"i$o X∄v9z{Jt ٜl=yyixȝt渙yG;NŞ:Zzڡ峚њ#c jɟmو9Y:|Y)G 'DZFzHJLڤNPRZwx)ONS=։ l0 pu≣©i9piD&<) ۆ/:n1 - r,if~wYz0oZCЗ6)@zx*8Z@{@2ˉF~)yj1A0aIꝗ Jmf: Ꙝ= `K z٧Fb Cq pj =0W p'6' %o))@@ka6)rO`rVAШx6=J<ʠACcVZH)O  :9 *1R*D#@pb0';)+:  O0ک{*'~:a yjT~+p~ ^2  &EU~PlPpuOI{f~@ jI^g/륇P.S*fh1*n?в6^{ī'* = i oު{;T\)ٻx[zH' g[) (0:v⊻S7K.˸Kosz:v mmg{)duhp`x@e᪮~F~f7@k-`g*ɹ /`ie~`MJET~ oڻ G#ƥ˱w d@p- '@eOr,̷0 Z7̸:uCCJAkG/ .I pL~pC" Ҫ [g9+<`jO2q<+\ EZ* fC c.+90sI *0č0T P\!@v#~0ca캑IndX;ߩ##So 0rzq7BͪYp rt ^o݀(}W]_>J>Jqͦ$>m~>~^u^3M7N->l+3XEG-qJTn,.-ZHN">jノ~)Z[/. (ꍎ.}O=g1gHmP㯭&N>6|籺~ľ XMcZ`RuP\PeVnoZleu__v`b6f 6aafUbm60r/XP2~@npr?t_vxtO'O]k |_N“EGζZJ/a C/ьo_A E*5V^^…` G"qN[X]oT MB!kP}}eOd"J\}@}c}g-g{ʈ"{|(|d)GUb.|,0!!!0<.,T~,~,IJ0*/<ʑ<&&*mT,!T<.T*0&o<0m./!<^Ti J`HQ?jCkIQ%O\˗\&~󥽐Bqd)ڛ Yf[DB/ c rTTPEC`M9) K.x+(HWL0J0XTVRqZmU ))doL̘+µ,ĘtZYK^g⍹H/9^!qSժXWΪ̎Ұ?׮j7R?/L[Ra| 3pV޿9SwIdj #6B$CDQa9@Co}"%&8 [ BG4G/~YF~}hE{X㍞قc+瑒ގX@<ˡ/9ӌ2@"D! jNF]%@'*0C%&`@.W-[+l=| ݈L$ LUbZ_NH.3`;K]2\SBF *(cy* FjT7J *DŽ{V‡3qoH)``ws"rCDBh8GHEO6 rF=@6(d<# [\a&P6f+()ɽQ<|CBvCU*FW-=-8~UI4SHpeI[ Z/WS7(*# </e|C6:5#-(+'veg^@ 9(,C917T[r ĥ h&"qP6HgFRy(+g${ P&Rt./!3:HeFaD'JъZͨF+JazTeLHw"%4Zl(O|@A'aQvj,l\!`İ$SȂ )t `6U4t zT0 +X*jTu \`4 Pәph cdAJ F,<{ ԰#\ ^@ЀX /Lme)ZԤ`gBT aC0ֲ&+ /lw^0g x Xk^Fw}X96qPN&[fvlheJ0jzT66mnOp"7sFwսzeU?8,dkYj-LKZ4maJU60o@wBp@qS/Ͻ0u`]j2 8  &'eƇ9 愔;aNH`IFM s$Ngsm{a,־6FjY8ŭn\nr'\aJwUW@Lm i{zI^G e :V*|lil/2Ѓ/`חj] *GF!h/8o\f|(m##T8q>\PfHPsW7'qhP|mI-ds+Jn0d GT0 "cEU]D0Sa(A&) csC8%ցO: 1+ĝcC+dN+8zDW;vm[:@ۧzNpMǛ=vpps덞S%#=D8x, e Dl `.