Skip to main content

End of Basic Auth SMTP on Microsoft Exchange Online: timeline, 550 5.7.30 error, and migration guide

By CaptainDNS
Published on February 20, 2026

Diagram illustrating the transition from Basic Auth to OAuth 2.0 for SMTP AUTH on Exchange Online
TL;DR
  • Microsoft is retiring Basic Auth for SMTP AUTH (Client Submission) on Exchange Online: disabled by default in late December 2026 for existing tenants, with a final removal date to be announced in H2 2027.
  • Any client still using Basic Auth will receive the error 550 5.7.30 Basic authentication is not supported for Client Submission.
  • Five alternatives: OAuth 2.0 SMTP, High Volume Email (HVE), Azure Communication Services, on-premises SMTP relay, Microsoft Graph API.
  • Start inventorying your Basic Auth senders now using the SMTP AUTH report in the Exchange Admin Center.

Since 2019, Microsoft has been gradually eliminating Basic authentication (username + password) from its Exchange Online protocols. EAS, POP, IMAP, EWS, PowerShell: all were migrated to Modern Auth by the end of 2022. The last holdout was SMTP AUTH Client Submission, the protocol used by multifunction printers, sending scripts, and line-of-business applications to submit emails through smtp.office365.com on port 587.

In April 2024, Microsoft announced the end of this last holdout. After several postponements (September 2025, then March 2026), the revised January 2026 timeline grants additional time, but the message is clear: Basic Auth SMTP is on its way out, and every organization needs to plan its migration.

This article covers the exact timeline, affected systems, the five available alternatives, and a hands-on migration checklist.

What is Basic Auth SMTP and why is it a problem?

Basic authentication for SMTP works simply: the client encodes the username and password in Base64 and transmits them to the server in the AUTH LOGIN or AUTH PLAIN command. Even when the connection is encrypted with TLS (STARTTLS on port 587), the credentials are reusable, never expire, and lack a second factor.

C: AUTH LOGIN
S: 334 VXNlcm5hbWU6
C: dXNlckBjYXB0YWluZG5zLmNvbQ==
S: 334 UGFzc3dvcmQ6
C: bW90ZGVwYXNzZQ==
S: 235 2.7.0 Authentication successful

This mechanism creates three major risks:

RiskDescription
Credential theftAn attacker intercepting the session (even if encrypted) or compromising local storage retrieves a permanent password
Brute-force attacksWithout client-side rate limiting, credentials can be tested at scale
MFA incompatibilityBasic Auth does not support multi-factor authentication, a cornerstone of Zero Trust

OAuth 2.0 addresses all three issues: tokens are temporary (60 min by default), revocable, scoped to a specific permission (SMTP.Send), and compatible with MFA and conditional access.

Comparison diagram between the Basic Auth flow and the OAuth 2.0 flow for SMTP AUTH on Exchange Online

SMTP AUTH Client Submission vs SMTP Relay

It's important to distinguish between two sending mechanisms in Exchange Online:

FeatureClient Submission (port 587)SMTP Relay (port 25)
Endpointsmtp.office365.comExchange Online inbound connector
AuthenticationUsername + password (Basic or OAuth)Source IP address (no credentials)
Affected by this retirementYesNo
RecipientsInternal and externalInternal only (by default)

The Basic Auth retirement only affects Client Submission. IP-based SMTP relays (option 2 in Microsoft's documentation) are not affected.

Complete retirement timeline

The timeline has been revised several times. Here is the consolidated schedule as of February 19, 2026:

DateEvent
November 2019Initial "Improving Security Together" announcement
October 2022Basic Auth disabled for EAS, POP, IMAP, EWS, PowerShell. SMTP AUTH spared
April 2024Basic Auth retirement announced for SMTP AUTH Client Submission (target: Sept 2025)
Mid-October 2024SMTP AUTH report updated in EAC (Basic vs OAuth distinction)
December 2025Postponement: new target date March-April 2026
January 27, 2026Revised timeline: extension through late 2026
Late December 2026Basic Auth SMTP disabled by default for existing tenants (re-enableable by admin)
After December 2026New tenants: Basic Auth SMTP unavailable by default, OAuth only
H2 2027Microsoft will announce the final removal date (irreversible)

The 550 5.7.30 error

After the disablement, any client attempting Basic authentication will receive:

550 5.7.30 Basic authentication is not supported for Client Submission.

