Authentication Methods for Microsoft 365 (All Products) Migrations

Authentication and permission management for Microsoft 365 can be complex and varies by type. This article covers the various types of authentication, what scenarios they apply to, and special cases. 

The specific authentication needed, and the steps to enable it, will be found in the migration guide for your specific scenario.

Terminology

Basic Authentication

Any authentication that uses a simple combination of the username and password. This kind of authentication is considered weak and is prone to password attacks.

Modern Authentication

Modern authentication is based on the use of OAuth 2.0 tokens and the Active Directory Authentication Library. It notably adds support for multifactor authentication, in which a secondary challenge besides a password is used to verify a user's identity, such as previously set personal questions.

Delegated Permissions

Your application needs to access the web API as the signed-in user, but access is limited by the selected permissions. This type of permission can be granted by a user unless the permission is configured as requiring administrator consent.

Application Permissions

Your application needs to access the web API directly as itself (no user context). This type of permission requires administrator consent and is also not available for native client applications.

Authentications Available per Product Type

SharePoint & OneDrive

Basic - User Credentials (OneDrive)

The user’s credentials are provided as a line item. The user is the site collection admin of his own OneDrive personal site, so no additional credentials are required. OneDrive user account provisioning is NOT supported. User credentials are only supported for GCC & China migrations.

Basic - Admin Credentials

  • SharePoint migrations: Site Collection admin credentials
  • OneDrive migrations: will utilize the SharePoint admin credentials. OneDrive user account provisioning is supported when using SharePoint admin credentials. 

Modern Authentication - Delegated Permissions - BitTitan App

This authentication method requires the BitTitan permissions app. The steps for this app are described in a following section. 

Global admin credentials are required for this method. 

  • SharePoint migrations: Site Collection admin credentials
  • OneDrive migrations: will utilize the SharePoint admin credentials. The admin will be promoted to a site collection admin for the OneDrive account being migrated. OneDrive user account provisioning is supported when using SharePoint admin credentials (provided destination tenant doesn’t block basic authentication).

Modern Authentication - Delegated Permissions - Customer Tenant App

  • SharePoint migrations: Global admin and site collection admin (GA role required to create tenant app)
  • OneDrive migrations: will utilize the SharePoint admin credentials. The global admin will create the tenant app and promote their permissions to site collection admin levels for the account being migrated. OneDrive user account provisioning is supported when using SharePoint admin credentials (provided destination tenant doesn’t block basic authentication).

Modern Authentication - Application Permissions - BitTitan App

This authentication method requires the BitTitan permissions app. The steps for this app are described in a following section. 

  • This method uses user credentials, but the user will need to be a member of a created MigrationWiz security group in the Microsoft 365 tenant. 
  • Global admin permissions are required to give consent to the BitTitan app. 
  • OneDrive provisioning is not supported and only admin cred flow is supported. 
  • Requires the Advanced Option UseApplicationPermission=1

Teams

Modern Authentication - Delegated Permissions - BitTitan App

This authentication method requires the BitTitan permissions app. The steps for this app are described in the Teams to Teams migration guide.

  • Requires global admin or Teams admin credentials.
  • Requires the Advanced Option UseDelegatePermission=1

Modern Authentication - Delegated Permissions - Customer Tenant App

  • Requires global admin credentials.
  • Requires the Advanced Option UseDelegatePermission=1

Modern Authentication - Application Permissions - BitTitan App

This authentication method requires the BitTitan permissions app. The steps for this app are described in the Teams to Teams migration guide.

  • This method uses user credentials, but the user will need to be a member of a created MigrationWiz security group in the Microsoft 365 tenant. 

Microsoft 365

Basic Authentication

  • No app required
  • Admin credentials required

Modern Authentication - Delegated Permissions

  • Created in the customer's Azure account.
  • Requires admin credentials.
  • Requires app and client ID, which are added via Advanced Options.

Small Business Tenant

Document migrations in the Microsoft 365 Small Business Tenant require some special considerations.

MigrationWiz will support Document Migration, but the Destination has to be configured in the following manner:

 

While the Source (e.g., Google Drive) is able to use admin credentials, the Destination, Microsoft 365 Small Business Tenant, needs to be configured with the end user credentials. If admin credentials are used, the following error will surface:

 

Destination

Your migration failed checking destination credentials. OneDrive for Business administrative authentication failed with <your tenant URL>.

