# Entra ID (Azure AD) SAML (QUX)

{% hint style="warning" %}
**Please Note:**

This article is **ONLY** for customers configuring SAML SSO for **Quadrant UX (QUX)** deployments using Entra ID (Azure AD) **as the IdP**.

If you are configuring Entra ID SAML for the Respond UX, please see [Entra ID (Azure AD) SAML (RUX) ](https://docs.vectra.ai/configuration/access/saml-sso-rux/entra-id-azure-ad-saml-rux)instead of this article.

While similar, there are some differences in the implementation for customers using the Respond UX. If you are unsure which UX you are using, please see: [Vectra Analyst User Experiences (Respond vs Quadrant) for more information](https://docs.vectra.ai/deployment/getting-started/analyst-ux-options-rux-vs-qux).

The Quadrant UX requires different SAML claim names than the Respond UX when setting up SAML 2.0 based SSO but the claim creation process in the IdP is similar.
{% endhint %}

## Introduction

* Customers can setup SSO federation to multiple SAML 2.0-based identity providers (IdP).
  * For most customers, only a single IdP is required.
* Once federated, already authenticated users will have one-click login in to the Vectra Quadrant UX.
* Unauthenticated users will get redirected to their IdP’s login portal.
* If multiple IdPs are configured, and the user is not already authenticated, the user will need to enter their email address so the domain name mapping can direct the user to the appropriate IdP.
* Features like password policies and multi-factor authentication will be enforced by the IdP.
* Once authenticated, users are assigned the Vectra role defined for their user or group in the IdP.
  * This will map to a role (and permissions) as defined in the Vectra Quadrant UX UI.

## Multiple SAML Profile Support

Vectra now supports multiple SAML profiles in private preview. Not all customers will require this, and NO changes are required for existing single IdP SAML configurations. If you are interested in this feature prior to it's planned general availability in the v9.10 release, please ask your Vectra account team.

{% hint style="info" %}
**Please Note:**

* Existing customers do **NOT** need to do anything if they will continue to only have a single SAML IdP configured.
* Any new profile that is added, for new or existing customers, will now need to have a **Domains** list configured as part of the Vectra SAML profile.
* If you add a 2nd profile to an existing deployment that did **NOT** have a **Domains** list configured previously, you **MUST** edit that existing profile to add the **Domains** mapping for that IdP.
* Nothing changes on the IdP side of the configuration.
* When multiple profiles are configured, users will be asked to enter their email address to be redirected to the appropriate IdP when they click **Login with SSO** on the Vectra login screen.
  {% endhint %}

## QUX SAML SSO - Notes of Interest

* **Please ensure the users are only mapped to one Vectra Role in the IdP.**
  * At this time, if a user is mapped to more than 1 role in the IdP, the user may not successfully log in with the desired role.
* IdP initiated flows are **NOT** supported.
  * While these flows may work, they are not recommended because they are highly susceptible to Man-in-the-Middle attack using stolen SAML assertions.
* The `SessionNotOnOrAfter` SAML parameter is supported to invalidate user sessions and require a user to re-authenticate.
* Single Log Out (SLO) and IdP initiated log out are **NOT** supported.
  * When a user logs out of the Quadrant UX, they are taken to a screen where they can log in locally or click a link to **Log in via SSO**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-c3455be19ad71725ab7b0cc0ea47b1f5fa2e064b%2F9c010e9fe101f9505d65aab3753357ab97072add384f3569620b994f0db96d9c.jpg?alt=media" alt="" width="280"><figcaption></figcaption></figure>

* At this time, a user who successfully authenticates through their IdP to Vectra will have a session that is good for one day.
* **Local login is still possible after SAML configuration:**
  * Construct a login URL as shown below.
  * `https//<ip_or_hostname>/accounts/login/?local=True`
* API keys are not supported for SAML users.
  * For API use, Vectra recommends local accounts authenticated locally or against external authentication sources such as RADIUS, LDAP, or TACACS+.
* Token Encryption is currently **NOT** supported.

