Skip to content

Commit 764ac24

Browse files
Merge pull request #302941 from habibaum/18Jul-server-permission-updates
Server permissions - remove
2 parents 315c620 + 2603ff1 commit 764ac24

File tree

3 files changed

+5
-80
lines changed

3 files changed

+5
-80
lines changed

articles/migrate/migrate-support-matrix-physical.md

Lines changed: 1 addition & 76 deletions
Original file line numberDiff line numberDiff line change
@@ -37,80 +37,6 @@ Assessment | You can add up to 35,000 servers in a single group.<br/><br/> You c
3737
3838
- **Operating system:** All Windows and Linux operating systems can be assessed for migration.
3939

40-
## Permissions for Windows servers
41-
42-
- For Windows servers, use a domain account for domain-joined servers and a local account for servers that aren't domain joined.
43-
- For physical discovery, specify the username in Down level format (domain\username) and UPN format ([email protected]) is not supported.
44-
45-
You can create the user account in one of the following two ways.
46-
47-
### Option 1
48-
49-
Create an account that has administrator privileges on the servers. Use this account to:
50-
51-
- Pull configuration and performance data through a Common Information Model (CIM) connection.
52-
- Perform software inventory (discovery of installed applications).
53-
- Enable agentless dependency analysis by using PowerShell remoting.
54-
55-
> [!Note]
56-
> If you want to perform software inventory (discovery of installed applications) and enable agentless dependency analysis on Windows servers, we recommend that you use Option 1.
57-
58-
### Option 2
59-
60-
- Add the user account to these groups: Remote Management Users, Performance Monitor Users, and Performance Log Users.
61-
- If the Remote Management Users group isn't present, add the following user account to the group **WinRMRemoteWMIUsers_**.
62-
- The account needs these permissions for the appliance to create a CIM connection with the server and pull the required configuration and performance metadata from the Windows Management Instrumentation (WMI) classes listed here.
63-
- In some cases, adding the account to these groups might not return the required data from WMI classes. The account might be filtered by [User Account Control (UAC)](/windows/win32/wmisdk/user-account-control-and-wmi). To overcome the UAC filtering, the user account needs to have the necessary permissions on CIMV2 Namespace and subnamespaces on the target server. To enable the required permissions, see [Troubleshoot the Azure Migrate appliance](troubleshoot-appliance.md).
64-
65-
> [!Note]
66-
> For Windows Server 2008 and 2008 R2, ensure that Windows Management Framework 3.0 is installed on the servers.
67-
68-
To discover SQL Server databases on Windows servers, both Windows and SQL Server authentication are supported. You can provide credentials of both authentication types in the appliance configuration manager. Azure Migrate requires a Windows user account that's a member of the sysadmin server role.
69-
70-
## Permissions for Linux server
71-
72-
For Linux servers, based on the features you want to perform, you can create a user account in one of the following two ways.
73-
74-
### Option 1
75-
76-
- You need a sudo user account on the servers that you want to discover. Use this account to:
77-
78-
- Pull configuration and performance metadata.
79-
- Perform software inventory (discovery of installed applications).
80-
- Enable agentless dependency analysis by using Secure Shell (SSH) connectivity.
81-
- You need to enable sudo access on /usr/bin/bash to execute the commands listed in [Linux server metadata](discovered-metadata.md#linux-server-metadata). In addition to these commands, the user account also needs to have permissions to execute ls and netstat commands to perform agentless dependency analysis.
82-
- Make sure that you enable **NOPASSWD** for the account to run the required commands without prompting for a password every time the sudo command is invoked.
83-
- Azure Migrate and Modernize supports the following Linux OS distributions for discovery by using an account with sudo access:
84-
85-
Operating system | Versions
86-
--- | ---
87-
Red Hat Enterprise Linux | 5.1, 5.3, 5.11, 6.x, 7.x, 8.x, 9.x, 9.5
88-
Ubuntu | 24.04, 22.04, 12.04, 14.04, 16.04, 18.04, 20.04, 22.04
89-
Oracle Linux | 6.1, 6.7, 6.8, 6.9, 7.2, 7.3, 7.4, 7.5, 7.6, 7.7, 7.8, 7.9, 8, 8.1, 8.3, 8.5
90-
SUSE Linux | 10, 11 SP4, 12 SP1, 12 SP2, 12 SP3, 12 SP4, 15 SP2, 15 SP3
91-
Debian | 7, 8, 9, 10, 11
92-
Amazon Linux | 2.0.2021
93-
CoreOS Container | 2345.3.0
94-
Alma Linux | 8.x, 9.x
95-
Rocky Linux | 8.x, 9.x
96-
97-
98-
> [!Note]
99-
> If you want to perform software inventory (discovery of installed applications) and enable agentless dependency analysis on Linux servers, we recommend that you use Option 1.
100-
101-
### Option 2
102-
103-
- If you can't provide the root account or user account with sudo access, you can set the `isSudo` registry key to the value `0` in the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\AzureAppliance registry on the appliance server. Provide a nonroot account with the required capabilities by using the following commands:
104-
105-
Command | Purpose
106-
--- | --- |
107-
setcap CAP_DAC_READ_SEARCH+eip /usr/sbin/fdisk <br></br> setcap CAP_DAC_READ_SEARCH+eip /sbin/fdisk _(if /usr/sbin/fdisk is not present)_ | Collects disk configuration data.
108-
setcap "cap_dac_override,cap_dac_read_search,cap_fowner,cap_fsetid,cap_setuid,<br> cap_setpcap,cap_net_bind_service,cap_net_admin,cap_sys_chroot,cap_sys_admin,<br> cap_sys_resource,cap_audit_control,cap_setfcap=+eip" /sbin/lvm | Collects disk performance data.
109-
setcap CAP_DAC_READ_SEARCH+eip /usr/sbin/dmidecode | Collects BIOS serial number.
110-
chmod a+r /sys/class/dmi/id/product_uuid | Collects BIOS GUID.
111-
112-
- To perform agentless dependency analysis on the server, ensure that you also set the required permissions on /bin/netstat and /bin/ls files by using the following commands:<br /><code>sudo setcap CAP_DAC_READ_SEARCH,CAP_SYS_PTRACE=ep /bin/ls<br /> sudo setcap CAP_DAC_READ_SEARCH,CAP_SYS_PTRACE=ep /bin/netstat</code>
113-
11440
## Azure Migrate appliance requirements
11541

