Azure / Office 365 / SharePoint Development / Search

Building daemon or service app with the Microsoft Graph API

on Nov 27, 2015 by Elio Struyf with 13 comments

In my previous blog post I described the process how to create all day events with the Microsoft Graph API. I used this method for synchronizing an external planning system to Office 365. This enabled our users to go to a MVC site and manually start the synchronization process. The next thing on my to-do list was to create a daemon or service application which performs a synchronization on a scheduled basis via an Azure WebJob.

In order to create / modify events in a user’s calendar, the service application requires app-only permissions. This can be configured via an Azure AD application. You are able to define the permission levels of various services like calendar, mail, groups, etc. which your application has to access. In this article I describe what I had to do in order to successfully configure and create such a service application.

Create a certificate (optional)

First of all you need a certificate. For the development process of you application you can make use of a self-signed. When you put your service application in production it is best to make use of a trusted certificate. So if you already have a self-signed or trusted certificate, this step is not required.

To create a self-signed certificate you can make use of the makecert.exe tool. Here are the steps to execute:

  • Locate the makecert.exe tool on your computer. If you have Visual Studio installed, you can run it from the Visual Studio command prompt. Or if you have Fiddler installed, you find it in the Fiddler program folder. When you have neither of these installed, you can get it from the Windows SDK: MakeCert;
  • Once you have located the makecert tool, execute the following command:
  • Once the certificate is created, you have to open the Microsoft Management Console. Easiest way is with the mmc.exe command;
  • Open the Current User's certificate folder via: File > Add/Remove snap-in > Click on certificates > choose My user account and click Finish > click OK;
My user account certificates

My user account certificates

  • Find the certificate you created in the list;
The certificate I created

The certificate I created

  • Export the certificate as PFX and CER by right clicking on the certificate > All Tasks > Export;
  • Go through the export wizard and choose Yes, export the private key > Next > Check the password checkbox and fill in a password for the PFX;
Insert a password for your certificate

Insert a password for your certificate

  • Choose the location to store the PFX file and click finish;
  • Repeat the same steps, but choose in the export wizard No, do not export the private key and complete the wizard;
  • Once you completed the export wizard twice, you should have the PFX and CER files.

Azure AD application configuration

As I mentioned, your service application requires app-only permissions to perform Microsoft Graph API calls. In order to do this, you have to create an Azure AD application.

Add an Azure AD application

Follow the next steps to create a new Azure AD application:

  • Open the Azure management portal and go to your active directory;
  • On the Applications tab, click on the ADD button;
  • In the dialog window choose to Add an application my organization is developing;
Add a new application

Add a new application

  • Give your application a name;
Application name

Application name

  • Specify the sign-on URL and APP ID URI;
Sign-on URL and APP ID URI

Sign-on URL and APP ID URI

Note: The sign-on URL does not matter in this case, because you will use a certificate to get the access token. I entered  the Azure Web App URL where the WebJob is going to run.

  • Once you have completed this wizard your application is added and you are able to specify the permissions for your application.

Application permissions

Now that the Azure AD application is created, it is time to set the application permissions for your app.

  • Click on the Configure tab of your application;
  • Scroll to the bottom of the page and click on the Add application;
Permissions to other applications

Permissions to other applications

  • Add the Microsoft Graph by clicking on the plus button and store this configuration;
Add Microsoft Graph to the permissions list

Add Microsoft Graph to the permissions list

  • Once the Microsoft Graph has been added to the list of permissions to other applications. Click on the application permissions dropdown and select your required set of permissions for your application;
Give the required set of permissions

Give the required set of permissions

  • Click on the save button at the bottom of the page to store your configuration.

Configure your certificate public key in the application manifest

The next step is to configure your certificate public key in the Azure AD manifest. First of all you need to retrieve the keys. Richard diZerega created a PowerShell script for this on his blog:

Once you have the base64Cert, base64CertHash and KeyId value, go back to your Azure AD application and download the manifest file:

Download Manifest file

Download Manifest file

Open the manifest file, and replace the keyCredentials property with the following value:

Important: update the base64Cert, base64CertHash and KeyId value in this JSON string.

When you updated the manifest file, upload it to the Azure AD application. Now you can almost start building your application.

Certificate configuration on the Azure Web App

I created the service application as a Azure WebJob, this makes scheduling of the job very straight forward. Once you start building your application, the first thing you have to do is retrieving the certificate and getting an access token. To retrieve your certificate in your application, you can make use of Azure Key Vault or another option is to add the certificate to the App Web to which you publish your WebJob. The last approach is the one I used.

To configure a certificate on an Azure Web App, it should be scaled to the basic or standard tier.