Ѵo${˳4K7狾еi#}J'nzznRnUWjRo&o{s[h"|h|v2nGtjwrHg2C#7-(@/|g6~k!1=7+g-W#bgmBhGzGmxiK7zzjT'{Vnj[ e"6 0 `\||d}c?2bFprf ^"}A}g%+b7w RkSb|T}$6s2Fs0qm4i;::`ziRXF@'uX{vu]u  }1T p Ȅw ʈ4PЁ/82&DcO$ Ǥ;ڇHx ; QȱfcKƉU!FDgc0K~UH 2: {춅jrWs1u$I3@y@7zp>pT77) IZzin葷 */0&Ӣ"d4iGwBc2~4D]P*Ж~pu~0%-׀&BVQ\ RR]^`#.dg5)~`' 77)02EP[AwDy =`\OY؋\蔌4@ID9Yyؙڹٝ≝Y Y39,, 9m0Yۦp0_Yq)nY)Z`ɛH@_řXWFLyڡ ":$Z&z(*Y⢆u呙ȢbHzIلМ : Ix9* MSɑi(m9`b:dZfzҞ"AfF89*P5Yy0YOOK X٘ 妒^&Y SxZ:EDj[U~D II ّpڏ00lj0rt*fy=c ~`8PAzKzڛI9ڔPz4 J *Kx0' 1SP) @#)[ۚ' `%uY:Dz3cYeENxzdzFnJ6'K.ɩ!*1v tP(>+u)ɔ9 ɴhN+LPR34V{X 7Pǟə`ڶjP"N;[k `fZzLUxyX*J[h4.˸ǯ P,9kt9v[M_zIۼ;A `);}8k׋ s7i`x+#k vJ9+.# @,}(kK4 c{˷k){k, / g %aa7;ʄiK^z+yû=챗)+=, |㛖"p@@Y5E 9 H n !B#)A8ۋP,DX#.̹ ,;V~ v)# L#92 bL'{iLm tooZKwlRy\ǧʑǿ >6[ _М@`[ٙPmÍ6wԡz-0<]{ɝ@Ƚ݂Fh}-- ;ː\+kMy،Ry^1y/ܹ;Эޣ+\N Xh9RXu '4ޱPM<<$u |NG0N -❡-Y{+A*Kmōm4`;^7 䗬VX^Z>\Ju-Qm+mkm.o9^ `N{~;|C=UpO魷?NֽÒ^zܧ~X f>^~븞^Mm^aiJlІβ.R.+ў^~nپ>5n;޼gy'c.e{n<[?|;~B~ o ߛʛd.T=؝LY =Lɛ} HO(1/ b rAU) OyxF2UO.02/ 46_@&)#C% 26 hu1 `ljDa/_~ c=,^后m7aG5&~˗?tl˩!(rkаv  *bH"˳R56@ˠ;TOCf%T5dHo5X]Ԏx⓯qb;"ov ܇:A,pv?-v-J[ mTk5P S_2ZNMَ":qlEGwts+#>o䟯ˢ&"=ýC?{{ڶF qx7Ѩ'H Z̠7z GHV sCāgoSИE7A oHߘ-Amp2\ lQH*ZX̢Ev`D ƩDwAC]i[b0 1f;#jo&I1F@ t@!^ '_gͮ" V1$0U~ʫE'(dC0SD "v|! XZf av9%r-3AF b8( P!,۞eDi @>p̖'A׼ܜt:@D!"D%j@Ձ iDg2@WҖS%%0op ` #C `Qv@)Ђ t @@9H*|qKծbf" Z#:r $陂0 E #8 PA$Hv$`cizM 22.PP*Wn6  bWVã)H-n Yr6ET ,ptRWwl4OZ)b,/˵uy xK򮋷4$V6 :BBW0 |SiKGbN6 "޻ })R"dv@  A$pJ Ň bQ@@0 (p Pb*QT1OUiXβ+ٲ8u^g 1+UZxҲ|X.-3Zy̥#LbkFg΋pLYqD\袶Rzfޜo7|izE m AQMbNf;ЎMj[۶2FZ9t[*SQecvMzη~m,o&s;=Gz$w Bϸ+%݃K8]GBSY sq,u=.1#u!~UЇNH[b3qn?