The Government Community Cloud High (GCC-High) is designed for US federal agencies and contractors that process Controlled Unclassified Information (CUI) or are subject to ITAR, DFARS, and other strict compliance requirements. GCC-High operates on physically and logically isolated infrastructure with heightened security controls.
Cloud Endpoints
GCC-High uses dedicated government cloud endpoints:
| Service | Endpoint |
|---|
| Graph API | https://graph.microsoft.us/beta |
| Authority Host | https://login.microsoftonline.us |
| OAuth 2.0 Authorization | https://login.microsoftonline.us/{tenant}/oauth2/v2.0/authorize |
| OAuth 2.0 Token | https://login.microsoftonline.us/{tenant}/oauth2/v2.0/token |
| Graph Scopes | https://graph.microsoft.us/.default |
Implementation Details
From CloudEndpoints.cs:
CloudEnvironment.GCCHigh =>
("https://graph.microsoft.us/beta", AzureAuthorityHosts.AzureGovernment)
The authority host constant AzureAuthorityHosts.AzureGovernment maps to:
- Authority URI:
https://login.microsoftonline.us
Do not confuse with Commercial endpoints. GCC-High uses .us domains exclusively. Using .com endpoints will result in authentication failures.
Compliance & Certifications
GCC-High provides the highest level of compliance certifications:
| Certification | Status |
|---|
| FedRAMP High | Authorized |
| DISA IL4 | Compliant |
| DISA IL5 | In progress |
| ITAR | Compliant |
| DFARS | Compliant |
| CJIS | Compliant |
| IRS 1075 | Compliant |
| NIST 800-171 | Compliant |
| DoD SRG IL4 | Compliant |
Data Residency
- Physical location: US government datacenters only
- Personnel: All support personnel are US citizens with government screening
- Isolation: Physically and logically isolated from Commercial and GCC clouds
- Encryption: All data encrypted at rest and in transit
App Registration
Prerequisites
- Global Administrator or Application Administrator role in Entra ID
- GCC-High tenant
- Access to the Azure Government Portal: https://portal.azure.us
Use Azure Government Portal, not Azure Commercial Portal. GCC-High app registrations MUST be created at portal.azure.us, not portal.azure.com.
Registration Steps
1. Create App Registration
- Sign in to the Azure Government Portal with your GCC-High credentials
- Navigate to Entra ID > App registrations > New registration
- Configure the registration:
- Name:
Intune Commander - GCC-High (or your preferred name)
- Supported account types: Accounts in this organizational directory only (single tenant)
- Redirect URI:
- Platform: Mobile and desktop applications
- URI:
http://localhost:45132
- Click Register
2. Note Registration Details
After registration, copy the following values:
- Application (client) ID - Found on the Overview page
- Directory (tenant) ID - Found on the Overview page
These values will be different from any app registrations in your Commercial or GCC tenants. Do not reuse Client IDs across clouds.
Navigate to API permissions and add the following Microsoft Graph Application permissions:
Device Management
DeviceManagementConfiguration.ReadWrite.All
DeviceManagementApps.ReadWrite.All
DeviceManagementServiceConfig.ReadWrite.All
DeviceManagementManagedDevices.Read.All
DeviceManagementRBAC.ReadWrite.All
DeviceManagementScripts.ReadWrite.All
Conditional Access & Identity
Policy.ReadWrite.ConditionalAccess
Policy.Read.All
Agreement.ReadWrite.All
Organization & Branding
Organization.Read.All
OrganizationalBranding.ReadWrite.All
Groups
Group.Read.All
GroupMember.Read.All
Windows 365 (Optional)
4. Grant Admin Consent
- Still on the API permissions page
- Click Grant admin consent for [Your Organization]
- Click Yes to confirm
- Verify all permissions show a green checkmark in the Status column
Admin consent in GCC-High may take 15-30 minutes to propagate fully through the government cloud infrastructure.
For unattended/service principal authentication:
- Navigate to Certificates & secrets
- Click New client secret
- Add a description:
Intune Commander Service Principal
- Select expiration: 12 months (recommended)
- Click Add
- Immediately copy the secret value - it will not be shown again
Government data handling: Client secrets for GCC-High apps must be stored according to your organization’s CUI and ITAR data handling procedures.
Authentication Methods
Interactive Browser (Default)
Configuration:
- Auth Method:
Interactive
- Client Secret: (leave blank)
Behavior:
- Opens browser window to
login.microsoftonline.us
- Supports MFA, Conditional Access, and all Entra ID features
- Token cached locally for persistent sessions
- Automatically uses GCC-High authority host
Azure.Identity Implementation:
var credential = new InteractiveBrowserCredential(
new InteractiveBrowserCredentialOptions
{
TenantId = profile.TenantId,
ClientId = profile.ClientId,
AuthorityHost = new Uri("https://login.microsoftonline.us"),
RedirectUri = new Uri("http://localhost:45132")
}
);
Client Secret (Service Principal)
Configuration:
- Auth Method:
ClientSecret
- Client Secret: (paste the secret value)
Behavior:
- No user interaction required
- Authenticates as the application identity
- Secrets encrypted and stored in the profile file
- Automatically uses GCC-High authority host
Azure.Identity Implementation:
var credential = new ClientSecretCredential(
profile.TenantId,
profile.ClientId,
profile.ClientSecret,
new ClientSecretCredentialOptions
{
AuthorityHost = new Uri("https://login.microsoftonline.us")
}
);
Profile Configuration
Creating a Profile
From the Login Screen:
- Launch Intune Commander
- Fill in the profile details:
- Profile Name:
Agency-GCCHigh-Production
- Tenant ID:
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx (from portal.azure.us)
- Client ID:
xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx (from portal.azure.us)
- Cloud:
GCCHigh (critical—select this, not Commercial or GCC)
- Auth Method:
Interactive or ClientSecret
- Client Secret: (if using ClientSecret auth method)
- Click Save Profile
[
{
"name": "Agency-GCCHigh-Production",
"tenantId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"clientId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx",
"cloud": "GCCHigh",
"authMethod": "Interactive"
}
]
Critical: Set "cloud": "GCCHigh" to ensure correct endpoint selection.
