Microsoft Exchange Online Phases Out Legacy Tokens for Outlook Add-Ins: Transition to Nested App Authentication Required

Posted by

Microsoft Exchange Online is phasing out legacy tokens for Outlook add-ins, requiring a switch to Nested App Authentication (NAA). Tenant admins can now identify apps still using legacy tokens via PowerShell, helping ensure a smooth transition before discontinuation. Bullet points:

Microsoft Exchange Online: Legacy Token Support Ending Soon

If you’re managing Exchange Online and Outlook add-ins, there’s a crucial update you need to know. Microsoft is phasing out legacy Exchange tokens used for authentication in Outlook add-ins. This change affects only Exchange Online and requires action from tenant admins and developers.

What’s New?

Microsoft will discontinue Exchange legacy tokens as a valid authentication method for Outlook add-ins. Instead, all add-ins must switch to Nested App Authentication (NAA). This shift aims to enhance security and streamline authentication processes within Exchange Online.

As Nino Bilic from the Exchange Team puts it:

“Outlook add-ins used with Exchange Online will have to use Nested App Authentication (NAA) instead.”

How to Check Your Tenant’s Legacy Token Usage

To help administrators prepare, Microsoft updated its documentation with a handy PowerShell command. You can now run:

Get-AuthenticationPolicy-AllowLegacyExchangeTokens

This command lists all app IDs still requesting and receiving legacy Exchange tokens in your tenant.

Knowing which add-ins rely on legacy tokens is vital. It allows you to identify and update or replace outdated apps before the cutoff.

Why This Matters

Legacy tokens pose security risks and compatibility issues. Moving to NAA ensures better protection and smoother integration with modern Exchange Online features.

Microsoft’s Exchange Team emphasizes:

“This impacts Exchange Online only. Details are in the FAQ.”

So, it’s essential to review your environment soon. Ignoring this update could lead to authentication failures and disrupted workflows.

Next Steps for Admins and Developers

  • Run the PowerShell command to audit legacy token usage.
  • Identify add-ins still using legacy tokens.
  • Coordinate with developers to update add-ins to use Nested App Authentication.
  • Consult Microsoft’s updated documentation and FAQ for detailed guidance.

In summary, Microsoft’s move away from legacy tokens is a security-forward step. Staying ahead means auditing your Exchange Online tenant now and planning your migration to NAA.

Keep your add-ins secure and functional by embracing this change early. For tech-savvy admins, this is a straightforward but critical task to maintain a smooth Exchange Online experience.

  • Legacy Exchange tokens will no longer be supported for Outlook add-ins in Exchange Online.
  • Nested App Authentication (NAA) is the new required method for add-in authentication.
  • Exchange Online PowerShell cmdlet available to list app IDs using legacy tokens.
  • Documentation updated with detailed guidance and FAQs on the token transition.
  • Change affects Exchange Online only, emphasizing tenant admin action for compliance.
  • From the New blog articles in Microsoft Community Hub



    Related Posts
    Unlock New Possibilities with Windows Server Devices in Intune!

      Windows Server Devices Now Recognized as a New OS in Intune Microsoft has announced that Windows Server devices are Read more

    Unlock the Power of the Platform: Your Guide to Power Platform at Microsoft Ignite 2022

    Microsoft Power Platform is leading the way in AI-generated low-code app development. With the help of AI, users can quickly Read more

    Unlock the Power of Microsoft Intune with the 2210 October Edition!

    Microsoft Intune is an enterprise mobility management platform that helps organizations manage mobile devices, applications, and data. The October edition Read more

    Unlock the Power of Intune 2.211: What’s New for November!

    Microsoft Intune has released its November edition, featuring new updates to help IT admins better manage their organization’s mobile devices. Read more