## SAML Service Provider (SP) Initiated Flow

* This example flow diagram uses Azure as the IdP but SSO should work with any SAML 2.0 compliant IdP.
* Please note that all communication is brokered by the User Agent (user's browser). Vectra never needs to communicate with the IdP.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-ae2b8d1bb08be8cb845143dbd7a27c38de213bc8%2F646bda414d5f547c525e5c7c8dc6974b6b3fcff0532da96cb3313eef44964b58.png?alt=media)

## **Release Demo for this Feature**

{% embed url="<https://player.vimeo.com/video/473900779>" %}

{% hint style="info" %}
**Please Note:**

At the time this feature became available, Azure AD App Roles needed to be configured in the App Manifest. Microsoft has since added functionality to create and manage App Roles in their GUI. The steps below have been updated but the video remains as originally published. The manifest is still a valid method to use if you desire but the App Roles GUI is simpler for most admins to deal with.
{% endhint %}

## Configuration

### Start SAML Profile Creation in Vectra UI

* First we'll need to start creating the SAML Authentication Profile.
  * Additional profiles can be configured if multiple IdPs are required for your deployment.
* Open a new browser tab, log in as you normally do, and navigate to *Configuration → ACCESS → External Authentication.*
* Click on **Create** in the SAML Profiles section.

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-43357412e28cf8704fae2292b03da1ee7ad5b647%2Fany-idp-saml-rux-2.jpg?alt=media)

* A dialog will open and the **SP ACS URL** and **SP Entity Provider** will be displayed there for entry into the corresponding fields in the IdP. Make note of these values for later use with your IdP. The SP is the Service Provider (your Vectra QUX deployment in this case).

{% hint style="info" %}
**Please Note:**

* Not every IdP uses the same terminology to refer to these fields.
* As an example, in Entra ID, Vectra's **SP Entity Provider** URI should be used for the Azure **Identifier (Entity ID)** and Vectra's **SP ACS URL** should be used for the Azure **Reply URL (Assertion Consumer Service URL)**.
  {% endhint %}

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fz1J1V6M7uPQtZa5WvE1M%2Fimage.png?alt=media&#x26;token=1980162a-d584-4bb1-b312-bdec313e3b6f" alt="" width="563"><figcaption></figcaption></figure>

* Leave this tab in your browser open and proceed in another tab or window to your IdP configuration so that you can configure the IdP side and retrieve the required metadata XML file needed to complete the Vectra configuration.

{% hint style="info" %}
**Please Note:**

If you want a hostname-based entry instead of IP-based entry for the **SP ACS URL** and **SP Entity Provider**, then you should:

* Configure in Vectra the Brain FQDN, in *Configuration → COVERAGE → Data Sources → Network → Brain Setup → Brain → DNS Name.*
* Check the **DNS Name** radio button for the **For linking in alerts/notifications (except AWS SecurityHub)** section.
* This will populate the SP entries using hostname instead of IP.

**Please Also Note:**

The **DNS Name** should be in lowercase in this area and any place you see it in your IdP.]
{% endhint %}

![Configuration → COVERAGE → Data Sources → Network → Brain Setup → Brain](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-add172a937e809ffb6e191be256abdba6ae98c89%2F63ab184b40970e8c9b56862267b01c5df005f4f8573ae3ca9e96b474edbd3de3.jpg?alt=media)

### Configuring the Entra ID Application

* Select **Enterprise applications** from Entra ID.
* Click the **+ New application** button.
* Click the **+ Create your own application** button (this is not a Gallery application).

