

Set-OrganizationConfig -DefaultAuthenticationPolicy BasicAuth_BlockĪlso, note that there is another OAuth2ClientProfileEnabled option in the organization settings, which determines whether Modern Auth is enabled for the tenant:

New-AuthenticationPolicy -Name "BasicAuth_Block" Set-User -Identity k.muller -AuthenticationPolicy "BasicAuth_Allow_PoSh"Īnd the default policy will block legacy auth protocol: Set-AuthenticationPolicy -Identity "BasicAuth_Allow_PoSh" -AllowBasicAuthPowershell:$true In this example, we’ll allow a user to connect to Exchange Online through a remote PowerShell session with basic authentication: In my case, most of the events were associated with native email clients on smartphones, they need to be migrated to the MS Outlook app.ĪllowBasicAuthReportingWebServices : Falseįor security purposes, you can create a separate policy with different Basic Auth permissions for specific protocols and assign it to users using the legacy application. You need to migrate the found applications to the Modern Auth protocol. This will allow you to find users and applications that are still using Basic Authentication. Select all Legacy Authentication Clients for this filter.Go to the Azure Active Directory -> Sign-in logs.It will appear when connecting to Microsoft 365 services or connecting to Azure (including PowerShell connections).īasic Authentication Sign-in Log in Azure ADīefore enabling modern authentication and disabling basic authentication, check which authentication protocols your Microsoft 365 users and apps use.
DISABLE AZURE SECURITY DEFAULTS PASSWORD
The window for entering a username and password when performing modern authentication looks like this. Modern Auth supports additional authentication factors including MFA. Apps don’t store or use user credentials, and authentication is based on time-limited tokens.
DISABLE AZURE SECURITY DEFAULTS HOW TO
How to Enable Modern Authentication for Microsoft 365 Tenant?.Basic Authentication Sign-in Log in Azure AD.
