Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Contact Us
  • Home
  • Migrations
  • Migration Jobs
  • Advanced Job Options

Permission Preservation

Learn how to configure folder and file permissions for a migration job.

Written by Andrea Harvey

Updated at June 23rd, 2025

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Insights
    Prebuilt Insights Custom Insights
  • Content
  • Accounts
  • Activity Log
  • Content Scans
  • Migrations
    Migration Jobs Migration Reports Maps Flagged Items Migration Tools
  • Connections
    Supported Platform Connections Creating Connections Connection Maintenance Connection Pools
  • Entity Types
    DryvIQ Available Entity Types Custom Entity Types Entity Type Maintenance
  • Action Sets
    Creating Action Sets Action Sets Maintenance
  • Settings
    License Performance Notifications Extensions Entity Types Settings Display Settings Configuration
  • API, CLI, and SDK Documentation
    REST API Documentation Command-line Interface SDK Development
  • POC Offering
  • Release Notes
+ More

Table of Contents

Overview Preserve Item Authorship/Ownership Preserve Item Permissions Permission Failures Shared Links Policy Platforms That Support Shared Links Box Sharing Terms Shared Links Support User and Group Mapping Policy

Overview

Permission Preservation determines how permissions are transferred between platforms. You specify how you want the source permissions for folders and files to transfer to the destination platform during the job run.

The Permission Preservation toggle on the Advanced job settings page will be inactive for jobs that use platforms that don’t support permissions.

 
Permission Preservation page

Preserve Item Authorship/Ownership

The author/owner preservation feature enables migrated files to retain their original author and owner information. To preserve authorship, both the source platform connector and the destination platform connector must support this feature. Refer to the Platform Comparison to verify compatibility between your platforms.

While DryvIQ will automatically attempt to map users based on various rules, such as name and actual ID, it is also possible to map specific users from one platform to another. This is useful when a user no longer exists or when a user's name, email, or other identifiable information is different between platforms.

DryvIQ tracks associations between items and user mappings, similar to permission tracking. Users who created or modified the item or its versions (when applicable) will be displayed on the User mapping tab of the job page. For author/owner preservation tracking to work, the job audit level must be set to at least "Info" (the default level for the DryvIQ user interface).

The Preserve Destination root folder authorship option allows you to preserve authorship for the root folder. Note that authorship will only be preserved if DryvIQ creates the root folder on the destination as part of the transfer. If the root folder already exists on the destination, the authorship from the source will not be preserved on the destination. Instead, authorship on the destination will be whoever created the root folder on the destination. 

 

Preserve Item Permissions

The item permissions policy determines how permissions are applied to your job execution(s). There are four options available:

  • Disable Preserve Item Permissions: If you do not turn on the Preserve Item Permissions toggle, the item permissions will not be preserved. No permissions will be passed from source to destination. This is the default. You must turn on this toggle to use any of the other preserve item permissions options.
  • Add permissions: The current permissions on impending transfers (for files or folders) will be preserved as they are transferred to both the source and the destination. This is the recommended setting.
  • Prefer permissions on the source: This option reconciles permissions with the source, removing permissions from the destination if they do not match the source. This will keep things in sync if the destination folder levels have more permissions than the source. This is a good option for sync jobs that require constant movement to maintain everything as intended.
  • Assign permissions from file: Permissions for items on the source will not be retained. Instead, new permissions will be assigned based on information provided in a CSV-formatted file stored on the source platform. See Permissions Import for details about how to structure your permission import file.
  • Shared links only: This preserves permissions for shared links only. No other permissions are preserved. 

Permission Failures

Permission failure policy determines what should happen with your job execution(s) if permissions cannot be applied. You can select to transfer the item even if there is an issue with applying permissions. This is the recommended setting. If preferred, you can opt not to have items transferred in the event of permission failures. 

DryvIQ will reevaluate permissions every time the content changes or a permissions reset is performed. This is applicable for both copy and synchronize job types. For example, if a new permission is added to a file but no other changes occur, DryvIQ will not apply this permission on subsequent runs. A permission reset will need to be performed.

