Home / Platform Considerations

Microsoft Exchange 2010 – 2019 (EWS) Considerations

Transend supports migrating to or from Exchange versions 2010 – 2019 via Exchange Web Services (EWS).

When performing a migration of bulk users using a migration account with administrator rights (so that you don’t need end-user passwords), you will need to assign an Application Impersonation role to your migration account in Exchange Server via EWS, Exchange Web Services over port 443 (HTTP or HTTPS).

Assign impersonation to your migration account using the Exchange Management Console, or use Exchange PowerShell. Impersonation allows you to migrate user accounts using the migration account’s login and password so that you do not have to provide user passwords.

Setting up Impersonation in Exchange Management Console

Create an Admin Role from the Exchange Admin Portal:

  1. Sign-in to the Exchange Admin Center using an Admin account.
  2. Click Permissions from the menu on the left hand side of the screen.
  3. Click on Admin roles from the top menu.
  4. Click on the Add a new Admin Role Group icon.
  5. Name: Transend Migration Console
  6. Select: ApplicationImpersonation Role
  7. Add the migration acccout: migration@domain.com (or name the account whatever you desire)
  8. Click Save.
  9. Add the Impersonation account email address and password into the configuration Settings in Transend Migration Console and click Verify.

Note: Depending on your authentication, the impersonation service account may be:

  • UPN name
  • Email address
  • Domain\username

Alt text

Use PowerShell to Assign Application Impersonation

Alternatively, you may assign impersonation to your migration account using Exchange PowerShell.

  1. Open the Exchange Management Shell.
  2. Run the New-ManagementRoleAssignment cmdlet to add the permission to impersonate to the specified user.
  3. Change “ServiceAccount” to the account you are assigning impersonation to.

The following example shows how to configure Application Impersonation to enable an administrator account to impersonate all user accounts in an organization:

Example:
New-ManagementRoleAssignment –Name:impersonationAssignmentName –
Role:ApplicationImpersonation –User:serviceAccount