SAP Identity Management Overview



Similar documents
SAP Identity Management Overview

First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2

Business-Driven, Compliant Identity Management

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

Business-Driven, Compliant Identity Management

SAP Solution in Detail SAP NetWeaver SAP NetWeaver Identity Management. Business-Driven, Compliant Identity Management

SAP NetWeaver Identity

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

Compliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

SAP Business Intelligence Adoption V6.41: Software and Delivery Requirements. SAP Business Intelligence Adoption February 2015 English

ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes. October 2013

SAP Document Center. May Public

Minimize Access Risk and Prevent Fraud With SAP Access Control

Cut Costs and Improve Agility by Simplifying and Automating Common System Administration Tasks

GR5 Access Request. Process Diagram

SAP Mobile Documents. December, 2015

SAP BusinessObjects BI Clients

Rapid database migration of SAP Business Suite to SAP HANA (V4.10): Software and Delivery Requirements. SAP HANA November 2014 English

SAP BusinessObjects Cloud

This presentation provides a SECOND LEVEL of information about the topic of Central Finance.

SuccessFactors Global Human Capital Management (HCM) Academy and Admin Training Schedule (Q3 Q4 2014)

Simplify and Secure Cloud Access to Critical Business Data

Real-Time Reconciliation of Invoice and Goods Receipts powered by SAP HANA. Stefan Karl, Finance Solutions, SAP ASUG Presentation, May 2013

SAP Cloud Identity Service

SAP S/4HANA Embedded Analytics

SAP Fiori Infrastructure rapid-deployment solution: Software and Delivery Requirements

SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015

Software and Delivery Requirements

SAP HANA SPS 09 - What s New? HANA IM Services: SDI and SDQ

How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer

R49 Using SAP Payment Engine for payment transactions. Process Diagram

SFSF EC to 3 rd party payroll Integration Software and Delivery Requirements

Two UX Solutions Now Included with SAP Software

Integration capabilities of SAP S/4HANA to SAP Cloud Solutions

Integration Capabilities of SAP S/4HANA to SAP Cloud Solutions

Mobile app for Android Version 1.2.x, December 2015

Cybersecurity and Secure Authentication with SAP Single Sign-On

Data Doesn t Communicate Itself Using Visualization to Tell Better Stories

SAP Business Intelligence Adoption V7.41:Software and Delivery Requirements. SAP Business Intelligence Adoption August 2015 English

SAP MII for Manufacturing rapid-deployment solution: Software Requirements

SAP BusinessObjects Business Intelligence 4.1 One Strategy for Enterprise BI. May 2013

SM250 IT Service Management Configuration

Unlock the Value of Your Microsoft and SAP Software Investments

Protect Your Connected Business Systems by Identifying and Analyzing Threats

Streamline HR Tasks with Centralized Document Access

Automate Complex Pay Rules While Streamlining Time and Attendance Management

Software and Delivery Requirements

SAP Business Warehouse Powered by SAP HANA for the Utilities Industry

Partner Certification to Operate SAP Solutions and SAP Software Environments

Munich City Utilities Empowers Developers With ABAP Development Tools for Eclipse

SAP MDG, central governance, financial data. Nov. 2015

SAP Single Sign-On 2.0 Overview Presentation

Introducing SAP s Landscape and Data Center Innovation Platform. Phil Jackson SAP Solution Engineer

SAP Solution Manager: The IT Solution from SAP for IT Service Management and More

Software and Delivery Requirements

Integration of SAP central user administration with Microsoft Active Directory

Managing Customer Relationships with SAP Business One

SAP NetWeaver Identity Management Identity Services Configuration Guide

SAP Identity Management Connector Overview. SAP SE Walldorf, August 2015

Enterprise Information Management Services Managing Your Company Data Along Its Lifecycle

Software Requirements

Build an Advanced Incentive- Compensation Program That Meets Today s Sales Goals

Update on the SAP GUI Family. Q3/2014 Public

SAP Business One mobile app for Android Version 1.0.x November 2013

SAP HANA SPS 09 - What s New? SAP DB Control Center DBA Tool to manage Data Center

