
Thanks for reaching out to Q&A Forum.
For your concern, switching authentication from ACS to Microsoft Entra ID (Azure AD) is necessary but not enough. The SharePoint Add-in model, which Provider-Hosted Add-ins (PHAs) rely on, will be fully retired on April 2, 2026. Even with Entra ID authentication, PHAs won’t work via the Add-in framework after that date. Key components like app parts, app webs, launcher tiles, and add-in permissions will no longer function.
The future platform is: SPFx + Entra ID + Microsoft Graph / SharePoint REST API
Regarding your question about post-ACS viability of PHAs
- Authentication: You can refactor your C# code to use Entra ID tokens and continue calling SharePoint Online via CSOM/REST or Graph. This is supported.
- Add-in Model: Retires April 2, 2026. Even with Entra ID, PHAs won’t load via the Add-in framework. You’ll need to surface your apps via SPFx, Teams, or as standalone web apps.
- Remote Event Receivers (RERs):
- ACS-registered RERs stop working on April 2, 2026.
- Entra ID-registered RERs are supported until July 1, 2027.
- Permissions: Add-in permissions (AppRegNew/AppInv) retire. Use Entra ID app registrations with Graph/SharePoint app-only permissions (e.g., Sites.Read.All, Sites.Selected).
With your suggested redirection workaround, there is some pros and cons come with it:
- Script Editor Web Parts: Not viable long-term. Custom scripting is disabled in modern SharePoint and doesn’t restore Add-in functionality.
- SPFx Redirection: Supported. You can build SPFx web parts or Application Customizers to redirect users to standalone Entra ID-protected apps.
- Ensure the destination is a normal web app, not an Add-in web.
- Use secure auth flows like Authorization Code + PKCE or On-behalf-of.
- Prefer least privilege scopes like Sites.Selected.
For SPFx migration strategy, phased Migration is recommended:
- Inventory: Use the Microsoft 365 Assessment Tool to identify all Add-ins and generate a Power BI report.
- Authentication First: Migrate all ACS-based code to Entra ID to keep backend services running.
- Surface Replacement:
- SPFx web parts or full-page apps calling your backend.
- SPFx + external web app (via redirect or iFrame, if allowed).
- Background jobs → Azure Functions/WebJobs.
- Eventing → Replace RERs with webhooks, Power Automate, or re-register with Entra ID.
- Freeze Add-ins: Disable new Add-in installs using PowerShell to stabilize your environment.
There are some recommended architectures based on official Microsoft documents and community guidance:
SPFx (React) web part → Azure App Service backend → Graph/REST with Entra ID.
Full-page SPFx apps with SSO via On-behalf-of flow.
Teams + SharePoint dual-home: Package SPFx components as Teams tabs.
Governance: Use Sites.Selected over tenant-wide scopes; automate consent and site assignments.
You can find more details in the following Microsoft Learn articles; these resources provide clear guidance and the latest updates on the topic:
SharePoint Add-Ins and Azure ACS retirement FAQ | Microsoft Learn
Azure ACS retirement in Microsoft 365 | Microsoft Learn
SharePoint Add-In retirement in Microsoft 365 | Microsoft Learn
Here are some additional documents and tools you might find useful. Please note that these tools aren’t officially provided or supported by Microsoft, so it’s a good idea to review them carefully and assess their reliability before using them in your environment.
Modernizing Authentication in SharePoint Online | SharePointed
SharePoint Add-In Retirement: What You Need to Know
Migrate SharePoint Add-ins to SharePoint Framework - FAQ
If the answer is helpful, please click "Accept Answer" and kindly upvote it. If you have extra questions about this answer, please click "Comment".
Note: Please follow the steps in our documentation to enable e-mail notifications if you want to receive the related email notification for this thread.