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2F7aybdpkAyJQ2wb4HpRfw%2Fimage.png?alt=media&#x26;token=6c05dad6-ee17-449e-a2a9-1468ab72fdf6" alt=""><figcaption></figcaption></figure>

* Give it a name like **Vectra QUX SSO** or any name you desire.
* Use the **Integrate any other application you don't find in the gallery option**.
* Click **Create** at the bottom of the dialog.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FizJiEGYZkyWKaTeTqcyc%2Fimage.png?alt=media&#x26;token=8c6cb3ce-a46c-4636-8cfe-fe4a9c7aa16f" alt="" width="375"><figcaption></figcaption></figure>

* Select **Single sign-on** from the left or **Set up single sign on** from the **Getting Started** section.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2F7jvRnXMrGigPYNCANVxY%2Fimage.png?alt=media&#x26;token=1e7320f2-7195-468e-98e0-7bda6cd456ae" alt=""><figcaption></figcaption></figure>

* Select **SAML** from the single sign-on method list.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FzppjReL5bwowTwATRDb3%2Fimage.png?alt=media&#x26;token=0151e147-9d1b-4bc5-8006-fc2ab2f1024b" alt=""><figcaption></figcaption></figure>

* Next we will configure the Enterprise application with the values we collected earlier.
* **Edit** the **Basic SAML Configuration** in the newly created Enterprise application.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2F4FgwntKT7i7yBCU1BqcO%2Fimage.png?alt=media&#x26;token=3f3fa17f-5728-4bc2-8c52-87152670a2e9" alt=""><figcaption></figcaption></figure>

* Mapping the values we collected earlier:
  * Vectra's **SP Entity Provider** URI should be used for the Microsoft **Identifier (Entity ID)**.
  * Vectra's **SP ACS URL** should be used for the Microsoft **Reply URL (Assertion Consumer Service URL)**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FivASKKPaq9gL4lY66Obs%2Fimage.png?alt=media&#x26;token=014b8baf-7a14-4d67-bcfe-2a560302c230" alt=""><figcaption></figcaption></figure>

* The rest of the Basic SAML Configuration can be left blank.
* Click the **Save** button at the top of the Basic SAML Configuration window.
* After this is saved, you can close the window. You will be asked if you want to test now. Select **No, I'll test later**. Additional configuration needs to be done before the new SAML app will work for login to Vectra.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FNGQUL7MFpwNQRbzmlz3z%2Fimage.png?alt=media&#x26;token=53d4307b-7e87-48e3-93ae-c5c6ffdfabb8" alt="" width="563"><figcaption></figcaption></figure>

* Next we will download the **Federation Metadata XML** file from the SAML app so that we can later complete the Vectra configuration.
* While still in your SAML app in Enterprise applications, scroll down to section 3 **SAML Signing Certificate**.
* Download the **Federation Metatdata XML** file to a location you can later access to upload the file to Vectra.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FeJbwDVJEd4UeF1fsppE9%2Fimage.png?alt=media&#x26;token=05c04bba-10da-4fe3-89a4-a63392d486fa" alt=""><figcaption></figcaption></figure>

### Configure the Role Claim and Vectra Roles in Entra ID

* We'll begin by creating the the `user.assignedroles` claim.
* In your SAML app, select **Edit** in section 2 **User Attributes & Claims**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FBetfiY36AtAtzN68wyUH%2Fimage.png?alt=media&#x26;token=950174be-a37c-458b-bd9f-74b0ed6efeba" alt=""><figcaption></figcaption></figure>

* Select **Add a new claim**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2F0gMUTL7lrbexzgIGRvwT%2Fimage.png?alt=media&#x26;token=86eaf15d-df25-40e9-bbfc-dd53893664ef" alt=""><figcaption></figcaption></figure>

* Enter `https://schema.vectra.ai/role` in the **Name** section.
* For **Source attribute**, select `user.assignedroles`.
* **Save** the claim.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FPwa6WVlItnAv68SsOTIL%2Fimage.png?alt=media&#x26;token=07cb622a-9c6d-4488-be00-770e64c7564b" alt=""><figcaption></figcaption></figure>

