Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This article provides a solution to the error AADSTS900439 (USGClientNotSupportedOnPublicEndpoint) that occurs when you try to sign in to an application registered in the Azure Government cloud using a public cloud endpoint.
Symptoms
When trying to sign in to an application registered in the Azure Government cloud using a public endpoint, the sign-in fails, and you receive the AADSTS900439 (USGClientNotSupportedOnPublicEndpoint) error.
Cause
Microsoft Entra authority for Azure Government has been updated from https://login-us.microsoftonline.com
to https://login.microsoftonline.us
. This change also applies to Microsoft 365 GCC High and Microsoft 365 DoD environments, which Microsoft Entra authority for Azure Government also services. Microsoft Entra ID enforces the correct endpoint for sign-in operations. You can no longer sign in to an application registered in the Azure Government cloud using the public endpoint https://login-us.microsoftonline.com
.
For more information, see Microsoft Entra Authority for Azure Government Endpoint Update.
Solution
To resolve this issue, ensure you use the correct Azure Government endpoint for sign-in operations. Here are the mappings between Azure services and Azure Government endpoints:
Name | Azure Government endpoint |
---|---|
Portal | https://portal.azure.us |
Microsoft Graph API | https://graph.microsoft.us |
Active Directory Endpoint and Authority | https://login.microsoftonline.us |
For more information, see Azure Government endpoint mappings.
More information
Each national cloud environment differs from the global Microsoft environment. When you develop applications for these environments, it's important to understand the key differences. For example, registering applications, acquiring tokens, and calling the Microsoft Graph API can be different.
For more information about registering applications in a national cloud, see App registration endpoints.
For more information about acquiring tokens in a national cloud, see Microsoft Entra authentication endpoints.
For more information about the different Microsoft Graph national cloud deployments and the capabilities that are available to developers within each cloud, see Microsoft Graph national cloud deployments. Here's a sample implementation: Configure a .NET application to call Microsoft Graph in a national cloud tenant.
Contact us for help
If you have questions or need help, create a support request, or ask Azure community support. You can also submit product feedback to Azure feedback community.