Add new attachment

Only authorized users are allowed to upload new attachments.

List of attachments

Kind Attachment Name Size Version Date Modified Author Change note
png
»auth_smtp_office_365.png 44.1 kB 1 05-Dec-2023 05:32 krivacsz
png
»client_id.png 92.7 kB 1 05-Dec-2023 05:32 krivacsz
png
»enable_access_token.png 50.3 kB 1 05-Dec-2023 05:32 krivacsz
png
»microsoft_app_password.png 39.9 kB 2 06-Jun-2025 09:13 krivacsz
png
»microsoft_enable_app_password.... 150.5 kB 1 06-Jun-2025 09:13 krivacsz
png
»microsoft_security_details.png 164.8 kB 1 13-Jun-2025 03:31 krivacsz
png
»ms_client_secet.png 88.6 kB 2 03-May-2025 02:37 krivacsz
png
»new_registration.png 86.9 kB 1 05-Dec-2023 05:32 krivacsz
png
»new_secret.png 138.7 kB 1 05-Dec-2023 05:32 krivacsz
png
»permission_final.png 209.0 kB 1 05-Dec-2023 05:32 krivacsz
png
»permission_microsoft_graph.png 182.9 kB 1 05-Dec-2023 05:32 krivacsz
png
»pop_imap_task.png 141.8 kB 3 14-May-2025 02:49 krivacsz
png
»register_app.png 230.6 kB 1 05-Dec-2023 05:32 krivacsz
png
»smtp_from_email.png 50.3 kB 1 05-Dec-2023 05:32 krivacsz
png
»smtp_get_refresh_token.png 44.7 kB 2 05-Dec-2023 05:32 krivacsz
png
»tenant_security_defaults.png 74.0 kB 1 06-Jun-2025 09:30 krivacsz

This page (revision-202) was last changed on 13-Jun-2025 03:33 by krivacsz

This page was created on 05-Dec-2023 05:32 by krivacsz

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

-
Difference between version and

At line 13 added one line
----
At line 15 changed one line
🔴 App Passwords do not work with SMTP/IMAP/POP for these accounts anymore. __Microsoft has deprecated basic auth for personal accounts.__\\
🔴 App Passwords do not work with SMTP/IMAP/POP for these accounts anymore. __⚠️ Microsoft has deprecated basic auth for personal accounts__.\\
At line 18 added one line
----
At line 19 changed one line
For Microsoft 365 (work or school) accounts, App Passwords and 2FA (MFA) are managed centrally by your organization through Microsoft Entra ID (formerly Azure AD) — not through the personal Microsoft account portal.\\
For Microsoft 365 (work or school) accounts, __App Passwords__ and __Multi-Factor Authentication (MFA)__ are managed centrally by your organization through __Microsoft Entra ID (formerly Azure Active Directory)__ — not through the personal Microsoft account portal.\\
At line 21 changed 7 lines
How to Set Up __2FA for Microsoft 365 Work Account__:\\
a. Go to: [Microsoft Security Admin Link|https://aka.ms/mfasetup]\\
b. Sign in with your work email.\\
c. Follow the wizard to configure:\\
• Microsoft Authenticator (preferred)\\
• Phone call or SMS (if allowed by your org)\\
d. Click __App passwords__ (if available) in the menu to generate one.\\
__How to enable App Passwords:__:\\
• Go to the legacy __MFA portal__: [MultifactorVerification Link|https://account.activedirectory.windowsazure.com/UserManagement/MultifactorVerification.aspx] (Admin user)\\
• Click on the __Service settings__ tab.\\
• Enable the flag: __Allow users to create app passwords to sign in to non-browser apps__\\
[SMTP Microsoft Graph XOAUTH 2 Integration|microsoft_enable_app_password.png]\\
At line 29 changed 4 lines
__App Passwords in Microsoft 365__:\\
• App passwords are only available if your admin allows it.\\
• Used for legacy apps that don’t support modern authentication (e.g. old Outlook clients, SMTP apps).\\
• If disabled by policy, you won’t see the __App passwords__ link at all.\\
__Check App Password Availability:__\\
a. Go to: [Security info Link| https://mysignins.microsoft.com/security-info]\\
b. Sign in with your work or school email\\
c. Follow the prompts to configure MFA using:\\
• Microsoft Authenticator app (recommended)\\
• Phone call or SMS (if permitted by your organization’s policy)\\
d. If enabled by your admin, click on __+Add sign-in method__ button and you will see an __App passwords__ link in the menu to generate one:\\
[SMTP Microsoft Graph XOAUTH 2 Integration|microsoft_app_password.png]\\
e. If you don’t see the __App passwords__ option:
Check and enforce MFA:\\
• Go to [MultifactorVerification Link|https://account.activedirectory.windowsazure.com/UserManagement/MultifactorVerification.aspx] (Admin user)\\
• Find the target user.\\
• In the __MFA Status__ column, confirm it says: __Enforced__. Otherwise, enable __MFA__.\\
At line 43 added 15 lines
__Check if Security Defaults are enabled:__\\
__App Passwords__ will not work if __Microsoft Entra ID Security Defaults__ are __enabled__ for your __tenant__.\\
To disable them:\\
• Go to the Microsoft Entra admin portal [Microsoft EntraLink|https://entra.microsoft.com] (Admin user)\\
• Navigate to: __Identity > Overview > Properties__ Scroll down to Security Defaults and click __Manage security defaults__\\
•Select Disable, then click Save. __Changes may take 5–10 minutes to take effect.__\\
[SMTP Microsoft Graph XOAUTH 2 Integration|tenant_security_defaults.png]\\
\\
🔴 __Error message__ like:\\
{{{Authentication unsuccessful, user is locked by your organization's security defaults policy. Contact your administrator.}}}
This indicates that your Microsoft 365 tenant has __Security Defaults__ enabled, which blocks __App Passwords__ completely, even if they were created successfully. Disable Security Defaults (if you’re the admin) [Microsoft Entra Link|https://entra.microsoft.com]. __Identity -> Overview -> Properties -> Manage security defaults__ \\
\\
----
\\
Usage:\\
At line 63 added one line
----
Version Date Modified Size Author Changes ... Change note
202 13-Jun-2025 03:33 12.794 kB krivacsz to previous
201 13-Jun-2025 03:33 12.793 kB krivacsz to previous | to last
« This page (revision-202) was last changed on 13-Jun-2025 03:33 by krivacsz
G’day (anonymous guest)
CrushFTP11 | What's New

Referenced by
LeftMenu

JSPWiki