Yes. Tzunami Deployer extracts the source security definitions and enables the mapping of these to SharePoint security definitions. Security modeling is a complex topic. If you have any further questions about how Tzunami Deployer supports security extraction and modeling, please contact the Tzunami Support Team at email@example.com.
Does Tzunami Deployer support the migration of security information from the source? Print
Modified on: Mon, 14 Jun, 2021 at 2:06 PM
Did you find it helpful?Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.