Skip to content

Commit c1293fe

Browse files
authored
Merge pull request #113825 from hpsin/patch-58
New breaking change - USGov disconnect
2 parents 6957073 + d8975be commit c1293fe

File tree

1 file changed

+20
-2
lines changed

1 file changed

+20
-2
lines changed

articles/active-directory/develop/reference-breaking-changes.md

Lines changed: 20 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.service: active-directory
99
ms.subservice: develop
1010
ms.workload: identity
1111
ms.topic: conceptual
12-
ms.date: 3/13/2020
12+
ms.date: 5/4/2020
1313
ms.author: ryanwi
1414
ms.reviewer: hirsin
1515
ms.custom: aaddev
@@ -33,13 +33,31 @@ The authentication system alters and adds features on an ongoing basis to improv
3333

3434
None scheduled at this time. Please see below for the changes that are in or are coming to production.
3535

36+
## May 2020
37+
38+
### Azure Government endpoints are changing
39+
40+
**Effective date**: May 5th (Finishing June 2020)
41+
42+
**Endpoints impacted**: All
43+
44+
**Protocol impacted**: All flows
45+
46+
On 1 June 2018, the official Azure Active Directory (AAD) Authority for Azure Government changed from `https://login-us.microsoftonline.com` to `https://login.microsoftonline.us`. This change also applied to Microsoft 365 GCC High and DoD, which Azure Government AAD also services. If you own an application within a US Government tenant, you must update your application to sign users in on the `.us` endpoint.
47+
48+
Starting May 5th, Azure AD will begin enforcing the endpoint change, blocking government users from signing into apps hosted in US Government tenants using the public endpoint (`microsoftonline.com`). Impacted apps will begin seeing an error `AADSTS900439` - `USGClientNotSupportedOnPublicEndpoint`. This error indicates that the app is attempting to sign in a US Government user on the public cloud endpoint. If your app is in a public cloud tenant and intended to support US Government users, you will need to [update your app to support them explicitly](https://docs.microsoft.com/azure/active-directory/develop/authentication-national-cloud). This may require creating a new app registration in the US Government cloud.
49+
50+
Enforcement of this change will be done using a gradual rollout based on how frequently users from the US Government cloud sign in to the application - apps signing in US Government users infrequently will see enforcement first, and apps frequently used by US Government users will be last to have enforcement applied. We expect enforcement to be complete across all apps in June 2020.
51+
52+
For more details, please see the [Azure Government blog post on this migration](https://devblogs.microsoft.com/azuregov/azure-government-aad-authority-endpoint-update/).
53+
3654
## March 2020
3755

3856
### User passwords will be restricted to 256 characters.
3957

4058
**Effective date**: March 13, 2020
4159

42-
**Endpoints impacted**: Both v1.0 and v2.0
60+
**Endpoints impacted**: All
4361

4462
**Protocol impacted**: All user flows.
4563

0 commit comments

Comments
 (0)