11642
Azure Migrate uses the [Azure Migrate appliance](migrate-appliance.md) for discovery and assessment. The appliance for physical servers can run on a virtual machine (VM) or a physical server.
@@ -127,8 +53,7 @@ The following table summarizes port requirements for assessment.
12753
Device | Connection
12854
--- | ---
12955
Appliance | Inbound connections on TCP port 3389 to allow remote desktop connections to the appliance.<br/><br/> Inbound connections on port 44368 to remotely access the appliance management app by using the URL ``` https://<appliance-ip-or-name>:44368 ```.<br/><br/> Outbound connections on ports 443 (HTTPS) to send discovery and performance metadata to Azure Migrate and Modernize.
130-
Physical servers | **Windows**: Inbound connections on the WinRM port 5986 (HTTPS) are used to pull configuration and performance metadata from Windows servers. <br/><br/> If the HTTPS prerequisites aren't configured on the target Hyper-V servers, the appliance communication will fall back to WinRM port 5985 (HTTP).<br/><br/> To enforce HTTPS communication without fallback, toggle the Appliance Config Manager. <br/><br/> After enabling, ensure that the prerequisites are configured on the target servers. <br/><br/> - If certificates aren't configured on the target servers, discovery will fail on both the currently discovered servers and the newly added servers. <br/><br/> - WinRM HTTPS requires a local computer Server Authentication certificate with a common name (CN) matching the hostname. The certificate must not be expired, revoked, or self-signed. Refer to the [article](/troubleshoot/windows-client/system-management-components/configure-winrm-for-https) for configuring WinRM for HTTPS. <br/><br/>
131-
**Linux**: Inbound connections on port 22 (TCP) to pull configuration and performance metadata from Linux servers. |
56+
Physical servers | **Windows**: Inbound connections on the WinRM port 5986 (HTTPS) are used to pull configuration and performance metadata from Windows servers. <br/><br/> If the HTTPS prerequisites aren't configured on the target Hyper-V servers, the appliance communication will fall back to WinRM port 5985 (HTTP).<br/><br/> To enforce HTTPS communication without fallback, toggle the Appliance Config Manager. <br/><br/> After enabling, ensure that the prerequisites are configured on the target servers. <br/><br/> - If certificates aren't configured on the target servers, discovery will fail on both the currently discovered servers and the newly added servers. <br/><br/> - WinRM HTTPS requires a local computer Server Authentication certificate with a common name (CN) matching the hostname. The certificate must not be expired, revoked, or self-signed. Refer to the [article](/troubleshoot/windows-client/system-management-components/configure-winrm-for-https) for configuring WinRM for HTTPS.<br/><br/> - Linux: Inbound connections on port 22 (TCP) to pull configuration and performance metadata from Linux servers. |
13257

