Warning
This guide describes changes related to an upcoming security update that has not yet been released. The steps outlined here may be completed in advance and will be required prior to the deployment. Additional details are available in the maintenance announcement.
Starting October 1, 2025, Microsoft will begin enforcing Multi-Factor Authentication (MFA) across its cloud services—marking a significant shift in how organizations must approach identity, access, and migration strategies. This policy change introduces new compliance requirements that directly impact IT operations, automation, and cloud governance. For businesses leveraging migration tools to transition Microsoft workloads, adapting to this new security standard is not optional—it’s essential for continuity, security, and long-term success.
MigrationWiz, built to support such transitions across Microsoft products and beyond, is evolving to meet these new standards. This article outlines the key MFA enforcement changes, their implications for migration planning, and how our solution ensures your organization remains secure, compliant, and agile in cloud security policies while migrating your services.
For more information on the Microsoft Mandatory Multi-Factor Authentication for Azure and other admin portals, please visit the following Microsoft article.
Mailbox Projects
Some mailbox type migration projects now require a more secure and structured setup. and you will need to create an application within Azure/Entra ID, configure a Client Secret and in some cases assign the Exchange Administrator role for this application.
The following scenarios apply for these changes:
- Tenant to Tenant Migrations (M365 to M365) with Coexistence enabled
- Google Groups to Shared mailbox Migrations
- Google Groups to Microsoft 365 Groups Migrations
- Microsoft 365 Groups mailbox to Microsoft 365 Groups mailbox (Conversations)
Application Permissions for Tenant-to-Tenant Migration (M365 to M365) with Coexistence enabled Projects
The following steps include new API permissions that must be used in the Entra ID App for a Tenant-to-Tenant Migration (M365 to M365) migration with Coexistence Projects.
Step One - Create a New Application Registration
Create a new Application Registration in the Microsoft 365 tenant source or destination.
- Log in to the Microsoft Entra admin center with a Global Administrator login.
- Click View all products and select Microsoft ID (Azure AD) in the Microsoft Entra Admin Center.
- In the left sidebar, open the Applications dropdown list and select App Registrations, which is found under the Identity dropdown list.
- Select New Registration at the top of the screen.
- Give the app a distinct name. You can change this later if necessary.
- Select the Accounts in this organizational directory ('Tenant name only' - Single tenant) radio button.
- Click Register.
- Under the Manage menu, select Authentication (preview).
- Select the Settings tab.
- Set the option Allow public client flows to Enabled.
- Under the Supported Account types, select Accounts in this organizational directory ('Tenant name only' - Single tenant).
- Click Save.
Step Two - Assign the API Permissions and Grant Admin Consent
The following steps allow you to assign the API permission and grant consent to the necessary M365 components.
- From the Manage menu, select API permissions.
- Click Add a Permission.
- Select APIs my organization uses.
- Scroll down or search for the following permissions Office 365 Exchange Online.
- Select Application Permissions.
- Check the box under Other Permissions for full_access_as_app.
- Check the box under Exchange for Exchange.ManageAsApp.
- Click Add Permissions.
- Repeat Step 2 and select Delegated Permissions.
- Check the box under Directory for EWS.AccessAsUser.All.
- Click Add Permissions.
- Now repeat Step 2 and select Microsoft APIs > Microsoft Graph.
- Select Application Permissions.
- Check the box under Directory for Directory.ReadWrite.All.
- Click Add Permissions.
- Click Grant admin consent.
- Click Yes to confirm the settings. Under the Status column, you should see a message that permission has been granted for the domain. Your API scopes should look like the following:
Step Three - Obtain the AppID and TenantID from the Application Registration
Follow the steps below to obtain the AppID and TenantID from the Application Registration.
- Navigate to the App Registrations item as shown below. In the Overview tab, you will find the Application (client) ID and the Directory (Tenant) ID.
- Copy both of these to another application, such as Notepad, for use later in this process. This is needed for the MigrationWiz Project Setup.
Step Four - Create a Client Secret
Create a Client Secret for the application by following the steps below.
- Go to Manage > Certificates & secrets from the left sidebar.
- Create a new secret client by clicking + New client secret.
- Copy and save the client secrets' value on a notepad or other preferred tool.
Warning
Consider that the secret client's value is only available until the first time you sign off the Azure Portal after the secret client creation. After that, it will be no longer visible.In case you lost the value, please create a new client secret as suggested above and use it in the steps below.
Step Five - Grant Exchange Administrator Role
Grant the Exchange Administrator Role to your app by following the steps below.
- Go to Entra ID> Roles & admins from the left sidebar.
