Announcing the SharePoint Add-in “Export to Word”

Today, we’re glad to announce the FREE SharePoint Add-in “Export to Word”, developed by the team at U2U. This add-in fixes one of those issues that you’ll probably will have come across with in SharePoint, namely generating Word documents based on SharePoint list items. A bit like a mail merge for list items! This functionality has never been out of the box available for regular SharePoint list items. You could achieve something like it on document libraries only, using Quick Parts in Word. But however, that only works for document libraries. Now, what does the add-in allow you to do? It allows you to configure, per SharePoint list, one or more Word templates. You can even upload your own templates! The add-in then allows you to link fields from your selected list to the content of the template. Once your template is completely designed, you can just go to the SharePoint list and export any item to Word using your template. You can even export multiple items in bulk!    Do you want to know more about this add-in? Just go to the official site.Do you want to install it from the Office Store? You can find the add-in here. For a quick start guide on how to work with the add-in, have a look at the following video:   Do note that this is the first version of the Add-in, and we want your feedback to further extend and improve the add-in. You can contact us via the regular ways.

Consuming SharePoint CSOM from an Office 365 app

I’ve been a C# developer for more than five years now. When SharePoint 2013 was released, I started doing development for SharePoint 2013 and later also SharePoint Online. My focus was on developing web services (in combination with the SharePoint App model), native client and mobile applications using the Client Side Object Model. When I was at the Barcelona TechEd conference in 2014, I decided to follow quite some breakout sessions about Office 365 and the “new” Office 365 APIs. It was around that time also that they released the new Office 365 Apps look and feel by means of the new “App Launcher” and the “My Apps” page. Without having the knowledge about Apps for Office 365, I initially thought that these would be quite comparable to Apps for SharePoint. However, Apps for Office 365 are completely different. Apps for Office 365 An app for Office 365 is conceptually: An application that is running externally (i.e. on some website) or standalone (i.e. mobile or desktop). The application can be accessible from within the office 365 website, but also could be surfaced from within Word or Outlook. Integrating somehow with Office 365 (this is not required). Registered in the Azure Active Directory (AAD) that is running behind your Office 365 tenant. Can use the same authentication mechanism as Office 365, resulting in single sign-on. So before you can use your app in Office 365, you have to register it in Azure Active Directory. When registering you app in Azure AD, you also configure the permissions it gets to access the Office 365 services like mail, contacts, events and OneDrive for Business, but also SharePoint! Then I started thinking: “Does this mean that you can register an app in Azure AD and let it access SharePoint online?”. Getting the access token I was eager to discover whether it was possible to access SharePoint using the Client Side Object Model and the Azure Authentication mechanism. Jeremy Thake briefly mentioned in a blog post that it is possible to use the token you get from Azure as the Bearer token in you ClientContext requests.So I created an ASP.NET MVC5 web application, registered it in Azure AD, set the permissions for Office 365 SharePoint Online (see above) and started experimenting. You can get the access token as follows: /// <summary> /// Get the access token for the required resource /// </summary> /// <param name="clientID">The client ID of your app</param> /// <param name="appKey">The app key</param> /// <param name="resource">The resource you would like access to</param> /// <returns></returns> public static async Task<string> GetAccessToken(String clientID, String appKey, String resource) { // Redeem the authorization code from the response for an access token and refresh token. ClaimsPrincipal principal = ClaimsPrincipal.Current; String authorizationUri = "https://login.windows.net"; String nameIdentifier = principal.FindFirst(ClaimTypes.NameIdentifier).Value; String tenantId = principal.FindFirst("http://schemas.microsoft.com/identity/claims/tenantid").Value; AuthenticationContext authContext = new AuthenticationContext( string.Format("{0}/{1}", authorizationUri, tenantId), new ADALTokenCache(nameIdentifier) ); try { // Get the object identifier String objectId = principal.FindFirst("http://schemas.microsoft.com/identity/claims/objectidentifier").Value; // Authenticate AuthenticationResult result = await authContext.AcquireTokenSilentAsync( resource, new ClientCredential(clientID, appKey), new UserIdentifier(objectId, UserIdentifierType.UniqueId) ); return result.AccessToken; } catch (AdalException exception) { //handle token acquisition failure if (exception.ErrorCode == AdalError.FailedToAcquireTokenSilently) { authContext.TokenCache.Clear(); } } return null; } You obtain the values for the ClientID and AppKey from the application page in Azure AD. You typically store the values for these properties in the configuration file of your application. Now what is the Resource you have to supply? Well the resource is as follows: If you want access to the discovery service: https://api.office.com/discovery/ If you want access to a SharePoint Online site: https://tenant.sharepoint.com/ If you want access to the SharePoint Admin site: https://tenant-admin.sharepoint.com/ … So in order to access a SharePoint, you can get the access token as follows: String clientID = ConfigurationManager.AppSettings["ida:ClientId"] ?? ConfigurationManager.AppSettings["ida:ClientID"]; String appKey = ConfigurationManager.AppSettings["ida:AppKey"] ?? ConfigurationManager.AppSettings["ida:Password"]; String spSiteUrl = "https://tenant.sharepoint.com"; String accessToken = await GetAccessToken(clientID, appKey, spSiteUrl) Accessing a SharePoint Online Site In order to be able to use this token for your ClientContext, you need to set the Authorization Header on each webrequest the clientcontext sends out: ClientContext clientContext = new ClientContext(spSiteUrl); clientContext.ExecutingWebRequest += (sender, e) => { e.WebRequestExecutor.WebRequest.Headers["Authorization"] = "Bearer " + accessToken; }; You can now access this site through the clientcontext you created (taking into account the permissions you’ve set in Azure AD). In case you do not have the permissions to access something through the clientcontext, you’ll typically get a UnauthorizedaccessException. Research Tracker application Jeremy Thake often refers to a cool Office 365 project that combines different application types to access the same data in your SharePoint site. You can find these projects on GitHub.One of these projects uses the SharePoint REST API to access a SharePoint site, create lists, manage list items. I cloned this project and extended it to also include the functionality by means of CSOM. You can also find this project on GitHub.

Presenting @ the Belgian SharePoint Saturday and Techorama

This month I had the privelege to present a session at the Belgian SharePoint Saturday and the Techorama conference. As promised you can download both slidedecks at the links below:SharePoint Saturday: The SharePoint 2013 Design Manager: From HTML to SharePoint (2,2MB)Techorama Building a provider-hosted SharePoint app with ASP.NET MVC5 (726,8KB)