Home > Perform Microsoft 365 Groups Migrations > Required Permissions for Microsoft 365 Groups Migration > Destination Permissions for Microsoft 365 Groups
Export to PDFWith the Tenant Owner or Service Administrator role, you can create a Fly app profile in AvePoint Online Services > Management > App management to connect to the Microsoft 365 tenant using the Fly app.
Refer to Fly App Profile Permissions about how to create a Fly app profile and the required permissions of the Fly app profile.
With the authentication method of the Fly app profile only, if the destination is a multi-geo tenant, and the destination Groups need to be created in a defined location, you need to assign the Microsoft 365 Global Administrator, SharePoint Administrator, or Exchange Administrator role to the Fly app. You can refer to How to Assign the Exchange Administrator Role to an App? for examples of role assignment.
With the authentication method of the Fly app profile only, if you want to migrate Planner task comments, the consent user must have the license for Exchange Online.
With the Tenant Owner and Service Administrator role, you can create a custom app profile in AvePoint Online Services > Management > App management to connect to the Microsoft 365 tenant using a custom Azure app.
With the authentication method of the app profile only, if you want to migrate Planner task comments, the consent user must have the license for Exchange Online.
Refer to the following procedures to create a custom app profile:
Prepare a certificate in Microsoft Entra ID. Refer to Prepare a Certificate for the Custom Azure App for more information.
You can ignore this step if you have a certificate.
Create a custom Azure app in Microsoft Entra ID. Refer to Create Custom Azure Applications for more information.
Create an App Profile for a Custom Azure App in AvePoint Online Services.
After you re-authorize the app profile, you need to wait about one hour before using the app profile for your migration to refresh the token if there are permissions updated.
Refer to the following tables to add API permissions required by Microsoft 365 Groups Migration to the custom Azure app.
| API | Permission | Type | Purpose |
|---|---|---|---|
| Microsoft Information Protection Sync Service | UnifiedPolicy.Tenant.Read (Read all unified policies of the tenant.) | Application | Only required if you want to manage the sensitivity labels of files/emails/Groups. |
| Microsoft Graph | Directory.ReadWrite.All (Read and write directory data) | Application | Only required if the destination is multi-geo tenant with the following situations: The authentication uses the custom app profile only. The destination Groups need to be created in a defined location. |
| Microsoft Graph | Domain.Read.All | Application | Retrieve tenant domain. |
| Microsoft Graph | RoleManagement.Read.Directory | Application | Retrieve directory roles. |
| Microsoft Graph | Group.ReadWrite.All | Application | Retrieve and migrate Microsoft 365 Groups and group members. |
| Microsoft Graph | Sites.Read.All (Read items in all site collections) | Application | Retrieve team sites. |
| Microsoft Graph | User.Read.All (Read all users’ full profiles) | Application | Retrieve information of Microsoft 365 user profiles. |
| Microsoft Graph | InformationProtectionPolicy.Read.All (Read all published labels and label policies for an organization.) | Application | Only required if you want to manage the sensitivity labels of files/emails/Groups. |
| Microsoft Graph | Reports.Read.All (Read all usage reports) | Application | Only required by tenant discovery. |
| Microsoft Graph | Tasks.ReadWrite.All (Read and write all users’ tasks and tasklists) | Application | Migrate planners and data in planners to the destination. |
| Microsoft Graph | RoleManagement.ReadWrite.Directory | Application | Only required when the destination group can be assigned Microsoft Entra roles. Ensure the consent user of the app profile can be added as the group owner. |
| Microsoft Graph | ReportSettings.Read.All (Read all admin report settings) | Application | Retrieve the Reports setting of the Microsoft 365 admin center. |
| Azure Rights Management Services *Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services. | Content.DelegatedWriter (Create protected content on behalf of a user) | Application | Only required if you want to manage the sensitivity labels of files/emails/Groups. |
| Azure Rights Management Services *Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services. | Content.Writer (Create protected content) | Application | Only required if you want to manage the sensitivity labels of files/emails/Groups. |
| Office 365 Exchange Online | Exchange.ManageAsApp (Manage Exchange As Application) | Application | Use Exchange PowerShell to retrieve mailbox permissions. |
| Office 365 Exchange Online | Full_access_as_app (Use Exchange Web Services with full access to all mailboxes) | Application | Retrieve items from all mailboxes. *Note: If you do not want to add this permission to the app, you can create an RBAC assignment for the app to only access to specified mailboxes. Refer to the option 3 in the How to Migrate Mailboxes without the ApplicationImpersonation Role? section for details. |
| SharePoint/Office 365 SharePoint Online | Sites.FullControl.All (Have full control of all site collections) | Application | Retrieve settings and permissions of team sites. |
| SharePoint/Office 365 SharePoint Online | TermStore.ReadWrite.All | Application | Retrieve and migrate Managed Metadata Service. *Note: If the term groups/term sets/terms with the same name and level (global or local level) as the source ones exist in the destination, you can change this permission to TermStore.Read.All. |
For easy use, you can directly use the following commands to add required API permissions through Manifest for Microsoft 365 Commercial tenants.
If you only use service account authentication for destination Groups, the service account must meet the following requirements:
Users with Multi-Factor Authentication (MFA) enabled cannot be used as the service account to perform migrations. You can use a delegated app profile instead.
Licenses for Exchange Online
To assign the licenses to the service account, go to the Microsoft 365 admin center > Users > Active users, and select Exchange Online under the Licenses and apps tab of the service account.
If the destination is a Multi-Geo tenant, make sure the destination service account is the Microsoft 365 Global Administrator, SharePoint Administrator, or Exchange Administrator.