Landscape Deployment Recommendations for. SAP Fiori Front-End Server

Mobile app for ios Version 1.11.x, December 2015

Mobile app for Android Version 1.0.x, January 2014

SAP Product and Cloud Security Strategy

Software and Delivery Requirements

Mobile Security Without Barriers

rapid data load for SAP hybris Marketing: Software and Delivery Requirements

Price and Revenue Management - Manual Price Changes. SAP Best Practices for Retail

Mobile app for ios Version 1.10.x, August 2014

Why Cloud Platforms are the Secret Weapon to Make Your Business More Agile and Competitive

SAP Operational Process Intelligence Security Guide

Streamline End-to-End Payment Processes on a Central Platform

SAP Working Capital Analytics Overview. SAP Business Suite Application Innovation January 2014

Migration and Upgrade Paths to SAP Process Orchestration. Udo Paltzer Product Owner SAP Process Integration, SAP HANA Cloud Integration

Enabling Better Business Intelligence and Information Architecture With SAP PowerDesigner Software

SBOP Analysis 2.1, edition for Microsoft Office Additional PAM Information

SAP Project Portfolio Monitoring Rapid- Deployment Solution: Software Requirements

RCS UI Field Security (UI Masking) Tobias Keller, Product Owner Custom Development, SAP SE December 2014

SAP Change Control - One Integrated Process to Manage Software Solution Deployments SAP AG

How Accenture is taking SAP NetWeaver Identity Management to the next level. Kristian Lehment, SAP AG Matthew Pecorelli, Accenture

Multi Channel Sales Order Management: Mail Order. SAP Best Practices for Retail

Real-Time Enterprise Management with SAP Business Suite on the SAP HANA Platform

Managing Procurement with SAP Business One

HR Data Retrieval in a LDAP- Enabled Directory Service

Understanding Security and Rights in SAP BusinessObjects Business Intelligence 4.1

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Franco Furlan Middle and Eastern Europe CoE for Analytics

Keolis: Accelerating Recruitment with SAP Cloud for HR Solutions

Transcription:

Identity Management Overview Public May 2016

Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password Management Connectivity Architecture Identity Virtualization What s New in Release 8.0 Summary & Additional Information Appendices 2

Introduction to Identity Management

Identity Management In the Security Portfolio Business Suite Cloud Applications Single Sign-On Identity Management Access Control Cloud Identity service Add-On for Code Vulnerability Analysis Enterprise Threat Detection Mobile Applications Make it simple for users to do what they are allowed to do. Know your users and what they can do. Ensure corporate compliance to regulatory requirements. Manage the identity life-cycle in the cloud. Find and correct vulnerabilities in customer code. Counter possible threats and identify attacks. 3 rd Party Systems Platform Security Make sure that solutions run securely HANA Platform NetWeaver Application Server 4

Key Capabilities Enables the efficient, secure and compliant execution of business processes Consistent user roles and privileges Holistic approach Manage identities and permissions Identity Management Ensures that the right users have the right access to the right systems at the right time Across all systems and applications 5

Business Drivers for Identity Management Operational costs Changing business processes Multiple sources of identity data Manual user provisioning Labor-intensive, paper-based approval systems Manual password reset processes Transactions involve multiple enterprises Partners participate in business processes Company-specific requirements for user provisioning solutions Compliance challenges No record of who has access to which IT resources Inability to deprovision user access rights upon termination No complete audit trail available Prevention of unauthorized access in multi-enterprise environments 6

Identity Lifecycle How long does it take for new employees to receive all permissions and become productive in their new job? How can you remove permissions automatically if employees change their position? Are permissions automatically adjusted if someone is promoted to a new position? How long does it take to remove ALL permissions of an employee? And how can you ensure that they were properly removed? Who has adequate permissions to fill in for a co-worker? 7

