Skip to main content
🦉
Message CenterMicrosoft 365 Updates
HomePermissionsTenant FinderPortfolio
🦉
M365 Message Centerby Cengiz YILMAZ

Track the latest updates, features, and announcements for Microsoft 365 services. Comprehensive archive of service updates and important changes.

Quick Links

HomePermissionsTenant FinderPortfolio

Connect

© 2026 M365 Message Center. Created with ❤ by Cengiz YILMAZ

Data sourced from Microsoft 365 Message Center • Not affiliated with Microsoft

  1. Home
  2. /
  3. MC792991

Disablement of Symmetric keys for Microsoft Entra first-party applications Service Principals

Plan for Change
Major Change

Message ID

MC792991
View in Admin Center

Services

Microsoft Entra

Summary

Symmetric keys for Microsoft Entra first-party applications' Service Principals will be disabled to enhance security. Organizations must switch to Asymmetric keys by June 15, 2024, to avoid authentication failures. Preparation involves replacing Symmetric with Asymmetric keys as detailed in the provided link.

Details

Symmetric keys authentication relies on a shared key being sent by the client in its request to security token service. In the event the key is intercepted, it is permanently compromised.

To improve security posture of Microsoft first-party Applications and better protect customer data, client applications will no longer be able to use Symmetric Keys on Service Principals for First-Party Applications and must move to Asymmetric keys.

When this will happen:

June 15, 2024

How this affects your organization:

After this change is implemented, any client requests that use Symmetric Keys on their Microsoft first-party Application Service Principals will fail.

What you can do to prepare:

Customers currently using Symmetric keys for authenticating Microsoft first-party application's Service Principals in their tenant will need to replace these with Asymmetric keys, as described in the link Add-MgServicePrincipalKey

Timeline

Published
May 15, 2024
Message published to Message Center
Updated
May 15, 2024
Message content updated
End Date
Jul 29, 2024
Message timeline ends

Tags

#Admin impact#Retirement

Category

Plan for Change

Related Messages

Similar updates

MC727449●

"User consent to apps" setting in the Microsoft 365 portal to be retired

Mar 7, 2024
MC1234567●

Microsoft Rewards: Retirement of Azure AD Account Linking

Feb 18, 2026
MC1097225●

Entra ID: Upcoming changes to support passkey profiles in the authentication methods policy (preview)

Jun 17, 2025
MC1024404●

Microsoft Entra: Browser access will be enabled by default for all Android users

Mar 5, 2025
MC678069●

Migrate to the Authentication methods policy in Azure Active Directory by September 30, 2025

Sep 28, 2023