smtp.office365.com support

Discussion in 'LiquidFiles General' started by Gary Schultz, Apr 28, 2026 at 5:05 AM.

  1. Gary Schultz

    Gary Schultz New Member

    Joined:
    Nov 7, 2023
    Messages:
    26
    Likes Received:
    3
    It appears the LiquidFiles SMTP relay configuration does not work. Syslog has the following message:

    smtp.office365.com[52.96.180.114] said: 535 5.7.139 Authentication unsuccessful, basic authentication is disabled

    Are there plans to support modern authenitcaiton for Office 365 smtp relay in the future?
     
  2. David

    David Administrator
    Staff Member

    Joined:
    Dec 1, 2015
    Messages:
    846
    Likes Received:
    36
    The SMTP basic authentication still should work in the 365 service and you should still be able to re-enable it in your 365 sending account.
    The termination of the SMTP basic authentication was postponed till first half of 2027 for tenants created prior December 2026.

    After then I would recommend to switch to a other party, less restrictive, SMTP relay service providers like smtp2go.com
    If you really can't switch from Ms 365 then it's possible to configure their ACS (Azure Communication Services) connector which will still support the SMTP basic authentication
    or
    finally remains the OAUTH2 method, which uses short-lived tokens instead of stored passwords, but it's not suitable for servers.
    LF appliance also supports that OAUTH2 authorization since v4.3 beta (v4.2.5x).
     
  3. Gary Schultz

    Gary Schultz New Member

    Joined:
    Nov 7, 2023
    Messages:
    26
    Likes Received:
    3
    Thank you for the Azure Communicaton Service article. I already had a communicaiton service setup in our tenant. I was able to successfully add and test SMTP within Azure. In LiquidFiles I cannot get past the error message:

    SASL authentication failed; cannot authenticate to server smtp.azurecomm.net[52.159.232.89]: generic failure
     
  4. David

    David Administrator
    Staff Member

    Joined:
    Dec 1, 2015
    Messages:
    846
    Likes Received:
    36
    The "SASL authentication failed; generic failure" against smtp.azurecomm.net is almost always one of these:
    Most likely causes:

    1. Wrong username format: ACS SMTP requires the username in a very specific format. It's not just an email address. In the ACS portal under Email > SMTP credentials, the username is generated as <Azure Communication Services Resource name>|<Entra Application Id>|<Entra Application Tenant Id>. Using a plain email address or Azure AD credentials here will fail with generic SASL error.

    2. Wrong password: ACS generates a dedicated SMTP password (not the Azure account password, not an app password). It's generated once in the portal and must be copied exactly. If it was regenerated since LF was configured, the old one is invalidated.

    3. From address not matching a verified sender domain: ACS enforces that the From address belongs to a domain verified in the ACS resource. If LF is sending from noreply@company.com but only DoNotReply@some-id-1234.azurecomm.net or DoNotReply@yourverifiedoamain.com is verified in ACS, it will reject it. This can manifest as auth failure rather than a relay denied error.


    Further to this topic:
    The ACS (Azure Communication Services) can be used as a limited substitution for the Ms 365 relay service.
    Unfortunately the ACS solution has had these major limitations:
    • Sender address format limitation
    • Sending limitation
    • Configuration complexity

    Initially when the ACS service is configured then the sender address is restricted only to this format DoNotReply@some-id-1234.azurecomm.net when the Azure's free domain is used.

    Additionally or optionally it be verified a custom domain for sending.
    When you have verified your custom domain make sure you have verified also the mandatory SPF, DKIM a DKIM2 records which Azure generated into your domain DNS records then emails can be relayed from this domain
    but the sender's name in the email is still restricted to DoNotReply and this can not be changed.
    So if something has not changed in the ACS the sender's email address can be only in this format for verified custom domains: DoNotReply@yourverifiedoamain.com

    On the LF server side the Email relay configuration (Admin > Configurations > Email) with configured ACS then should look like this:
    • Email Sender Address Policy: Specified Address Only
    • Email Sender Address: either DoNotReply@some-id-1234.azurecomm.net or DoNotReply@yourverifiedoamain.com
    • Email Delivery Security Level: May Opportunistic TLS
    • Email Relay Host: smtp.azurecomm.net:587
    • Email Relay Username has this format
      <Azure Communication Services Resource name>|<Entra Application Id>|<Entra Application Tenant Id>
      or <Azure Communication Services Resource name>.<Entra Application Id>.<Entra Application Tenant Id>
    • Email Relay Password: is one of the Microsoft Entra application's client secrets.

    To troubleshoot these ACS delivery issue I would start at first test if the emails are delivered properly when you set the "Email Sender Address" at first to DoNotReply@some-id-1234.azurecomm.net.
    If the email with the Azure's free domain worked then try to replace with the DoNotReply@yourverifiedoamain.com
    If this did not work then there is something wrong related to verification of the custom domain.
     

Share This Page