/* Magazine Blog - Überschrift in Weiß */
Skip to content
csm_goodbye_cf85e5fb1c

Goodbye anonymous sharing in SharePoint Online: what’s changing July 1st

Goodbye anonymous sharing in SharePoint Online: what’s changing July 1st
3:46

If your organization relies on SharePoint Online for file sharing and collaboration, a significant change is coming your way. Starting July 1, 2025, Microsoft is tightening the screws on how One-Time Passcode (OTP) sharing links work in SharePoint Online and OneDrive. These changes are aimed at enhancing security but they come with real implications for how your users collaborate with external partners. In this article you'll learn: 

  • What’s changing with sharing links in SharePoint and OneDrive
  • Why this matters to your external collaboration model
  • What you need to consider to stay productive and secure, including a smart workaround at the end
Icon of a green calender

What’s changing on July 1st?

Beginning July 1, 2025, Microsoft will deprecate OTP-based external sharing links for SharePoint Online and OneDrive. This change affects anonymous links that allow people outside your organization to access content via a verification code sent to their email, even if they don’t have a Microsoft account. Key Impacts:

  • OTP-based access will no longer be supported
  • External recipients must now authenticate using Entra ID (formerly Azure AD)
  • Anyone accessing content via a SharePoint sharing link must be a “guest” in your Entra ID tenant

In short: no Entra ID guest account, no access.

Why is Microsoft making this change?

he OTP method had its flaws, it allowed users to bypass organizational security policies and access sensitive content via a basic email verification process. While this made collaboration easier, it created loopholes in auditability and identity verification. By requiring Entra ID guest accounts for access, Microsoft strengthens:

  • Auditing and compliance capabilities
  • Policy enforcement (like MFA or conditional access)
  • And identity traceability for external users

From a security standpoint, this is a win. But from a usability and management perspective? Not so much.

What problems will this cause?

IT admins and security teams will now have to manage a flood of Entra ID guest accounts, which introduces a number of challenges:

  • Increased administrative overhead: IT teams must now provision and govern guest identities for every external collaborator
  • User confusion: External users unfamiliar with Microsoft accounts may struggle to log in, increasing support tickets
  • Broken workflows: Legacy OTP sharing links will stop working, disrupting external collaboration unless proactively updated

This change particularly hurts organizations that:

  • Share files externally on an ad-hoc basis
  • Work with freelancers, clients, or vendors without Microsoft accounts
  • Or operate in industries where seamless file access is critical

Workarounds and limitations

You do have some options, but none are ideal:

  • Bulk-create guest accounts via Entra ID, which is time-consuming and requires governance.
  • Use SharePoint file requests, which only work one-way (external users can upload files to you, but can’t see/download anything).
  • Switch to secure email or file transfer services, which adds friction and silos information outside SharePoint.

In each case, you're either compromising user experience or increasing IT workload or both.

Why this policy highlights a bigger problem

Microsoft's new policy underscores a broader trend: the ecosystem is getting more secure, but also more complex and expensive to manage. Every new compliance requirement (MFA, Entra ID guests, retention policies) adds cost and overhead. And as more data piles up in SharePoint and OneDrive, your storage bills keep growing, especially if you need to keep old versions or unused files "just in case." You're paying more, managing more, and still scrambling to stay compliant.

RELATED ARTICLES