Google Enforces New Password Rules for Gmail: Millions Must Switch to Secure Login Methods
October 2, 2024As of September 30, millions of Gmail users are now subject to new password rules designed to enhance security.
These changes specifically impact all Google Workspace customers, as Google discontinues support for password-based login credentials across various protocols, including CalDAV, CardDAV, IMAP, and POP.
This move is part of Google's broader initiative to enhance security, as older protocols require sharing Google Account credentials with third-party apps, increasing the risk of unauthorized access.
Google has been preparing for this transition for a year, moving away from traditional username and password logins towards more secure methods like OAuth.
Consequently, Google will no longer support access to Gmail data from apps deemed less secure, including those that rely solely on username and password logins.
Users who continue to connect via these outdated protocols will lose access to their Google accounts if they fail to update their settings.
Without taking action, affected users will encounter error messages indicating incorrect credentials, preventing them from logging in.
For Outlook users, those with versions from 2016 or earlier must upgrade to Microsoft 365 or a newer version, while Thunderbird users need to re-add their Google accounts with OAuth configuration.
Google recommends specific actions for Workspace users to avoid login issues, including upgrading Outlook versions and reconfiguring email clients to utilize OAuth.
The company advises using 'Sign-in with Google,' which implements the OAuth security standard, providing better control over data access for third-party applications.
Businesses still using old protocols will face significant challenges in updating their networks, with detailed resources available on Google's Workspace Admin Help website.
To prevent data loss during this transition, users are encouraged to back up their email accounts into a .pst file before importing them into the new application.
Summary based on 2 sources