Skip to content

Commit c3acc37

Browse files
authored
Updates from editor
1 parent c8170e7 commit c3acc37

1 file changed

Lines changed: 9 additions & 9 deletions

File tree

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Error AADSTS900439 - USGClientNotSupportedOnPublicEndpoint
3-
description: Describes a problem in which you receive the error AADSTS900439 when signing in to an application registered in Azure Government cloud using a public endpoint.
4-
ms.date: 03/17/2025
3+
description: Describes a problem in which you receive the error AADSTS900439 when signing in to an application registered in the Azure Government cloud using a public endpoint.
4+
ms.date: 03/21/2025
55
ms.reviewer: bernawy
66
ms.service: entra-id
77
ms.custom: sap:Issues Signing In to Applications
@@ -12,19 +12,19 @@ This article provides a solution to the error AADSTS900439 (USGClientNotSupporte
1212

1313
## Symptoms
1414

15-
When trying to sign in to an application registered in Azure Government cloud using a public endpoint, the sign-in fails and you receive the AADSTS900439 (USGClientNotSupportedOnPublicEndpoint) error.
15+
When trying to sign in to an application registered in the Azure Government cloud using a public endpoint, the sign-in fails, and you receive the AADSTS900439 (USGClientNotSupportedOnPublicEndpoint) error.
1616

1717
## Cause
1818

19-
Microsoft Entra authority for Azure Government has been updated to from `https://login-us.microsoftonline.com` to `https://login.microsoftonline.us`. This change also applies to Microsoft 365 GCC High and M365 DoD environments, which Microsoft Entra authority for Azure Government also services. Microsoft Entra ID enforces the correct endpoint for sign-in operations. You can no longer sign in to an application registered in the Azure Government cloud using the public endpoint `https://login-us.microsoftonline.com`.
19+
Microsoft Entra authority for Azure Government has been updated from `https://login-us.microsoftonline.com` to `https://login.microsoftonline.us`. This change also applies to Microsoft 365 GCC High and Microsoft 365 DoD environments, which Microsoft Entra authority for Azure Government also services. Microsoft Entra ID enforces the correct endpoint for sign-in operations. You can no longer sign in to an application registered in the Azure Government cloud using the public endpoint `https://login-us.microsoftonline.com`.
2020

21-
For more information, see [Endpoint Update - Microsoft Entra Authority for Azure Government](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update)
21+
For more information, see [Microsoft Entra Authority for Azure Government Endpoint Update](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update).
2222

2323
## Solution
2424

2525
To resolve this issue, ensure you use the correct Azure Government endpoint for sign-in operations. Here are the mappings between Azure services and Azure Government endpoints:
2626

27-
| Name | Azure Government Endpoint |
27+
| Name | Azure Government endpoint |
2828
| --- | --- |
2929
| Portal | `https://portal.azure.us` |
3030
| Microsoft Graph API | `https://graph.microsoft.us` |
@@ -34,12 +34,12 @@ For more information, see [Azure Government endpoint mappings](/azure/azure-gove
3434

3535
## More information
3636

37-
Each national cloud environment differs from the global Microsoft environment. When you develop applications for these environments, it's important to understand key differences. For example, registering applications, acquiring tokens and calling the Microsoft Graph API can be different.
37+
Each national cloud environment differs from the global Microsoft environment. When you develop applications for these environments, it's important to understand the key differences. For example, registering applications, acquiring tokens, and calling the Microsoft Graph API can be different.
3838

3939
For more information about registering applications in a national cloud, see [App registration endpoints](/entra/identity-platform/authentication-national-cloud#app-registration-endpoints).
4040

41-
For more information about acquire tokens in a national cloud, see [Microsoft Entra authentication endpoints](/entra/identity-platform/authentication-national-cloud#azure-ad-authentication-endpoints).
41+
For more information about acquiring tokens in a national cloud, see [Microsoft Entra authentication endpoints](/entra/identity-platform/authentication-national-cloud#azure-ad-authentication-endpoints).
4242

43-
For more information about the different Microsoft Graph national cloud deployments and the capabilities that are available to developers within each, see [Microsoft Graph national cloud deployments](/graph/deployments). Here is a sample for implementation: [Configure .Net Application to call Microsoft Graph in a National Cloud Tenant](https://blogs.aaddevsup.xyz/2020/06/configure-net-application-to-call-microsoft-graph-in-a-national-cloud-tenant).
43+
For more information about the different Microsoft Graph national cloud deployments and the capabilities that are available to developers within each cloud, see [Microsoft Graph national cloud deployments](/graph/deployments). Here's a sample implementation: [Configure a .NET application to call Microsoft Graph in a national cloud tenant](https://blogs.aaddevsup.xyz/2020/06/configure-net-application-to-call-microsoft-graph-in-a-national-cloud-tenant).
4444

4545
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]

0 commit comments

Comments
 (0)