You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Describes a problem in which you receive the error AADSTS900439 when signing in to an application registered in Azure Government cloud using a public endpoint.
4
-
ms.date: 03/17/2025
3
+
description: Describes a problem in which you receive the error AADSTS900439 when signing in to an application registered in the Azure Government cloud using a public endpoint.
4
+
ms.date: 03/21/2025
5
5
ms.reviewer: bernawy
6
6
ms.service: entra-id
7
7
ms.custom: sap:Issues Signing In to Applications
@@ -12,19 +12,19 @@ This article provides a solution to the error AADSTS900439 (USGClientNotSupporte
12
12
13
13
## Symptoms
14
14
15
-
When trying to sign in to an application registered in Azure Government cloud using a public endpoint, the sign-in fails and you receive the AADSTS900439 (USGClientNotSupportedOnPublicEndpoint) error.
15
+
When trying to sign in to an application registered in the Azure Government cloud using a public endpoint, the sign-in fails, and you receive the AADSTS900439 (USGClientNotSupportedOnPublicEndpoint) error.
16
16
17
17
## Cause
18
18
19
-
Microsoft Entra authority for Azure Government has been updated to from `https://login-us.microsoftonline.com` to `https://login.microsoftonline.us`. This change also applies to Microsoft 365 GCC High and M365 DoD environments, which Microsoft Entra authority for Azure Government also services. Microsoft Entra ID enforces the correct endpoint for sign-in operations. You can no longer sign in to an application registered in the Azure Government cloud using the public endpoint `https://login-us.microsoftonline.com`.
19
+
Microsoft Entra authority for Azure Government has been updated from `https://login-us.microsoftonline.com` to `https://login.microsoftonline.us`. This change also applies to Microsoft 365 GCC High and Microsoft 365 DoD environments, which Microsoft Entra authority for Azure Government also services. Microsoft Entra ID enforces the correct endpoint for sign-in operations. You can no longer sign in to an application registered in the Azure Government cloud using the public endpoint `https://login-us.microsoftonline.com`.
20
20
21
-
For more information, see [Endpoint Update - Microsoft Entra Authority for Azure Government](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update)
21
+
For more information, see [Microsoft Entra Authority for Azure Government Endpoint Update](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update).
22
22
23
23
## Solution
24
24
25
25
To resolve this issue, ensure you use the correct Azure Government endpoint for sign-in operations. Here are the mappings between Azure services and Azure Government endpoints:
26
26
27
-
| Name | Azure Government Endpoint|
27
+
| Name | Azure Government endpoint|
28
28
| --- | --- |
29
29
| Portal |`https://portal.azure.us`|
30
30
| Microsoft Graph API |`https://graph.microsoft.us`|
@@ -34,12 +34,12 @@ For more information, see [Azure Government endpoint mappings](/azure/azure-gove
34
34
35
35
## More information
36
36
37
-
Each national cloud environment differs from the global Microsoft environment. When you develop applications for these environments, it's important to understand key differences. For example, registering applications, acquiring tokens and calling the Microsoft Graph API can be different.
37
+
Each national cloud environment differs from the global Microsoft environment. When you develop applications for these environments, it's important to understand the key differences. For example, registering applications, acquiring tokens, and calling the Microsoft Graph API can be different.
38
38
39
39
For more information about registering applications in a national cloud, see [App registration endpoints](/entra/identity-platform/authentication-national-cloud#app-registration-endpoints).
40
40
41
-
For more information about acquire tokens in a national cloud, see [Microsoft Entra authentication endpoints](/entra/identity-platform/authentication-national-cloud#azure-ad-authentication-endpoints).
41
+
For more information about acquiring tokens in a national cloud, see [Microsoft Entra authentication endpoints](/entra/identity-platform/authentication-national-cloud#azure-ad-authentication-endpoints).
42
42
43
-
For more information about the different Microsoft Graph national cloud deployments and the capabilities that are available to developers within each, see [Microsoft Graph national cloud deployments](/graph/deployments). Here is a sample for implementation: [Configure .Net Application to call Microsoft Graph in a National Cloud Tenant](https://blogs.aaddevsup.xyz/2020/06/configure-net-application-to-call-microsoft-graph-in-a-national-cloud-tenant).
43
+
For more information about the different Microsoft Graph national cloud deployments and the capabilities that are available to developers within each cloud, see [Microsoft Graph national cloud deployments](/graph/deployments). Here's a sample implementation: [Configure a .NET application to call Microsoft Graph in a national cloud tenant](https://blogs.aaddevsup.xyz/2020/06/configure-net-application-to-call-microsoft-graph-in-a-national-cloud-tenant).
44
44
45
45
[!INCLUDE [Azure Help Support](../../../includes/azure-help-support.md)]
0 commit comments