Problem with SSO between Azure gov cloud and Azure National Cloud?

I’ve run into a problem I haven’t seen before. I am trying to get a customer set up with an AAD connection to our SaaS product. I went through the whole process as I have with other operational customers, but this one threw a curveball at me.

The error we receive is:

AADSTS900381: Request redirection failed. Tenant ‘.onmicrosoft,com’ specified belongs to the National Cloud ‘MicrosoftOnline,COM’, but Current Cloud Instance ‘microsoftonline,us’ does not federate with ‘MicrosoftOnline,COM’/

This error seems to imply that because our SaaS product is in the gov cloud, and the customer tenant is part of the “National Cloud ‘MicrosoftOnline,COM’”, they can’t federate. From what I gather, National Cloud means “physically isolated instance of Azure”.

For reference, we use the Auth0 .NET SDK’s AuthenticationApiClient’s to create the redirect uri, as well as validate the token response.

Is this something in Auth0’s court, our court (the SaaS product in the gov cloud) or our customer’s court (the AAD in the National Cloud)?

I’m not quite sure who to talk to about this.

(I replaced addresses with comma, since the forum thought they were links and wouldn’t let me post)

1 Like

Hello. Was this ever resolved? I’m getting a similar error trying to connect to a customer’s Azure AD in their Azure Government. I am getting AADSTS900432: Confidential Client is not supported in Cross Cloud request. My guess is that this is because the connection in Auth0 is hitting instead of Auth0 team, is it possible for you allow us to hit another Azure AD endpoint to support connecting to Azure Government?

I’m still not sure if I’ve gotten to the bottom of the problem yet. Here’s the latest:

The gist of the response I got from Auth0:
After discussing this with the rest of the Support Team, the recommendation here would be to instead create an Enterprise OIDC connection instead. The reason being is that this will allow you to configure any domain URL. One of our Staff Support Engineers Nico wrote up a rather comprehensive how-to for just this type of situation:

The response I got from Microsoft about this:
On 1 June 2018, the official Azure Active Directory (AAD) Authority for Azure Government changed from to This change also applied to Microsoft 365 GCC High and DoD, which Azure Government AAD also services. If you own an application within a US Government tenant, you must update your application to sign users in on the .us endpoint. Starting in July 2020, Azure AD will begin enforcing the endpoint change for public cloud users, blocking public cloud users from signing into apps hosted in US Government tenants ( tenants).

See: Azure Government AAD Authority Endpoint Update | Azure Government (

See: Azure Government Identity - Azure Government | Microsoft Docs

Thanks @jblanchard!

Auth0 team, could you please allow us to set the Azure AD endpoint so we can reliably and easily allow Azure Government users to authenticate with us?