The process of building custom applications and tools that interact with Microsoft SharePoint, including SharePoint Online in Microsoft 365.
Please note that our forum is a public platform, and we will modify your question to hide your personal information in the description. Kindly ensure that you hide any personal or organizational information the next time you post an error or other details to protect personal data.
Hi @Selvakumar K
Thank you for reaching out regarding the “Forbidden” error you are encountering when attempting to access SharePoint Online documents using app passwords.
I understand that this issue is caused by Microsoft’s platform-wide retirement of Basic Authentication across all Microsoft 365 services, including SharePoint Online, and that this change is impacting your workflow. Since app passwords rely entirely on this legacy authentication method, they are now fully blocked at the service level by Microsoft.
Regarding to your concerns:
For temporary extension or re-enablement of Basic Authentication method
Unfortunately, I have not identified any supported method to temporarily extend, bypass, or re-enable Basic Authentication or app passwords for any Microsoft 365 workload.
Since Basic Authentication is now permanently disabled in all tenants for Exchange Online, SharePoint Online, and other Microsoft 365 services. Neither customers nor Microsoft Support can turn it back on.
Recommended migration approach
To restore application access to SharePoint Online and ensure long-term compatibility, the recommended approach is to migrate to Modern Authentication (OAuth 2.0) using Microsoft Entra ID (formerly Azure AD).
You could refer to the concrete steps to take depending on the application type:
1.Set up App Registration in Microsoft Entra ID:
Go to the Microsoft Entra Admin Center.
Navigate to Identity > Applications > App registrations and register a new application.
2.Choose the corresponding flow based on your app type:
For Background/Server Applications (Daemon apps): Use the Client Credentials flow (App-only access). You must configure a Certificate or Client Secret for the application and grant it the appropriate API permissions (such as Sites.Read.All or Sites.ReadWrite.All on the Microsoft Graph API).
For User-facing or Rich Client Applications: The application must be updated to use Interactive user sign-in flows that fully support Multi-Factor Authentication (MFA).
For handling custom applications during transition
While updating your custom applications, you could consider to follow these recommendations:
Remove Dependencies: Plan to permanently remove all code dependencies on Basic Authentication (username/password strings) and app passwords.
Adopt Microsoft Graph API: Instead of using older SharePoint REST APIs, we highly recommend migrating your integration layer to Microsoft Graph API. It is the most robust, modern, and supported method for file operations in Microsoft 365.
Third-Party Applications: If you are using third-party software, please contact the vendor immediately. You must request a patch or an updated version that integrates OAuth 2.0 support.
References:
Basic authentication sign-in prompts are blocked by default in Microsoft 365 Apps
Authentication and authorization in Microsoft Graph
I hope this helps.
Please feel free to correct me if I misunderstood your request. If you have any additional concerns, feel free to comment below. I would be more than happy to assist.
Note: Please follow the steps in [our documentation] to enable e-mail notifications if you want to receive the related email notification for this thread.