Share via

SharePoint Online – Impact of ACS Policy Deprecation on Logic Apps using Username/Password Authentication

Monika V 90 Reputation points
2026-03-26T05:53:29.36+00:00

I understand that ACS (Azure Access Control Services) for SharePoint Online is being deprecated.

We currently have an integration where Logic Apps are used to sync data between SharePoint Online and a database. The Logic App is triggered whenever an item is created or modified in SharePoint.

At present, the SharePoint connection in Logic Apps is configured using username and password (SharePoint connector authentication).

My question is:

  • Will the ACS policy deprecation impact this setup?
  • Since we are not using Client ID / Client Secret (ACS-based authentication), can we assume that this integration will continue to work without any changes?
  • Are there any recommended actions or migration steps we should consider for future-proofing this setup?
Microsoft 365 and Office | SharePoint | Development
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Hani-Ng 9,345 Reputation points Microsoft External Staff Moderator
    2026-03-26T06:57:07.1833333+00:00

    Hi Monika V

    The Azure Access Control Services (ACS) retirement only impacts solutions that rely on ACS‑based authentication, such as classic SharePoint Add‑Ins or custom applications using Client ID / Client Secret (ACS app principals).

    The built‑in SharePoint Online connector in Azure Logic Apps that authenticates using a username and password does not use ACS for authentication. Therefore, the ACS retirement does not directly affect this setup.

    Because this integration is not using ACS‑based app‑only authentication, it should continue to function without changes after the ACS retirement.

    While no immediate action is required, Microsoft’s long‑term recommendation is to avoid username/password authentication for unattended automation. For future‑proofing and improved security, consider migrating to:

    These approaches align with Microsoft’s modern authentication guidance and reduce reliance on user credentials.

    I hope this information helps!


    Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.

    0 comments No comments

  2. Q&A Assist
    2026-03-26T05:53:40.57+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    ACS retirement only affects solutions that rely on Azure Access Control Services–based auth (classic SharePoint Add-Ins, low-trust provider-hosted add-ins, and custom apps using ACS-issued OAuth tokens).

    The built-in SharePoint Online connector in Logic Apps that uses username/password does not use Azure ACS. It authenticates via modern Microsoft Entra ID–backed mechanisms, not via the SharePoint Online ACS trust that is being retired. Therefore:

    • The ACS retirement does not directly impact a Logic App SharePoint connection configured with username/password.
    • The fact that no Client ID/Client Secret (ACS add-in principal) is used is a strong indicator that this integration is not ACS-based and will continue to work beyond the ACS retirement timelines.

    For future-proofing and alignment with current guidance:

    1. Avoid any new dependencies on ACS or SharePoint Add-Ins
      • SharePoint Add-Ins and ACS are both retired in Microsoft 365 as of April 2nd, 2026.
      • Primary replacement for SharePoint extensibility is SharePoint Framework (SPFx), which is explicitly not impacted by these retirements.
    2. Prefer Microsoft Entra ID–based app registrations for automation
      • Where possible, move away from username/password connections toward app-based auth (for example, Microsoft Entra applications with appropriate SharePoint permissions), as this is the recommended pattern for unattended access.
    3. Validate that no hidden ACS dependencies exist
      • Ensure there are no SharePoint Add-Ins, provider-hosted add-ins, or custom apps in the solution that use ACS-issued tokens for SharePoint Online access. Those must be migrated to Microsoft Entra ID–based auth before April 2nd, 2026.
    4. Follow the official ACS/Add-In retirement and migration guidance
      • Use the ACS retirement and SharePoint Add-In modernization guidance to assess any other integrations that might still be using ACS and plan their migration to Microsoft Entra ID and/or SPFx.

    References:

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.