Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Important
Tenant-to-tenant migration is currently available in preview. Features and availability may change before general availability (GA).
Prerequisites for source and target tenants
This article walks through all steps of preparing the tenants and users for a successful migration. Here are some other requirements we don't provide explicit steps for:
Global administrator access for source and target admins on their respective tenant, which is required to manage the setup and migration.
At least one mail-enabled security group is required in the source tenant.
- These groups are used to:
- Scope the list of users whose content can move from source tenant to the target tenant.
- Inform the identity mapping service what users should be mapped.
- This scoping allows the source tenant administrator to restrict access to a specific set of users whose content needs to be moved, preventing unintended users from being migrated or their data accessed.
- These groups are used to:
The Microsoft 365 tenant ID of your trusted partner organization. This tenant ID is used in the Organization Relationship DomainName field.
To obtain the tenant ID of a subscription, sign in to the Microsoft 365 admin center and go to Active Directory > Properties. Select the copy icon for the Tenant ID property to copy it to the clipboard.
Prepare both tenants for Mailbox migration
To prepare tenants for mailbox moves, see Cross-tenant mailbox migration.
Prepare both tenants with Migration applications and permissions
To enable migration, add the applications for Cross-Tenant Migration Service, OneDrive Migration, Teams Chat Migration, and Teams Meeting Migration, add permissions to those applications, and run additional setup steps.
The following modules are prerequisites to importing the CrossTenantMigration module.
Microsoft.Graph.Authentication
Microsoft.Graph.Applications
Microsoft.Graph.Identity.DirectoryManagement
ExchangeOnlineManagement
MicrosoftTeams
Microsoft.Graph.Beta (minimum version 2.33.0)
Microsoft.Graph and Microsoft.Graph.Beta versions should all be the same.
For both tenants, perform the following steps:
Download the CrossTenantMigration NuGet package
Expand the CrossTenantMigration NuGet package and import the modules
Expand-Archive -Path ".\CrossTenantMigration.nupkg" -DestinationPath ".\CTModule" -Force
Import-Module -Name ".\CTModule\CrossTenantMigration" -Force
Set up the Cross-Tenant Migration Service Application on the target tenant only. Run
Grant-CTMSAppPermissionsSet up the OneDrive Migration Application. Run
Grant-OneDriveSharePointMigrationPermissionsSet up the Teams Chat Migration Application. Run
Grant-CTTMAppPermissionsSet up the Teams Meeting Migration Application. On the source tenant, run
Grant-MMSAppPermissions -TenantType "source"On the target tenant, runGrant-MMSAppPermissions -TenantType "target"Turn on auto forwarding for meeting migration. Run
Enable-AutoForwardingModeSet calendar role-based access control (RBAC) roles on the target tenant only. Run
Set-CalendarRBACRoles
Prepare both tenants for OneDrive migration
Important
These instructions must be run from both the source and the target tenant.
The required setup steps for OneDrive Migration on both source and target are available in Steps 1 - 3 of its public documentation. These steps establish trust for the tool and between tenants.
Prepare both tenants for Teams Chat Migration
Important
These instructions must be run from both the source and the target tenant.
Install Microsoft Teams PowerShell: Install Microsoft Teams PowerShell.
Connect to Microsoft Teams PowerShell:
Connect-MicrosoftTeamsFederated users must be allowed. Run the cmdlet:
Set-CsTenantFederationConfiguration -AllowFederatedUsers $TrueIf the tenant is a Trial tenant, it must also allow External Access. Run the cmdlet:
Set-CsTenantFederationConfiguration -ExternalAccessWithTrialTenants "Allowed"Confirm the settings by running:
Get-CsTenantFederationConfiguration
Prepare both tenants for Identity Mapping
Important
These instructions must be run from both the source and the target tenant.
Running Identity Mapping is a required step for migrating user data. Cross-Tenant Identity Mapping (CTIM) is a tool that allows source users to be mapped one-to-one to target users. It edits the users' properties, so they have the correct properties to successfully migrate. It also maintains a mapping file to reference so that the data for the correct source users is migrated to the correct target users.
To learn more about Identity Mapping, see Cross-Tenant Identity Mapping.
Important
Use CTIM after creating target users and before migrating data to ensure accuracy and avoid manual errors.
What permissions are added?
When you run the tenant configuration steps, there are many permissions added to your tenant and applications.
Cross-Tenant Migration Service (CTMS) permissions
The CrossTenantMigration Production AAD app is added with service principals. The Resource Identity Mapping service app service principals are added. The identity mapping service app role is granted to the CTMS app.
OneDrive permissions
The following are retrieved when setting permissions: the SharePoint Online (SPO) resource app service principal, the migration app service principal, and the cross-tenant identity mapping (CTIM) app service principal.
Teams Chat Migration (CTTM) permissions
The CTTM permissions granted are as follows:
- Cross Tenant Teams Migration app role
- Identity Mapping Service app role
- Chat.Create
- Chat.Read.All
- Teamwork.Migrate.All
- ChatMember.ReadWrite.All
- User.Read.All
- CrossTenantMigrationAuthorization-Internal.Read
Teams Meeting Migration (MMS) permissions
Grant-MMSAppPermissions adds Service Principals for:
Cross Tenant Teams Migration app
Meeting Migration Service app
Identity Mapping Service app
Grant-MMSAppPermissions adds App Roles for:
- Cross Tenant Teams Migration app role from Cross Tenant Teams Migration app assigned to target Meeting Migration Service App
- Identity Mapping Service app role from Identity Mapping Service app to target Meeting Migration Service app
- CrossTenantMigrationAuthorization-Internal.Read
Grant-MMSAppPermissions adds the Graph permissions for:
- Online.ReadWrite.All
- User.Read.All
- RoleManagement.Read.Directory
- Chat.ReadBasic.All
- Application.Read.All
Grant-MMSAppPermissions also adds the Exchange Admin Directory Role and Application access policies to MMS Application.
Enable-AutoForwardingMode turns autoforwarding is set to On for Default Outbound Spam Filter.
Set-CalendarRBACRoles assigns an RBAC role to the MMS App to allow Calendar Read Write Permissions.
Teams Chat Migration (CTTM) permissions
The CrossTenantMigration Production Azure Active Directory (AAD) App is added with service principals. The Resource Identity Mapping service app service principals are added. The Identity Mapping service app role is granted to the CTMS app.
Next steps
For information on preparing users for migration, see Preparing users for tenant-to-tenant migration.