- In the search bar, type Exchange Administrator and click on it.
- On the Assignments page, click the button to Add assignments.
- In the search bar, enter the name of the app or its Application ID.
- Select your app from the list.
-
Add to confirm the assignment. A confirmation message will appear after the permission is granted.
Warning
This role process might take up to 30 minutes to take effect.
Important
App password usage, MFA/2FA, SSO, and ADFS are not supported for the migration service account when using Application Permissions. However, users being migrated to your project can have these security features enabled.
Application Permissions for Google Groups to M365 Shared Mailbox Projects
The following steps include new API permissions that must be used in the Entra ID App for a Google Groups to M365 Shared Mailbox Projects.
Step One - Create a New Application Registration
Create a new Application Registration in the Microsoft 365 tenant source or destination.
- Log in to the Microsoft Entra admin center with a Global Administrator login.
- Click View all products and select Microsoft ID (Azure AD) in the Microsoft Entra Admin Center.
- In the left sidebar, open the Applications dropdown list and select App Registrations, which is found under the Identity dropdown list.
- Select New Registration at the top of the screen.
- Give the app a distinct name. You can change this later if necessary.
- Select the Accounts in this organizational directory ('Tenant name only' - Single tenant) radio button.
- Click Register.
- Under the Manage menu, select Authentication (preview).
- Select the Settings tab.
- Set the option Allow public client flows to Enabled.
- Under the Supported Account types, select Accounts in this organizational directory ('Tenant name only' - Single tenant).
- Click Save.
Step Two - Assign the API Permissions and Grant Admin Consent
The following steps allow you to assign the API permission and grant consent to the necessary M365 components.
- From the Manage menu, select API permissions.
- Click Add a Permission.
- Select APIs my organization uses.
- Scroll down or search for the following permissions Office 365 Exchange Online.
- Select Application Permissions.
- Check the box under Other Permissions for full_access_as_app.
- Check the box under Exchange for Exchange.ManageAsApp.
- Click Add Permissions.
- Repeat Step 2 and select Delegated Permissions.
- Check the box under Directory for EWS.AccessAsUser.All.
- Click Add Permissions.
- Now repeat Step 2 and select Microsoft APIs > Microsoft Graph.
- Select Application Permissions.
- Check the box under Directory for Directory.ReadWrite.All.
- Click Add Permissions.
- Click Grant admin consent.
- Click Yes to confirm the settings. Under the Status column, you should see a message that permission has been granted for the domain. Your API scopes should look like the following:
Step Three - Obtain the AppID and TenantID from the Application Registration
Follow the steps below to obtain the AppID and TenantID from the Application Registration.
- Navigate to the App Registrations item as shown below. In the Overview tab, you will find the Application (client) ID and the Directory (Tenant) ID.
- Copy both of these to another application, such as Notepad, for use later in this process. This is needed for the MigrationWiz Project Setup.
Step Four - Create a Client Secret
Create a Client Secret for the application by following the steps below.
- Go to Manage > Certificates & secrets from the left sidebar.
- Create a new secret client by clicking + New client secret.
- Copy and save the client secrets' value on a notepad or other preferred tool.
Warning
Consider that the secret client's value is only available until the first time you sign off the Azure Portal after the secret client creation. After that, it will be no longer visible.In case you lost the value, please create a new client secret as suggested above and use it in the steps below.
Step Five - Grant Exchange Administrator Role
Grant the Exchange Administrator Role to your app by following the steps below.
- Go to Entra ID> Roles & admins from the left sidebar.
- In the search bar, type Exchange Administrator and click on it.
- On the Assignments page, click the button to Add assignments.
- In the search bar, enter the name of the app or its Application ID.
- Select your app from the list.
-
Add to confirm the assignment. A confirmation message will appear after the permission is granted.
Warning
This role process might take up to 30 minutes to take effect.
Important
App password usage, MFA/2FA, SSO, and ADFS are not supported for the migration service account when using Application Permissions. However, users being migrated to your project can have these security features enabled.
Application Permissions for Google Groups to Microsoft 365 Groups Projects
The following steps include new API permissions that must be used in the Entra ID App for Google Groups to Microsoft 365 Groups Projects.
Step One - Create a New Application Registration
Create a new Application Registration in the Microsoft 365 tenant source or destination.
- Log in to the Microsoft Entra admin center with a Global Administrator login.
- Click View all products and select Microsoft ID (Azure AD) in the Microsoft Entra Admin Center.
- In the left sidebar, open the Applications dropdown list and select App Registrations, which is found under the Identity dropdown list.
- Select New Registration at the top of the screen.