13358
## Software inventory requirements
13459

articles/migrate/tutorial-discover-aws.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,8 @@ If you just created a free Azure account, you're the owner of your subscription.
8383

8484
Set up an account that the appliance can use to access AWS instances.
8585

86-
- For **Windows servers**, set up a local user account on all the Windows servers that you want to include in the discovery. Add the user account to the following groups: - Remote Management Users - Performance Monitor Users - Performance Log users.
87-
- For **Linux servers**, you need a root account on the Linux servers that you want to discover. Refer to the instructions in the [support matrix](migrate-support-matrix-physical.md#permissions-for-linux-server) for an alternative.
86+
- For **Windows servers**, set up a local user account on all the Windows servers that you want to include in the discovery. Add the user account to the following groups: - Remote Management Users - Performance Monitor Users - Performance Log users. Refer the [instructions](tutorial-discover-physical.md#prepare-windows-server).
87+
- For **Linux servers**, you need a root account on the Linux servers that you want to discover. Refer the [instructions](tutorial-discover-physical.md#prepare-linux-server).
8888
- Azure Migrate uses password authentication when discovering AWS instances. AWS instances don't support password authentication by default. Before you can discover instance, you need to enable password authentication.
8989
- For Windows servers, allow WinRM port 5985 (HTTP). This allows remote WMI calls.
9090
- For Linux servers:

articles/migrate/tutorial-discover-gcp.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,9 +87,9 @@ Set up an account that the appliance can use to access servers on GCP.
8787
* Set up a local user account on non-domain joined servers, and a domain account on domain joined servers that you want to include in the discovery. Add the user account to the following groups:
8888
* Remote Management Users
8989
* Performance Monitor Users
90-
* Performance Log users.
90+
* Performance Log users. Refer the [instructions](tutorial-discover-physical.md#prepare-windows-server).
9191
* For **Linux servers**:
92-
* You need a root account on the Linux servers that you want to discover. If you aren't able to provide a root account, refer to the instructions in the [support matrix](migrate-support-matrix-physical.md#permissions-for-linux-server) for an alternative.
92+
* You need a root account on the Linux servers that you want to discover. If you aren't able to provide a root account. Refer the [instructions](tutorial-discover-physical.md#prepare-linux-server).
9393
* Azure Migrate uses password authentication when discovering GCP instances. GCP instances don't support password authentication by default. Before you can discover instance, you need to enable password authentication.
9494
1. Sign into each Linux machine.
9595
2. Open the sshd_config file: vi /etc/ssh/sshd_config

0 commit comments

Comments
 (0)