ENow Blog | Exchange Center

Dedicated Entra App Required for Exchange Hybrid - October 2025 Deadline

Written by Thomas Stensitzki | Sep 30, 2025 11:15:03 PM

Microsoft is changing how hybrid authentication works between on-premises Exchange servers and Exchange Online. The long-standing Shared Service Principal (“Office 365 Exchange Online”, App ID 00000002-0000-0ff1-ce00-000000000000) will no longer be supported. Each tenant must deploy a dedicated Entra enterprise application by October 31, 2025. 

If not done, essential hybrid features, such as Free/Busy lookups, MailTips, and profile photos from on-premises mailboxes to the cloud, will cease functioning permanently after October 31st. Additionally, Microsoft will enforce two temporary blocking periods in September and October to encourage organizations to act. 

TL;DR: Microsoft is retiring the Shared Service Principal for Exchange Hybrid. By October 31, 2025, you must deploy a dedicated Entra enterprise app or lose hybrid features like Free/Busy, MailTips, and profile photos.

Why Microsoft Requires a Dedicated Entra App 

The Shared Service Principal has long been used to streamline hybrid coexistence. However, it relies on shared authentication identifiers and certificates uploaded by customers to a global object in Microsoft Entra. This method introduces a security risk: if certificates are compromised, they could be misused across multiple tenants. 

To address this issue, Microsoft now mandates a dedicated enterprise application for each tenant. Each organization will have its own distinct identity object, uploaded keys, and full control over certificate lifecycle management. 

This shift achieves: 

  • Tenant isolation: No more shared credentials across customers. 

  • Reduced attack surface: Only your organization’s keys are valid for your tenant. 

  • Operational clarity: Easier to manage, audit, and rotate certificates.

What Happens If You Don’t Deploy by October 31, 2025

Starting November 1, 2025, if you have not deployed and activated the dedicated Entra app, the following Rich Coexistence features will cease to function in the on-premises environment when accessing Exchange Online: 

  • Free/Busy lookups (on-premises user querying the calendar availability of a cloud mailbox) 

  • MailTips (informational warnings such as “recipient is out of office” or “message size too large”) 

  • Profile photos 

Other hybrid features remain fully functional: mail flow, migrations, recipient management, and directory synchronization are not affected. 

Important clarification: The reverse direction, from Exchange Online to your on-premises organization, remains unaffected. Exchange Online will continue to query Free/Busy for on-premises mailboxes. The disruption only impacts the on-premises-to-cloud direction. 

Temporary enforcement windows 

To ensure organizations cannot overlook the change before it's too late, Microsoft has arranged two temporary blocking periods: 

  • September 16–17, 2025: a 2-day block 

  • October 7–9, 2025: a 3-day block 

During these periods, Free/Busy, MailTips, and profile photos will be unavailable if your environment continues to depend on the Shared Service Principal. These blocks serve as intentional “wake-up calls.” 

After October 31, 2025, the block will become permanent, with no exceptions or bypasses. 

How to Configure the Exchange Hybrid Dedicated App

The new dedicated hybrid application is a Microsoft Entra enterprise app created specifically for your tenant. Its name follows the format ExchangeServerApp-{GUID}. This app has a single purpose: to enable your on-premises Exchange servers to securely authenticate with Exchange Online for hybrid coexistence. 

There are two supported ways to create and configure this application: 

1. PowerShell script (ConfigureExchangeHybridApplication.ps1) 

  • Creates the dedicated app in your tenant. 
  • Uploads the hybrid authentication certificate (Exchange Server Auth Certificate) 
  • Activates the feature in your on-premises organization. 
  • Optionally cleans up the legacy Shared Service Principal 
  • Supports a split permission approach when the Exchange Team does not have appropriate permissions in Entra. 

2. Hybrid Configuration Wizard (HCW) (updated version) 

  • Creates the enterprise app. 
  • Requests tenant-wide admin consent. 
  • Uploads the hybrid authentication certificate.  
  • Requires you to enable the feature afterwards via a configuration setting manually. 
  • Does not clean up the old Shared Service Principal 

Microsoft recommends using the mentioned script because it completes the process end-to-end, including activation and cleanup. 

Minimum Server Versions for Dedicated App Support

To support the new authentication model, your on-premises Exchange servers must be updated to specific builds: 

  • Exchange Server 2016 CU23 with April 2025 HU or later (build 15.1.2507.55+) 
  • Exchange Server 2019 CU14 with April 2025 HU or later (build 15.2.1544.25+) 
  • Exchange Server 2019 CU15 with April 2025 HU or later (build 15.2.1748.24+) 
  • Exchange Server Subscription Edition (SE) from RTM (build 15.2.2562.17+) 
Older builds do not include support for the dedicated hybrid app and cannot use the new authentication model. 

