

NEW - You can now accelerate your migration and modernization with AWS Transform. Read [Getting Started](https://docs.aws.amazon.com/transform/latest/userguide/getting-started.html) in the *AWS Transform User Guide*.

# Prerequisites for installing the MGN connector
Prerequisites

To use the Application Migration Service connector you must meet these prerequisites.

## General prerequisites
General prerequisites
+ While the MGN connector can be deployed on the same server that hosts the MGN vCenter Client installer (agentless appliance), we recommend that the MGN connector be installed on a dedicated server.
+ The *openssl* library must be installed on the server.
+ You must have the required [permissions](mgn-connector-permissions.md).

## Operating systems that support the MGN connector


The MGN connector can be installed on servers running the following Linux versions:
+ Ubuntu 18.x\$1 (64 bit) - 22.04 (x86\$164)
+ Amazon Linux 2 (x86\$164)
+ RHEL8.x (x86\$164)

## SSM agent installation requirements
SSM requirements

Installation of the MGN Connector also installs the SSM agent.
+ If the SSM agent is already installed on the server you must uninstall it before installing the MGN connector. See [ Uninstalling SSM Agent from Linux instances ](https://docs.aws.amazon.com/systems-manager/latest/userguide/sysman-uninstall-agent.html) in the *AWS Systems Manager User Guide*.
+ A minimum of 200 MB of free disk space and 200 KB of free disk space in the `/var` directory.
+ Installation is not supported on these operating systems:
  + CentOS 5.x
  + CentOS 6.x
  + RHEL 6.x
  +  Oracle 6.x
  + Amazon Linux 1

## Security recommendations for MGN connector
Security recommendations

We recommend that the MGN connector server is only accessed by authorized personnel and has the required OS patches. We also recommend that the servers to which the MGN connector connects have all the required OS patches.

If you configure [outputting logs to S3](https://docs.aws.amazon.com/systems-manager/latest/userguide/getting-started-create-iam-instance-profile.html#create-iam-instance-profile-ssn-logging), you will first [create an Amazon S3 bucket](https://docs.aws.amazon.com/AmazonS3/latest/userguide/create-bucket-overview.html). We recommend that you apply S3 bucket [S3 security practices](https://docs.aws.amazon.com/AmazonS3/latest/userguide/security-best-practices.html)