This error is a permanent rejection (5xx code). The sending server will not retry. Emails are not queued: they are lost immediately.

Who is affected?

Any application or device sending emails through smtp.office365.com or smtp-legacy.office365.com with a username and password is affected.

Typically affected systems

CategoryExamples
Multifunction printersScan-to-email (Xerox, HP, Canon, Ricoh, Konica Minolta)
Line-of-business apps (LOB)ERP, CRM, ticketing systems, helpdesk
Automated scriptsPowerShell Send-MailMessage, Python smtplib, cron jobs
Print serversJob completion notifications
Monitoring systemsNagios, Zabbix, PRTG alerts via SMTP
IoT devicesNAS (Synology, QNAP), IP cameras, home automation controllers
Legacy SaaS applicationsInternal tools without OAuth support

How to identify Basic Auth senders

Microsoft updated the SMTP AUTH report in the Exchange Admin Center (EAC) in October 2024 to distinguish Basic Auth connections from OAuth connections.

  1. Sign in to admin.exchange.microsoft.com
  2. Go to Reports > Mail flow > SMTP Auth Clients report
  3. Filter by authentication type to isolate Basic Auth senders

Each row shows the sender address, message count, and authentication type used.

Alternative 1: OAuth 2.0 for SMTP AUTH

This is Microsoft's recommended solution for clients and applications that can handle OAuth tokens.

Prerequisites

  1. Register an application in Microsoft Entra (Azure AD)
  2. Add the SMTP.Send permission (interactive flow) or SMTP.SendAsApp (application flow)
  3. Obtain admin consent for the tenant

Two possible flows

FlowUse caseMFAToken
Authorization CodeInteractive apps (user present)YesOn behalf of the user
Client CredentialsServer scripts, daemons, servicesNo (service principal)On behalf of the application

SMTP session with OAuth

The client uses the SASL XOAUTH2 mechanism:

C: AUTH XOAUTH2 dXNlcj1hbGVydHNAY2FwdGFpbmRucy5jb20BYXV0aD1CZWFyZXIgZXl
KMGVYQUlPaUpLVjFRaUxDSmhiR2NpT2lKU1V6STFOaUo5Li4uAQE=
S: 235 2.7.0 Authentication successful

The Base64 token encodes user=alerts@captaindns.com followed by the OAuth Bearer token. The token expires after 60 minutes; the client must handle renewal via the refresh token.

Limitations

  • Multifunction printers (MFP) and IoT devices generally do not support OAuth
  • Requires an application registration in Entra ID
  • The Client Credentials flow requires registering a Service Principal in Exchange Online via PowerShell

Alternative 2: High Volume Email (HVE)

The HVE service is designed for high-volume internal sending from applications and devices.

FeatureValue
Endpointsmtp-hve.office365.com
Port587 (TLS required)
AuthenticationBasic Auth (maintained for HVE)
RecipientsInternal only (external removed in June 2025)
Account limit100 HVE accounts per tenant
Recipient limit50 per message
Sent Items folderNo

When to use HVE

HVE is suitable when:

  • The device does not support OAuth (MFP, IoT)
  • Emails are exclusively internal (alerts, notifications, scan-to-email to tenant mailboxes)
  • Volume is high (no rate limit on recipients)

Creating an HVE account

Via the EAC: Mail flow > High Volume Email (Preview) > Add HVE account.

Or via PowerShell:

New-MailUser -HVEAccount -Name "Scanner Alerts" -PrimarySmtpAddress "scanner-alerts@captaindns.com"

Warning: HVE is in public preview. Microsoft reserves the right to suspend the service. Do not assign licenses to HVE accounts.

Alternative 3: Azure Communication Services Email

Azure Communication Services (ACS) Email enables both internal and external sending via a REST API or SDKs (.NET, Python, JavaScript, Java).

