Permissions for Destination Entra ID

To connect to the destination, you can choose Fly app profile, or custom app profile as the authentication method.

Refer to the following sections to view the permissions required by the authentication methods.

Fly App for Entra ID Destination Permissions (Default app)

The Tenant Owner and Service Administrators can create a default app profile for Microsoft Entra ID in AvePoint Online Services.

Refer to the following steps to create a default app profile for Entra ID source and destination:

  1. Click Create on the App management page.

  2. On the Create app profile page, select a Microsoft 365 tenant where you want to create the app profile.

    *Note: Make sure your selected tenant has been connected to AvePoint Online Services.

  3. Click Fly, and click Next.

  4. Click Modern mode.

  5. Click Consent of Fly for Entra ID source and destination.

  6. On the Microsoft 365 sign-in page, sign in with a Microsoft 365 Global Administrator account to consent to the app. The Microsoft 365 Global Administrator account is a requirement from Microsoft. Refer to the for more information.

    On the Permissions requested page, review the permissions required for using Fly and click Accept to accept the permissions to ensure the AvePoint Online Services and Fly functionality works. (The required permissions are listed in the table below.)

  7. Click Finish to create the app profile.

    *Note: After the app profile is created, if you want to remove the Global Administrator role from the app profile, you can re-authorize the app profile and change to use the User consent method. Refer to for more information.

    After you re-authorize the app profile, you need to wait about one hour before using the app profile for your migration to refresh the token if there are permissions updated.

Refer to the following API permissions of the default app required by Entra ID migrations.

APIPermissionTypePurpose
Microsoft GraphDomain.Read.All(Read domains)ApplicationRetrieve tenant domain.
Microsoft GraphGroup.ReadWrite.All(Read and write all groups)ApplicationRetrieve and migrate groups and group members.
Microsoft GraphMailboxSettings.Read(Read user’s mail setting)ApplicationRetrieve the mailbox settings information for all users.
Microsoft GraphOrganization.Read.All(Read subscribed skus)ApplicationRetrieve information of license.
Microsoft GraphRoleManagement.ReadWrite.Directory (Read and Write roles and Role assignments)ApplicationRetrieve directory roles and migrate roles.
Microsoft GraphUser.ReadWrite.All(Read and write all users’ full profiles)ApplicationRetrieve and migrate users.
Microsoft GraphUser.EnableDisableAccount.All(Unblock user sign-in)ApplicationEnable and disable users' accounts.
Microsoft GraphUser-Phone.ReadWrite.All(Update Business phone and Mobile phone)ApplicationUpdate business phones and mobile phone properties for all users.
Microsoft GraphUser-Mail.ReadWrite.All(Update Other emails)ApplicationUpdate other mails property for all users.

Custom App Profile Permissions

With the Tenant Owner and Service Administrator role, you can create a custom app profile in AvePoint Online Services > Management > App management to connect to the Microsoft 365 tenant using a custom Azure app.

Refer to the following procedures to create a custom app profile:

  1. Prepare a certificate in Microsoft Entra ID. Refer to for more information.

    You can ignore this step if you have a certificate.

  2. Create a custom Azure app in Microsoft Entra ID. Refer to for more information.

  3. .

  4. in AvePoint Online Services.

*Note: After you re-authorize the app profile, you need to wait about one hour before using the app profile for your migration to refresh the token if there are permissions updated.

Refer to the following tables to add API permissions required by Entra ID Migration to the custom Azure app.

APIPermissionTypePurpose
Microsoft GraphDomain.Read.All(Read domains)ApplicationRetrieve tenant domain.
Microsoft GraphGroup.ReadWrite.All(Read and write all groups)ApplicationRetrieve and migrate groups and group members.
Microsoft GraphMailboxSettings.Read(Read user’s mail setting)ApplicationRetrieve the mailbox settings information for all users.
Microsoft GraphOrganization.Read.All(Read subscribed skus)ApplicationRetrieve information of license.
Microsoft GraphRoleManagement.ReadWrite.Directory (Read and Write roles and Role assignments)ApplicationRetrieve directory roles and migrate roles.
Microsoft GraphUser.ReadWrite.All(Read and write all users’ full profiles)ApplicationRetrieve and migrate users.
Microsoft GraphUser.EnableDisableAccount.All(Unblock user sign-in)ApplicationEnable and disable users' accounts.
Microsoft GraphUser-Phone.ReadWrite.All(Update Business phone and Mobile phone)ApplicationUpdate business phones and mobile phone properties for all users.
Microsoft GraphUser-Mail.ReadWrite.All(Update Other emails)ApplicationUpdate other mails property for all users.

For easy use, you can directly use the following commands to add required API permissions through Manifest for Microsoft 365 Commercial tenants.

"requiredResourceAccess": [{

**"resourceAppId": "00000003-0000-0000-c000-000000000000",** **"resourceAccess": [** **{** **"id": "dbb9058a-0e50-45d7-ae91-66909b5d4664",** **"type": "Role"** **},** **{** **"id": "62a82d76-70ea-41e2-9197-370581804d09",** **"type": "Role"** **},** **{** **"id": "40f97065-369a-49f4-947c-6a255697ae91",** **"type": "Role"** **},** **{** **"id": "498476ce-e0fe-48b0-b801-37ba7e2685c6",** **"type": "Role"** **},** **{** **"id": "9e3f62cf-ca93-4989-b6ce-bf83c28f9fe8",** **"type": "Role"** **},** **{** **"id": "280d0935-0796-47d1-8d26-273470a3f17a",** **"type": "Role"** **},** **{** **"id": "86ceff06-c822-49ff-989a-d912845ffe69",** **"type": "Role"** **},** **{** **"id": "3011c876-62b7-4ada-afa2-506cbbecc68c",** **"type": "Role"** **},** **{** **"id": "741f803b-c850-494e-b5df-cde7c675a1ca",** **"type": "Role"** **} ]** **}**

]