Switching to basic tier

Switching to basic tier

Note: the whole certificate configuration process is explained on the following Azure documentation page: Using Certificates in Azure Websites Applications.

Important: switching to basic tier brings a cost with it.

Once you uploaded the certificate to your Azure Web App, it should look like this:

Uploading your certificate

Uploading your certificate

Important: Now there is one thing before you can start building your app. In order to be able to retrieve the certificate for your application, you have to make it accessible by adding an app setting: WEBSITE_LOAD_CERTIFICATES with the certificate Thumbprint value (you could also use “*”).



Once this is added, you are ready to start developing.

Building your daemon or service app

If you already have a Visual Studio web project, you can add the Azure WebJob project when you right-click on your web project > New Azure WebJob Project.

New Azure WebJob project

New Azure WebJob project

Another way to start is by creating a console application. Once you are finished you can publish it by right-clicking on the project > Publish as Azure WebJob. This is the method I used for this blog post.

Publish a application as an Azure WebJob

Publish a application as an Azure WebJob

Note: more information about this can be found here: Deploy WebJobs using Visual Studio.

Get the certificate

The first thing you need when you start building your application is to retrieve the certificate. This can be done as follows:

Note: this piece of code requires the Thumbprint of your certificate in order to find it.

Get an access token

Once you acquired the certificate in by code. Your next step is to retrieve an access token to call the Microsoft Graph API. Here is the code to retrieve an access token:

Note 1: this code requires the following NuGet package to be installed to your project: Microsoft.IdentityModel.Clients.ActiveDirectory.

Note 2: this piece of code requires the Authority (, ClientId (you can find it on the Azure AD application configure page), GraphUrl (

Retrieving events from the Microsoft Graph API

Now that we have an access token, you are finally able to do calls against the Microsoft Graph API. Here is an example of how you can retrieve events:

Note 1: this code is created with the RestSharp client, which can be installed from NuGet.

Note 2: you have to specify the user’s ID or Principle Name in order to retrieve the events.

Once you have this, you can start adding your own calls and logic. The last thing that remains is publishing WebJob project to Azure and you are done.

WebJob result in Azure

WebJob result in Azure

Demo application code

The code of the demo application can be found at GitHub: Microsoft Graph Service Application Demo.

Useful resources

The following links have helped me accomplish to create my service app:

Article comments

  • Daniel

    G’day Elio great post. I have been trying to find a solution so I can read from a shared calendar in Office365 and display events from this calendar on a home page of a SharePoint Intranet (same tenant as the shared calendar). Running into authentication problems as apparently accessing a Shared Mailbox uses Basic Auth and using a cross domain rest call from within SharePoint is causing problems..

    Would love you thoughts on that and whether this could work in that situation?

  • Pingback: Building daemon or service app with the Microsoft Graph API « Katpro Technologies Pvt Ltd()

  • Cam Nguyen

    Hi, can you help me.

    I want to build a app only(get Office data without redirect to login page from javascript).
    I have some questions, can you help me.
    1. Can I get outlook data with tenantId, clientId and clientSecrect(without registing the X509 certificate) or can I use X509 certificate on javascript.
    2. If user that created app(on Azure Directory) is not a administrator, can we access to view another members meeting.

    Thank you.

    • Yes, you can do this via JavaScript / Node.js.

      For you first question, all you have to do is make use of the ADAL library.

      Here you can find a sample for acquiring your token via a certificate:

      Here is a sample were only the clientId and secret is used:

      For the second question. If you created the app on Azure and could consent it, I would presume that you have high enough privileges. If not, you will have to ask an admin to give an admin consent to you app.

      • Cam Nguyen

        Thank you for your reply.
        But I have question about admin role.
        I created a user with role is Global Administrator.
        And then I login as this user and create App.
        But I can’t access for get data of all user in this tenant.
        Did I miss setting something. Please help me.

        • Do you want to get the messages with the global administrator account? If that is the case, you can only access your own account via delegated permissions. If you want to be able to get to other users their mail/calendars you will need to create an application which you give application permissions. This works with client + secret / certificate.

        • Cam Nguyen

          I created app that I can get all member calendar with client Id and secret key(I tried with Postman and I see data) , But now I try with Javascript(not Node.js), I can’t call cross domain with POST method(I try to use ajax and also send by iframe). If I send by Iframe, I can receive data, But I can not get access_token from iframe. Can you help me. Thank you.

        • Are you using a custom API which you built? If so, you probably still have to specify your CORS settings on your site to allow to make calls from the SharePoint domain.

        • Cam Nguyen

          Thank you so much for your reply. Actually, we use another service so we can’t set CORS on server. But we solved this. Thank you again.

        • Great to hear! Thanks for the update. Any information about it you can share?