We use SharePoint administrator API in order to perform auto-provisioning and provide rights to the administrator to access user sites. Some Office 365 plans prevent us from accessing them (Small Business, for example). If your plan doesn't provide access to the SharePoint administrator API, you must use end user credentials.

Enabling Modern Authentication

BitTitan now supports Modern Authentication for Microsoft 365 endpoints used for Mailbox migrations. Modern Authentication provides a more secure authentication mechanism for registered applications to connect to Azure Active Directory and Microsoft 365. 

The Autodiscovery of items option will not work with Modern Authentication in place.

Microsoft's documentation explains enabling and disabling Modern Authentication for Exchange Online.

Prerequisites

  • A Global Administrator account with access to Azure Active Directory. MFA/2FA is not supported at this time. The administrator account will need to be excluded from these policies if enabled. 
  • MigrationWiz Mailbox project(s) created and ready for configuration.
  • The application will require administrator consent

Supported Endpoints

Project Type

Source

Destination

 

 

 

Mailbox

  1. Exchange Server 2003+

  2. Microsoft 365

  3. Microsoft 365 (China)

  4. Microsoft 365 (Germany)

  5. Microsoft 365 (US Government)

  6. Microsoft 365 Groups

  1. Exchange Server 2003+

  2. Microsoft 365

  3. Microsoft 365 (China)

  4. Microsoft 365 (Germany)

  5. Microsoft 365 (US Government)

  6. Microsoft 365 Groups

 

 

 

 

 

 

 

 

Public Folder

  1. Exchange Server 2003+

  2. Exchange Server Public Folder

  3. Microsoft 365

  4. Microsoft 365 China

  5. Microsoft 365 Germany

  6. Microsoft 365 US Government

  7. Microsoft 365 Public Folders

  8. Microsoft 365 Public Folders (China)

  9. Microsoft 365 Public Folders (Germany)

  10. Microsoft 365 Public Folders (US Government)

  1. Exchange Server 2003+

  2. Exchange Server Public Folder

  3. Microsoft 365

  4. Microsoft 365 China

  5. Microsoft 365 Germany

  6. Microsoft 365 US Government

  7. Microsoft 365 Public Folders

  8. Microsoft 365 Public Folders (China)

  9. Microsoft 365 Public Folders (Germany)

  10. Microsoft 365 Public Folders (US Government)

 

 

Personal Archive

  1. Exchange Server 2003+

  2. Microsoft 365

  3. Microsoft 365 (China)

  4. Microsoft 365 (Germany)

  5. Microsoft 365 (US Government)

  1. Exchange Server 2003+

  2. Microsoft 365

  3. Microsoft 365 (China)

  4. Microsoft 365 (Germany)

  5. Microsoft 365 (US Government)

Hybrid

  1. On-Premises Exchange 2010+

  1. Microsoft 365 (Hybrid Migrations only)

Process

  1. Log in to the Azure AD admin console with a Global Administrator login.
  2. Select Azure Active Directory in the Azure Active Directory Admin Center.
  3. Select App Registrations, which is found under Manage.
  4. Select New Registration at the top of the screen.
  5. Give the app a distinct name. You can change this later if necessary.
  6. Select the Accounts in any organizational directory button.
  7. Under Redirect Uri, select Public Client (mobile & desktop) and set it to urn:ietf:wg:oauth:2.0:oob
  8. Click Register.
  9. Go back to App registrations.
  10. Select the App you just created.
  11. In the Overview, you will find a ClientId (aka Application) and Directory (Tenant) ID.
  12. Copy both of these to another application, such as Notepad, for use later in this process.
  13. Under the Manage menu, select Authentication.
  14. Set the option Allow public client flows to Yes
  15. Click Save.
  16. From the Manage menu, select API permissions.
  17. Select Add a Permission.
  18. Select APIs my organization uses

