No duplicate storage required
Migrate directly from on-prem file servers through the secure agent, rather than staging duplicate data copies.
Migration Platform
Schemr helps IT teams discover file structures, plan target architecture, map permissions, and run production migrations with real-time job visibility.
Schemr is built for MSP operators and IT teams that need repeatable, lower-risk delivery.
Migrate directly from on-prem file servers through the secure agent, rather than staging duplicate data copies.
Structured stage flow reduces mapping and permission mistakes, helping avoid expensive rework.
Track multiple migrations in-flight with centralized job states, progress, and event history.
Run migrations across multiple customer tenants from one platform model and consistent process.
Use agent-based discovery to pull folder structure without manually building spreadsheets.
Replace one-off FTP transfers and fragile PowerShell handoffs with a controlled, automated workflow.
Built for home-drive to OneDrive migrations with tenant-level setup and guided mapping.
Request discovery and pull first-level home-drive folders through the built-in agent workflow.
Map discovered home-drive paths to target OneDrive users with an easy review-and-save flow.
Use tenant-level application permissions so teams avoid per-user OneDrive sign-in during migration delivery.
Identity is handled through Clerk with backend authorization controls, and operations are scoped by tenant membership.
Tenant-scoped access controls and role-based authorization keep customer environments isolated and controlled.
Transport is protected over HTTPS/TLS, and sensitive stored material uses encrypted handling where configured.
Windows agents use registration and access tokens, while user sign-in is separated from tenant authorization.
Set your customer model first, then pick SharePoint or OneDrive pricing.
Standalone OneDrive migration
Standalone OneDrive migration
100+ users
Includes SharePoint base + OneDrive base
Scale active user migrations
High-volume user migrations
Yes. Each flow can run independently while sharing tenant setup.
Client users are invited through Clerk and then authorized with tenant-scoped roles.
Yes for source discovery and migration execution on Windows-accessible file shares.
Completed, skipped, failed, and event output files are available for reporting.
Schemr
Creating an account gets you started quickly for a single organization. Need MSP or multi-customer onboarding? Contact our team and we will help set up the right plan.
Secure sign-in experience for migration teams and customer stakeholders.
Purpose-built agent workflows to support reliable, repeatable migration delivery at scale.
MSP (multiple customers, team billing) is not available through self-service yet. Contact sales for MSP pricing and onboarding.
SharePoint migration—plan folders, map sources, permissions, and jobs in one place.
Snapshot of customers and migration jobs. Use Jobs in the sidebar for the full searchable job table, filters, and row actions.
— organization(s) you can access
Totals across all customers you can manage (full-wizard scope).
Migrate local H drive folders to user OneDrive using the same customer Microsoft 365 certificate app.
| Source folder | GB | Files | Folders |
|---|
Map each first-level home folder to a tenant user account (UPN). This is used for OneDrive target resolution.
| Source folder | Folder | Target user (UPN) | Enabled |
|---|
Choose the customer migration to work on. MSP and platform admins can create additional customers here. The next steps cover the Windows agent and a dedicated Microsoft 365 app for that customer’s tenant.
Limited client invite (wizard stages 6–9 only)
Invite someone who should only edit folder structure, mapping, roles, and folder access. They sign in here
with the URL your MSP shares, including ?mappingSetId= and the mapping set id. That
shareable link is generated in Stage 5: Create SharePoint Site Plan after you save the
site plan (same place you can copy the client deep link).
Revoke blocks existing users immediately and can cancel pending invitations.
The agent runs on a Windows machine that can reach your file shares (often a file server). You need both the
Worker (uploads, heartbeat) and the Tray app (NTFS scans in the interactive
user session). See schemr-agent/README-AGENT.md in the product repository for full install
notes.
Use published binaries from your administrator when available.
spm-installer).
Paste the token into the Worker or Tray when prompted (spmrt_…).
Agent installer link will appear when release manifest is configured.
This application uses an Azure AD app registration in your Microsoft 365 tenant with application permissions to SharePoint and Microsoft Graph. Schemr generates a per-customer certificate and stores the private key encrypted at rest. You only download and upload the public certificate into your Entra app registration.