* Azure AD defaults to including a `user.userprincipalname` claim (which is required) but if you do not have this or are using a different IDP, please ensure that you also create this claim similarly to how to you created the `user.assignedroles` claim.
  * This claim's name should be `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name`.
* Next we will configure **App roles** in your newly created App.
* In the **Entra ID**, select **App Registrations**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2F3fQWMxMnWRnK0hbwdCBu%2Fimage.png?alt=media&#x26;token=c30f68f5-05c1-4999-92cb-b6f63377c20f" alt=""><figcaption></figcaption></figure>

* Select **All Applications**, search for your newly created app, and **click on it**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FilRAZeeszw5nJgbCdV12%2Fimage.png?alt=media&#x26;token=56d91746-ecd2-4c6c-b020-5642f59efa0e" alt=""><figcaption></figcaption></figure>

* Select **App roles** from the sidebar.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FrwYnsG2Ecog7dFbpUlw9%2Fimage.png?alt=media&#x26;token=a998e77a-b37f-449f-a055-36e69a7d3c66" alt=""><figcaption></figcaption></figure>

* Back in your Vectra UI tab, navigate to *Configuration → ACCESS → Roles.*
* Click on each role that your SAML users will be using and make note of the specific **Standardized Name** for each role. You will need to enter these roles in Entra ID.

  * For example, the **Security Analyst** role has a **Standardized Name** of `security_analyst`.
  * Any custom roles that you create will also have a **Standardized Name**.

  <figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FmzOfkQ5qncCwNJQJbKeN%2Fimage.png?alt=media&#x26;token=bfd29d59-a003-4673-810a-6276d8bcbdec" alt="" width="563"><figcaption></figcaption></figure>

  * Default Standardized Names for roles in Vectra are:
    * `admins`
    * `read_only`
    * `restricted_admins`
    * `security_analyst`
    * `setting_admins`
    * `super_admins`
* Back in the *App Registration → App roles* tab, add a new entry for each role you will be using with your Vectra deployment.
* Default roles from Microsoft of **User** and **msiam\_access** can be ignored or deleted if desired.
* Create new **App roles** using the **+ Create app role** button for each role that you will have users or groups assigned to in Vectra.
* Be sure to use the **Standardized Name** that you collected previously for the **Value** field.
* The **Display name** and **Description** can be anything that you want to refer to inside the IdP for the Vectra roles you will be assigning to your users.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FOCkl2jPXbwjO2drNDzGx%2Fimage.png?alt=media&#x26;token=23359bc1-cc5e-4e42-8e25-c6eb222bc9c5" alt=""><figcaption></figcaption></figure>

#### Role Configuration via Microsoft App Manifest

{% hint style="info" %}
**Please Note:**

* Most users can skip this section. It is only included for advanced users who wish to use the app manifest to configure roles. Most users should instead use the instructions in this guide to configure roles for their SAML app.
  {% endhint %}

* When SAML first came out for Vectra QUX deployments, the [Microsoft App Manifest](https://learn.microsoft.com/en-us/entra/identity-platform/reference-microsoft-graph-app-manifest#approles) was required to be used to configure roles for the SAML app. The configuration can now be done much more simply and the steps in this article reflect the simpler method.  If you wish to use the app manifest to configure roles, Vectra is providing the JSON formatted default app roles as an attachment below. Instructions are not provided for this method.

### Assign Entra ID Users and Groups to the Roles

* In Entra ID, select **Enterprise applications**.
* Select **All applications** to view a list of all your applications.
* **Search for** and then **click on** your newly created **SAML App for Vectra**.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2F61MnjCnZpvOmnOGonoJy%2Fimage.png?alt=media&#x26;token=90704655-7cb8-41cb-a86b-7c1cf0d53111" alt=""><figcaption></figcaption></figure>

* Select the **Users and groups** from **Manage** in the sidebar or click on**Assign users and groups** from the panes.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FzvKuUMMwxXOodepOFxpB%2Fimage.png?alt=media&#x26;token=a83f0cf2-dd88-44e7-9e06-04a8c0a2fd1a" alt=""><figcaption></figcaption></figure>

