@@ -292,6 +292,15 @@ documentation = The parameters below control advanced options for the proxy. In
292292 using catch-all accounts or the proxy's `--cache-store` parameter you must manually remove unencrypted secrets from
293293 the local configuration file after the encrypted secret has been created (i.e., this will not be automatic).
294294
295+ - use_login_password_as_client_credentials_secret (default = False): When using the O365 client credentials grant
296+ (CCG) flow, rather than encrypting the client secret (see above), the proxy can be instructed to use the given
297+ IMAP/POP/SMTP login password as the client secret. This approach removes the risk of storing the unencrypted client
298+ secret in the proxy's configuration file, and also means there is no risk of unauthorised account access when using
299+ the O365 CCG flow in conjunction with the proxy's catch-all mode (see below). To enable this option, set
300+ `use_login_password_as_client_credentials_secret` to True. Note that if a `client_secret` value is present in your
301+ account's configuration entry, that value will be used instead of the given IMAP/POP/SMTP login password even if
302+ this option is enabled. To avoid this, remove the entire `client_secret` line from the configuration entry.
303+
295304 - allow_catch_all_accounts (default = False): The default behaviour of the proxy is to require a full separate
296305 configuration file entry for each account. However, when proxying multiple accounts from the same domain it can be
297306 cumbersome to have to create multiple near-identical configuration profiles. To simplify this the proxy supports
@@ -308,4 +317,5 @@ documentation = The parameters below control advanced options for the proxy. In
308317[emailproxy]
309318delete_account_token_on_password_error = True
310319encrypt_client_secret_on_first_use = False
320+ use_login_password_as_client_credentials_secret = False
311321allow_catch_all_accounts = False
0 commit comments