  19. Scroll down and select Office 365 Exchange Online

  20. Then select Delegated Permissions

  21. Select EWS

  22. Check the box under EWS for EWS.AccessAsUser.All.
  23. Click Add permissions. This permission only allows the OAuth application (MigrationWiz) to be associated with EWS.
      • Important: This does not grant access to all mailbox data.
  24. Click Grant admin consent.
  25. Click Yes to confirm the settings.
  26. In MigrationWiz, select the project that needs to be configured for Modern Authentication.
  27. Click the Edit Project menu.
  28. Select Advanced Options.
  29. Under Support Options enter the ClientID and TenantID information you saved earlier in the following format:
    • If enabling Modern Authentication for the Source:
      • ModernAuthClientIdExport=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
      • ModernAuthTenantIdExport=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
    • If enabling Modern Authentication for the Destination:
      • ModernAuthClientIdImport=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
      • ModernAuthTenantIdImport=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx 
        • Enter the specific ClientID and TenantID for your tenant in place of the xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.
        • These options can be entered for either the Source or the Destination, or both, depending on the settings on the tenants.
        • These options need to be configured for each MigrationWiz project that needs to have Modern Authentication enabled.

  30. Run a Verify Credentials to confirm that MigrationWiz can connect using Modern Authentication. 
  31. Click on the item that was verified. There will be a message in the MigrationWiz Migration Information page that Modern Authentication is being used. This message will show in the “Migration Errors” box; however, it is not an error. This is just a message confirming that Modern Authentication is now active and being used for connection.

AAD SSO Login

Microsoft 365 AAD login can be enabled on your company's MigrationWiz account by our Support team. Note that SSO login happens at the domain level, which means all users with the domain you request will therefore be required to sign in with their Microsoft 365 AAD logins - for example, instead of enabling SS just for You@company.com, it would be enabled for all users of @company.com. 

To set this up, you must have at least one MigrationWiz account with the same domain as your Microsoft 365 account. We do not support other SSO providers at this time.

  1. Contact our Support team.
  2. Our support team will set up your account to use AAD login.
  3. Once your AAD is ready, Support will contact you with instructions. 
  4. You will receive a response from Support when your account is all set up.

Enabling Application Permissions

Teams - Global admin & Application Permissions

In recent updates, the AO ‘UseApplicationPermission=1’ has been defaulted. Use Teams-FullControlApp for both Source and Destination.

MigrationWiz now supports read-only Application Permissions for Teams migrations, in addition to full-control permissions. This new app, with ReadOnly permissions, can only be used at the source to enhance security, and will not export document permissions. The destination permissions will always require FullControl permissions.

This allows for a secure migration without the use of Global Admin or Site Collection Admin permissions on the source and destination.

This app is similar to the Office 365 Authentication App previously deployed, which utilized delegate permissions. This app uses application permissions. If you are not using application permissions, go to the Authentication App article and follow those steps.

61d5b82a-cc9f-42d9-8565-7813f8c94121.png

Enable Application Permissions

These are the steps to enable permission level at the source only. This authentication process gives you control over who is entitled to use the source.

  1. Ensure you are signed in as a Global Admin in the Office 365 Admin Portal.

  2. Go to either Teams-ReadOnlyApp or to Teams-FullControlApp and consent to the app access when prompted. If choosing the Teams-ReadOnlyApp option, you will need to disable AMR via "DisableAsynchronousMetadataRead=1", due to Microsoft API limitation.

  3. Create new Security Group named “MigrationWiz” on the Microsoft 365 Admin Portal. If you have not created a security group before, follow Microsoft's instructions.

  4. Create new user. This user must have an active Teams license applied.

  5. Add new user to previously created security group as a member. Important: ADFS and MFA must be turned off for this user.

  6. Create MigrationWiz project.

  7. When creating the endpoints, enter the new user credentials.

Steps to enable permission level at the destination:

  1. Ensure you are signed in as a Global Admin.

  2. Go to Teams-FullControlApp and consent to the app access when prompted.

  3. Create new Security Group named “MigrationWiz” on the Microsoft 365 Admin Portal.

  4. Create new user. Important: ADFS and MFA must be turned off for this user.

  5. Add new user to previously created security group as a member.

  6. Create MigrationWiz project.

  7. When creating the endpoints, enter the new user credentials.

Teams-FullControlApp may be used on both source and destination tenant and will export document permissions. Teams-ReadOnly can only be used on the source tenant, and will not export document permissions.