FeatureValue
ProtocolREST API / SDK
AuthenticationAccess key or Managed Identity
RecipientsInternal and external
PricingPay-per-use (per email sent)
Native SMTPNo (API only)

ACS is relevant for cloud-native applications that can integrate an SDK. It is not suitable for physical devices (printers, scanners) that only speak SMTP.

Alternative 4: on-premises SMTP relay

For organizations in a hybrid configuration (Exchange Online + on-premises Exchange Server), a local SMTP relay remains an option.

Diagram of the on-premises SMTP relay flow to Exchange Online in a hybrid configuration

How it works

  1. Devices (MFP, IoT, scripts) send to the local Exchange server via port 25 (anonymous relay)
  2. The Receive connector is configured to accept connections from an internal IP range
  3. The local Exchange server relays to Exchange Online via the Send connector

Receive connector configuration

New-ReceiveConnector -Name "Anonymous Relay" `
  -TransportRole FrontendTransport `
  -Usage Custom `
  -Bindings 0.0.0.0:25 `
  -RemoteIPRanges 192.168.1.0/24 `
  -PermissionGroups AnonymousUsers

Pros and cons

ProsCons
No OAuth needed on the device sideRequires maintaining an on-premises Exchange server
Works with any SMTP-capable deviceInfrastructure complexity and licensing costs
Internal and external sendingAdditional point of failure

Alternative 5: Microsoft Graph API

For scripts and applications, the Graph API offers the /users/{id}/sendMail endpoint as a superior replacement for SMTP.

curl -X POST "https://graph.microsoft.com/v1.0/users/alerts@captaindns.com/sendMail" \
  -H "Authorization: Bearer $TOKEN" \
  -H "Content-Type: application/json" \
  -d '{
    "message": {
      "subject": "Alerte monitoring",
      "body": {"contentType": "Text", "content": "Le serveur DNS est indisponible."},
      "toRecipients": [{"emailAddress": {"address": "ops@captaindns.com"}}]
    }
  }'

Graph API is ideal for replacing PowerShell scripts (Send-MailMessage is deprecated) and server applications. It is not suitable for hardware devices that can only execute SMTP.

Alternatives comparison table

CriterionOAuth SMTPHVEAzure CSOn-prem relayGraph API
Internal sendingYesYesYesYesYes
External sendingYesNoYesYesYes
Supports MFP/IoTNoYesNoYesNo
Basic Auth maintainedNoYesN/AYesNo
Migration effortMediumLowMediumHighMedium
Additional costNoneNonePay-per-useExchange licenseNone
MFA/Conditional AccessYesNoNoNoYes

Migration checklist

Migrate from Basic Auth SMTP to a secure alternative

Six steps to identify, categorize, and migrate your SMTP senders before Basic Auth is disabled on Exchange Online.
  1. Step 1: Enable and review the SMTP AUTH report

    Sign in to the Exchange Admin Center. Go to Reports > Mail flow > SMTP Auth Clients report. Filter by Basic authentication type. Export the list of senders.

  2. Step 2: Inventory and categorize each sender

    For each identified sender, determine: the device or application type, its ability to support OAuth, the recipients (internal only or internal + external), and the monthly sending volume.

  3. Step 3: Choose the right alternative for each category

    OAuth-capable apps: migrate to OAuth SMTP. Internal printers/scanners: use HVE. Scripts: switch to Graph API. Legacy devices with external sending: deploy an on-premises relay or Azure Communication Services.

  4. Step 4: Implement and test in parallel

    Configure the new authentication method for each sender. Test sending in parallel with Basic Auth while it is still active. Check the headers of received emails to confirm OAuth authentication.

  5. Step 5: Proactively disable Basic Auth

    Before Microsoft's disablement, create an Authentication Policy in Exchange Online that blocks Basic Auth for SMTP: Set-AuthenticationPolicy -AllowBasicAuthSmtp:$false. Apply it to a pilot group, then gradually expand.

  6. Step 6: Monitor rejections after migration

    After the switch, monitor Exchange transport logs for 550 5.7.30 errors. Each occurrence signals an unmigrated sender. Address them one by one by applying the appropriate alternative.

