Skip to main content
The Government Community Cloud (GCC) is designed for US federal, state, local, and tribal government entities, and contractors holding or processing data on behalf of the US government. GCC uses the same endpoints as Commercial cloud but provides compliance with government requirements.

Cloud Endpoints

GCC uses the same technical endpoints as Microsoft Commercial cloud:
ServiceEndpoint
Graph APIhttps://graph.microsoft.com/beta
Authority Hosthttps://login.microsoftonline.com
OAuth 2.0 Authorizationhttps://login.microsoftonline.com/{tenant}/oauth2/v2.0/authorize
OAuth 2.0 Tokenhttps://login.microsoftonline.com/{tenant}/oauth2/v2.0/token
Graph Scopeshttps://graph.microsoft.com/.default

Implementation Details

From CloudEndpoints.cs:
CloudEnvironment.GCC => 
  ("https://graph.microsoft.com/beta", AzureAuthorityHosts.AzurePublicCloud)
GCC shares the same API endpoints as Commercial but provides FedRAMP High compliance and is physically and logically isolated in the Microsoft cloud infrastructure.

Compliance & Certifications

GCC provides the following compliance certifications:
CertificationStatus
FedRAMP HighAuthorized
CJISCompliant
IRS 1075Compliant
DISA IL2Compliant
NIST 800-171Compliant

App Registration

Prerequisites

  • Global Administrator or Application Administrator role in Entra ID
  • GCC tenant
  • Access to the Azure Portal: https://portal.azure.com
GCC uses the standard Azure Portal (portal.azure.com), not the government-specific portal used by GCC-High and DoD.

Registration Steps

1. Create App Registration

  1. Sign in to the Azure Portal with your GCC credentials
  2. Navigate to Entra ID > App registrations > New registration
  3. Configure the registration:
    • Name: Intune Commander - GCC (or your preferred name)
    • Supported account types: Accounts in this organizational directory only (single tenant)
    • Redirect URI:
      • Platform: Mobile and desktop applications
      • URI: http://localhost:45132
    • Click Register

2. Note Registration Details

After registration, copy the following values:
  • Application (client) ID - Found on the Overview page
  • Directory (tenant) ID - Found on the Overview page

3. Configure API Permissions

Navigate to API permissions and add the following Microsoft Graph Application permissions: Device Management
DeviceManagementConfiguration.ReadWrite.All
DeviceManagementApps.ReadWrite.All
DeviceManagementServiceConfig.ReadWrite.All
DeviceManagementManagedDevices.Read.All
DeviceManagementRBAC.ReadWrite.All
DeviceManagementScripts.ReadWrite.All
Conditional Access & Identity
Policy.ReadWrite.ConditionalAccess
Policy.Read.All
Agreement.ReadWrite.All
Organization & Branding
Organization.Read.All
OrganizationalBranding.ReadWrite.All
Groups
Group.Read.All
GroupMember.Read.All
Windows 365 (Optional)
CloudPC.ReadWrite.All
  1. Still on the API permissions page
  2. Click Grant admin consent for [Your Organization]
  3. Click Yes to confirm
  4. Verify all permissions show a green checkmark in the Status column

5. (Optional) Configure Client Secret

For unattended/service principal authentication:
  1. Navigate to Certificates & secrets
  2. Click New client secret
  3. Add a description: Intune Commander Service Principal
  4. Select expiration: 12 months (recommended)
  5. Click Add
  6. Immediately copy the secret value - it will not be shown again

Authentication Methods

Interactive Browser (Default)

Configuration:
  • Auth Method: Interactive
  • Client Secret: (leave blank)
Behavior:
  • Opens browser window for authentication
  • Supports MFA, Conditional Access, and all Entra ID features
  • Token cached locally for persistent sessions

Client Secret (Service Principal)

Configuration:
  • Auth Method: ClientSecret
  • Client Secret: (paste the secret value)
Behavior:
  • No user interaction required
  • Authenticates as the application identity
  • Secrets encrypted and stored in the profile file

Profile Configuration

Creating a Profile

From the Login Screen:
  1. Launch Intune Commander
  2. Fill in the profile details:
    • Profile Name: Agency-GCC-Production
    • Tenant ID: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
    • Client ID: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
    • Cloud: GCC (select this, not Commercial)
    • Auth Method: Interactive or ClientSecret
    • Client Secret: (if using ClientSecret auth method)
  3. Click Save Profile

JSON Profile Format

[
  {
    "name": "Agency-GCC-Production",
    "tenantId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
    "clientId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
    "cloud": "GCC",
    "authMethod": "Interactive"
  }
]
Important: Set "cloud": "GCC" to ensure the profile is recognized as a GCC environment.

Supported Features

All Intune Commander features are fully supported in GCC:
FeatureSupport Status
Device ConfigurationsFull support
Compliance PoliciesFull support
ApplicationsFull support
App Protection PoliciesFull support
Conditional AccessFull support
Endpoint SecurityFull support
Windows UpdatesFull support
Scripts & RemediationFull support
Enrollment ConfigurationsFull support
RBAC & Scope TagsFull support
GroupsFull support
Terms of UseFull support
Named LocationsFull support
Authentication StrengthsFull support
Conditional Access PowerPoint ExportFull support
Windows 365 Cloud PCFull support (requires license)

Differences from Commercial

Technical Differences

None. GCC uses identical API endpoints and authentication flows as Commercial cloud.

Compliance Differences

AspectGCCCommercial
Data residencyUS datacenters onlyWorldwide
Personnel screeningUS citizens (screened)Global workforce
FedRAMPHighNot certified
CJISCompliantNot certified
IRS 1075CompliantNot certified

Service Availability

Most Microsoft 365 and Intune features reach GCC on the same timeline as Commercial. Occasional delays of 1-2 weeks may occur for preview features.

Network Requirements

Required Outbound Connectivity

GCC uses the same endpoints as Commercial cloud:
DestinationPurpose
login.microsoftonline.comAuthentication
graph.microsoft.comMicrosoft Graph API
*.microsoft.comCertificate validation, service discovery
No special firewall rules or allowlists are required beyond Commercial cloud requirements.

Troubleshooting

Wrong Cloud Selected

Symptom: Authentication succeeds but all API calls fail with 401 or 403 errors Solution:
  1. Verify you selected GCC (not Commercial) when creating the profile
  2. Delete the profile and recreate with correct cloud selection
  3. Clear cached tokens: Delete %LocalAppData%\.IdentityService\msal.cache

Tenant Not in GCC

Symptom: “Tenant is not in the GCC environment” Solution:
  • Verify your tenant is actually a GCC tenant (check Microsoft 365 admin portal URL)
  • If your tenant is Commercial, select Commercial cloud instead
  • Contact your Microsoft account team if you believe you should have GCC access

Permission Errors

Solution:
  1. Use the Permission Check feature (View menu)
  2. Verify all required permissions are consented
  3. Grant admin consent in Azure Portal
  4. Sign out and sign back in

Migration from Commercial

Moving Configurations from Commercial to GCC

  1. Export from Commercial tenant:
    • Connect to Commercial tenant in Intune Commander
    • Export all configurations to a folder
  2. Import to GCC tenant:
    • Connect to GCC tenant in Intune Commander
    • Import configurations from the export folder
    • Review and update assignments (groups won’t migrate automatically)
  3. Update references:
    • Update any hardcoded URLs or resource references
    • Verify app registrations exist in GCC tenant
    • Test Conditional Access policies with pilot group
Cross-cloud sync not supported. You cannot synchronize or replicate configurations between Commercial and GCC in real-time. Use export/import for one-time migrations.

Build docs developers (and LLMs) love