Group owner of destination Groups
You can manually add the service account as the group owner. For easy use, if you grant Groups Administrator or Global Administrator for the service account, Fly can automatically add the service account as the group owner.
If your destination Groups do not exist before the migration and need Fly to create during the migration, the service account only needs to be a Microsoft 365 user. Fly will automatically add the service account as the Group owner.
After the migration, you can remove the service account from the group owner using PowerShell or block the service account directly. To remove the account, refer to Remove the Service Account for details. To block the service account, go to Microsoft 365 Admin Center > Users and click the display name of the user. Click the Block this user icon, select Block the user from signing in, and save the changes.
If the service account is SharePoint Administrator or Global Administrator, during the full migration job, the service account will be automatically added as Site Collection Administrator of the team sites of destination Groups. After the migration, you can remove the service account from the team sites.
Service account pool is no longer available in migrations. If you have used the service account pool for the destination before, and you want to continue using the service account pool, you can select multiple service accounts when creating Groups connections, and make sure all selected service accounts meet the requirements mentioned above.
What permissions are required if I also use an app profile?
If you use both service account and app profile authentications for destination Groups, the service account must meet the following requirements:
Users with Multi-Factor Authentication (MFA) enabled cannot be used as the service account to perform migrations. You can use a delegated app profile instead.
Licenses for Exchange Online
To assign the licenses to the service account, go to the Microsoft 365 admin center > Users > Active users, and select Exchange Online under the Licenses and apps tab of the service account.
If the destination is a Multi-Geo tenant, make sure the destination service account is the Microsoft 365 Global Administrator, SharePoint Administrator, or Exchange Administrator.
Normally, when migrating to Groups, the service account needs to be the corresponding group owner.
With the app profile in the connection, you do not need to manually add the group owner. Fly will automatically add the service account as the group owner.
After the migration, you can block the service account directly. To block the service account, go to Microsoft 365 Admin Center > Users and click the display name of the user. Click the Block this user icon, select Block the user from signing in, and save the changes.
During the full migration job, the service account will be automatically added as Site Collection Administrator of the team sites of destination Groups. After the migration, you can remove the service account from the team sites.
Service account pool is no longer available in migrations. If you have used the service account pool for the destination before, and you want to continue using the service account pool, you can select multiple service accounts when creating Groups connections, and make sure all selected service accounts meet the requirements mentioned above.
Fly allows you to use the Fly delegated app profile or custom delegated app profile to connect to your workspace.
The license and permission requirements for the consent user are the same as those for the service account. For details, refer to Service Account Permissions.
If the consent user of the delegated app profile has Multi-Factor Authentication (MFA) enabled, you must authorize or re-authorize the delegated app profile after MFA is enabled. Otherwise, the migration jobs using the delegated app profile will fail.
With the authentication method of the app profile only, if you want to migrate Planner task comments, the consent user must have the license for Exchange Online.
If you re-authorize the app profile, you need to wait about one hour before using the app profile for your migration to refresh the token when there are permissions updated.
The steps of creating a default or custom delegated app profile for the destination are the same as the steps in Delegated App Profile Permissions for the source.
For Fly delegated app profile permissions, refer to the table in Fly Delegated App Profile Permissions.
For custom delegated app profile permissions, refer to the table below.
If you use the custom delegated app profile to create Groups in a specific location of the destination multi-geo tenant, you need to assign the Microsoft 365 Global Administrator, SharePoint Administrator, or Exchange Administrator role to the app. Refer to How to Assign the Exchange Administrator Role to an App? for examples of role assignment.
| API | Permission | Type | Purpose |
|---|---|---|---|
| Microsoft Information Protection Sync Service | UnifiedPolicy.User.Read | Delegated | Only required if you want to manage the sensitivity labels of files/emails/Groups. |
| Microsoft Graph | Directory.ReadWrite.All | Delegated | Only required if the destination is a multi-geo tenant, and the destination Groups need to be created in a defined location. |
| Microsoft Graph | Domain.Read.All | Delegated | Retrieve tenant domain. |
| Microsoft Graph | RoleManagement.Read.Directory | Delegated | Retrieve Microsoft global groups. |
| Microsoft Graph | Group.ReadWrite.All | Delegated | Retrieve and migrate Microsoft 365 Groups and group members. |
| Microsoft Graph | Sites.Read.All | Delegated | Retrieve site collections. |
| Microsoft Graph | RoleManagement.ReadWrite.Directory | Delegated | Only required when the destination group can be assigned Microsoft Entra roles. Ensure the consent user of the app profile can be added as the group owner. |
| Microsoft Graph | User.Read.All | Delegated | Retrieve information of Microsoft 365 user profiles. |
| Azure Rights Management Services *Note: For 21Vianet tenants, the API name is Microsoft Rights Management Services. | user_impersonation | Delegated | Only required if you want to manage the sensitivity labels of files/emails/Groups. |
| Office 365 Exchange Online | EWS.AccessAsUser.All | Delegated | Use Exchange Web Services with full access to user data via impersonation. |
| Office 365 Exchange Online | Exchange.Manage | Delegated | Retrieve mailbox permissions. |
| SharePoint/Office 365 SharePoint Online | AllSites.FullControl | Delegated | Retrieve settings and permissions of team sites. |
| SharePoint/Office 365 SharePoint Online | TermStore.ReadWrite.All | Delegated | Retrieve and migrate Managed Metadata Service. |
For easy use, you can directly use the following commands to add required API permissions through Manifest for Microsoft 365 Commercial tenants.