Skip to content

Commit 447b7a8

Browse files
authored
Merge pull request #8466 from AmandaAZ/Branch-CI3605
AB#3605: Convert blog post
2 parents f9ec9fa + f843063 commit 447b7a8

2 files changed

Lines changed: 47 additions & 0 deletions

File tree

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
title: Error AADSTS900439 - USGClientNotSupportedOnPublicEndpoint
3+
description: Describes a problem in which you receive the error AADSTS900439 when signing in to an application registered in the Azure Government cloud using a public endpoint.
4+
ms.date: 03/31/2025
5+
ms.reviewer: bernawy, v-weizhu
6+
ms.service: entra-id
7+
ms.custom: sap:Issues Signing In to Applications
8+
---
9+
# Error AADSTS900439 - USGClientNotSupportedOnPublicEndpoint
10+
11+
This article provides a solution to the error AADSTS900439 (USGClientNotSupportedOnPublicEndpoint) that occurs when you try to sign in to an application registered in the Azure Government cloud using a public cloud endpoint.
12+
13+
## Symptoms
14+
15+
When trying to sign in to an application registered in the Azure Government cloud using a public endpoint, the sign-in fails, and you receive the AADSTS900439 (USGClientNotSupportedOnPublicEndpoint) error.
16+
17+
## Cause
18+
19+
Microsoft Entra authority for Azure Government has been updated from `https://login-us.microsoftonline.com` to `https://login.microsoftonline.us`. This change also applies to Microsoft 365 GCC High and Microsoft 365 DoD environments, which Microsoft Entra authority for Azure Government also services. Microsoft Entra ID enforces the correct endpoint for sign-in operations. You can no longer sign in to an application registered in the Azure Government cloud using the public endpoint `https://login-us.microsoftonline.com`.
20+
21+
For more information, see [Microsoft Entra Authority for Azure Government Endpoint Update](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update).
22+
23+
## Solution
24+
25+
To resolve this issue, ensure you use the correct Azure Government endpoint for sign-in operations. Here are the mappings between Azure services and Azure Government endpoints:
26+
27+
| Name | Azure Government endpoint |
28+
| --- | --- |
29+
| Portal | `https://portal.azure.us` |
30+
| Microsoft Graph API | `https://graph.microsoft.us` |
31+
| Active Directory Endpoint and Authority | `https://login.microsoftonline.us` |
32+
33+
For more information, see [Azure Government endpoint mappings](/azure/azure-government/documentation-government-developer-guide#endpoint-mapping).
34+
35+
## More information
36+
37+
Each national cloud environment differs from the global Microsoft environment. When you develop applications for these environments, it's important to understand the key differences. For example, registering applications, acquiring tokens, and calling the Microsoft Graph API can be different.
38+
39+
For more information about registering applications in a national cloud, see [App registration endpoints](/entra/identity-platform/authentication-national-cloud#app-registration-endpoints).
40+
41+
For more information about acquiring tokens in a national cloud, see [Microsoft Entra authentication endpoints](/entra/identity-platform/authentication-national-cloud#azure-ad-authentication-endpoints).
42+
43+
For more information about the different Microsoft Graph national cloud deployments and the capabilities that are available to developers within each cloud, see [Microsoft Graph national cloud deployments](/graph/deployments). Here's a sample implementation: [Configure a .NET application to call Microsoft Graph in a national cloud tenant](https://blogs.aaddevsup.xyz/2020/06/configure-net-application-to-call-microsoft-graph-in-a-national-cloud-tenant).
44+
45+
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

support/entra/entra-id/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,8 @@
118118
href: app-integration/error-code-aadsts7000110-request-is-ambiguous.md
119119
- name: Error AADSTS7000112 - application is disabled
120120
href: app-integration/error-code-aadsts7000112-application-is-disabled.md
121+
- name: Error AADSTS900439 - USGClientNotSupportedOnPublicEndpoint
122+
href: app-integration/error-aadsts900439-usgclientnotsupportedonpublicendpoint.md
121123
- name: Error AADSTS50000 - issuing a token or an issue with our sign-in service
122124
href: app-integration/error-code-aadsts50000-issuing-token-sign-in-service.md
123125
- name: Troubleshoot signing in to SAML-based single sign-on configured apps

0 commit comments

Comments
 (0)