 

Shared Links Policy

Several platforms support the option to share files and folders through a link. The Shared Links Policy determines whether "domain" or "anyone" links are transferred from the source to the destination. Permission Preservation must be enabled for the job to use this policy. 

This option is automatically enabled when shared links only is selected as the item permissions policy. 

 

Notification emails may be generated on the destination platform when shared links are transferred.

 

Platforms That Support Shared Links

The following platforms support shared links. Refer to the Platform Comparison to see the conflict between platforms.

  • Box (See below for additional information.)
  • Dropbox
  • Microsoft SharePoint Online (Microsoft Office 365/Microsoft OneDrive for Business Online)
  • Google Workspace

Box

Box supports links for the following:

  • (Anyone) People with the link: Anyone with the link view only.
  • (Company) People in your company view only.
  • (Company) Invited people only: shared link will be view only; invited users can be set as view or edit.
  • Box has an additional option to view and download, but DryvIQ does not support transferring it. This option is not applicable to SharePoint Online. 

DryvIQ only supports “anyone” or “domain (company).” When transferring to Microsoft SharePoint Online, the Box options will be translated as follows: 

  • Anyone: Anyone with the link can view.
  • Company: People in the company with the link can view.
  • Company Internal: People in the company with the link can view, and the invited users from within the company will be added to the Microsoft SharePoint Online direct access list with the corresponding edit or view rights.
  • Company External Users: People in the company with the link can view, and the invited external user will go to the pending access and requests page.
Shared link information in the Sharing Insights

Sharing Terms

Anyone/Anonymous: Links that can be shared with anyone.

  • Box: open
  • Dropbox: public
  • Google: anyone
  • SharePoint: anonymous

Domain: Links that can be shared only within your organization or enterprise.

  • Box: company
  • Dropbox: team_only
  • Google: domain
  • SharePoint: organizational

Shared Links Support

DryvIQ handles shared links differently per platform. The following list defines the different ways DryvIQ handles shared links. Refer to the table below to see how DryvIQ handles shared links for each platform that supports this feature. 

  • Read/View Rights Unsafe-Only: Links will be transferred as “view only.”
  • Read/View and Write/Edit: Both "read" and "edit" links can be transferred.
  • Anyone Links Unsafe-Only: Anyone/Anonymous links that can be shared with anyone.
  • Supported: Feature is fully supported by the Platform and DryvIQ.
  • Not Supported: The feature is available on the Platform but not supported by DryvIQ.
  • Not Applicable: The feature is not supported by the Platform.
  Box Dropbox Microsoft SharePoint Online Google Workspace
Number of Links 1 link per file or folder 1 link per file or folder Multiple links per file or folder Max 2 links 
(anonymous and/or a domain)
Rights Read/View Rights Unsafe-Only Read/View Rights Unsafe-Only Read/View and Write/Edit Read/View and Write/Edit
Expiration Date Supported Supported Anyone Links Unsafe-Only Read/View Rights Unsafe-Only
Link Passwords Not Supported Not Supported Not Applicable Not Applicable
Disable Download Not Supported Not Supported Not Applicable Not Applicable

User and Group Mapping Policy

User and group mapping policies enable accounts and groups to be mapped between different platforms. Maps can be created before creating the job in the Maps area. If a map that uses the source and destination selected for the job exists, the map field will default to this map when you enable the mapping option. If a map doesn’t exist, you need to use the corresponding Create new map policy link to create the map before you can select to use the user or group map policy. Refer to the Maps section for information about creating new maps. 

 

Create User Map Modal

 

Create Group Map Modal

 

You cannot assign a mapping document to an intelligent migration job when specifying the permission preservation for the job. Instead, mapping policies for intelligent migration jobs are automatically assigned to child jobs based on their source and destination platforms. If there are no matching maps, no mapping will be used. If there are multiple matching maps, the child job will not be created, and an error will be present on the parent job, noting that multiple maps are not supported.

 

 

permissions permission preservation author preservation owner preservation item permissions permission failures user mapping policy group mapping policy shared links

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • Has External Permissions (REST API Only)
  • Allow Unsupported File Names to be Changed
  • Allow Truncation

Copyright 2025 – DryvIQ, Inc.

Knowledge Base Software powered by Helpjuice

Expand