Sign-ins using legacy authentication workbook
Have you ever wondered how you can determine whether it is safe to turn off legacy authentication in your tenant? The sign-ins using legacy authentication workbook helps you to answer this question.
This article gives you an overview of this workbook.
Azure AD supports several of the most widely used authentication and authorization protocols including legacy authentication. Legacy authentication refers to basic authentication, which was once a widely used industry-standard method for passing user name and password information through a client to an identity provider.
Examples of applications that commonly or only use legacy authentication are:
Microsoft Office 2013 or older.
Apps using legacy auth with mail protocols like POP, IMAP, and SMTP AUTH.
Single-factor authentication (for example, username and password) doesn’t provide the required level of protection for today’s computing environments. Passwords are bad as they are easy to guess and humans are bad at choosing good passwords.
Unfortunately, legacy authentication:
Does not support multi-factor authentication (MFA) or other strong authentication methods.
Makes it impossible for your organization to move to passwordless authentication.
To improve the security of your Azure AD tenant and experience of your users, you should disable legacy authentication. However, important user experiences in your tenant might depend on legacy authentication. Before shutting off legacy authentication, you may want to find those cases so you can migrate them to more secure authentication.
The sign-ins using legacy authentication workbook lets you see all legacy authentication sign-ins in your environment so you can find and migrate critical workflows to more secure authentication methods before you shut off legacy authentication.
With this workbook, you can distinguish between interactive and non-interactive sign-ins. This workbook highlights which legacy authentication protocols are used throughout your tenant.
The data collection consists of three steps:
Select a legacy authentication protocol, and then select an application to filter by users accessing that application.
Select a user to see all their legacy authentication sign-ins to the selected app.
View all legacy authentication sign-ins for the user to understand how legacy authentication is being used.
This workbook supports multiple filters:
Time range (up to 90 days)
User principal name
Status of the sign-in (success or failure)
For guidance on blocking legacy authentication in your environment, see Block legacy authentication to Azure AD with conditional access.
Many email protocols that once relied on legacy authentication now support more secure modern authentication methods. If you see legacy email authentication protocols in this workbook, consider migrating to modern authentication for email instead. For more information, see Deprecation of Basic authentication in Exchange Online.
Some clients can use both legacy authentication or modern authentication depending on client configuration. If you see “modern mobile/desktop client” or “browser” for a client in the Azure AD logs, it is using modern authentication. If it has a specific client or protocol name, such as “Exchange ActiveSync”, it is using legacy authentication to connect to Azure AD. The client types in conditional access, and the Azure AD reporting page in the Azure Portal demarcate modern authentication clients and legacy authentication clients for you, and only legacy authentication is captured in this workbook.
Submit and view feedback for