Sites.ReadWrite.All, User.Read.All or Directory.Read.All for
role picker, Group.ReadWrite.All or GroupMember.ReadWrite.All if you create Entra groups for folder access).
Also add SharePoint (Office 365 SharePoint Online) Application permissions such as
Sites.FullControl.All or Sites.Selected (plus an admin grant for the target site) so the API can call SharePoint REST for folder permission inheritance before uploads.
Follow least privilege for your process.
401 Unsupported app only token, set worker env SKIP_SHAREPOINT_FOLDER_ACL=1 to finish Entra-only steps, or confirm the app uses a certificate uploaded to Entra (same key as the private key you store here).
https://contoso.sharepoint.com/sites/Migration).
Server requirement: the API must define GRAPH_CREDENTIALS_ENCRYPTION_KEY (32 random bytes,
base64-encoded) so private keys can be stored; without it, saving will return an error.
Snapshots are created when the Windows agent completes an NTFS scan. Click Refresh after the scan finishes, choose the snapshot in the list (newest first), then Load Snapshot.
The tray app must be running on the file server with a configured source folder; when the agent finishes, the snapshot appears in the list.
Name the migration set and define the target site and document library.
Link for limited client login
After the site plan is saved, send this URL to someone with a migration-contributor account. It includes
the mapping set id (mappingSetId) so they can open stages 6–9 without the snapshot list.
Add root folders, then use + on rows to add child folders with indentation.
| Folder Structure | Path | Action |
|---|
Each source folder can be mapped to a target folder in SharePoint.
| Source Path | Target Folder | Include Subfolders |
|---|
Create logical roles (for example Finance or HR), then add Microsoft 365 users to each role. When you are finished, save this page before assigning roles to folders in the next stage (Stage 9).
One row per target folder (within your max depth). Assign organization roles only — the same people-backed roles from Stage 8. Read access on parent folders is added automatically when someone has access deeper in the tree. Rows marked “Parent access” are read-only.
| Target folder | Depth | Role | Permission | Level (matches folder depth) |
|---|
Queue a migration job, watch progress, and review stage events.
Compare the planning snapshot attached to this mapping set to a newer scan of the same file-server root. Added or removed folders here are advisory only — jobs still use the planning snapshot until you create a new mapping set from a newer scan.
Queue a scan from the tray app on the file server. When it completes and imports, use Refresh snapshot list above, then pick the new snapshot and run comparison.
Lists are capped per request (see summary). Use download for up to 10,000 paths per side.
Completed / skipped / failed lists are shown as CSV (Source, Destination). When a row has a reason (for example skip or failure), it appears in parentheses after the destination path.
Searchable list of migration jobs across customers you manage. Open a row in the wizard for full controls and event downloads.
| Customer | Mapping | Status | Stage | % | Queued (UTC) | Last error |
|---|
Complete setup for this tenant. This replaces SharePoint setup stages and applies to both SharePoint and OneDrive migrations.
Install the Worker service and Tray app on a Windows host that can access your source shares. Use this
token once during registration (spmrt_...).
Installer manifest not configured.
Create a single-tenant app registration in Microsoft Entra ID, grant application permissions, then paste tenant/client/site details here.
Microsoft Entra App Registration (single tenant) ------------------------------------------------ Portal path: Microsoft Entra ID -> App registrations -> New registration Supported account types: Accounts in this organizational directory only (Single tenant) Required API permissions (Application permissions): - Microsoft Graph - Sites.ReadWrite.All - Group.ReadWrite.All - User.Read.All - SharePoint - Sites.FullControl.All After adding permissions: 1) Click "Grant admin consent for <TenantName>" 2) Confirm all required permissions show "Granted for <TenantName>" 3) Copy: - Directory (tenant) ID - Application (client) ID 4) Save IDs + site URL in Schemr below Certificate step (next screen): - Download generated public certificate from Schemr - Upload in Entra app -> Certificates & secrets -> Certificates -> Upload certificate - Return to Schemr and continue
Generate a per-tenant public certificate here, upload it to Entra App Registration (Certificates & secrets), then confirm upload.