Solution in a Nutshell Central management of identities throughout the system landscape Rule-driven workflow and approval process Extensive audit trail, logging, and reporting functionality Governance through centralized and auditable identity data Compliance through integration with Access Control Compliant and integrated identity management solution to mitigate segregation-of-duties risks applications SCM ERP HCM ERP HANA Access Control Identity Management Java SuccessFactors Portal Non- applications Database Legacy OS Active Directory Lotus Notes MS Exchange Web Apps 8

A Holistic Approach to Compliant Identity Management Success Factors ERP HCM Example: On-boarding Central identity store Integration with Business Suite and SuccessFactors Identity virtualization and identity as a service Compliance checks BusinessObjects Access Control Access Control (GRC) Reporting Rule-based assignment of business roles Identity Management Provisioning to and non- systems Approval workflows Password management 9

Solution in Detail Role Management and Workflows

Role Definition and Provisioning Role Definition (design, one-time task) Read system access information (roles, groups, authorizations, etc.) from target systems Define a business role hierarchy Assign technical roles to business roles Develop rules for role assignments Business roles Employee Accounting Manager Provisioning (regularly) Assign or remove roles to/from people Through request/approval workflow Manually (administrator) Automatically, e.g. HR-driven Automatic adjustment of master data and assignments of technical authorizations in target systems Technical roles E-mail E-mail system AD user Active Directory Portal role Portal Accounting (ABAP role) FI HR manager (ABAP role) HR 11

Context-Based Role Management: Reducing Complexity Context-based role management simplifies the structure of roles through dynamic role assignment based on user context information. Benefits Reduced number of roles Reduced complexity Sufficient granularity Improved data consistency and governance User Business Role NetWeaver Identity Management Position Location Identity Management Technical role A Technical role B Technical role C Managed System User Managed Technical System role A Technical role B Example: 20 roles in 1000 factories Conventional method: 20.000 entries (roles) Context-based: 1.020 entries (roles + contexts) 12

Workflows Notification Identity Center sends a notification to user/manager Request User sends a role request Provisioning Identity Center provisions new roles and privileges to respective systems Approval Manager checks request and approves/denies Processing Identity Center processes request Sends alert to manager / administrator 13

Solution in Detail Business-Driven Identity Management

Integration with Business Applications Portfolio and Product Management Customer Relationship Management Success Factors Employee Central Supply Network Collaboration Extended Warehouse Management Supplier Relationship Management Identity Management Transportation Management Product Lifecycle Management Service Parts Planning HANA ERP Financials ERP Human Capital Management 15

Business Process Driven Identity Management On-Boarding Kim Perkins joins the company as a marketing specialist. From the first day with her new company, she is able to log on to all relevant systems, including access to the employee self-services, and access to CRM to track the marketing activities she is responsible for. 1 Pre-hire phase HR ensures that all necessary employee data for Kim is available, such as position and entry date 5 First day at work Provisioning of role and authorization information to relevant target systems 2 3 4 Event-based extraction of personnel data ERP HCM Success Factors HR Operations Based on the position in HCM, IDM automatically assigns the business role Marketing Specialist Identity Management Kim s manager approves the assignment Line Manager ERP HCM ERP CRM Portal User created Employee Business Partner created User created Marketing Professional User created Access to ESS Access to CRM 16

Business Process Driven Identity Management Position Change 2 HR Operations 1 Event-based extraction of personnel data ERP HCM Success Factors After two years as a marketing specialist, Kim is promoted and takes over personnel and budget responsibility for her marketing team. On the first day in her new role, she has access to the manager self-services. In her new position, she is responsible for budget approvals for all marketing campaigns - this requires immediate access to ERP to view the marketing costs. HR ensures that all necessary employee data for Kim is available 3 Identity Management recognizes the line manager information for Kim and automatically assigns the business role Marketing Manager Identity Management Day of position change Provisioning of role and authorization information to relevant target systems 17 4 ERP HCM ERP CRM Portal User updated Employee Line Manager User created Marketing Controller User updated Marketing Controller User updated Access to ESS Access to MSS Access to CRM

