10 min readHow to Migrate SharePoint Permissions Between Tenants Without Breaking Access

10 min readHow to Migrate SharePoint Permissions Between Tenants Without Breaking Access

If you’re planning a tenant-to-tenant SharePoint migration, one question matters immediately: Will permissions survive the move? 

That concern is justified. Permissions control access across sites, libraries, folders, lists, and individual items in SharePoint Online. If they are not migrated correctly, users can lose access to important content or gain access they should not have. A successful SharePoint permissions migration depends on a clear permission inventory, accurate identity mapping, and validation after cutover. 

This guide explains how to migrate SharePoint permissions during a cross-tenant move. It covers permission levels and scopes, inherited versus unique permissions, identity mapping between source and target Entra ID tenants, the 5,000 unique permission scope limits, and the steps needed to preserve access. For the broader project plan, see our Microsoft SharePoint to SharePoint Online migration guide

Why SharePoint Permissions Migration Is High Risk 

Permissions in SharePoint Online can be assigned at the site, library, list, folder, or item level. Many objects inherit permissions from a parent, while others use unique access settings. During a tenant-to-tenant migration, that structure becomes harder to preserve because the destination tenant has its own users, groups, and policies. 

The biggest risks are: 

  • Permissions spread across multiple levels that must each be recreated correctly in the target tenant. 
  • Broken inheritance chains where unique access settings need to be identified and mapped individually. 
  • Source identities – users, security groups, Microsoft 365 groups that do not exist automatically in the target Entra ID directory. 
  • Excessive unique permissions that push lists and libraries toward SharePoint Online’s platform limits. 
  • Heavily customized environments where years of ad hoc sharing and workflow-driven access create hidden complexity. 

Because of this, a migration can move content successfully while still leaving access problems behind – problems that surface only when users try to open files they could access yesterday. 

Understanding SharePoint Permission Levels and Scopes 

Before Microsoft 365 SharePoint, identify where permissions exist and how they behave. 

Inherited vs. Unique Permissions 

By default, SharePoint objects inherit permissions from their parents. A library may inherit from the site, and files may inherit from the library. This is usually easier to manage and migrate. 

When inheritance is broken, the object gets unique permissions. That means the folder, list, library, or item has its own access settings instead of following the parent. 

Inherited permissions are generally easier to recreate. Unique permissions need to be identified, mapped, and validated individually, which increases migration effort significantly. 

SharePoint Permission Levels 

SharePoint Online uses SharePoint permission levels such as Full Control, Edit, Contribute, and Read. These determine what users can do once access is assigned. 

If the source environment uses custom permission levels, review them before migration and recreate or map them in the target tenant. Custom levels that exist in the source but not the target will result in users losing that specific access after cutover. 

How Permissions Work at Each Level 

Site-Level Permissions 

SharePoint Site-level permissions control broad access through owners, members, and visitors groups. If these assignments are wrong in the target tenant, all inherited access below the site can be affected. 

Library and List-Level Permissions 

Libraries and lists can inherit from the site or use unique permissions. These are commonly used when one team needs separate access to specific content within a shared site. 

Folder-Level Permissions 

Folders can also break inheritance. This is common in shared libraries, but each uniquely secured folder adds another permission scope that must be tracked and recreated. 

Item-Level Permissions 

Files and list items may also have unique permissions. These are often the hardest to manage because they tend to come from ad hoc sharing, approval workflows, or old exceptions that no one remembers creating. 

In most M365 SharePoint migrations, folder-level and item-level permissions need the closest review because they carry the highest risk of being missed or incorrectly mapped. 

The Identity Mapping Challenge Across Tenants 

One of the most common reasons permissions fail during SharePoint Tenant migration is identity mismatch. 

Even if the permission structure is copied perfectly, access still depends on valid identities in the destination tenant. A source user, security group, or Microsoft 365 group cannot simply be assumed to exist in the target. Azure AD SharePoint permissions – now managed through Entra ID (formerly Azure AD) – depend on directory identities that must be mapped correctly between tenants. 

Identity mapping problems usually appear in familiar scenarios. A merger may require two separate directories to be unified. A restructuring may introduce new UPNs, renamed accounts, or changed group structures. In other cases, the issue is less visible: former employees still hold unique permissions on files, or guest users in the source tenant no longer exist in the target environment and need to be re-invited. 

These issues matter because permission migration depends on identity continuity. If the right person or group does not exist in the target tenant in the expected form, the permission structure may migrate while effective access still fails. 

How to Map Users and Groups Between Tenants 

1. Export Source Permissions 

Generate a report of users, groups, and permission assignments from the source SharePoint environment, including site, library, folder, and item-level access where relevant. 

2. Export Target Entra ID Identities 

Export users, security groups, and Microsoft 365 groups from the target tenant, so you can identify mismatches before migration begins. 

3. Build a Mapping File 

Create a CSV that maps each source identity to the correct target identity. Include user accounts, security groups, Microsoft 365 groups, and any service accounts that affect SharePoint access. 

Before finalizing the mapping, confirm that your migration roles and licenses are configured correctly in Apps4.Pro Migration Manager. 

4. Resolve Exceptions 

For unmatched accounts, decide whether access should be reassigned to a successor, removed entirely, recreated through a target group, or handled later through guest re-invitation. Every unmatched identity needs an explicit decision – leaving them unresolved leads to silent access failures. 

5. Validate Group Membership 

Matching group names is not enough. The target groups also need the correct members. A security group that exists in both tenants but has different membership will produce different access results. 