- Give the app a distinct name. You can change this later if necessary.
- Select the Accounts in this organizational directory ('Tenant name only' - Single tenant) radio button.
- Click Register.
- Under the Manage menu, select Authentication (preview).
- Select the Settings tab.
- Set the option Allow public client flows to Enabled.
- Under the Supported Account types, select Accounts in this organizational directory ('Tenant name only' - Single tenant).
- Click Save.
Step Two - Assign the API Permissions and Grant Admin Consent
The following steps allow you to assign the API permission and grant consent to the necessary M365 components.
- From the Manage menu, select API permissions.
- Click Add a Permission.
- Select APIs my organization uses.
- Scroll down or search Office 365 Exchange Online.
- Select Application permissions and add:
- Repeat Step 2 and search Office 365 Exchange Online.
- Now select Delegated permissions, check the box of EWS.AccessAsUser.All under EWS.
- Repeat Step 2 and now Select Microsoft Graph.
- Select Application permissions and under Group select Group.ReadWrite.All.
- Click Add Permissions.
- Click Grant admin consent.
- Click Yes to confirm the settings. Under the Status column, you should see a message that permission has been granted for the domain.
Your API permissions should look like the below:
Step Three - Obtain the AppID and TenantID from the Application Registration
Follow the steps below to obtain the AppID and TenantID from the Application Registration.
- Navigate to the App Registrations item as shown below. In the Overview tab, you will find the Application (client) ID and the Directory (Tenant) ID.
- Copy both of these to another application, such as Notepad, for use later in this process. This is needed for the MigrationWiz Project Setup.
Step Four - Create a Client Secret
Create a Client Secret for the application by following the steps below.
- Go to Manage > Certificates & secrets from the left sidebar.
- Create a new secret client by clicking + New client secret.
- Copy and save the client secrets' value on a notepad or other preferred tool.
Warning
Consider that the secret client's value is only available until the first time you sign off the Azure Portal after the secret client creation. After that, it will be no longer visible.In case you lost the value, please create a new client secret as suggested above and use it in the steps below.
Step Five - Grant Exchange Administrator Role
Grant the Exchange Administrator Role to your app by following the steps below.
- Go to Entra ID> Roles & admins from the left sidebar.
- In the search bar, type Exchange Administrator and click on it.
- On the Assignments page, click the button to Add assignments.
- In the search bar, enter the name of the app or its Application ID.
- Select your app from the list.
-
Add to confirm the assignment. A confirmation message will appear after the permission is granted.
Warning
This role process might take up to 30 minutes to take effect.
Important
App password usage, MFA/2FA, SSO, and ADFS are not supported for the migration service account when using Application Permissions. However, users being migrated to your project can have these security features enabled.
Public Folders Projects
Some Public Folders type migration projects now require a more secure and structured setup. and you will need to create an application within Azure/Entra ID and configure a Client Secret.
The following scenarios apply for these changes:
- Public Folder Migration Guide From On-Premises Exchange 2007+ to Microsoft 365 (Hybrid Mode)
- Exchange or Microsoft 365 Public Folder to Exchange or Microsoft 365 Shared Mailbox Migration Guide
- Public Folder from Microsoft 365 to Microsoft 365 - Migration Guide
- Public Folder Migration Guide From Hosted Exchange To Microsoft 365
- Public Folder Migration Guide From On-Premises Exchange 2007+ to Microsoft 365
Delegated Permissions for Public Folders Projects
This section details the changes for API Permissions applications in Public Folders Projects.
Limitations
- App password usage, MFA/2FA, SSO, and ADFS are not supported for the migration service account when using Application Permissions. However, users being migrated to your project can have these security features enabled.
- Client Secret is now a mandatory field when configuring the application registration.
Step One - Create a New Application Registration
Create a new Application Registration in the Microsoft 365 tenant source or destination.
- Log in to the Microsoft Entra admin center with a Global Administrator login.
- Click View all products and select Microsoft ID (Azure AD) in the Microsoft Entra Admin Center.
- In the left sidebar, open the Applications dropdown list and select App Registrations, which is found under the Identity dropdown list.
- Select New Registration at the top of the screen.
- Give the app a distinct name. You can change this later if necessary.
- Select the Accounts in this organizational directory ('Tenant name only' - Single tenant) radio button.
- Click Register.
- Under the Manage menu, select Authentication (preview).
- Select the Settings tab.
- Set the option Allow public client flows to Enabled.
- Under the Supported Account types, select Accounts in this organizational directory ('Tenant name only' - Single tenant).
- Select Save.
