Home > Aviator > Aviator for Microsoft Teams > Permissions Required by Destination Teams

Export to PDF

Permissions Required by Destination Teams

To connect to the destination, you can choose to only use a service account, Fly app profile, or custom app profile as the authentication method. You can also use the combination of a service account and a Fly app profile or the combination of a service account and a custom app profile.

Refer to the following sections to view the permissions required by the authentication methods.

Fly App Profile Permissions

With the Tenant Owner or Service Administrator role, you can create a Fly app profile in AvePoint Online Services > Management > App management to connect to the Microsoft 365 tenant using the Fly app.

Refer to Fly App Profile Permissions about how to create a Fly app profile and the required permissions of the Fly app profile.

NOTE

With the authentication method of the Fly app profile only, if the destination is a multi-geo tenant, and the destination Teams need to be created in a defined location, you need to assign the Microsoft 365 Global Administrator, SharePoint Administrator, or Exchange Administrator role to the Fly app. You can refer to How to Assign the Exchange Administrator Role to an App? for examples of role assignment.

Custom App Profile Permissions

With the Tenant Owner and Service Administrator role, you can create a custom app profile in AvePoint Online Services > Management > App management to connect to the Microsoft 365 tenant using a custom Azure app.

Refer to the following procedures to create a custom app profile:

  1. Prepare a certificate in Microsoft Entra ID. Refer to Prepare a Certificate for the Custom Azure App for more information.

    You can ignore this step if you have a certificate.

  2. Create a custom Azure app in Microsoft Entra ID. Refer to Create Custom Azure Applications for more information.

  3. Connect your tenant to AvePoint Online Services.

  4. Create an App Profile for a Custom Azure App in AvePoint Online Services.

NOTE

After you re-authorize the app profile, you need to wait about one hour before using the app profile for your migration to refresh the token if there are permissions updated.

Refer to the following tables to add API permissions required to the custom Azure app.

NOTE

refers to the permission is required to copy or merge the data type.

API  Permission  Type  Purpose  TeamChannelPlanner
Microsoft GraphDirectory.Read.All
(Read directory data)
Application 
 
Retrieve the Microsoft 365 tenant information, including the tenant domain and the service account licenses for migration. *Note: If the destination is a multi-geo tenant, and the destination Teams need to be created in a defined location, you need to change this permission to Directory.ReadWrite.All. Alternatively, you can assign the Microsoft 365 Global Administrator, SharePoint Administrator, or Exchange Administrator role to the custom app. You can refer to How to How to Assign the Exchange Administrator Role to an App? for examples of role assignment.
 

 
Microsoft GraphGroup.ReadWrite.All
(Read and write all groups)
Application
 
Migrate Microsoft 365 Groups and group data.
 

 

 

 
Microsoft GraphSites.ReadWrite.All
(Read and write items in all site collections)
Application
 
Migrate channel folders and files of team sites and private/shared channels’ site collections.
 

 

 

 
Microsoft GraphUser.Read.All 
(Read all users’ full profiles)
Application  
 
Retrieve information of Microsoft 365 user profiles.
 

 

 

 
Microsoft GraphChannelMember.ReadWrite.All
(Add and remove members from all channels)
Application  
 
Migrate private/shared channel members.
 

 

 
 
 
Microsoft GraphTeamwork.Migrate.All
(Create chat and channel messages with anyone’s identity and with any timestamp)
Application  
 
Create Teams and channels, and migrate channel messages with any message sender and timestamp.
 

 
 
 
 
 
Microsoft GraphTeamworkTag.ReadWrite.All
(Read and write tags in Teams)
Application  
 
Migrate tags.
 

 
 
 
 
 
Microsoft GraphTeamMember.ReadWrite.All
(Add and remove members from all teams)
Application
 
Migrate team members.
 

 
 
 

 
Microsoft GraphChannel.Create
(Create channels)
Application
 
Create channels.
 

 

 
 
 
Microsoft GraphChannelSettings.ReadWrite.All
(Read and write the names, descriptions, and settings of all channels)
Application
 
Migrate channel settings.
 

 

 
 
 
Microsoft GraphTeam.Create
(Create teams)
Application
 
Create Teams.
 

 
 
 
 
 
Microsoft GraphTeamSettings.ReadWrite.All
(Read and change all teams’ settings)
Application
 
Migrate team settings.
 

 
 
 
 
 
Microsoft GraphTeamsAppInstallation.ReadWriteForTeam.All
(Manage Teams apps for all teams)
Application
 
Migrate team apps.
 

 
 
 
 
 
Microsoft GraphTeamsTab.ReadWriteForTeam.All
(Allow the Teams app to manage all tabs for all teams)
Application
 
Migrate team tabs.
 

 

 
 
 
Microsoft GraphSchedule.ReadWrite.All
(Read and write all schedule items)
Application
 
Migrate Teams Shifts app data.
*Note: If the destination is a GCC High or 21Vianet tenant, this permission is not required.

 
 
 
 
 
Microsoft GraphReports.Read.All
(Read all usage reports)
Application
 
Only required by tenant discovery.
*Note: If the destination is a 21Vianet tenant, this permission is not required.

 

 
 
 
Microsoft GraphTasks.ReadWrite.All
(Read and write all users’ tasks and tasklists)
Application
 
Migrate planners and data in planners to the destination.
*Note: If the destination is a 21Vianet tenant, this permission is not required.

 
 
 

 
Microsoft GraphReportSettings.Read.All
(Read all admin report settings)
Application
 
Retrieve the Reports setting of the Microsoft 365 admin center.
*Note: If the destination is a 21Vianet tenant, this permission is not required.