Impact on deliverability and security

The Basic Auth retirement does not affect SPF, DKIM, or DMARC. These email authentication protocols operate at the DNS level and remain independent of the SMTP authentication method.

However, the migration provides an opportunity to strengthen your security posture:

  • MFA everywhere: OAuth enables enforcing multi-factor authentication on interactive sending accounts
  • Revocable tokens: unlike a compromised password that remains valid until changed, an OAuth token expires automatically
  • Conditional access: you can restrict SMTP sending to specific IP ranges, compliant devices, or time windows
  • Granular auditing: OAuth connections are traceable in Entra ID logs with details on the application and scope used

This move by Microsoft is part of a broader trend. Google and Yahoo imposed stricter authentication requirements for bulk senders starting in 2024. Securing the SMTP sending channel is the logical next step.

FAQ

Is Basic Auth SMTP already disabled on Exchange Online?

No. As of February 19, 2026, Basic Auth SMTP still works normally. The default disablement is scheduled for late December 2026 on existing tenants. Admins will be able to temporarily re-enable it. The final removal date will be announced in H2 2027.

My printer doesn't support OAuth, what should I do?

Two options: use High Volume Email (HVE), which maintains Basic Auth on a dedicated endpoint (smtp-hve.office365.com) for internal sending only. Or deploy an on-premises SMTP relay (hybrid Exchange Server or third-party SMTP server) that accepts connections without OAuth and relays to Exchange Online.

Can I request an exception from Microsoft?

No. Microsoft is explicit: no exceptions will be granted. Technical support cannot permanently re-enable Basic Auth or grant waivers. The only solution is to migrate to an alternative.

Does HVE support sending to external recipients?

No. Since June 2025, HVE only supports internal sending (recipients within the same tenant). For external sending, use OAuth SMTP, Azure Communication Services, an on-premises relay, or Graph API.

How do I know if my applications use Basic Auth?

Check the SMTP AUTH report in the Exchange Admin Center (Reports > Mail flow > SMTP Auth Clients report). Since October 2024, this report distinguishes Basic Auth connections from OAuth connections. You can also check the Sign-in logs in Microsoft Entra for SMTP connections.

Is the 550 5.7.30 error permanent?

Yes. The 550 code is a permanent rejection (5xx). The sending server will not retry delivery. The email is lost. You must fix the source by migrating to OAuth or another alternative before Basic Auth is disabled.

Can Graph API replace SMTP for a scanner?

No. Scanners and multifunction printers communicate exclusively via SMTP. Graph API requires an HTTP client capable of executing REST requests with OAuth tokens, which is beyond these devices' capabilities. Use HVE or an on-premises relay for these cases.

What's the difference between SMTP Client Submission and SMTP Relay?

Client Submission (port 587) authenticates the sender with credentials (Basic or OAuth) via smtp.office365.com. SMTP Relay (port 25) authenticates by source IP address via an Exchange Online connector. Only Client Submission is affected by the Basic Auth retirement.

Download the deployment checklist

Assistants can reuse the checklist via the JSON or CSV exports below.

Glossary

  • Basic Auth: authentication method that transmits the username and password encoded in Base64. No inherent protection against replay attacks.
  • OAuth 2.0: authorization protocol based on temporary tokens. Supports MFA and conditional access.
  • SASL XOAUTH2: SASL mechanism used to transmit an OAuth 2.0 token within an SMTP, IMAP, or POP session.
  • Client Submission: authenticated SMTP sending method via smtp.office365.com (port 587). The sender authenticates with credentials.
  • SMTP Relay: IP-based SMTP sending method without credentials. Uses an Exchange Online inbound connector.
  • HVE (High Volume Email): Microsoft 365 service enabling high-volume internal sending via smtp-hve.office365.com. Public preview.
  • Microsoft Entra: the new name for Azure Active Directory. Manages application registrations, permissions, and OAuth tokens.
  • Service Principal: application identity in Exchange Online, required for the OAuth Client Credentials flow.
  • MFA: multi-factor authentication. Not possible with Basic Auth, native with OAuth 2.0.

Sources

Similar articles