Permissions for Source Entra ID

To connect to the source, you can choose to only use Fly app profile, or custom app profile as the authentication method.

Refer to the following sections to view the permissions required by the authentication methods.

Fly App for Entra ID Source Permissions (Default app)

The Tenant Owner and Service Administrators can create a default app profile for Entra ID Source in AvePoint Online Services.

Refer to the following steps to create a default app profile for Entra ID Source:

  1. Click Create on the App management page.

  2. On the Create app profile page, select a Microsoft 365 tenant where you want to create the app profile.

    *Note: Make sure your selected tenant has been connected to AvePoint Online Services.

  3. Click Fly, and click Next.

  4. Click Modern mode.

  5. Click Consent of Fly for Entra ID source.

  6. On the Microsoft 365 sign-in page, sign in with a Microsoft 365 Global Administrator account to consent to the app. The Microsoft 365 Global Administrator account is a requirement from Microsoft. Refer to the for more information.

    On the Permissions requested page, review the permissions required for using Fly and click Accept to accept the permissions to ensure the AvePoint Online Services and Fly functionality works. (The required permissions are listed in the table below.)

  7. Click Finish to create the app profile.

Refer to the following API permissions of the default app required by Entra ID migrations.

APIPermissionTypePurpose
Microsoft GraphDomain.Read.All(Read domains)ApplicationRetrieve tenant domain.
Microsoft GraphGroup.Read.All (Read all groups)ApplicationRetrieve groups and group members.
Microsoft GraphMailboxSettings.Read(Read user’s mail setting)ApplicationRetrieve the mailbox settings information for all users.
Microsoft GraphOrganization.Read.All(Read subscribed skus)ApplicationRetrieve information of license.
Microsoft GraphRoleManagement.Read.Directory(Read roles and Role assignments)ApplicationRetrieve directory roles.
Microsoft GraphUser.Read.All (Read all users’ full profiles)ApplicationRetrieve information of user profiles.

Custom App Profile Permissions

With the Tenant Owner and Service Administrator role, you can create a custom app profile in AvePoint Online Services > Management > App management to connect to the Microsoft 365 tenant using a custom Azure app.

Refer to the following procedures to create a custom app profile:

  1. Prepare a certificate in Microsoft Entra ID. Refer to for more information.

    You can ignore this step if you have a certificate.

  2. Create a custom Azure app in Microsoft Entra ID. Refer to for more information.

  3. .

  4. in AvePoint Online Services.

*Note: After you re-authorize the app profile, you need to wait about one hour before using the app profile for your migration to refresh the token if there are permissions updated.

Refer to the following tables to add API permissions required by Entra ID Migration to the custom Azure app.

APIPermissionTypePurpose
Microsoft GraphDomain.Read.All(Read domains)ApplicationRetrieve tenant domain.
Microsoft GraphGroup.Read.All (Read all groups)ApplicationRetrieve groups and group members.
Microsoft GraphMailboxSettings.Read(Read user’s mail setting)ApplicationRetrieve the mailbox settings information for all users.
Microsoft GraphOrganization.Read.All(Read subscribed skus)ApplicationRetrieve information of license.
Microsoft GraphRoleManagement.Read.Directory(Read roles and Role assignments)ApplicationRetrieve directory roles.
Microsoft GraphUser.Read.All (Read all users’ full profiles)ApplicationRetrieve information of user profiles.

For easy use, you can directly use the following commands to add required API permissions through Manifest for Microsoft 365 Commercial tenants.

"requiredResourceAccess": [{

**"resourceAppId": "00000003-0000-0000-c000-000000000000",** **"resourceAccess": [{** **"id": "dbb9058a-0e50-45d7-ae91-66909b5d4664",** **"type": "Role"** **},** **{** **"id": "5b567255-7703-4780-807c-7be8301ae99b",** **"type": "Role"** **},** **{** **"id": "40f97065-369a-49f4-947c-6a255697ae91",** **"type": "Role"** **},** **{** **"id": "498476ce-e0fe-48b0-b801-37ba7e2685c6",** **"type": "Role"** **},** **{** **"id": "483bed4a-2ad3-4361-a73b-c83ccdbdc53c",** **"type": "Role"** **},** **{** **"id": "df021288-bdef-4463-88db-98f22de89214",** **"type": "Role"** **} ]** **}**

]