 

 
 
 
Office 365 Exchange OnlineExchange.ManageAsApp
(Manage Exchange As Application)
Application
 
Use Exchange PowerShell to retrieve mailbox permissions. 
 

 
 
 
 
 
Office 365 Exchange OnlineFull_access_as_app
(Use Exchange Web Services with full access to all mailboxes)
Application
 
Retrieve items from all mailboxes.
*Note: If you do not want to add this permission to the app, you can create an RBAC assignment for the app to only access to specified mailboxes. Refer to the option 3 in the How to Migrate Mailboxes without the ApplicationImpersonation Role? section for details.

 
 
 
SharePoint / Office 365 SharePoint OnlineSites.FullControl.All
(Have full control of all site collections)
Application
 
Retrieve settings and permissions of team sites.
 

 

 

 
SharePoint / Office 365 SharePoint OnlineTermStore.ReadWrite.All
(Read and write managed metadata)
Application
 
Retrieve and migrate Managed Metadata Service.
*Note: If the term groups/term sets/terms with the same name and level (global or local level) as the source ones exist in the destination, you can change this permission to TermStore.Read.All.

 

 
 
 
Azure Rights Management Services
*Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services.
Content.DelegatedWriter
(Create protected content on behalf of a user)
Application
 
Only required if you want to manage the sensitivity labels of files/emails/Teams.
 

 

 
 
 
Azure Rights Management Services
*Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services.
Content.Writer
(Create protected content)
Application
 
Only required if you want to manage the sensitivity labels of files/emails/Teams.
 

 

 
 
 
Microsoft Information Protection Sync ServiceUnifiedPolicy.Tenant.Read
(Read all unified policies of the tenant)
Application
 
Only required if you want to manage the sensitivity labels of files/emails/Teams.
 

 

 
 
 

Service Account Permissions

The service account permissions required by the destination are the same as Microsoft Teams Migration. Refer to Service Account Permissions for details.

Pay additional attention: If the destination connection only has a service account configured, the service account will be automatically added as the destination team owner while loading channels.

Delegated App Profile Permissions

Fly allows you to use the Fly delegated app profile or custom delegated app profile to connect to your workspace.

NOTE

The license and permission requirements for the consent user are the same as those for the service account. For details, refer to Service Account Permissions.

NOTE

If the consent user of the delegated app profile has Multi-Factor Authentication (MFA) enabled, you must authorize or re-authorize the delegated app profile after MFA is enabled. Otherwise, the migration jobs using the delegated app profile will fail.

NOTE

If you re-authorize the app profile, you need to wait about one hour before using the app profile for your migration to refresh the token when there are permissions updated.

The steps of creating a default or custom delegated app profile for the destination are the same as the steps in Delegated App Profile Permissions for the source.

For Fly delegated app profile permissions, refer to the table in Fly Delegated App Profile Permissions.

For custom delegated app profile permissions, refer to the table below.

NOTE

refers to the permission is required to copy or merge the data type.

API  Permission  Type  Purpose  TeamChannelPlanner
Microsoft GraphDirectory.ReadWrite.All
(Read and write directory data)
Delegated
Only required if the destination is a multi-geo tenant and the destination Teams need to be created in a defined location.
Microsoft GraphDomain.Read.All
(Read domains)
Delegated
Retrieve domains.
Microsoft GraphRoleManagement.Read.Directory
(Read directory RBAC settings)
DelegatedRetrieve directory roles.
Microsoft GraphGroup.ReadWrite.All
(Read and write all groups)
DelegatedOnly required if the destination consent user is not the team owner to automatically add the consent user as the Team owner.
 
Microsoft GraphSites.Read.All
(Read items in all site collections)
DelegatedRetrieve channel folders and files of team sites and private channels’ site collections.
Microsoft GraphFiles.ReadWrite
(Have full access to user files and files shared with user)
DelegatedMigrate channel folders and files of team sites and private/shared channels’ site collections.
Microsoft GraphUser.Read.All
(Read all users’ full profiles)
DelegatedRetrieve information of Microsoft 365 user profiles.
Microsoft GraphChannelMember.ReadWrite.All
(Add and remove members from all channels)
DelegatedOnly required if the destination consent user is not the private/shared channel owner to automatically add the consent user as the channel owner.
Microsoft GraphTeamMember.ReadWrite.All
(Add and remove members from all teams)
DelegatedMigrate team members.
Microsoft GraphTeamworkTag.ReadWrite
(Read and write tags in Teams)
DelegatedMigrate tags.
Office 365 Exchange OnlineEWS.AccessAsUser.All
(Access mailboxes as the signed-in user via Exchange Web Services)
DelegatedAccess mailboxes as the signed-in user via Exchange Web Services
Office 365 Exchange OnlineExchange.Manage
(Manage Exchange configuration)
DelegatedUse Exchange PowerShell to retrieve mailbox permissions.
SharePoint / Office 365 SharePoint OnlineAllSites.FullControl
(Have full control of all site collections)
DelegatedRetrieve settings and permissions of team sites.
SharePoint / Office 365 SharePoint OnlineTermStore.ReadWrite.All
(Read and write managed metadata)
DelegatedRetrieve and migrate Managed Metadata Service.
*Note: This permission is required to migrate the term set used in the Managed Navigation. If you do not need to migrate the term set used in the Managed Navigation, you can replace the permission with TermStore.Read.All.
Microsoft Information Protection Sync Service
 
UnifiedPolicy.User.Read
(Read all unified policies a user has access to)
DelegatedOnly required if you want to manage the sensitivity labels of files/emails/Teams.
Azure Rights Management Services
*Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services.
user_impersonation
(Create and access protected content for users)
DelegatedOnly required if you want to manage the sensitivity labels of files/emails/Teams.