How the change affects different environments 

You need to deploy the dedicated hybrid app if all three conditions apply: 

  1. You run a hybrid Exchange environment with both on-premises and cloud mailboxes. 

  2. You use (or want to continue using) Rich Coexistence features like Free/Busy, MailTips, or profile photos between environments. 

  3. Your servers are on a supported build, but you have not yet created and activated the dedicated app. 

If you no longer need Rich Coexistence features, you could technically skip the app deployment. However, Microsoft strongly recommends cleaning up the old Shared Service Principal, even in this case, to eliminate unused certificates and reduce risk. 

Verification and testing 

Once the app has been created and activated, you should: 

  • Verify that the new application object exists in your Entra tenant. 
  • Confirm that hybrid features are functioning as expected: 
    • Test calendar availability lookups from an on-premises mailbox to a cloud mailbox. 
    • Send messages to cloud recipients and check that MailTips (such as out-of-office warnings) are displayed. 
    • Check that profile photos for cloud recipients display correctly in on-premises Outlook clients. 

Successful tests confirm that your Exchange environment is using the dedicated app rather than the Shared Service Principal. 

Cleaning up the legacy Shared Service Principal 

One of the final and crucial security steps is to remove your old certificates from the Shared Service Principal. This process deletes the KeyCredentials that your organization had uploaded to the global “Office 365 Exchange Online” app. 

Keeping them in place does not disrupt functionality, but it does leave behind unnecessary attack vectors. Removing them helps you: 

  • Reduce the risk of credential misuse. 
  • Avoid confusion in future audits. 
  • Align with Microsoft’s best practices for hybrid security. 

Common misunderstandings 

  • Mail flow will break.” No, mail flow, migrations, and recipient management are unaffected. Only Free/Busy, MailTips, and profile photos from on-premises to cloud are at risk. 

  • “We only use Free/Busy occasionally, so we can ignore this.” Not true, the temporary enforcement windows will disrupt you regardless, and the permanent block is unavoidable. 

  • “The Hybrid Configuration Wizard takes care of everything.” Not quite, it creates the app but does not enable it automatically, and it does not clean up the Shared Service Principal. 

  • “We don’t use HCW at all, so we don’t need the app.” If you have never configured hybrid coexistence and do not require these features, you may not need the app. But double-check your setup before assuming you are exempt. 

Looking ahead: Microsoft Graph 

The dedicated app is not the end of the journey. Microsoft has already announced that Exchange hybrid features will eventually transition from Exchange Web Services (EWS) to Microsoft Graph APIs. 

This move will introduce: 

  • More granular, least-privilege permissions for hybrid apps 
  • Better monitoring through Entra sign-in and audit logs 
  • A future-proof architecture that no longer relies on aging EWS endpoints. 

The first server updates to support Graph are planned for Q3 2025, and Microsoft intends to enforce the full transition by October 2026. Organizations that deploy the dedicated app now will be well-positioned to adopt Graph when it becomes mandatory. 

Your action plan before October 31, 2025 

  1. Update servers: Ensure all hybrid servers are on supported builds. 

  2. Choose your method: Use the PowerShell script (preferred) or the updated HCW to create the app. 

  3. Grant admin consent: Tenant-wide approval is required for the app to function. 

  4. Enable the feature: Confirm that your on-premises Exchange organization is actively using the dedicated app. 

  5. Clean up the old principal: Remove legacy certificates from the Shared Service Principal 

  6. Test thoroughly: Free/Busy, MailTips, and profile photos must work reliably before the first enforcement window in September. 

  7. Document and monitor: Record app IDs, certificate lifetimes, and set reminders for renewals. 

Why Monitoring Exchange Hybrid Matters More Than Ever

Hybrid environments are already complex, and changes like the dedicated Entra app requirement add another moving part that administrators must manage. It is not enough to configure the new application once; you also need visibility into whether Free/Busy lookups, MailTips, and profile photos continue to work reliably after the cutover, if certificates are nearing expiration, and if authentication requests are flowing as expected. This is where ENow’s monitoring solutions for Exchange Server and Exchange Online become invaluable. With real-time insights, proactive alerts, and hybrid-specific health checks, ENow helps you detect issues before users are affected. Instead of waiting for the next enforcement window to find a problem, you can continuously verify that your hybrid coexistence remains healthy and compliant with Microsoft’s evolving requirements. 

Conclusion 

This change is not optional.
If you still rely on hybrid coexistence features, you 
must deploy the dedicated Entra app by October 31, 2025. 

Failing to do so will not only result in two disruptive enforcement windows in September and October but will also permanently disable key hybrid functionality thereafter. Acting now ensures business continuity, closes a known security gap, and prepares your environment for the next stage of Microsoft’s hybrid evolution. 

Additional Resources

 

Request a Demo of ENow's Exchange Monitoring & Reporting