ܤωNE:/t37]SzYl]}Xw-Z{={ϥK{kmY\ jDߚYwcp=C'Wx? gyܑ4ONw'j6rv|azٛ\Ͻ'\=o|~ņe? #m<}O6/41(d6vGp d  + r] ]z s+lAuX`(a^`x0e-Z3P6x8:<؃>@DXw~FJ۵{LPRXVwZʗ\`x^dXU7fjqnpr8tXvxxz|؇~6Xx؈8;PKKOXgIgPK8^EOEBPS/img/help_layout.gifb,GIF89aֽνέƭ{{{{{9Zss{k{s{甭ތބ{ޜֵ֭JcckRRssΌƄRJZZ{{1ccJB{BB{޽ބ{{kk)111BBBcks{!{!s!k!{k!{ckޜ!ޔތ֌ք΄19Bck{))Zkބ)){Ɣ!!)kkkkk!!kBB{ssscJksB9sR!JB91BJZcRcsRRksބ{ZcƌcΜ99s99k11kΌƄ)c!s{!RcZkck91)s{s{!skZRJ9RZB{ޜ{kcRB1ZΔ!B!Zֵޭcc,H*\ȰÇ#JHŋ3jȱǏ CI!(S\ɲ˗0cʜI͛8sɳϟ@ JѣH ӧPJJիXjtׯ`ÊKٳTD!qnA B0mFSw`[pǐ#KL˔Q;71H*v4C¢56p\SE۸sͻ͞ޑBv.ApԾkνʚQ |j0 ۖAβ _aGgWA%@-j58 ݆v݅wہ}Ma_b'!Hguh@/f;>HEx#t F)TV鐈(t7NA(r\:&llI#@rkl4l!y&bfݣiJ vUJgɭHb\gj뭸Nhd{8fWz )ǞZ쬛z\eZ^z ev˥ )(jv)*貛e_E;ˁ+ߊxuZÑ2*Y*RЊw_\(!%#ǝIޥB*34;c}*Xb!y- aϰTW'B눴hm6I-vrso``EIx筷dXЂG/Lt!L߉^xx %ޙ{n뮫-n'--o!7G}ʏ[w/~M+Weh Q # HL@1'HA ~_AЗ~~qnA8(L W0 gH8T!Kh ăbAAD"A HLb&6PRpSA xыB#!6pH:x̣ٸ IB ҇"f9^5ALT+B\)`R> b3>,gIZ̥.w^KaeG~A(~\2It!X'2̡$A'DY;&LeEVR$0o)~.e` =(Io G&Z)\!F5m⡛.FΆ4!d';҂ i)BdsJ)ApS9UMR NV GvHZժ"VիfZ%A f:43PM)@QC w rғ*įPO ԟr.CRĮC)b;x* ]JU$;hG;ZV,m?QӶvtiI+օ(4  v"<+Z{ch$B8jSA]VW@JJT E`sTt25PK^ɪW]aK󖗥6}/a} 5-a' R ff!{!*XYկWAaooo[ߖ"p㑏5Wu XAs{"n6I)z Z٧B;,GXn앩X0Yh2Lҷn/J+! v=jbx#;$\D,rhEg iqBwܶx X5m(r`G;܁q|qB" # G|"u2w (s0=sb1W^3 ;z|HKH ڰ c0pX }d+T%{%dx'Ã}tx ؀ ٰ!x8>؋8H QȘʸ8XxLNԍȈ%a8%I蘎긎؎T?*XX ؏8#]xD y5y%9yM0.*/ &y"!(0<Hz'5:99.IXrQ-8>DKɓN KU.S<-AWP`Y3??VIBi=Hi듖a9twGY%pٖyrYR{閉ٔ%ɕ*\ɔ+QɘSYyw9;yI*Iyizj99II^ٜ)ICɚM9+鑯M yٝ)Xٞ9a9yٟIJ9y C:Z*ڡ :$Z&z( +.02:4Z6z8:<ڣ>@9ʢ)FzHJLڤ6JR:TZVz2:Ⱕ\ڥ^`b:dZfzhjlڦnpr:tZhj/ a~:Zz xz|:Zzzʥ Z[jN9Q⠪<ɪ᪡ zʫ05j<1JڬO <NJ/ګ񬵦ҪʭSz⺧Jz;Z yZ誯隧*4 1ڪ:گ21a !Jʯ QJJ k7j˧ & +AZ* aK;*!k꨽B۴N+(5]:<]I˲)˫FKP'g n۶ ;(k+Y [\ d fzzw;p,+sŚ {!;ҷ;K{ :˺; +6[D{$[h;D˶i49}*cۺA[k+{{ {˹[K t;r۸y˼[++++ λ9 |;˭۰J{Njj!<\KKLj ñ}ڿ|