* Select the **+ Add user/group** button.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FtCYo5ibuNvdHfJJXZLmX%2Fimage.png?alt=media&#x26;token=c1d5fe57-c682-4594-aa4c-933b953a326b" alt=""><figcaption></figcaption></figure>

* Choose a **user or group** and then a Vectra role that you previously added and assign it.
* Repeat as required for other users and groups.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fs0qzevHVDm5hO3arBrPM%2Fimage.png?alt=media&#x26;token=e4fa4de7-20bc-4450-9195-2d2fc4402031" alt=""><figcaption></figcaption></figure>

{% hint style="success" %}
When you have finished mapping all your users and groups to Vectra roles in your SAML Enterprise app, you have finished the Microsoft side of the configuration and can move on to completing the configuration in Vectra.
{% endhint %}

### Completing Vectra Configuration

* After IdP configuration and downloading the IdP Metadata XML file you can complete the configuration in the Vectra UI.
* Click **Select a file** next to **Upload IDP Metadata XML File** in the **Create SAML Profile** window.
* Fill in the **Profile Name** with a name.
* Fill in the **Domains** field with the domains that should map to the SAML IdP you are configuring.
  * For example, if you username is `user@company.com`, then you would enter `company.com`.
  * When multiple SAML profiles are configured, users will enter an email address after clicking **Login with SSO**.
  * Based on the user input and mapped domains, the user will be redirected to the appropriate IdP for authentication and then redirected back to Vectra with a SAML assertion.
* Click **Create.**

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FkXLRUAFA2UV7Atajiku3%2Fimage.png?alt=media&#x26;token=a9d4d9ab-aea4-4886-bff1-0e76d5521083" alt="" width="563"><figcaption></figcaption></figure>

## Testing

* Once configuration is complete on both the Service Provider (Vectra) and IdP side, you are ready to test SAML SSO to Vectra.
  * Keep in mind that only users and groups who are mapped to standardized Vectra role names in your IdP will succeed.
* Click the **Login with SSO** button on the login page for your Vectra QUX deployment.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FG2AmR83b8uTqYnRnoEra%2Fimage.png?alt=media&#x26;token=cd8681ff-89c5-44c0-97de-b73e89fe63d6" alt="" width="375"><figcaption></figcaption></figure>

* If you are already authenticated to your IdP, and have a mapping to a standardized role that exists in Vectra, you should be logged in without requiring any additional steps.
* If you are need to authenticate to your IdP, you will be asked for a email address when multiple profiles are configured and redirected to your IdP for authentication and then redirected back to Vectra and presented the UI with your mapped role permissions applied.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-4640c6d79a875d69eb1ff1761b76e16ae9c2e0cf%2Fany-idp-saml-rux-9.jpg?alt=media" alt="" width="375"><figcaption></figcaption></figure>

{% hint style="info" %}
**Please Note:**

After SAML configuration, local login using username/password is still supported via a different URL constructed as follows:

* `https//<ip_or_hostname>/accounts/login/?local=True`

* For users not participating in SSO, please ensure they have this new URL to login to Vectra.
  {% endhint %}

* After login, you can see your status under *My Profile.*

![](https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2Fgit-blob-7a0f9ecdc61c3bc588f6aba0d1ca6c480d15b3da%2F7d2ce171c4b24bf5da1e21c41cd5a67ae04a07e09977c419d115971930c253e6.jpg?alt=media)

* If you have rights to the *Configuration → ACCESS > Users* screen, you can see all user logins.
  * SAML users are shown with a `SAML:` prefix.
  * SAML users are not locally defined in your Vectra deployment, they exist in the IdP and the configuration allows them to login to your Vectra deployment.

<figure><img src="https://4227135129-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FHJ1ltuWFvsArFWtevnRn%2Fuploads%2FCSAsxrmET8WXZ2dYn2NH%2Fimage.png?alt=media&#x26;token=f43cc6eb-ce1b-4e1a-a6ea-0efbadfe0a23" alt=""><figcaption></figcaption></figure>
