NOTE: Oversized attachments are defined using the maximum size limit for attachments that is set in the Data Migration Wizard on the Select Date and Size Filters screen. |
• |
One-click registration: Click this button to automatically register the MNE application with the Microsoft Azure portal. The Client ID, Client Secret, and Tenant fields are automatically populated. Once registration is complete, you can click Save to store the settings in the MNE database and in the INI settings. |
• |
Follow instructions to manually register the App: You must perform the steps in Manually registering the MNE application with the Microsoft Azure portal to manually register Migrator for Notes to Exchange with the Microsoft Azure portal site. It is important that you note the Application (client) ID and client secret that is assigned since you must enter them, along with Office 365 Tenant name, in this page. |
Register with Exchange admin user credential: Selected by default. Used if you want to register the MNE application using the Exchange account that you entered as the Exchange administrator under Exchange credentials. The specified account is used to connect to the Microsoft Azure portal and register the application.
Grant admin consent: Click this button to ensure the requested permissions needed to access the Microsoft OneDrive stores and migrate attachments to the stores are granted to the application. When the Microsoft screen listing the requested permissions for your tenant is displayed, click Accept. A confirmation message appears. Click Yes.
• |
Office 365 Tenant: Your Office 365 tenant name. For example, Sitraka.onmicrosoft.com. |
• |
Registered App Client ID (SSDM): The application ID created with delegated permissions after the application is registered in the Microsoft Azure portal. It is automatically populated if you used the one-click registration. With the manual registration process, the client ID that you enter for the SSDM is the same as the Registered App Client ID. |
• |
Registered App Client ID: The Application ID created with application permissions after the application is registered in the Microsoft Azure portal. |
• |
Registered App Client Secret: The Application Secret created after the application is registered in the Microsoft Azure portal. |
Show App Client Secret: When the check box is selected, the App Client Secret value is not masked but is displayed so that you can make note of the client secret value to use if you are manually registering the application with Microsoft Azure.
To find your Office 365 tenant name, log in into Office 365 Admin Center as an administrator. Under Settings, click Domains and find a domain which ends in .onmicrosoft.com. This is your Office 365 tenant name, for example Sitraka.onmicrosoft.com.
The process of registering an application with the Microsoft Azure portal is also described in the Microsoft topic Register an application with the Microsoft identity platform.
1 |
• |
Name: For example, Quest Migrator for Notes to Exchange. |
• |
Supported account types: Select Accounts in any organizational directory (Any Azure AD directory - Multi tenant) |
• |
Select Public client/native (mobile & desktop) |
• |
Enter a URI: https://login.microsoftonline.com/common/oauth2/nativeclient |
4 |
Click Register. |
• |
Application (client) ID: The Application ID created after the application is registered in the Microsoft Azure portal. You must copy this ID and use it later to complete the App Registration. |
5 |
a |
Select Application permissions on the right. |
b |
From the list, expand Files, select Files.ReadWrite.All and click Add permissions to grant application permission. |
c |
Go back to add a permission for Microsoft Graph under Microsoft APIs and select the left box Delegated permissions. |
d |
From the list, expand Files, select Files.ReadWrite and click Add permissions to grant delegated permission. |
7 |
On the App registrations main page, click Certificates & secrets. |
8 |
Under Client secrets, click New client secret |
10 |
Click Add to generate the client secret. |
12 |
On the App registrations main page, click API permissions. |
13 |
14 |
Click Yes. |
15 |
On the App registration main page, click Authentication. |
16 |
17 |
On the Microsoft Azure App Registration page in MNE, enter the values that were assigned for: |
• |
Registered App Client ID: The Application ID created with application permissions after the application is registered in the Microsoft Azure portal. |
• |
Registered App Client Secret: The Application Secret created after the application is registered in the Microsoft Azure portal. |
• |
Office 365 Tenant: Your Office 365 tenant name. For example, Sitraka.onmicrosoft.com. |
• |
Registered App Client ID (SSDM): The application ID created with delegated permissions after the application is registered in the Microsoft Azure portal. With the manual registration process, the client ID that you enter for the SSDM is the same as the Registered App Client ID. |
18 |
Click Save. |
Click Apply after you enter new information or changes to existing information. The program does not read or save any new information or changes until Apply is clicked.
• |
Automatically grant permissions: The access credentials must be an Active Directory administrative account that is a member of the Exchange Organization Management role group, is configured with remote PowerShell enabled, and has full access to the target Organizational Units (OUs). You can use this option to automatically grant the required permissions to the specified account. |
• |
Global Catalog host name: Specify a Global Catalog (GC) at a level higher than all the users, groups, and contacts to be migrated. If you have multiple Global Catalogs/Domain Controllers in an AD forest, you can choose any GC as long as it is in the same domain. |
• |
Domain Controller host name Specify the Domain Controller that is used to read data from or write data to Active Directory. |
• |
User name and Password: The access credentials used to authenticate the administrator by whose authority the program accesses Active Directory. |
• |
Always use these values: Select this check box if the wizards will always use these credentials. If this box is selected, the wizard skips the screen that requests credential information. If the check box is empty, the wizard retrieves the values entered here as defaults, but will display the screen to offer the option of accepting or changing the default credentials. |
• |
Path to existing organizational unit for distribution groups: Fully qualified domain name (FQDN) for the group organizational unit (OU) path. |
• |
Path to existing organizational unit for creating external members for distribution groups: Fully qualified domain name (FQDN) for the path for an existing organizational unit (OU) to which group members will be assigned when a member must be created as a new AD contact (when there is no corresponding AD user account). |
• |
Create user objects in Active Directory: Determines whether the Provisioning Wizard will create a new user object in AD when none is found to correspond with a user in the collection. Such new user objects are created in the container specified by the Path to existing organizational unit for creating user objects text box. Ordinarily the objects created are not mail-enabled, although the EnableUsers parameter (in Task Parameters) can be set to 1 to change that default behavior. |
• |
Path to existing organizational unit for creating user objects: Click Browse to find and specify the relative domain name for an existing organizational unit (for example, cn=users) where any new user objects will be created in AD (when a wizard encounters a contact for which there is no existing corresponding AD user account). |
• |
Use resource/user forest: If your target environment is configured for a resource forest and a user forest with corresponding user accounts, you must provide these credentials for the Data Migration Wizard to enable mailboxes and to associate the resource accounts with the user accounts. The credentials specified here identify the user forest, while the credentials specified for AD credentials pertain to the resource forest. |
NOTE: In addition to specifying the User forest credentials here, you must also add a set of parameters to the configuration data for the Data Migration Wizard, explained in Appendix A of the Migrator for Notes to Exchange Administration Guide—see the topic How do I prepare the SQL database for mailbox-enabling (if AD is configured for a resource forest and a user forest)? |
• |
Global Catalog host name: The name of the AD server. |
• |
User name: The user ID of the administrator who will be running the migration program, by whose authority the program accesses the user forest AD. This entry must be the SAM Account name, not the UPN. |
• |
Password: The password associated with the user name. |
• |
Apply: Reads and saves new or changed information. Any new information or changes are discarded if you do not click Apply before you exit. |
• |
More info: Launches the Log Viewer to display the associated log file. This button is enabled only if the program encountered significant errors or warnings that require resolution before continuing in the migration. If no significant errors or warnings are encountered, the button is dimmed (unavailable). |
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center