Navigation with migRaven

References for navigation and workflow in migRaven

Start display

Illustration: Navigation in migRaven

1. Workflows in work steps in migRaven

After the start-up, first of all the AD must be scanned. migRaven works with a copy of your AD, which migRaven creates in its graph database. If you have new objects in your AD, you must carry out a re-scan in migRaven, in order to receive an updated snapshot of your AD.

Secondly the authorizations must be configured in the group configuration. Following is important:

  • Determination of a new AD-OU, in which the authorization groups are created
  • The determination of the group of the authorization groups: as universal, global or local groups
  • The prefix, group type, server name, share name, directory name and suffix for the access rights to the directory

Then you can select one of the project types:

  • Migrate by Scan for the Windows File Server share.
  • Novell Migration for the migration of Novell directories in a windows share.
  • Bulk import for writing the authorization data from a table in a windows share.

2. Work steps and status within a project

The progress within a project is marked by the project status. Your project achieves a new status as soon as the given work step has been successfully completed.

working step Description status
start your project enter project name, source (depending on the project type) and the target share
Read in Scan permission data 0
View current situation Visualization of the scanned permission data
Design & Work Based on the scanned permissions, migRaven creates a new folder & permission group structure (according to MS Best Practice) and stores the data in its database 1
View new structure Visualization of the new folder & permission structures
Deploy Groups In this step, the changes are applied to your live system. 2
Deploy ACL The new directory tree is written in the corresponding ACLs. 3
Deploy Data migRaven manages the copy-process for your data with automatic RoboCopy scripts that fits your folder structure.

3. completion

After you have the authorizations in the target share and meet your expectations, you must copy your data and properly identify the source and target share.

Permanent link to this post: