{"id":170902,"date":"2022-05-05T12:22:29","date_gmt":"2022-05-05T17:22:29","guid":{"rendered":"https:\/\/itblog.ldlnet.net\/?p=170902"},"modified":"2022-05-05T12:33:36","modified_gmt":"2022-05-05T17:33:36","slug":"basic-authentication-deprecation-in-exchange-online-may-2022-update","status":"publish","type":"post","link":"https:\/\/itblog.ldlnet.net\/index.php\/2022\/05\/05\/basic-authentication-deprecation-in-exchange-online-may-2022-update\/","title":{"rendered":"Basic Authentication Deprecation in Exchange Online \u2013 May 2022 Update"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/user\/viewprofilepage\/user-id\/324116\"><img decoding=\"async\" src=\"https:\/\/techcommunity.microsoft.com\/t5\/image\/serverpage\/image-id\/123334iA2C11F7B2B7DC41C\/image-dimensions\/150x150\/image-coordinates\/190%2C179%2C1319%2C1308?v=v2\" alt=\"The_Exchange_Team\" title=\"The_Exchange_Team\"\/><\/a><\/figure>\n\n\n\n<p>I wanted to forward this article to everyone for review. This article could not come at a better time with the transition of Exchange on premises to Exchange Online ongoing along with the updating of general security protocols for Microsoft&#8217;s IaaS and SaaS Services. In about 150 days from today, Microsoft is going to start to turn off Basic Auth for specific protocols in Exchange Online&nbsp;for those customers still using it.<\/p>\n\n\n\n<p>Since&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/basic-authentication-and-exchange-online-september-2021-update\/ba-p\/2772210\" target=\"_blank\">we announced the October 1, 2022 deadline last year<\/a>&nbsp;MS has seen great progress from customers and partners as they move their clients and apps from basic to Modern Authentication. Since there are a lot of customers still using Basic Auth, we wanted to re-state the scope and implications of this change, and to answer some of the common questions we get.<\/p>\n\n\n\n<p>As a reminder, Basic Auth is still one of, if not&nbsp;<em>the<\/em>&nbsp;most common ways our customers get compromised, and these types of attacks are&nbsp;<em>increasing<\/em>.<\/p>\n\n\n\n<p>We\u2019ve disabled Basic Auth in&nbsp;<em>millions<\/em>&nbsp;of tenants that weren\u2019t using it, and we\u2019re currently disabling unused protocols within tenants that still use it, but every day your tenant has Basic Auth enabled, you are at risk from attack.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Timeline and Scope<\/h3>\n\n\n\n<p>As we communicated last year in&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/basic-authentication-and-exchange-online-september-2021-update\/ba-p\/2772210\" target=\"_blank\" rel=\"noreferrer noopener\">blog posts<\/a>&nbsp;and Message Center posts, we will start to turn off Basic Authentication in our worldwide multi-tenant service on October 1, 2022. To be clear, we will&nbsp;<em>start<\/em>&nbsp;on October 1<sup>;&nbsp;<\/sup>this is not the date we turn it off for&nbsp;<em>everyone<\/em>. We will randomly select tenants, send 7-day warning Message Center posts (and post Service Health Dashboard notices), then we will turn off Basic Auth in the tenant. We expect to complete this by the end of this year. You should therefore be ready by October 1.<\/p>\n\n\n\n<p>We\u2019re turning off Basic Auth for the following protocols: MAPI, RPC, Offline Address Book (OAB), Exchange Web Services (EWS), POP, IMAP, and Remote PowerShell.<\/p>\n\n\n\n<p>We are not turning off SMTP AUTH. We have turned off SMTP AUTH for millions of tenants not using it, but if SMTP AUTH is enabled in your tenant, it\u2019s because we see usage and so we won\u2019t touch it. We do&nbsp;<a href=\"https:\/\/docs.microsoft.com\/exchange\/clients-and-mobile-in-exchange-online\/authenticated-client-smtp-submission\" target=\"_blank\" rel=\"noreferrer noopener\">recommend<\/a>&nbsp;you disable it at the tenant level and re-enable it only for those user accounts that still need it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exceptions and Per-Tenant Timing<\/h3>\n\n\n\n<p><strong><u>There is no way to request an exception after October<\/u><\/strong>. Tenant selection is random, and we cannot put your tenant to the back of the queue to give you more time or change your settings on any specific date. If you want Basic Auth to be disabled at a time of your choosing (either now, or as soon as you are ready), use Authentication Policies. More info on that below.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What should I do to prepare for this change?<\/h4>\n\n\n\n<p>Any client (user app, script, integration, etc.) using Basic Auth for one of the affected protocols will be unable to connect. The app will receive an HTTP 401 error:&nbsp;<em>bad username or password<\/em>.<\/p>\n\n\n\n<p>Any app using Modern Auth for these same protocols will be unaffected.<\/p>\n\n\n\n<p>Our documentation page lists some of the common apps and what can be done to switch them from basic to Modern Auth, but based on calls with customers of all sizes, here are some common themes:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>If you have Outlook for Windows, make sure it\u2019s up to date,&nbsp;<a href=\"https:\/\/docs.microsoft.com\/microsoft-365\/admin\/security-and-compliance\/enable-modern-authentication\" target=\"_blank\" rel=\"noreferrer noopener\">has the right registry keys in place<\/a>&nbsp;and most importantly \u2013 that the tenant-wide switch to enable is set to True! Without that setting Outlook for Windows won\u2019t use Modern Auth.&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/enabling-modern-auth-for-outlook-how-hard-can-it-be\/ba-p\/2278411\" target=\"_blank\" rel=\"noreferrer noopener\">So, turn it on<\/a>. If clients are already logged in to another Microsoft 365 app, such as Teams, they are already authenticated and so it\u2019s very likely they will not see any kind of auth prompt. We are turning this setting&nbsp;<em>on<\/em>&nbsp;for customers as we disable Basic Auth for MAPI\/RPC in the tenant, but not before. We want to make sure Outlook can connect using Modern Auth once Basic Auth is disabled. Outlook doesn\u2019t support OAuth with POP and IMAP \u2013 if you want to use POP and IMAP, with a client app, you\u2019ll need another app.<\/li><li>POP\/IMAP \u2013 we have several customers using these protocols for application access.&nbsp;<a href=\"https:\/\/docs.microsoft.com\/exchange\/client-developer\/legacy-protocols\/how-to-authenticate-an-imap-pop-smtp-application-by-using-oauth\" target=\"_blank\" rel=\"noreferrer noopener\">POP and IMAP both support OAuth<\/a>&nbsp;for interactive applications, and we\u2019re rolling out support for non-interactive flows now. If you are a developer you\u2019ll know where to look, and if you do that right now you\u2019ll find the IMAP.AccessAsApp and POP.AccessAsApp permissions. We\u2019ll have some guidance on how to use them very soon, so watch out for that.<\/li><li>EWS apps \u2013 we also have several customers with apps that use EWS and Basic Auth. EWS supports app-only access and you can use&nbsp;<a href=\"https:\/\/docs.microsoft.com\/graph\/auth-limit-mailbox-access\" target=\"_blank\" rel=\"noreferrer noopener\">Application Access Policies<\/a>&nbsp;to control what an app can access \u2013 if you have apps using EWS with Basic Auth, you need to either modify the code, or get the app owner to do so. Many partner apps have support for Modern Auth, you just need to modify your configuration or update to the latest versions. Do it now!<\/li><li>ActiveSync \u2013 all the native apps on up-to-date clients support Modern Auth, but many users devices are still using Basic Auth. If you use an MDM\/MAM solution, use it to deploy new profiles.&nbsp;<a href=\"https:\/\/docs.microsoft.com\/mem\/intune\/configuration\/email-settings-ios\" target=\"_blank\" rel=\"noreferrer noopener\">Here\u2019s<\/a>&nbsp;how you can use Intune to set the auth mechanism for iPhone and iPad, for example. If you don\u2019t have an MDM, simply remove and re-add the account from the device and it should automatically switch to Modern Auth.<\/li><li>PowerShell scripts \u2013 If you have scripts you need to run, follow&nbsp;<a href=\"https:\/\/docs.microsoft.com\/powershell\/exchange\/app-only-auth-powershell-v2?view=exchange-ps\" target=\"_blank\" rel=\"noreferrer noopener\">this<\/a>&nbsp;guide to use Modern Auth in your scripts.<\/li><li>Reporting Web Services \u2013 the support for OAuth is rolling out now (to be completed by end of May). Basic Auth will be disabled starting October 1.<\/li><li>Microsoft Teams Rooms \u2013 make sure they are using Modern Auth by following&nbsp;<a href=\"https:\/\/docs.microsoft.com\/MicrosoftTeams\/rooms\/rooms-authentication#prerequisites-specific-to-microsoft-teams-rooms\" target=\"_blank\" rel=\"noreferrer noopener\">these<\/a>&nbsp;steps.<\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\">How do you know you are still using Basic Auth? <\/h4>\n\n\n\n<p>Azure AD sign-in events is the best place to look (filter by client app, then in the client app filter, check the boxes for the affected protocols under Legacy Authentication Clients). Check out&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/new-tools-to-block-legacy-authentication-in-your-organization\/ba-p\/1225302\" target=\"_blank\">this<\/a>&nbsp;post for more info.<\/p>\n\n\n\n<p>We also send monthly Message Center posts to tenants using Basic Auth, summarizing their usage. We\u2019ve been doing this since October 2021. These are not as exact as Azure AD\u2019s reports; they are meant as an&nbsp;<em>indicator<\/em>&nbsp;of usage, but if you get one, you should investigate what\u2019s causing it.<\/p>\n\n\n\n<p>Sometimes, we are asked if we can send the list of users still using Basic Auth. Unfortunately, we cannot send you a list, because that information is only available&nbsp;<em>inside<\/em>&nbsp;your tenant for privacy reasons. Of course, this information is available to admins in the Azure portal.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What\u2019s the Best Way to Disable Basic Auth Once I\u2019m Done?<\/h4>\n\n\n\n<p>The absolute best way to disable Basic Auth is to use Authentication Policies to block Basic Auth. As&nbsp;<a href=\"https:\/\/docs.microsoft.com\/exchange\/clients-and-mobile-in-exchange-online\/disable-basic-authentication-in-exchange-online\" target=\"_blank\" rel=\"noreferrer noopener\">this<\/a>&nbsp;article&nbsp;<em>clearly<\/em>&nbsp;states, if you want to&nbsp;<em>block<\/em>&nbsp;Basic Auth, use Auth Policies. Don\u2019t use Set-CASMailbox or Conditional Access, as those are both&nbsp;<em>post<\/em>-authentication. They prevent access to the data, but they don\u2019t stop authentication.<\/p>\n\n\n\n<p>You might notice that that we\u2019re not disabling Autodiscover at this time. That\u2019s something we\u2019ll do once the clients that depend on it are using Modern Auth, but it\u2019s also something you can do for yourself with Authentication Policies.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What If I Still Need Help?<\/h4>\n\n\n\n<p>If you still need help, that\u2019s where our amazing network of&nbsp;<a href=\"https:\/\/docs.microsoft.com\/partner-center\/find-a-partner\" target=\"_blank\" rel=\"noreferrer noopener\">partners<\/a>,&nbsp;<a href=\"https:\/\/mvp.microsoft.com\/MvpSearch\" target=\"_blank\" rel=\"noreferrer noopener\">MVPs<\/a>,&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">community<\/a>, and&nbsp;<a href=\"https:\/\/support.microsoft.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft support<\/a>&nbsp;engineers come in. There\u2019s a huge amount of experience and knowledge to help you with this transition. So, ask questions, look for help, and most importantly \u2013 disable Basic Auth and get secure!<\/p>\n\n\n\n<p><em><strong>The Exchange Team<\/strong><\/em><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\">STAY INFORMED! CHECK BACK OFTEN FOR UPDATES!<\/h2>\n\n\n\n<p><strong><em>REFERNECES:<\/em><\/strong><br><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/basic-authentication-deprecation-in-exchange-online-may-2022\/ba-p\/3301866\">Basic Authentication Deprecation in Exchange Online \u2013 May 2022 Update &#8211; Microsoft Tech Community<\/a><br><a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/bg-p\/Exchange\">Exchange Team Blog &#8211; Microsoft Tech Community<\/a><br><a href=\"https:\/\/itblog.ldlnet.net\/index.php\/2021\/04\/20\/enabling-modern-authentication-for-outlook-how-hard-can-it-be\/\">Enabling Modern Authentication for Outlook \u2013 How Hard Can It Be? \u2013 IT Blog (ldlnet.net)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I wanted to forward this article to everyone for review. This article could not come at a better time with the transition<\/p>\n<p class=\"link-more\"><a class=\"myButt \" href=\"https:\/\/itblog.ldlnet.net\/index.php\/2022\/05\/05\/basic-authentication-deprecation-in-exchange-online-may-2022-update\/\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":877,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,265,194,266],"tags":[9,303,148],"class_list":["post-170902","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-exchange","category-microsoft365","category-office365","category-security-and-compliance","tag-exchange","tag-exchange-online","tag-exchange-upgrade","odd"],"_links":{"self":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/170902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/comments?post=170902"}],"version-history":[{"count":4,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/170902\/revisions"}],"predecessor-version":[{"id":170950,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/posts\/170902\/revisions\/170950"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/media\/877"}],"wp:attachment":[{"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/media?parent=170902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/categories?post=170902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itblog.ldlnet.net\/index.php\/wp-json\/wp\/v2\/tags?post=170902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}