At line 13 added one line |
---- |
At line 14 changed 5 lines |
__1.1 Personal account__:\\ |
Go to: [Microsoft Account Security Link|https://account.microsoft.com/security]:\\ |
• Scroll down to __App passwords__\\ |
• Click __Create a new app password__\\ |
• Microsoft will generate a 16-character password — copy it and use it in the app.\\ |
__1.1 Microsoft Personal Accounts__ (@outlook.com, @hotmail.com, etc.):\\ |
🔴 App Passwords do not work with SMTP/IMAP/POP for these accounts anymore. __⚠️ Microsoft has deprecated basic auth for personal accounts__.\\ |
At line 18 added one line |
---- |
At line 22 changed one line |
For Microsoft 365 (work or school) accounts, App Passwords and 2FA (MFA) are managed centrally by your organization through Microsoft Entra ID (formerly Azure AD) — not through the personal Microsoft account portal.\\ |
For Microsoft 365 (work or school) accounts, __App Passwords__ and __Multi-Factor Authentication (MFA)__ are managed centrally by your organization through __Microsoft Entra ID (formerly Azure Active Directory)__ — not through the personal Microsoft account portal.\\ |
At line 24 changed 7 lines |
How to Set Up __2FA for Microsoft 365 Work Account__:\\ |
a. Go to: [Microsoft Security Admin Link|https://aka.ms/mfasetup]\\ |
b. Sign in with your work email.\\ |
c. Follow the wizard to configure:\\ |
• Microsoft Authenticator (preferred)\\ |
• Phone call or SMS (if allowed by your org)\\ |
d. Click __App passwords__ (if available) in the menu to generate one.\\ |
__How to enable App Passwords:__:\\ |
• Go to the legacy __MFA portal__: [MultifactorVerification Link|https://account.activedirectory.windowsazure.com/UserManagement/MultifactorVerification.aspx] (Admin user)\\ |
• Click on the __Service settings__ tab.\\ |
• Enable the flag: __Allow users to create app passwords to sign in to non-browser apps__\\ |
[SMTP Microsoft Graph XOAUTH 2 Integration/microsoft_enable_app_password.png]\\ |
At line 32 changed 4 lines |
__App Passwords in Microsoft 365__:\\ |
• App passwords are only available if your admin allows it.\\ |
• Used for legacy apps that don’t support modern authentication (e.g. old Outlook clients, SMTP apps).\\ |
• If disabled by policy, you won’t see the __App passwords__ link at all.\\ |
__Check App Password Availability:__\\ |
a. Go to: [Security info Link| https://mysignins.microsoft.com/security-info]\\ |
b. Sign in with your work or school email\\ |
c. Follow the prompts to configure MFA using:\\ |
• Microsoft Authenticator app (recommended)\\ |
• Phone call or SMS (if permitted by your organization’s policy)\\ |
d. If enabled by your admin, click on __+Add sign-in method__ button and you will see an __App passwords__ link in the menu to generate one:\\ |
[SMTP Microsoft Graph XOAUTH 2 Integration|microsoft_app_password.png]\\ |
e. If you don’t see the __App passwords__ option: |
Check and enforce MFA:\\ |
• Go to [MultifactorVerification Link|https://account.activedirectory.windowsazure.com/UserManagement/MultifactorVerification.aspx] (Admin user)\\ |
• Find the target user.\\ |
• In the __MFA Status__ column, confirm it says: __Enforced__. Otherwise, enable __MFA__.\\ |
At line 43 added 16 lines |
__Check if Security Defaults are enabled:__\\ |
__App Passwords__ will not work if __Microsoft Entra ID Security Defaults__ are __enabled__ for your __tenant__.\\ |
To disable them:\\ |
• Go to the Microsoft Entra admin portal [Microsoft EntraLink|https://entra.microsoft.com] (Admin user)\\ |
• Navigate to: __Identity > Overview > Properties__ Scroll down to Security Defaults and click __Manage security defaults__\\ |
•Select Disable, then click Save. __Changes may take 5–10 minutes to take effect.__\\ |
[SMTP Microsoft Graph XOAUTH 2 Integration|microsoft_security_details.png]\\ |
[SMTP Microsoft Graph XOAUTH 2 Integration|tenant_security_defaults.png]\\ |
\\ |
🔴 __Error message__ like:\\ |
{{{Authentication unsuccessful, user is locked by your organization's security defaults policy. Contact your administrator.}}} |
This indicates that your Microsoft 365 tenant has __Security Defaults__ enabled, which blocks __App Passwords__ completely, even if they were created successfully. Disable Security Defaults (if you’re the admin) [Microsoft Entra Link|https://entra.microsoft.com]. __Identity -> Overview -> Properties -> Manage security defaults__ \\ |
\\ |
---- |
\\ |
Usage:\\ |
At line 64 added one line |
---- |
At line 51 changed 2 lines |
This requires a __Microsoft Graph__ application registration. Start by visiting the Microsoft Azure portal: |
[Link|https://azure.microsoft.com/en-us/features/azure-portal/]\\ |
This requires a __Microsoft Graph__ application registration.\\ |
At line 76 added 2 lines |
Start by visiting the __Microsoft Azure Portal__: [Link|https://azure.microsoft.com/en-us/features/azure-portal/]\\ |
\\ |
At line 58 changed one line |
The Redirect URL must end with __register_microsoft_graph_api/__.\\ |
In the Redirect URI section, for Platform configuration, select __Web__. The Redirect URL must end with __register_microsoft_graph_api/__.\\ |
At line 120 added one line |
---- |
At line 126 added one line |
---- |
At line 158 added one line |
---- |
At line 164 added one line |
---- |
At line 181 added one line |
---- |
At line 183 added one line |
---- |