I had updated the description to say new installs only. I can see an argument for not even doing that but then I have a reverse question: Are there still any email services that do NOT support OAUTH? (besides home-grown/self-hosted)
Most of our sites use IMAP with traditional providers that don't use OAUTH. I have very few sites that use Google and none that use Office365 so we have OAuth enabled on only 2 sites. So I see that as such an edge case that enabling on new sites doesn't make sense.
Most of our sites use IMAP with traditional providers that don't use OAUTH.
I guess I prefer to turn on a feature as opposed to having to disable it.
Oh - I also don't use IMAP for bounce processing - we use sendgrid or AWS so the API handles that so this limits us to possibly needed OAUTH for incoming emails only.
I am not dead set against this - if the majority need OAUTH these days, I am happy to have the change. I assumed my use case is typical which it may not be.
FWIW I have a roughly equal mix of folks using a webhook endpoint for bounces, using Google/Microsoft-hosted bounce emails, and non-Google/Microsoft bounce emails.
@DaveD I like your last suggestion of making this an upgrade message on sites that have an existing non-OAUTH MS account. For outgoing mail relayed through MS, is there a limited number of URLs? E.g. with Google it'll always be smtp-relay.gmail.com or smtp.gmail.com. Those folks should also get an upgrade warning IMO.
Also hopefully once people attempt this upgrade we'll finally iron out the quirks in MS-based OAuth. I unfortunately don't have access to the Azure control panel on the client that needs to use this.
For outbound, I don't believe civi yet supports OAUTH unless I missed some PRs, which is possible. That may be a whole separate issue which I know there's a ticket open for already but may now be more urgent.
And yes I've seen that it's not always smooth to set up for MS because of how the tenant id is not configurable.