Microsoft is continuing to enhance security and will be removing one of the last remaining outdated login methods in Exchange Online in the coming months: Basic Authentication for SMTP AUTH Client Submission. Many companies still use this method for automated processes – often unknowingly and deeply integrated into business processes.
With the discontinuation of Basic Authentication for Client Submission (SMTP AUTH), Microsoft is consistently pursuing its multi-year plan to improve cloud security. The schedule has been set: Microsoft will begin rejecting the first Basic Auth connections on 1 March 2026, and Basic Authentication for SMTP AUTH will be completely disabled on 30 April 2026. What may sound like a minor technical change at first glance can have a direct impact on business processes – for example, if invoices, alerts or status messages can no longer be sent by email. Now is the right time for companies to review their own environments and plan the transition in a structured manner.
Basic Authentication is now a fundamental security risk. Usernames and passwords are only transmitted in Base64-encoded form for each connection – an open gateway for phishing, brute force attacks and credential stuffing.
Even more critically, Basic Auth undermines modern security concepts because it does not support multi-factor authentication (MFA). As long as a tenant accepts Basic Auth, a backdoor remains open – even if strong security mechanisms have already been implemented elsewhere.
Microsoft is therefore following a clear line: away from password-based logins, towards zero trust and modern, token-based authentication using OAuth 2.0. OAuth 2.0 significantly reduces the risk of stolen passwords, can be controlled granularly and forms the basis for stable security controls. Basic Authentication has already been disabled for other protocols; with SMTP AUTH, one of the last remaining exceptions is now being removed.
Imagine checking into a hotel. Instead of receiving the master key for the building (password/basic authentication), you are given a key card (token). This card only opens your room and perhaps the fitness area – and only for the duration of your stay. If the card is stolen, the vault remains secure.
This is exactly how OAuth 2.0 works: an application (e.g. a scanner) does not receive your password, but a time-limited access token. This token only allows clearly defined actions (e.g. ‘send email’) and can be revoked at any time without having to change the main password. This significantly increases security, keeps the login process compatible with modern methods such as MFA, and noticeably reduces the risk of compromised access data.
To ensure that the changeover does not happen overnight, Microsoft has deliberately divided the process into several steps. Since October 2024, an updated report for SMTP AUTH client submission has been available in the Exchange Admin Centre. This report shows which devices and applications still use basic authentication. For administrators, this is the starting point for creating transparency and compiling a complete list of all affected systems.
On 1 March 2026, Microsoft will begin to specifically reject a small portion of Basic Auth connections. This is intentional and serves as a practical test: systems that sporadically stop sending emails from this point onwards will need to take action. This gives companies a clear signal before the change takes effect permanently.
On 30 April 2026, Basic Authentication for SMTP AUTH will be completely deactivated. Any connection attempt with Basic Auth will be rejected and acknowledged with the message ‘550 5.7.30 Basic authentication is not supported for Client Submission’. No further extension or exemption is planned.
In theory, switching to OAuth 2.0 is easy. In practice, however, it often fails due to the existing infrastructure in the background. While laptops and smartphones have long been modernised, printers, scanners, older ERP systems and scripts continue to stubbornly communicate using usernames and passwords.
Typical examples include a scanner that sends delivery notes to a central mailbox address, an ERP system that automatically sends order confirmations by email, or a monitoring tool that sends alerts to the on-call service in the event of malfunctions. For many of these devices, there are no longer any current firmware updates available. A complete hardware or system replacement would be technically possible, but often disproportionate in economic terms.
That is why a systematic analysis of existing connections is the most important first step. If you know early on where basic authentication is still in use, you can carry out the changeover in a planned, risk-aware manner and without time pressure.
Companies should proceed in a structured manner:
The strategy should be two-pronged.
It is tempting to put off dealing with this issue. However, those who delay the transition risk automated email delivery failures from May 2026 onwards: invoices will remain stuck in the ERP, scan-to-mail functions will fail, and alerts from monitoring systems will no longer reach anyone. Individual disruptions can quickly become a business risk – with consequences for efficiency, customer satisfaction and, in some circumstances, compliance. This means that the changeover is not just a technical detail, but a business-critical project.
As a bridging technology, MTF offers an SMTP mail relay service from the MTF Business Cloud. The service is specially designed for scenarios in which systems that do not support modern authentication must continue to operate but still need to send emails reliably.
The relay service runs in our highly available Swiss cloud environment, is optimised for sending from applications and devices, and can be integrated into existing security and compliance requirements in a controlled manner. Companies retain control over senders, routing and policies, while the technical complexity of connecting to Exchange Online is reduced.
The advantages of this solution are obvious:
The decision to disable Basic Authentication for SMTP AUTH has been made. Companies have until April 2026 to adapt their environment – but this time should be used actively. The next steps include a structured inventory, evaluation of affected systems and a decision on modernisation or a relay solution.
MTF supports you in making this transition predictable and secure. We analyse your Exchange Online environment, identify all relevant connections and work with you to develop a migration plan – from direct conversion to OAuth 2.0 to integration of the SMTP Mail Relay Service from the MTF Business Cloud.
If you want to ensure that your email communication continues to function smoothly after April 2026, it is worth discussing this with us at an early stage. Contact us for a no-obligation consultation – we will guide you step by step through the transition.