Business Process Driven Identity Management Termination After eight years, Kim leaves the company. The day after her official assignment with the company ends, she is no longer able to access any corporate systems. 1 HR ensures that all data relevant for the employment contract termination is available, such as last day of work 4 Day after termination of employment 2 Event-based extraction of personnel data ERP HCM 3 Identity Management recognizes the last day information for Kim; it automatically takes away all access rights and disables her accounts ERP HCM ERP CRM User disabled User disabled User disabled Success Factors HR Operations Identity Management Portal User disabled 18

Solution in Detail Compliant Identity Management

Compliant Identity Management: Capabilities Consistent view on current and historic access rights, approvals and policy violations Central management of heterogeneous environments Manage identities and permissions Identify and mitigate risks Compliance checks Integration based on standards Identity Management Access Control Business risk controls and mitigation Compliant identity management across and heterogeneous landscapes in one integrated solution 20

Compliant Identity Management: Process View 3 Risk analysis BusinessObjects Access Control (GRC) 2 Access Control 4 Risk mitigation 5 Forward request for risk analysis Risk status applications Request role assignment 1 Identity Management 6 8 7 Manager approval Non- applications Notification to user and manager Provisioning to target systems SCM Java Active Directory Exchnage ERP HCM HCP Legacy Lotus Notes ERP Portal OS Web app Success Factors HANA Database 21

Compliant, Business-Driven Identity Management Requirement: Provide automated, position-based role management while ensuring compliance Solution: Simplify and automate role assignment Reduce risk through compliance checks and remediation Automate manual processes through integration with Business Suite 1 New Hire ERP HCM Calculate entitlements based on position Compliance check Remediation 2 3 4 Approve assignments Yes 5 ERP HCM ERP FI No Portal Non- ERP HCM Identity Management Access Control Line Manager Landscape 22

Solution in Detail Reporting

Reporting Options at a Glance Basic Reporting Focus: Static, printable reports Report creation on database level Extended Reporting with Business Warehouse ( BW)* Focus: Dynamic reports, offering more, highly detailed, and customizable reporting options Data is extracted from Identity Management on a regular basis (as per defined job) Predefined report templates available, custom reports can be freely defined filtering, sorting, export to MS Excel, CSV, PDF, send via e-mail, etc. Reporting with Lumira** Focus: Customer-specific reposts/analyses for identity management Rich graphical capabilities for visualizing and utilizing reported data Low integration and maintenance efforts Easy extension * BW is not part of the ID Mgmt license ** Lumira, desktop edition license is included 24

Basic Reporting Application/privilege-centric Determination of system access User-centric Determination of user privileges Entry data Current data, historical data, time stamps, modified by, audit flags Approval data Who approved what when? Who had which privilege when? Segregation of duties, Attestation Task audit log Determination of tasks run on user / by user General logs Off-the-shelf reporting tools can be used 25

Extended Reporting with Business Warehouse BW report templates Persons, privileges, roles and their assignments over time and for specific dates Content-based and time-based reporting Advanced filtering and sorting options Access control Roles for reporting user (administrator, manager, owner) Basic audit data Who changed what Change history up to the time of last synchronization Flexibility BEX reports 26

Reporting with Lumira Customer-specific reposts/analyses for identity management Rich graphical capabilities for visualizing and utilizing reported data Low integration and maintenance efforts Easy extension 27

Solution in Detail Password Management

Password Management Requirement: Reduce help desk calls related to password reset inquiries Enable password provisioning across heterogeneous landscapes Solution: Centralize and automate password management Reset password Recover lost password ERP HCM ERP FI Set new password Portal Non- User Helpdesk Identity Management Landscape 29