6. Run a Pilot 

Test representative content before full cutover and confirm that mapped users and groups can access the correct content at every intended permission level. Tools like Apps4.Pro Migration Manager can automate much of this identity mapping and validation process, reducing the manual effort involved in building and testing mapping files across large environments. 

The Unique Permission Scope Limit 

SharePoint Online enforces a limit of 5,000 unique permission scopes per list or library. A unique scope is created every time inheritance is broken on a file, folder, or list item. 

Libraries usually reach this limit gradually, not all at once. Item-level permissions added through Power Automate approvals, repeated use of “Share with specific people,” folder-by-folder security, and years of one-off exceptions can all push a library toward the threshold without admins noticing until permission changes start failing. 

The most effective way to reduce this risk is to clean up before migration. Audit lists and libraries with reporting tools or PowerShell, reset inheritance where unique access is no longer needed, and move highly restricted content into separate libraries or sites where permissions can be applied more cleanly. If automation is repeatedly breaking inheritance, review whether that design should be changed before cutover. Our SharePoint security best practices guide covers practical ways to reduce this kind of permission sprawl. 

Step-by-Step SharePoint Permissions Migration Between Tenants 

1. Inventory the Existing Permission Model 

Document site owners, members, and visitors, unique permissions on libraries and lists, broken inheritance on folders and items, custom permission levels, guest access, and service accounts. This work aligns naturally with a broader SharePoint site migration checklist

2. Clean Up the Source Environment 

Remove orphaned users, obsolete groups, unused custom permission levels, unnecessary broken inheritance, and outdated guest permissions. The cleaner the source, the fewer surprises in the target. 

3. Prepare Identity and Group Mapping 

Build and validate mappings for users, groups, guests, and service identities before migrating content. Every unresolved mapping becomes a potential access failure after cutover. 

4. Coordinate with Metadata and Business Logic 

Permissions often interact with views, approval flows, and metadata-driven processes. Plan this alongside your SharePoint metadata migration work to avoid conflicts where a permission change breaks a workflow or vice versa. 

5. Prepare the Target Tenant 

Set up target groups, permission levels, sharing policies, site structure, and governance settings before migration begins. 

6. Run a Pilot Migration 

Choose sites with realistic complexity, including unique permissions at different levels. If your environment uses guest access, review how SharePoint external sharing should work after cutover. 

7. Validate Effective Access 

Do not stop at confirming that content exists in the destination. Test real access for owners, editors, readers, and restricted users across representative sites. 

8. Migrate in Phases 

For larger environments, migrate in batches and validate permissions after each phase rather than discovering problems at the end. 

9. Perform a Post-Migration Permission Audit 

Compare target-side reports against the source and look for missing users, incorrect group assignments, broken unique permissions, unexpected inherited access, and incomplete mapping results. 

Mistakes That Create Post-Migration Access Problems 

Most post-migration permission issues come from a small set of avoidable mistakes. The first is assuming permissions will transfer automatically. Without proper identity mapping and validation, users may lose access or inherit the wrong permissions even when the content itself migrates successfully. 

Another common problem is ignoring permission sprawl until it is too late. Libraries with excessive unique scopes, custom permission levels that were never recreated, and service accounts tied to flows or integrations can all break access in ways that are difficult to diagnose after cutover. Guest access is another area that often gets overlooked, because external users in the source tenant may need to be re-invited or intentionally removed in the target. 

Just as important, teams sometimes treat validation as optional. In practice, permissions migration is not complete when content appears in the destination. It is complete when the right users can access the right content, and nobody else can. 

Migrate Permissions with Confidence Using Apps4.Pro 

These challenges are exactly why SharePoint Online permission migration often becomes one of the hardest parts of a tenant-to-tenant SharePoint move. The content itself may migrate successfully, but identity mapping, permission recreation, scope validation, and post-migration verification still require significant admin effort. 

Apps4.Pro Migration Manager helps reduce that effort by supporting cross-tenant identity mapping, preserving existing permission structures across sites, libraries, folders, and items, and identifying libraries with excessive unique permission scopes before they become a larger problem. 

It also ensures that source permissions are accurately migrated to the target tenant while allowing you to create and apply new permission structures where needed. 

Built-in reporting gives your team a clearer way to validate access before and after cutover. 

Instead of relying on manual tracking and post-migration cleanup, your team gets a more controlled and auditable migration process. 

👉 Start Your SharePoint Migration with Apps4.Pro

Frequently asked Questions? 

Do permissions transfer automatically during SharePoint migration? 
Not automatically. Permissions only carry over correctly when users and groups are mapped properly between the source and target tenants.
How do I map Active Directory users to Entra ID during migration? 
Export users and groups from both tenants, then create a mapping file that matches each source account to the correct target account.
What is the unique permission scope limit in SharePoint Online? 
SharePoint Online allows up to 5,000 unique permission scopes per list or library. If that limit is exceeded, permission changes become difficult until inheritance is cleaned up.

Migrate Everything to Microsoft 365

Exchange Online SharePoint Online OneDrive For Business Microsoft Teams Microsoft Planner Viva Engage (Yammer) Microsoft Bookings Microsoft Forms Power Automate Microsoft Power BI Exchange Online SharePoint Online OneDrive For Business Microsoft Teams Microsoft Planner Viva Engage (Yammer) Microsoft Bookings Microsoft Forms Power Automate Microsoft Power BI
  • No Data Loss
  • Zero Downtime
  • ISO-Certified Protection

Start your free 15-days trial today !


4.5 out of 5

Bot Logo

Apps4.Pro Bot

Hey!👋 Ready to make your Microsoft 365 migration journey easier? Tell me what you’re looking.

What gets migrated?
I have a sales question
I'm here for tech support
Learn about Apps4.Pro