Skip to content

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
page_type description products languages extensions urlFragment
sample
Shows how to request RSC permissions, use them to call Microsoft Graph, and how to enumerate permission grants through teams tab.
office-teams
office
office-365
csharp
contentType createdDate
samples
07/07/2021 01:38:26 PM
officedev-microsoft-teams-samples-graph-rsc-csharp

RSC with Graph API

This sample illustrates you can use Resource Specific Consent (RSC) to call Graph APIs.

Included Features

  • Tabs
  • RSC Permissions

Interaction with app

Broadcast from user

Try it yourself - experience the App in your Microsoft Teams client

Please find below demo manifest which is deployed on Microsoft Azure and you can try it yourself by uploading the app manifest (.zip file link below) to your teams and/or as a personal app. (Sideloading must be enabled for your tenant, see steps here).

RSC with Graph API: Manifest

Prerequisites

Setup

  1. Register your app with Microsoft identity platform via the Microsoft Entra ID portal (Microsoft Entra ID app registration)

  2. Clone the repository

    git clone https://github.com/OfficeDev/microsoft-teams-samples.git
  3. Build your solution

    • Launch Visual Studio
    • File -> Open -> Project/Solution
    • Navigate to samples/graph-rsc folder
    • Select RSCDemo.sln file
    • Build the solution
  4. Run ngrok - point to port 3978

    ngrok http 3978 --host-header="localhost:3978"

    Alternatively, you can also use the dev tunnels. Please follow Create and host a dev tunnel and host the tunnel with anonymous user access command as shown below:

    devtunnel host -p 3978 --allow-anonymous
  5. Update appsettings.json

    • Update configuration for <<Client Id>>, <<Client Secret>> and <<Tenant Id>> with the MicrosoftAppId , MicrosoftAppPassword and TenantId which was generated while doing Microsoft Entra ID app registration in your Azure Portal.
  6. Run the bot from Visual Studio:

    • Press F5 to run the project
  7. Setup the manifest.json in the /AppManifest folder Replace the following details:

    • Replace <<Your Microsoft APP Id>> at all the places with your MicrosoftAppId received while doing Microsoft Entra ID app registration in Azure portal
    • [Your tunnel Domain] with base Url domain. E.g. if you are using ngrok it would be https://1234.ngrok-free.app then your domain-name will be 1234.ngrok-free.app and if you are using dev tunnels then your domain will be like: 12345.devtunnels.ms.
    • Zip up the contents of the AppManifest folder to create a manifest.zip
    • Upload the manifest.zip to Teams (in the Apps view click "Upload a custom app")

Running the sample

App review: Overview

App permission: Permossion

Permission list: Permissionlist

Tab Page tab-page

Select Reciepient select-people

Sent Notification notification

Further Reading.