How the SharePoint Migration Tool works

The SharePoint Migration Tool (SPMT) authenticates to the destination tenant. You're then prompted for the source file location and the destination SharePoint site collection. After you select Migrate to submit the migration jobs, the steps to scan, package, upload, and import run in parallel across all files targeted for migration.

Note

Use a Site Collection administrator account on the target SharePoint site when you're prompted for credentials.

Authentication: After you open the tool, you must first authenticate to the destination, which is the tenant you'll migrate your files to. Providing your user name and password to the tenant associates the migration jobs you submit to this account. This functionality allows you to resume your migration from another computer, if needed, by logging in with the same credentials. This account should be a site admin of the destination you're migrating to. The following authentication methods are supported:

  • NTLM
  • Kerberos
  • Forms
  • ADFS
  • Multi-factor authentication
  • SAML-based claims
  • Client certificate authentication

Important

If multiple authentication methods including NTLM or Kerberos are enabled in the on-premises SharePoint Web Application, NTLM and Kerberos authentication aren't supported by the SharePoint Migration Tool. Use a secondary form of authentication, or convert the Web Application to use NTLM and/or Kerberos authentication only.

Scan: After you select Migrate, every file is scanned, even if you decide not to migrate your files. The scan verifies that you have access to the data source and write access to the SharePoint destination. It also examines the files for potential known issues.

Packaging: In the packaging stage, a content package is created that contains a manifest.

Upload: In the upload stage, the content package is uploaded to Azure along with the manifest. Before a migration job can be accepted from a SharePoint-provided Azure container, the files and manifest are encrypted at rest using the AES-256-CBC standard.

Import: During the import phase, the key is provided to SharePoint SAS. Only Azure and SharePoint interact to fetch and migrate the data to the destination. This process is timer job-based but doesn't prevent other jobs from being queued up. During the import, a report is created in the working folder, and live updates occur. After the migration job is completed, the log is stored in the Azure container, and a final report is created.

Session and resume: While the migration run, the tool saves information about the session in a hidden list on the user's OneDrive. This information enables the migration tool to resume previous migration sessions.

Encryption and security

During the upload and import phases, data is encrypted, and Azure containers and keys are generated.

Important

The SharePoint service and a select number of engineers can run maintenance commands, but they don't have direct access to the accounts. Our datacenter technicians don't know how the data is laid out on disk and don't have ready access to equipment to mount disks. All drives are physically destroyed before they leave the datacenters. Physical security is also in place at all datacenters.

Each container is dedicated to a customer and not reused. The data is stored in the Azure blob for 4 to 30 days, and then it's deleted. When the data is deleted, the files are delinked and later soft-deleted from disk. A file in an account and on disk may be shared across many servers. The same process is used for replicas, including backup copies (geo-replicated data, if applicable).

A random, single-use default container key is generated programmatically and is only valid for three days. This key is the only way to gain access to the container. SharePoint never stores the key.

The container itself lives longer than the key. The container is purged 30 to 90 days after its creation. The container is housed in shared Microsoft storage outside the tenant but within the region. It's protected by the container key. For "multi-geo" customers, containers are generated based on the destination URL to dictate what geo it will be stored in.

There are two defenses in place that protect you if your key is lost or someone else obtains it. First, the container only enables read/write operations. The container has no list. You would need to know the details of the files in the container to read them or write to them. Second, the files are encrypted at rest by using AES-256-CBC.

Important

Only users who have the key have access to the container. Other users in the subscription or tenant don't have access.

Note

The SharePoint Migration Tool isn't available for users of Office 365 operated by 21Vianet in China.