You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/app-only-auth-powershell-v2.md
+17-14Lines changed: 17 additions & 14 deletions
Original file line number
Diff line number
Diff line change
@@ -23,13 +23,13 @@ description: "Learn about using the Exchange Online V2 module in scripts and oth
23
23
> The features and procedures described in this article require the following versions of the EXO V2 module:
24
24
>
25
25
> -**Exchange Online PowerShell (Connect-ExchangeOnline)**: Version 2.0.3 or later.
26
-
> -**Security & Compliance Center PowerShell (Connect-IPPSSession)**: Version 2.0.6 Preview5 or later.
26
+
> -**Security & Compliance PowerShell (Connect-IPPSSession)**: Version 2.0.6 Preview5 or later.
27
27
>
28
28
> For instructions on how to install or update the module, see [Install and maintain the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module).
29
29
>
30
30
> You can't use the procedures in this article to modify Microsoft 365 Groups ([Set-UnifiedGroup](/powershell/module/exchange/set-unifiedgroup)). To use Microsoft Graph instead, see [Update group](/graph/api/group-update).
31
31
32
-
Auditing and reporting scenarios in Microsoft 365 often involve unattended scripts in Exchange Online PowerShell and Security & Compliance Center PowerShell. In the past, unattended sign in required you to store the username and password in a local file or in a secret vault that's accessed at run-time. But, as we all know, storing user credentials locally is not a good security practice.
32
+
Auditing and reporting scenarios in Microsoft 365 often involve unattended scripts in Exchange Online PowerShell and Security & Compliance PowerShell. In the past, unattended sign in required you to store the username and password in a local file or in a secret vault that's accessed at run-time. But, as we all know, storing user credentials locally is not a good security practice.
33
33
34
34
Certificate based authentication (CBA) or app-only authentication as described in this article supports unattended script and automation scenarios by using Azure AD apps and self-signed certificates.
35
35
@@ -46,7 +46,7 @@ The following examples show how to use the Exchange Online PowerShell V2 module
@@ -287,7 +290,7 @@ The Security Administrator role does not have the necessary permissions for thos
287
290
For general instructions about assigning roles in Azure AD, see [View and assign administrator roles in Azure Active Directory](/azure/active-directory/roles/manage-roles-portal).
288
291
289
292
> [!NOTE]
290
-
> The following steps are slightly different for Exchange Online PowerShell vs. Security & Compliance Center PowerShell. The steps for both environments are shown. To configure roles for both environments, repeat the steps in this section.
293
+
> The following steps are slightly different for Exchange Online PowerShell vs. Security & Compliance PowerShell. The steps for both environments are shown. To configure roles for both environments, repeat the steps in this section.
291
294
292
295
1. On the Azure AD portal at <https://portal.azure.com/>, under **Manage Azure Active Directory**, click **View**.
293
296
@@ -303,19 +306,19 @@ For general instructions about assigning roles in Azure AD, see [View and assign
303
306
304
307

305
308
306
-
-**Security & Compliance Center PowerShell**:
309
+
-**Security & Compliance PowerShell**:
307
310
308
-

311
+

309
312
310
313
4. On the **Assignments** page that opens, click **Add assignments**.
311
314
312
315
-**Exchange Online PowerShell**:
313
316
314
317

315
318
316
-
-**Security & Compliance Center PowerShell**:
319
+
-**Security & Compliance PowerShell**:
317
320
318
-

321
+

319
322
320
323
5. In the **Add assignments** flyout that opens, find and select the app that you created in [Step 1](#step-1-register-the-application-in-azure-ad).
321
324
@@ -329,6 +332,6 @@ For general instructions about assigning roles in Azure AD, see [View and assign
329
332
330
333

331
334
332
-
-**Security & Compliance Center PowerShell**:
335
+
-**Security & Compliance PowerShell**:
333
336
334
-

337
+

Copy file name to clipboardExpand all lines: exchange/docs-conceptual/basic-auth-connect-to-eop-powershell.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ description: "Use remote PowerShell to connect to a standalone Exchange Online P
17
17
# Bssic auth - Connect to Exchange Online Protection PowerShell
18
18
19
19
> [!NOTE]
20
-
> The connection instructions in this article [will eventually be deprecated](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-july-update/ba-p/1530163) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online Protection PowerShell. For instructions, see [Connect to Exchange Online Protection PowerShell](connect-to-exchange-online-protection-powershell.md).
20
+
> The connection instructions in this article [will be deprecated starting on October 1, 2022](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-deprecation-in-exchange-online-may-2022/ba-p/3301866) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online Protection PowerShell. For instructions, see [Connect to Exchange Online Protection PowerShell](connect-to-exchange-online-protection-powershell.md).
21
21
22
22
In standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, standalone EOP PowerShell allows you to manage your EOP organization from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to EOP. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the EOP cmdlets into your local Windows PowerShell session so that you can use them.
23
23
@@ -61,7 +61,7 @@ The following introductory video shows you how to connect to and use Exchange On
61
61
62
62
- WinRM needs to allow Basic authentication (it's enabled by default). We don't send the username and password combination, but the Basic authentication header is required to send the session's OAuth token, since the client-side WinRM implementation has no support for OAuth.
63
63
64
-
**Note**: You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
64
+
**Note**: The following commands require that WinRM is enabled. To enable WinRM, run the following command:`winrm quickconfig`.
65
65
66
66
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt** (not in Windows PowerShell):
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/basic-auth-connect-to-exo-powershell.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -20,7 +20,7 @@ description: "Learn how to use remote PowerShell to connect to Exchange Online w
20
20
# Basic auth - Connect to Exchange Online PowerShell
21
21
22
22
> [!NOTE]
23
-
> The connection instructions in this article [will eventually be deprecated](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-july-update/ba-p/1530163) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](connect-to-exchange-online-powershell.md).
23
+
> The connection instructions in this article [will be deprecated starting on October 1, 2022](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-deprecation-in-exchange-online-may-2022/ba-p/3301866) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](connect-to-exchange-online-powershell.md).
24
24
25
25
Exchange Online PowerShell allows you to manage your Exchange Online settings from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to Exchange Online. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the Exchange Online cmdlets into your local Windows PowerShell session so that you can use them.
26
26
@@ -64,7 +64,7 @@ The following introductory video shows you how to connect to and use Exchange On
64
64
65
65
- WinRM needs to allow Basic authentication (it's enabled by default). We don't send the username and password combination, but the Basic authentication header is required to send the session's OAuth token, since the client-side WinRM implementation has no support for OAuth.
66
66
67
-
**Note**: You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
67
+
**Note**: You The following commands require that WinRM is enabled. To enable WinRM, run the following command:`winrm quickconfig`.
68
68
69
69
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt** (not in Windows PowerShell):
0 commit comments