Additional Azure Active Directory information for the migration from Microsoft Cloud Deutschland

To complete the move from the Azure German cloud to the Azure public cloud we recommend that the authentication endpoint, Azure Active Directory (Azure AD) Graph, and MS Graph endpoints for your applications be updated to those of the commercial cloud when the OpenID Connect (OIDC) endpoint,\<TenantIdOrDomain\>/.well-known/openid-configuration, starts reporting commercial cloud endpoints.

When should I make this change?

You'll receive a notification in Azure/Office portal when your tenant completes migration from German cloud to the commercial cloud. You have 30 days after receiving this notification to complete these updates so that your app continues to work for tenants that are migrated from Azure Germany cloud to Azure Public cloud.

There are three preconditions to updating your sign-in authority:

  • OIDC discovery endpoint for your tenant\<TenantIdOrDomain\>/.well-known/openid-configuration returns Azure AD public cloud endpoints.

  • If your tenant is set up for federation, Active Directory Federation Services (AD FS) is updated to sync with Azure AD Public. You can follow instructions to update Azure AD Connect settings for making this change.

  • Resource applications, if any, used by your applications are modified to accept tokens that are signed by both Azure AD Germany and Azure AD Public.

What kind of applications?

An application could be any of the following:


When an application switches to using as your authority, the tokens will be signed by this new authority. If you host any resource applications that other apps call into, you will need to allow for lax token validation. This means that your app needs to allow tokens that are signed by both the Azure AD Germany and Azure AD public clouds. This lax token validation is needed until all client applications that call your service are fully migrated to the Azure AD public cloud. After migration, your resource application only needs to accept tokens signed by the Azure AD public cloud.

What do I need to update?

  1. If you're hosting an application in Azure Germany that is used to authenticate Azure Germany or Office 365 Germany users, ensure that is used as the authority in the authentication context.

    • See Azure AD authentication contexts.
    • This applies both to authentication to your application as well as authentication to any APIs that your application may be calling (that is, Microsoft Graph, Azure AD Graph, Azure Resource Manager).
  2. Update Azure AD Graph endpoint to be

  3. Update MS Graph endpoint to be

  4. Update any German cloud endpoints (such as those for Exchange Online and SharePoint Online) that are used by your applications to be those of the public cloud.

  5. Update environment parameters to be AzurePublic (instead of AzureGermany) in administrative tools and scripts for:

What about applications that I publish?

If you publish an application that is available to users who are outside of your tenant, you may need to change your application registration to ensure continuity. Other tenants that use your application may be moved at a different time than your tenant. To ensure that they never lose access to your application, you'll need to consent to your app being synchronized from Azure Germany to Azure public.

Additional considerations

Here are some additional considerations for Azure AD:

  • For federated authentication:

    • You must not create, promote, or demote a federated domain while the tenant transition is in process. After the migration to the Azure AD service is complete (the tenant is fully complete), you can resume managing federated domains.

    • If you're using federated authentication with Active Directory Federation Services (AD FS), you shouldn't make changes to Issuer URIs used for all authentication with your on-premises Active Directory Domain Services (AD DS) during migration. Changing issuer URIs will lead to authentication failures for users in the domain. Issuer URIs can be changed directly in AD FS or when a domain is converted from managed to federated and vice versa. Microsoft recommends customers don't add, remove, or convert a federated domain in the Azure AD tenant being migrated. Issuer URIs can be changed after the migration is fully complete.

  • For networking:

    • Creating IPv6-named networks doesn't work in the Azure portal, Use the Azure portal at to create IPv6-named networks.

    • You can't create trusted IP address ranges for Azure Multi-Factor Authentication (MFA) service settings from the Microsoft Cloud Deutschland portal. Use the Azure AD portal for Office 365 services to create Azure MFA trusted IP address ranges.

  • For Conditional Access:

    • Conditional Access policies with the following grant controls aren't supported until migration to Office 365 services is complete (after the Finalize Azure AD migration phase):

      • Require Compliant Device
      • Require Approved App
      • Require App Protection Policy
    • The Conditional Access policy interface gives a false warning about security defaults being enabled for the tenant even when it's disabled, and Conditional Access policies already exist for the tenant. You should ignore the warning or use the Office 365 services portal to manage Conditional Access policies.

  • Intune scenarios are supported only against worldwide endpoints after tenant migration is complete, including all office workloads migrations.

  • Microsoft Cloud Deutschland users who use the Mobile App Notification method for MFA requests see the user's ObjectId (a GUID) instead of the user principal name (UPN) in the Microsoft Authenticator app. After migration of the Azure AD tenant is complete and hosted in Office 365 services, new Microsoft Authenticator activations will display users' UPNs. Existing Microsoft Authenticator accounts will continue to display the user ObjectId, but they'll continue to work for mobile app notifications.

  • For tenants that are created after October 22, 2019, security defaults may be auto-enabled for the tenant when it's migrated to the Office 365 service. Tenant admins can choose to leave security defaults enabled and register for MFA, or they can disable the feature. For more information, see Disabling security defaults.


    Organizations that are not auto-enabled during migration may still be auto-enrolled in the future as the feature to enable security defaults is rolled out in the Office 365 service. Admins who choose to explicitly disable or enable security defaults may do so by updating the feature under Azure Active Directory > Properties. After the feature is explicitly enabled by the admin, it will not be auto-enabled.

  • There will be warning about the version of Azure AD Connect in the Office 365 Germany portal as well as in the Office 365 portal once the tenant is in migration. This can be ignored if the version warning is no longer showing the warning after the migration is complete. If there's a warning, either before or after migration, in either portal, Azure AD Connect must be updated. The warning message says: "We detected you're using an outdated directory sync tool. We recommend you go to the Microsoft Download Center to get the latest version of Azure AD Connect."

More information

Getting started:

Moving through the transition:

Cloud apps: