Windows OS Hub
  • Windows Server
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Active Directory Domain Services (AD DS)
    • Group Policies
  • Windows Clients
    • Windows 11
    • Windows 10
    • Windows 8
    • Windows 7
    • Windows XP
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
    • KVM
  • PowerShell
  • Exchange
  • Cloud
    • Azure
    • Microsoft 365
    • Office 365
  • Linux
    • CentOS
    • RHEL
    • Ubuntu
  • Home
  • About

Windows OS Hub

  • Windows Server
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Active Directory Domain Services (AD DS)
    • Group Policies
  • Windows Clients
    • Windows 11
    • Windows 10
    • Windows 8
    • Windows 7
    • Windows XP
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
    • KVM
  • PowerShell
  • Exchange
  • Cloud
    • Azure
    • Microsoft 365
    • Office 365
  • Linux
    • CentOS
    • RHEL
    • Ubuntu

 Windows OS Hub / Microsoft 365 / Enabling Modern or Basic Authentication for Microsoft 365

April 27, 2022 AzureMicrosoft 365Office 365Outlook

Enabling Modern or Basic Authentication for Microsoft 365

Modern Authentication is enabled by default for all new Microsoft 365/Azure tenants. This authentication protocol is more secure than the legacy Basic Authentication. Microsoft plans to completely block the use of Basic Authentication for all Microsoft 365 clients starting October 1, 2021. In this article, we’ll look at how to enable or disable Modern and Basic Authentication in Microsoft 365.

Contents:
  • Modern Authentication vs. Basic Auth
  • Basic Authentication Sign-in Log in Azure AD
  • How to Enable Modern Authentication for Microsoft 365 Tenant?
  • Modern Authentication in Outlook 365/2019/2016/2013/2010

Modern Authentication vs. Basic Auth

Microsoft currently supports the following types of authentication for Office 365 (Microsoft 365):

  • Basic Authentication – this type of authentication is familiar to all Windows users. Basic auth is performed through a simple Windows Security window that prompts for a credential (username and password) and prompts you to save your password to the Windows Credential Manager. This authentication type doesn’t support MFA (Multifactor Authentication) and is not robust against brute-force attacks. Applications store and explicitly use the username and password for authentication. basic authentication - windows security prompt
  • Modern Authentication is based on ADAL (Active Directory Authentication Library) and OAuth 2.0 protocols. Apps don’t store or use user credentials, and authentication is based on time-limited tokens. Modern Auth supports additional authentication factors including MFA. The window for entering a username and password when performing modern authentication looks like this. It will appear when connecting to Microsoft 365 services or connecting to Azure (including PowerShell connections). Modern Authentication sign-in prompt

Basic Authentication Sign-in Log in Azure AD

Before enabling modern authentication and disabling basic authentication, check which authentication protocols your Microsoft 365 users and apps use.

  1. Open the Azure Portal;
  2. Go to the Azure Active Directory -> Sign-in logs;
  3. Select the date range Last 1 month;
  4. Add filter by field Client App;
  5. Select all Legacy Authentication Clients for this filter.

This will allow you to find users and applications that are still using Basic Authentication. You need to migrate the found applications to the Modern Auth protocol. In my case, most of the events were associated with native email clients on smartphones, they need to be migrated to the MS Outlook app.

check for basic auth events in the azure sign-in logs

Microsoft automatically disables Basic Authentication for tenants where it is not used.

How to Enable Modern Authentication for Microsoft 365 Tenant?

You can enable Modern Authentication through the Microsoft 365 Admin Center.

  1. Open the M365 Admin portal https://admin.microsoft.com;
  2. Go to Settings -> Org Settings -> Modern authentication
  3. Enable the option Turn on modern authentication for Outlook 2013 for Windows and later;
  4. Save the changes.

microsoft 365 admin center - Turn on modern authentication for Outlook 2013 for Windows and later

As we mentioned, for new Office 365/Azure tenants, Basic Authentication is disabled by default for all apps. In this case, a warning will be displayed in this section:

Your organization has security defaults enabled, which means modern authentication to ‎Exchange Online‎ is required, and basic authentication connections are blocked. You must turn off security defaults in the ‎Azure‎ portal before you can change any settings here.

Your organization has security defaults enabled, which means modern authentication to ‎Exchange Online‎ is required, and basic authentication connections are blocked

You can enable Basic Auth support for a tenant from the Azure portal (Azure Active Directory -> Properties -> Manage Security defaults -> Enable Security defaults = No).

enable basic auth protocol support for azure tenant

Note a number of options under Allow access to basic authentication protocols. Here are the various applications where you can enable Basic Authentication.

  • Outlook client
  • Exchange ActiveSync (EAS)
  • Autodiscover
  • IMAP4
  • POP3
  • Authenticated SMTP (example of SMTP authentication from telnet)
  • Exchange Online PowerShell — (Basic Authentication is not supported for modern EXOv2 PowerShell Module)

Disable Basic Authentication for all apps and protocols that definitely don’t need it.

If you have authentication policies configured in your Office 365 tenant, you can display the current settings and protocols that are allowed to use Basic Authentication. Use the following PowerShell command:

Get-AuthenticationPolicy

Get-AuthenticationPolicy - check basic authentication protocols allowed to use in office 365

In our case, we have only one policy and BasicAuth is disabled for all apps.

AllowBasicAuthActiveSync : False
AllowBasicAuthAutodiscover : False
AllowBasicAuthImap : False
AllowBasicAuthMapi : False
AllowBasicAuthOfflineAddressBook : False
AllowBasicAuthOutlookService : False
AllowBasicAuthPop : False
AllowBasicAuthReportingWebServices : False
AllowBasicAuthRest : False
AllowBasicAuthRpc : False
AllowBasicAuthSmtp : False
AllowBasicAuthWebServices : False
AllowBasicAuthPowershell : False

For security purposes, you can create a separate policy with different Basic Auth permissions for specific protocols and assign it to users using the legacy application. In this example, we’ll allow a user to connect to Exchange Online through a remote PowerShell session with basic authentication:

Set-AuthenticationPolicy -Identity "BasicAuth_Allow_PoSh" -AllowBasicAuthPowershell:$true
Set-User -Identity k.muller -AuthenticationPolicy "BasicAuth_Allow_PoSh"

And the default policy will block legacy auth protocol:

New-AuthenticationPolicy -Name "BasicAuth_Block"
Set-OrganizationConfig -DefaultAuthenticationPolicy BasicAuth_Block

Also, note that there is another OAuth2ClientProfileEnabled option in the organization settings, which determines whether Modern Auth is enabled for the tenant:

Get-OrganizationConfig | ft OAuth*

If OAuth2ClientProfileEnabled = False, it means that modern authentication is disabled.

OAuth2ClientProfileEnabled - modern authentication (ADAL) is enabled for Microsoft 365 tenant

Modern Authentication in Outlook 365/2019/2016/2013/2010

Please note the specifics of support for modern authentication in different Outlook versions:

  • Outlook 2010 and earlier – don’t support Modern Auth. If Basic Auth is disabled in the tenant settings, these versions of Outlook won’t be able to connect to Exchange Online mailboxes on Microsoft 365;
  • Outlook 2013 – to support OAuth, you need to set two registry parameters under the key HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Common\Identity (EnableADAL = 1 and Version = 1;
  • Outlook 365, 2019, 2016 – modern authentication is supported by default. In order to always use Modern Auth first, set the AlwaysUseMSOAuthForAutoDiscover = 1 under the reg key HKEY_CURRENT_USER\Software\Microsoft\Exchange (if this option is not enabled, Outlook may continually prompt for the password to connect);

You can verify that the Outlook client is using Modern Authentication to connect to Office 365 mailbox. Hold Ctrl and click on the Outlook icon in the tray. Make sure Bearer* is specified in the Authn field in the Outlook Connection Status. This means Outlook is using modern authentication.

outlook bearer* auth protocol means that basic authentication in used to connect to office 365

1 comment
4
Facebook Twitter Google + Pinterest
previous post
Storing BitLocker Recovery Keys in Active Directory
next post
Fine-Grained Password Policy in Active Directory

Related Reading

Removing Azure Arc Setup Feature on Windows Server...

November 9, 2023

Send Emails with Microsoft Graph API and PowerShell

November 6, 2023

PowerShell: Configure Certificate-Based Authentication for Exchange Online (Azure)

October 15, 2023

Configure Email Forwarding for Mailbox on Exchange Server/Microsoft...

September 14, 2023

Disable Welcome Message for Microsoft 365 Groups

August 28, 2023

1 comment

Mike September 29, 2021 - 12:42 pm

The Exchange Team:
Today, we are announcing that, effective October 1, 2022, we will begin to permanently disable Basic Auth in all tenants, regardless of usage, with the exception of SMTP Auth.
IMPORTANT: Beginning early 2022, we will selectively pick tenants and disable Basic Auth for all affected protocols except SMTP AUTH for a period of 12-48 hours. After this time, Basic Auth for these protocols will be re-enabled, if the tenant admin has not already re-enabled them using our self-service tools.

Reply

Leave a Comment Cancel Reply

Categories

  • Active Directory
  • Group Policies
  • Exchange Server
  • Microsoft 365
  • Azure
  • Windows 11
  • Windows 10
  • Windows Server 2022
  • Windows Server 2019
  • Windows Server 2016
  • PowerShell
  • VMWare
  • Hyper-V
  • Linux
  • MS Office

Recent Posts

  • How to Connect VPN Before Windows Logon

    November 14, 2023
  • Removing Azure Arc Setup Feature on Windows Server 2022

    November 9, 2023
  • Using WPAD (Web Proxy Auto-Discovery Protocol) on Windows

    November 7, 2023
  • Send Emails with Microsoft Graph API and PowerShell

    November 6, 2023
  • Zabbix: How to Get Data from PowerShell Scripts

    October 27, 2023
  • Tracking Printer Usage with Windows Event Viewer Logs

    October 19, 2023
  • PowerShell: Configure Certificate-Based Authentication for Exchange Online (Azure)

    October 15, 2023
  • Reset Root Password in VMware ESXi

    October 12, 2023
  • How to Query and Change Teams User Presence Status with PowerShell

    October 8, 2023
  • How to Increase Size of Disk Partition in Ubuntu

    October 5, 2023

Follow us

  • Facebook
  • Twitter
  • Telegram
Popular Posts
  • Checking User Sign-in Logs in Azure AD (Microsoft 365)
  • Whitelist Domains and Email Addresses on Exchange Server and Microsoft 365
  • Using Microsoft Graph API to Access Azure via PowerShell
  • How to Reset User Password in Azure Active Directory (Microsoft 365)
  • Enable or Disable MFA for Users in Azure/Microsoft 365
  • Get User or Group Creation Date in Azure AD (or MS365) with PowerShell
  • Manage Groups in Azure AD and Microsoft 365 Using PowerShell
Footer Logo

@2014 - 2023 - Windows OS Hub. All about operating systems for sysadmins


Back To Top