Supported Features
All Intune Commander features are fully supported in GCC-High:
| Feature | Support Status |
|---|
| Device Configurations | Full support |
| Compliance Policies | Full support |
| Applications | Full support |
| App Protection Policies | Full support |
| Conditional Access | Full support |
| Endpoint Security | Full support |
| Windows Updates | Full support |
| Scripts & Remediation | Full support |
| Enrollment Configurations | Full support |
| RBAC & Scope Tags | Full support |
| Groups | Full support |
| Terms of Use | Full support |
| Named Locations | Full support |
| Authentication Strengths | Full support |
| Windows 365 Cloud PC | Full support (requires license) |
PowerPoint Export Limitation: Conditional Access PowerPoint export is currently Commercial cloud only. GCC-High support is planned for a future release.
Differences from Commercial & GCC
Technical Differences
| Aspect | GCC-High | GCC | Commercial |
|---|
| Graph API endpoint | graph.microsoft.us | graph.microsoft.com | graph.microsoft.com |
| Authority host | login.microsoftonline.us | login.microsoftonline.com | login.microsoftonline.com |
| App registration portal | portal.azure.us | portal.azure.com | portal.azure.com |
| Tenant isolation | Physical & logical | Logical only | None |
| Personnel screening | Government screening | US citizens (screened) | Global workforce |
Service Availability
GCC-High typically receives new features 2-6 weeks after Commercial cloud:
- Core features: Usually available within 2-4 weeks
- Preview features: May not be available or significantly delayed
- Third-party integrations: Limited compared to Commercial
Network Requirements
Required Outbound Connectivity
GCC-High uses government-specific endpoints:
| Destination | Purpose |
|---|
login.microsoftonline.us | Authentication (required) |
graph.microsoft.us | Microsoft Graph API (required) |
*.microsoft.us | Certificate validation, service discovery |
*.windows.net | Azure infrastructure services |
Do not allowlist .com domains. GCC-High requires .us government endpoints. Blocking .us domains will prevent authentication and API access.
Proxy Support
Intune Commander uses the system proxy configuration:
- Windows: Internet Options proxy settings
- macOS/Linux: System environment variables (
HTTP_PROXY, HTTPS_PROXY)
Ensure proxy configuration allows connections to *.microsoft.us and *.microsoftonline.us domains.
Troubleshooting
Wrong Cloud Selected
Symptom: “AADSTS90043: The request was made to the wrong cloud instance”
Solution:
- Verify you selected GCCHigh when creating the profile
- Delete the profile and recreate with correct cloud selection
- Clear cached tokens: Delete
%LocalAppData%\.IdentityService\msal.cache
App Registration in Wrong Portal
Symptom: Authentication fails with “Application not found” or “Invalid client”
Solution:
- Verify app registration was created in portal.azure.us (not portal.azure.com)
- Create a new app registration in the correct portal
- Update profile with new Client ID from portal.azure.us
Endpoint Mismatch
Symptom: API calls return 401 Unauthorized or DNS resolution failures
Solution:
- Verify profile cloud is set to GCCHigh
- Check network connectivity to
graph.microsoft.us and login.microsoftonline.us
- Ensure firewall allows outbound HTTPS to
*.microsoft.us
- Test connectivity:
curl https://graph.microsoft.us/beta
Permission Propagation Delays
Symptom: Permissions granted but still getting 403 Forbidden errors
Solution:
- Wait 15-30 minutes after granting admin consent
- Sign out and sign back in to refresh token
- Use Permission Check feature to verify JWT token claims
- Contact Microsoft support if permissions don’t propagate after 1 hour
Migration from Commercial or GCC
Moving Configurations to GCC-High
-
Export from source tenant:
- Connect to Commercial or GCC tenant in Intune Commander
- Export all configurations to a folder
-
Review for compliance:
- Ensure configurations meet GCC-High compliance requirements
- Remove references to third-party services not approved for CUI
- Update URLs to government-specific endpoints (if any hardcoded)
-
Import to GCC-High tenant:
- Create app registration in portal.azure.us
- Create GCCHigh profile in Intune Commander
- Import configurations from the export folder
- Review and update assignments (groups won’t migrate automatically)
-
Test thoroughly:
- Validate Conditional Access policies with pilot group
- Test device enrollment and compliance evaluation
- Verify app deployments and MAM policies
Cross-cloud sync not supported. You cannot synchronize configurations between Commercial/GCC and GCC-High in real-time. Use export/import for one-time migrations only.