Skip to main content

Migration Workflow

This page explains the core concepts and workflow of the Migrate2GSA PowerShell module for migrating security configurations to Microsoft Global Secure Access (GSA).

Overview​

The Migrate2GSA tool follows a structured 4-phase migration workflow that ensures data integrity, administrative control, and seamless provisioning to Microsoft Global Secure Access.

Migration Flow​

πŸ”
EXPORT
Extract from Source Platform

Security Policies
URL Categories
Access Rules
User Groups

β†’
πŸ”„
CONVERT
Transform to GSA Format

Policy Translation
Category Mapping
Rule Optimization
Identity Resolution

β†’
πŸ“
CSV REVIEW
Administrative Control Point

Review & Edit
Selective Migration
Custom Modifications

β†’
⚑
PROVISIONING
Deploy to Microsoft GSA

Microsoft Graph API
EIA/EPA Provisioning
Validation
Rollback Support

Migration Phases​

1. πŸ” Export Phase​

Extract configurations from source platforms

The tool connects to your existing security platform and exports current configurations:

  • Security policies and rules
  • URL filtering configurations and categories
  • Application access policies and segments
  • User and group assignments

Key Features:

  • Secure API connections using authenticated sessions
  • Comprehensive data extraction including policies, rules, and user mappings
  • Exported data is structured and validated for the next phase

2. πŸ”„ Convert Phase​

Transform data into GSA-compatible format

Raw exported data is processed and converted into Microsoft Global Secure Access format:

  • Policy Translation β†’ Maps source platform policies to GSA equivalents
  • Category Mapping β†’ Translates custom categories using predefined mappings
  • User/Group Resolution β†’ Resolves identities to Azure AD/Entra ID objects
  • Rule Optimization β†’ Consolidates and optimizes rules for GSA deployment

Output: Structured data ready for administrative review and provisioning.

3. πŸ“ CSV Review & Customization​

Administrative control point for migration decisions

The conversion process generates timestamped, editable CSV files that administrators can review and modify:

Entra Internet Access (EIA) Migration Files​

πŸ“ Migration Output/
β”œβ”€β”€ πŸ“„ 20250105_143022_EIA_Policies.csv # Web filtering & TLS inspection policies
β”œβ”€β”€ πŸ“„ 20250105_143022_EIA_SecurityProfiles.csv # Security profile assignments
└── πŸ“„ 20250105_143022_Convert-ZIA2EIA.log # Conversion log file

Entra Private Access (EPA) Migration Files​

πŸ“ Migration Output/
β”œβ”€β”€ πŸ“„ 20250105_143022_GSA_EnterpriseApps_All.csv # Application segments with access policies
└── πŸ“„ 20250105_143022_Convert-ZPA2EPA.log # Conversion log file
note

File names include a timestamp prefix (yyyyMMdd_HHmmss) to prevent overwrites and maintain version history. The EIA_Policies.csv file contains both web content filtering rules and TLS inspection policies. The specific files generated depend on the migration type (ZIA→EIA, ZPA→EPA, NPA→EPA, NSWG→EIA).

Administrative Benefits:

  • Review Before Deploy β†’ Validate all configurations before provisioning
  • Selective Migration β†’ Choose which policies to migrate or exclude
  • Custom Modifications β†’ Adjust policy names, descriptions, or parameters
  • Audit Trail β†’ Document migration decisions and modifications

4. ⚑ Provisioning Phase​

Deploy configurations to Microsoft Global Secure Access

The final phase reads the CSV files and provisions configurations to GSA:

  • Microsoft Graph API β†’ Authenticates and connects to your tenant
  • Entra Internet Access (EIA) β†’ Provisions web security policies
  • Entra Private Access (EPA) β†’ Configures application access rules
  • Validation & Rollback β†’ Verifies successful deployment with error handling