Post-Migration Steps

  1. Remove the newly created user.

  2. Remove the MigrationWiz Security Group created in Step 3.

  3. To remove the app from the source or destination, perform the following steps:

    1. Launch PowerShell.

    2. Connect PowerShell to Microsoft 365.

    3. Enter the command: Connect-AzureAD

    4. Enter the admin credentials in the prompt.

    5. Enter the command:Get-AzureADServicePrincipal -SearchString Migration.

    6. Look for the ObjectId of the app you want to remove and enter the following command: Remove-AzureADServicePrincipal -objectId <the object id>

Permissions Granted

  Teams ReadOnly Teams FullControl
Conversations Y Y
Teams Permissions Y Y
Documents Y Y
Document Permissions N Y

Read Only permissions granted:

    • SharePoint API

      • Sites.Read.All,

      • User.Read.All

    • Graph API

      • Files.Read.All,

      • Group.ReadWrite.All
        (This is to add the user to the team as a owner first before being able to read conversations)

      • User.Read.All

      • Group.Read.All (delegate permission)
        (This is to be able to read all the conversations as a user after being added)

      • User.Read (delegate permission)

Full Control permissions granted:

  • SharePoint API:

    • Sites.FullControl.All

    • User.ReadWrite.All

  • Graph API:

    • Files.Read.All,

    • Group.ReadWrite.All

    • User.Read.All

    • Group.ReadWrite.All (delegate permission)

    • User.Read (delegate permission)

SharePoint & OneDrive

MigrationWiz now supports read-only Application Permissions for SharePoint and OneDrive migrations, via use of the support option UseApplicationPermission=1, in addition to full control permissions. This new app, with ReadOnly permissions, can only be used at the source to enhance security. The destination permissions will always require FullControl permissions.

This allows for a secure migration without the use of Global Admin or Site Collection Admin permissions on the source and destination.

This app is similar to the Office 365 Authentication App previously deployed, which utilized delegate permissions. This app uses application permissions. 

BitTitan applications are fully verified and accepted by Microsoft. 

Enable Application Permissions

SharePoint_Read_Only.PNG

 

Sharepoint_Full_Permissions.PNG

 

These are the steps to enable permission level at the source only. This authentication process gives you control over who is entitled to use the source.

  1. Ensure you are signed in as a Global Admin.
  2. Go to either MigrationWiz-SharePoint-ReadOnly or to MigrationWiz-SharePoint-FullControl and consent to the app access when prompted.
  3. Create new Security Group named “MigrationWiz” on the Office 365 Admin Portal. 
  4. Create new user.
  5. Add new user to previously created security group as a member.
  6. Create MigrationWiz project.
  7. When creating the endpoints, enter the new user credentials.
  8. Add support option UseApplicationPermission=1

Steps to enable permission level at the destination:

  1. Ensure you are signed in as a Global Admin.
  2. Go to MigrationWiz-SharePoint-FullControl and consent to the app access when prompted.
  3. Create new Security Group named “MigrationWiz” on the Microsoft 365 Admin Portal.
  4. Create new user.
  5. Add new user to previously created security group as a member.
  6. Create MigrationWiz project.
  7. When creating the endpoints, enter the new user credentials.

MigrationWiz-SharePoint-FullControl may be used on both source and destination tenant and will export document permissions. MigrationWiz-SharePoint-ReadOnly can only be used on the source tenant, will not export document permissions, and cannot use AMR.

Post-Migration Steps

  1. Remove the newly created user.

  2. Remove the MigrationWiz Security Group created in Step 3. 

  3. To remove the app from the source or destination, perform the following steps:

    1. Launch PowerShell.
    2. Connect PowerShell to Microsoft 365.
    3. Enter the command: Connect-AzureAD
    4. Enter the admin credentials in the prompt.
    5. Enter the command:Get-AzureADServicePrincipal -SearchString Migration
    6. Look for the ObjectId of the app you want to remove and enter the following command: Remove-AzureADServicePrincipal -objectId <the object id>

Permissions Granted

Read Only permissions granted:

  • SharePoint API:
    • Sites.Read.All
    • User.Read.All
  • Graph API:
    • Directory.Read.All
    • Files.Read.All
    • Group.Read.All (delegate permission)
    • User.Read (delegate permission)

Full Control permissions granted:

  • SharePoint API:
    • Sites.FullControl.All
    • User.ReadWrite.All
  • Graph API:
    • Directory.Read.All
    • Files.Read.All
    • Group.Read.All (delegate permission)
    • User.Read (delegate permission)
Was this article helpful?
5 out of 8 found this helpful