Solution in Detail Connectivity

Connectivity Framework Databases Microsoft SQL Server Microsoft Access Oracle database IBM UDB (DB2) MySQL Sybase HANA Directory Servers Microsoft Active Directory IBM Tivoli Directory Novell edirectory SunONE Java Directory Oracle Internet Directory Microsoft ADAM Atos DirX Identity OpenLDAP eb2bcom View500 Directory Server CA etrust Directory IDM Virtual Directory Server Any LDAP v3 compliant directory srv Identity Management Application Server Microsoft Windows NT Unix/Linux On-Premise/Cloud Applications Other Business Suite SuccessFactors Access Control Lotus Domino / Notes Microsoft Exchange RSA ClearTrust RSA SecurID Shell execute Custom Java connector API Script-based connector API Technical SPML LDAP ODBC/JDBC/OLE-DB RFC LDIF files XML files CSV files 31

Third-Party Connectors Identity Management Integration partners as well as potential partners and independent software vendors (ISVs) are invited to create an Identity Management connector using the public IDM interfaces and to integrate the application into the identity management landscape. For more information about connectivity, including third-party connectors, please refer to the Identity Management Connector Overview on SCN: http://scn.sap.com/docs/doc-4388 32

Solution in Detail Architecture

Identity Management Architecture 34

Solution in Detail Identity Virtualization

Virtual Directory Server Virtual Directory Server (VDS) provides Single consistent view and entry point for multiple distributed identity data sources Identity information as a service for applications through standard protocols (LDAP, SPML) Abstraction layer for underlying data stores Consumer only sees one standard interface Transform incoming LDAP requests, and connect directly to the existing data repositories while data stays within original data source and performs efficient caching SPML Virtual Directory Server LDAP Properties Real-time access to data No need to consolidate data sources No extra data store with quick LDAP deployment and easier and cheaper maintenance Attribute manipulation Name space modifications Complex operations on-the-fly SPML Directory Server LDAP Directory Server JDBC Database Application 36

Identity Management 8.0 What s New in Release 8.0

Main Enhancements in Identity Management 8.0 New Connectors SuccessFactors Lotus Notes ASE as a database option Identity Management Developer Studio in Eclipse New security model for development Configuration in packages Provisioning framework distributed as packages Graphical workflow editor NetWeaver Cluster support MacOS and Linux support Eclipse Luna support Enhanced integration with Access Control 38

Connector to SuccessFactors Employee Central 1 Personnel action in HR New hire, termination, change of position etc 5 At relevant date Provisioning of role and authorization information to relevant target systems 2 Event-based extraction of personnel data ERP HCM 3 Based on organizational data in HR automatic role assignment possible 4 Manager approves the assignment ERP HCM CRM HR Operations Identity Management Line Manager Portal 39

New IBM Lotus Domino Server Connector Using Java API Bulk operations (initial load) Reading of users Reading of groups Admin process User creation with certificate generation Admin rename request Admin delete user request Delete group Group actions Create group Modify group Delete group Add and remove members Password reset Invoked from a Domino Agent; example code provided Non-admin process User modification User deletion 40

Enhanced Identity Management Access Control Integration: GRC Request Grouping A business role and its child privileges are grouped into one group and send to Access Control as one request; available as of Identity Management 7.2 SP10 41

Provisioning Monitor Motivation Provides transparency of the workflow Helps analyze issues related to the provisioning queue Functionality Extract all the workflows in the provisioning queue related to a specified entry Problem report based on system s workflow Release independent Component IdM 8.0 IdM 7.2 42

Disabling and Enabling of Repositories Motivation Handle target system maintenance Prerequisite for changing repository types Functionality Manually enable/disable repository from the administration UI Visualization of repository state Maintaining provisioning operations while repository is disabled 43

Changing of Repository Types Motivation Get benefit from a new functionality for specific target systems Functionality Manually trigger the change for disabled repository Repository is renamed and kept for consistency Repository with the original name and the new repository type is created New and the old repositories should be enabled Optionally perform initial load for the new repository type 44

Summary & Additional Information

Summary Identity Management is part of a comprehensive security suite that includes access control as well as secure programming and compliance aspects. The solution covers the entire identity lifecycle and automation capabilities based on business processes. A strong integration with Access Control creates a holistic identity and access governance solution. Extensive connectivity with and non- applications extends identity management to all areas of the enterprise. 46

