At line 13 added one line |
---- |
At line 15 changed one line |
đź”´ App Passwords do not work with SMTP/IMAP/POP for these accounts anymore. __Microsoft has deprecated basic auth for personal accounts.__\\ |
🔴 App Passwords do not work with SMTP/IMAP/POP for these accounts anymore. __⚠️ Microsoft has deprecated basic auth for personal accounts__.\\ |
At line 18 added one line |
---- |
At line 19 changed one line |
For Microsoft 365 (work or school) accounts, __App Passwords__ and __Multi-Factor Authentication (MFA)__ are managed centrally by your organization through __Microsoft Entra ID (formerly Azure Active Directory)__ — not through the personal Microsoft account portal. |
For Microsoft 365 (work or school) accounts, __App Passwords__ and __Multi-Factor Authentication (MFA)__ are managed centrally by your organization through __Microsoft Entra ID (formerly Azure Active Directory)__ — not through the personal Microsoft account portal.\\ |
At line 21 changed 2 lines |
How to Set Up __MFA for Microsoft 365 Work Accounts__:\\ |
a. Go to: https://mysignins.microsoft.com/security-info\\ |
__How to enable App Passwords:__:\\ |
• Go to the legacy __MFA portal__: [MultifactorVerification Link|https://account.activedirectory.windowsazure.com/UserManagement/MultifactorVerification.aspx] (Admin user)\\ |
• Click on the __Service settings__ tab.\\ |
• Enable the flag: __Allow users to create app passwords to sign in to non-browser apps__\\ |
[SMTP Microsoft Graph XOAUTH 2 Integration/microsoft_enable_app_password.png]\\ |
\\ |
__Check App Password Availability:__\\ |
a. Go to: [Security info Link| https://mysignins.microsoft.com/security-info]\\ |
At line 27 changed one line |
d. If enabled by your admin, you will see an __App passwords__ link in the menu to generate one\\ |
d. If enabled by your admin, click on __+Add sign-in method__ button and you will see an __App passwords__ link in the menu to generate one:\\ |
[SMTP Microsoft Graph XOAUTH 2 Integration|microsoft_app_password.png]\\ |
e. If you don’t see the __App passwords__ option: |
Check and enforce MFA:\\ |
• Go to [MultifactorVerification Link|https://account.activedirectory.windowsazure.com/UserManagement/MultifactorVerification.aspx] (Admin user)\\ |
• Find the target user.\\ |
• In the __MFA Status__ column, confirm it says: __Enforced__. Otherwise, enable __MFA__.\\ |
At line 29 changed 7 lines |
__App Passwords in Microsoft 365__:\\ |
• App passwords are only available if explicitly allowed by your organization’s admin.\\ |
• They are used for legacy applications that don’t support modern authentication (OAuth2) — such as:\\ |
__-__ Old Outlook versions\\ |
__-__ SMTP/IMAP-based apps\\ |
• If disabled via Microsoft Entra policies, the App passwords option will not appear at all in your security settings.\\ |
• Admins can enable or disable this via Entra ID → Security > MFA > Additional cloud-based MFA settings\\ |
__Check if Security Defaults are enabled:__\\ |
__App Passwords__ will not work if __Microsoft Entra ID Security Defaults__ are __enabled__ for your __tenant__.\\ |
To disable them:\\ |
• Go to the Microsoft Entra admin portal [Microsoft EntraLink|https://entra.microsoft.com] (Admin user)\\ |
• Navigate to: __Identity > Overview > Properties__ Scroll down to Security Defaults and click __Manage security defaults__\\ |
•Select Disable, then click Save. __Changes may take 5–10 minutes to take effect.__\\ |
[SMTP Microsoft Graph XOAUTH 2 Integration|microsoft_security_details.png]\\ |
[SMTP Microsoft Graph XOAUTH 2 Integration|tenant_security_defaults.png]\\ |
At line 52 added 7 lines |
đź”´ __Error message__ like:\\ |
{{{Authentication unsuccessful, user is locked by your organization's security defaults policy. Contact your administrator.}}} |
This indicates that your Microsoft 365 tenant has __Security Defaults__ enabled, which blocks __App Passwords__ completely, even if they were created successfully. Disable Security Defaults (if you’re the admin) [Microsoft Entra Link|https://entra.microsoft.com]. __Identity -> Overview -> Properties -> Manage security defaults__ \\ |
\\ |
---- |
\\ |
Usage:\\ |
At line 64 added one line |
---- |
At line 51 changed 2 lines |
This requires a __Microsoft Graph__ application registration. Start by visiting the Microsoft Azure portal: |
[Link|https://azure.microsoft.com/en-us/features/azure-portal/]\\ |
This requires a __Microsoft Graph__ application registration.\\ |
At line 76 added 2 lines |
Start by visiting the __Microsoft Azure Portal__: [Link|https://azure.microsoft.com/en-us/features/azure-portal/]\\ |
\\ |
At line 58 changed one line |
The Redirect URL must end with __register_microsoft_graph_api/__.\\ |
In the Redirect URI section, for Platform configuration, select __Web__. The Redirect URL must end with __register_microsoft_graph_api/__.\\ |