National clouds, also known as Sovereign clouds, are physically isolated instances of Azure. These regions of Azure help make sure that data residency, sovereignty, and compliance requirements are honored within geographical boundaries.
In addition to the Microsoft worldwide cloud, the Microsoft Authentication Library (MSAL) enables application developers in national clouds to acquire tokens in order to authenticate and call secured web APIs. These web APIs can be Microsoft Graph or other Microsoft APIs.
Including the global Azure cloud, Azure Active Directory (Azure AD) is deployed in the following national clouds:
This guide demonstrates how to sign in to work and school accounts, get an access token, and call the Microsoft Graph API in the Azure Government cloud environment.
Azure Germany (Microsoft Cloud Deutschland)
Warning
Azure Germany (Microsoft Cloud Deutschland) will be closed on October 29, 2021. Services and applications you choose not to migrate to a region in global Azure before that date will become inaccessible.
Before you start, make sure that you meet these prerequisites.
Choose the appropriate identities
Azure Government applications can use Azure AD Government identities and Azure AD Public identities to authenticate users. Because you can use any of these identities, decide which authority endpoint you should choose for your scenario:
Azure AD Public: Commonly used if your organization already has an Azure AD Public tenant to support Microsoft 365 (Public or GCC) or another application.
Azure AD Government: Commonly used if your organization already has an Azure AD Government tenant to support Office 365 (GCC High or DoD) or is creating a new tenant in Azure AD Government.
After you decide, a special consideration is where you perform your app registration. If you choose Azure AD Public identities for your Azure Government application, you must register the application in your Azure AD Public tenant.
You can use MSAL.NET to sign in users, acquire tokens, and call the Microsoft Graph API in national clouds.
The following tutorials demonstrate how to build a .NET Core 2.2 MVC Web app. The app uses OpenID Connect to sign in users with a work and school account in an organization that belongs to a national cloud.
To enable your MSAL.js application for sovereign clouds:
Register your application in a specific portal, depending on the cloud. For more information on how to choose the portal refer App registration endpoints
Use any of the samples from the repo with a few changes to the configuration, depending on the cloud, which is mentioned next.
Use a specific authority, depending on the cloud you registered the application in. For more information on authorities for different clouds, refer to Azure AD Authentication endpoints.
To enable your MSAL Python application for sovereign clouds:
Register your application in a specific portal, depending on the cloud. For more information on how to choose the portal refer App registration endpoints
Use any of the samples from the repo with a few changes to the configuration, depending on the cloud, which is mentioned next.
Use a specific authority, depending on the cloud you registered the application in. For more information on authorities for different clouds, refer Azure AD Authentication endpoints.
To enable your MSAL for Java application for sovereign clouds:
Register your application in a specific portal, depending on the cloud. For more information on how to choose the portal refer App registration endpoints
Use any of the samples from the repo with a few changes to the configuration, depending on the cloud, which are mentioned next.
Use a specific authority, depending on the cloud you registered the application in. For more information on authorities for different clouds, refer Azure AD Authentication endpoints.
MSAL for iOS and macOS can be used to acquire tokens in national clouds, but it requires additional configuration when creating MSALPublicClientApplication.
For instance, if you want your application to be a multi-tenant application in a national cloud (here US Government), you could write:
MSAL for iOS and macOS can be used to acquire tokens in national clouds, but it requires additional configuration when creating MSALPublicClientApplication.
For instance, if you want your application to be a multi-tenant application in a national cloud (here US Government), you could write:
let authority = try? MSALAADAuthority(cloudInstance: .usGovernmentCloudInstance, audienceType: .azureADMultipleOrgsAudience, rawTenant: nil)
let config = MSALPublicClientApplicationConfig(clientId: "<your-client-id-here>", redirectUri: "<your-redirect-uri-here>", authority: authority)
if let application = try? MSALPublicClientApplication(configuration: config) { /* Use application */}