Find More Information Community Network Visit the Community Network (SCN) for comprehensive information on Identity Management, such as Discussion forum, product information, documentation, training, and support information Articles, blogs, WIKI, FAQs, and newsletters Downloads http://scn.sap.com/community/idm 47

Identity Management Rapid deployment solution Short project times and reduced TCO by simplifying assignment and management of roles and privileges to users Implementation of best practice processes out of the box with a fixed scope and most important and common scenarios, e.g. defined set of customer specific configuration, connection of source- and target-systems, provisioning etc Pre-configured functionality of Identity Management in a development system Step-by-step guide, describing each activity during deployment Solution can be extended with additional add-on options Connection of 1 source- and 2 target systems Support of system specific attributes Standard solution Mass user administration jobs Automatic authorization assignment Predefined HTML based reports Add-On 1: Connection to additional systems Add-On 2: Additional Go-Live Support Approval workflows E-mail notification framework New Web UI tasks 48

Appendix 1 Architecture

Components Overview End User IDM Admin R R NetWeaver AS Java R Dev Studio R Dev Studio REST End-User UI Admin UIs IDM REST API Developer R R R R Runtime Components VDS IDM Business Logic Dispatcher R R Runtime R Idenity Center Database IDM DB Business Logic External Repositories and Applications R IDM Utilities R Logs/Audit Config Identity Store R VDS (Standalone) 50

Identity Center Database Identity Center Database Core of the IDM product Tables, views, stored procedures and triggers Idenity Center Database Holds: Identity data (Identity Store) Configuration data: Jobs, processes, forms, etc. Logs Audit data Delta information Status Scheduling Logs/Audit IDM DB Business Logic Config Identity Store 51

Runtime Components Dispatcher Evaluates process workflow Starts runtime engine to execute tasks and jobs Runtime Components Housekeeping Dispatcher Runs as a service Runtime R Idenity Center Database IDM DB Business Logic Runtime Engine Responsible for doing the work Logs/Audit Config Identity Store Connects to external repositories and systems Runs on Java only 52

User Interfaces End-user UI Main interface for users and managers Web interface for registration and approvals Self-service interface Password reset Based on Web Dynpro Java Partially available on UI5 Administration UI Monitoring and audit Management of repositories and constants Based on Web Dynpro Java End User R R End-User UI Idenity Center Database IDM DB Business Logic IDM Admin R Admin UIs R R R IDM Business Logic IDM REST API REST API Logs/Audit Config Identity Store For custom-developed UIs 53

Developer Studio NetWeaver AS Java R Dev Studio R Dev Studio REST Developer Studio Developer R Used for IDM configuration development Eclipse Plugin multi-platform support Runs where eclipse runs IDM Business Logic R Developers don t know the DB credentials or encryption keys Idenity Center Database IDM DB Business Logic Developer Studio REST service Shared by multiple developers Logs/Audit Config Identity Store Can connect to multiple IDM DBs Not exposed for custom development 54

Other Components Virtual Directory Server (VDS) Provides a virtualized directory service information, offering LDAP support (when running standalone) and SPML support (when running on AS Java) Can connect to various external systems Use VDS to provide LDAP/SPML access to Identity Center database data Dispatcher Utility Supports management for dispatchers Keys.ini Utility Utility to manage encryption keys 55

Appendix 2 Reporting with Business Warehouse

Reporting with BW: Input Help 57

Reporting With BW: Person Details at a Given Date 58

Reporting With BW: Person History 59

Reporting With BW: Privilege Aggregations 60

Thank you

2016 SE or an affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SE or an affiliate company. and other products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SE (or an affiliate company) in Germany and other countries. Please see http://global12.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. Some software products marketed by SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SE or an affiliate company for informational purposes only, without representation or warranty of any kind, and SE or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SE or affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SE s or its affiliated companies strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forwardlooking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak only as of their dates, and they should not be relied upon in making purchasing decisions. 62