Migration Workflow
This page explains the core concepts and workflow of the Migrate2GSA PowerShell module for migrating security configurations to Microsoft Global Secure Access (GSA).
Overviewβ
The Migrate2GSA tool follows a structured 4-phase migration workflow that ensures data integrity, administrative control, and seamless provisioning to Microsoft Global Secure Access.
Migration Flowβ
Security Policies
URL Categories
Access Rules
User Groups
Policy Translation
Category Mapping
Rule Optimization
Identity Resolution
Review & Edit
Selective Migration
Custom Modifications
Microsoft Graph API
EIA/EPA Provisioning
Validation
Rollback Support
Migration Phasesβ
1. π Export Phaseβ
Extract configurations from source platforms
The tool connects to your existing security platform and exports current configurations:
- Security policies and rules
- URL filtering configurations and categories
- Application access policies and segments
- User and group assignments
Key Features:
- Secure API connections using authenticated sessions
- Comprehensive data extraction including policies, rules, and user mappings
- Exported data is structured and validated for the next phase
2. π Convert Phaseβ
Transform data into GSA-compatible format
Raw exported data is processed and converted into Microsoft Global Secure Access format:
- Policy Translation β Maps source platform policies to GSA equivalents
- Category Mapping β Translates custom categories using predefined mappings
- User/Group Resolution β Resolves identities to Azure AD/Entra ID objects
- Rule Optimization β Consolidates and optimizes rules for GSA deployment
Output: Structured data ready for administrative review and provisioning.
3. π CSV Review & Customizationβ
Administrative control point for migration decisions
The conversion process generates timestamped, editable CSV files that administrators can review and modify:
Entra Internet Access (EIA) Migration Filesβ
π Migration Output/
βββ π 20250105_143022_EIA_Policies.csv # Web filtering & TLS inspection policies
βββ π 20250105_143022_EIA_SecurityProfiles.csv # Security profile assignments
βββ π 20250105_143022_Convert-ZIA2EIA.log # Conversion log file
Entra Private Access (EPA) Migration Filesβ
π Migration Output/
βββ π 20250105_143022_GSA_EnterpriseApps_All.csv # Application segments with access policies
βββ π 20250105_143022_Convert-ZPA2EPA.log # Conversion log file
File names include a timestamp prefix (yyyyMMdd_HHmmss) to prevent overwrites and maintain version history. The EIA_Policies.csv file contains both web content filtering rules and TLS inspection policies. The specific files generated depend on the migration type (ZIAβEIA, ZPAβEPA, NPAβEPA, NSWGβEIA).
Administrative Benefits:
- Review Before Deploy β Validate all configurations before provisioning
- Selective Migration β Choose which policies to migrate or exclude
- Custom Modifications β Adjust policy names, descriptions, or parameters
- Audit Trail β Document migration decisions and modifications
4. β‘ Provisioning Phaseβ
Deploy configurations to Microsoft Global Secure Access
The final phase reads the CSV files and provisions configurations to GSA:
- Microsoft Graph API β Authenticates and connects to your tenant
- Entra Internet Access (EIA) β Provisions web security policies
- Entra Private Access (EPA) β Configures application access rules
- Validation & Rollback β Verifies successful deployment with error handling