Microsoft Azure Storage Platform Prerequisites


Currently, only owned items will be migrated.



Microsoft Azure Storage supports every source platform and every item type for storage.


General and Source Platform prerequisites 

You will be required to be logged in with a Microsoft account on the tenant you wish to migrate to.  

Destination Platform prerequisites

Setting up a Storage Bucket

  1. Sign in to Microsoft Azure Home.
  2. Open the Portal menu, using the Hamburger menu icon.
  3. Select Storage Accounts.
  4. On the Storage Accounts screen, select Create
  5. On the Basic tab, enter the following information:
    • Subscription - Select the subscription for the new storage account.
    • Resource Group - Create a new resource group for this storage account, or select an existing one
    • Storage Account Name - Choose a unique name for your storage account. Storage account names must be between 3 and 24 characters in length and may contain numbers and lowercase letters only.
    • Region Select the appropriate region for your storage account.



  1. On the Advanced tab, set Access Tiers to either HOT or COOL, as required. 
  2. On the Data Protection tab, you can configure data protection options for blob data in your new storage account. These options can also be configured after the storage account is created.
    • In CloudM Archive, the data retention rules can be rewritten using the Data Retention policies.
  3. Once you have configured these settings, select Review + Create, and then select Create again.
  4. The Storage Account will be created. This process can take a couple of minutes to complete.
  5. You will need to navigate back to the Storage Accounts screen.
  6. Click on the name of the newly created account in the list of Storage Accounts.
  7. In the menu, scroll down and select Blob Services > Containers.
  8. Now, select the + Container button,
  9. In the pop up screen, enter:
    • Name - A unique name for the container
    • Public Access Level - Set to Private
    • Advanced Settings > Encryption Scope - Leave as default.
  10. Click on Create.



  1. On the same Storage Account page, select the Settings > Access Keys menu option.
  2. In the Access Keys page, click on the name of the newly created key and then click again on the current version.
  3. Select the Show Keys button at the top of the screen.
  4. Copy the value in the Key 1 > Key field. You will need this value later so you should copy into a document or notepad application.



Setup Azure Key Value (optional - only complete if requiring encryption)

We don't require you to use encryption, but you can use the following process if it is required.

Use the same method (either using encryption or not using encryption) throughout your project to avoid issues.

  1. In the Search bar at the top of the screen, enter Key Vaults and select the Key Vaults option.
  2. On the Key Vaults screen, select Create.
  3. Under the Basics tab, enter the Subscription, Resource Group and Name.
  4. Select Create + Review, and then select Create again,
  5. When the Key Vault is being created, you will be taken away from the Key Vaults section so navigate back to Key Vaults using the Search bar.
  6. On the Key Vaults screen, select the newly created Key Vault.
  7. Select Keys.
  8. Select Generate.




  1. Click on the newly created key, copy the key identifier without the version info at the end. This is the value for the CloudM Migrate Key Vault URL setting.


  1. Navigate to Azure Active Directory -> App Registrations, and select New registration.


  1. Fill out the details and select Register.
  2. On the App Registration screen, click on the name of the newly registered application.
  3. Select API permissions from the menu on the left side of the screen.


  1. Select Add a permission and add either of the following:
    • User Read
    • user_impersonation
  2. In the menu on the left, select the Certificates & Secrets option. 
  3. Select New client secret and copy the Secret ID. This is the value for the CloudM Migrate Azure key vault client secret setting.


  1. In the left side menu, select Overview, and copy the Application (client) ID for the CloudM Migrate Azure key vault client ID setting.


  1. Return to Home > Key Vault,
  2. Ensure that the Permission Model is set to Vault access policy,
  3. Select + Add Access Policy,
  4. On the Add access policy screen, make sure that the Select principal value is set to the required Application (as set in step 4 and 5),
  5. Ensure that the Key Permissions field is set to GetDecryptEncrypt and Unwrap Key.
  6. Select Add.




Was this article helpful?
0 out of 0 found this helpful