Step Two - Assign the API Permissions and Grant Admin Consent
The following steps allow you to assign the API permission and grant consent to the necessary M365 components.
- From the Manage menu, select API permissions.
- Click Add a Permission.
- Select APIs my organization uses.
- Scroll down or search Office 365 Exchange Online.
- Select Application permissions.
- Check the box under Other Permissions and add full_access_as_app.
- Click Add Permissions.
- Scroll down or search Office 365 Exchange Online.
- Select Delegated permissions and add EWS.AccessAsUser.All
- Click Add Permissions.
- Click Grant admin consent.
- Click Yes to confirm the settings. Under the Status column, you should see a message that permission has been granted for the domain.
Your API permissions should look like the below:
Step Three - Obtain the AppID and TenantID from the Application Registration
Follow the steps below to obtain the AppID and TenantID from the Application Registration.
- Navigate to the App Registrations item as shown below. In the Overview tab, you will find the Application (client) ID and the Directory (Tenant) ID.
- Copy both of these to another application, such as Notepad, for use later in this process. This is needed for the MigrationWiz Project Setup.
Step Four - Create a Client Secret
Create a Client Secret for the application by following the steps below.
- Go to Manage > Certificates & secrets from the left sidebar.
- Create a new secret client by clicking + New client secret.
- Copy and save the client secrets' value on a notepad or other preferred tool.
Warning
Consider that the secret client's value is only available until the first time you sign off the Azure Portal after the secret client creation. After that, it will be no longer visible.In case you lost the value, please create a new client secret as suggested above and use it in the steps below.
Microsoft 365 Groups mailbox to Microsoft 365 Groups mailbox (Conversations)
Certain M365 Group migration projects now require a more secure and structured configuration. This includes creating an application in Azure/Entra ID, configuring a Client Secret, and, in some cases, assigning the Exchange Administrator role to the application.
The following scenarios apply to these changes:
Delegated Permissions for Microsoft 365 Groups Projects
This section details the changes for API Permissions applications Microsoft 365 Groups Projects.
Limitations
- App password usage, MFA/2FA, SSO, and ADFS are not supported for the migration service account when using Application Permissions. However, users being migrated to your project can have these security features enabled.
- Client Secret is now a mandatory field when configuring the application registration.
Step One - Create a New Application Registration
Create a new Application Registration in the Microsoft 365 tenant source or destination.
- Log in to the Microsoft Entra admin center with a Global Administrator login.
- Click View all products and select Microsoft ID (Azure AD) in the Microsoft Entra Admin Center.
- In the left sidebar, open the Applications dropdown list and select App Registrations, which is found under the Identity dropdown list.
- Select New Registration at the top of the screen.
- Give the app a distinct name. You can change this later if necessary.
- Select the Accounts in this organizational directory ('Tenant name only' - Single tenant) radio button.
- Click Register.
- Under the Manage menu, select Authentication (preview).
- Select the Settings tab.
- Set the option Allow public client flows to Enabled.
- Under the Supported Account types, select Accounts in this organizational directory ('Tenant name only' - Single tenant).
- Click Save.
Step Two - Assign the API Permissions and Grant Admin Consent
The following steps allow you to assign the API permission and grant consent to the necessary M365 components.
- From the Manage menu, select API permissions.
- Click Add a Permission.
- Select APIs my organization uses.
- Scroll down or search Office 365 Exchange Online.
- Select Application permissions.
- Check the box under Other Permissions and add full_access_as_app.
- Click Add Permissions.
- Scroll down or search Office 365 Exchange Online.
- Select Delegated permissions and add EWS.AccessAsUser.All
- Click Add Permissions.
- Click Grant admin consent.
- Click Yes to confirm the settings. Under the Status column, you should see a message that permission has been granted for the domain.
Your API permissions should look like the below:
Step Three - Obtain the AppID and TenantID from the Application Registration
Follow the steps below to obtain the AppID and TenantID from the Application Registration.
- Navigate to the App Registrations item as shown below. In the Overview tab, you will find the Application (client) ID and the Directory (Tenant) ID.
- Copy both of these to another application, such as Notepad, for use later in this process. This is needed for the MigrationWiz Project Setup.
Step Four - Create a Client Secret
Create a Client Secret for the application by following the steps below.
- Go to Manage > Certificates & secrets from the left sidebar.
- Create a new secret client by clicking + New client secret.
- Copy and save the client secrets' value on a notepad or other preferred tool.
Warning
Consider that the secret client's value is only available until the first time you sign off the Azure Portal after the secret client creation. After that, it will be no longer visible.In case you lost the value, please create a new client secret as suggested above and use it in the steps below.