services | platforms | author | level | client | service |
---|---|---|---|---|---|
microsoft-information-protection |
dotnet |
tommoser |
200 |
Desktop |
Microsoft Information Protection |
This sample application demonstrates using the Microsoft Information Protection SDK .NET wrapper to label and read a label from a file.
This sample illustrates basic SDK functionality where it:
- Obtains the list of labels for the user
- Prompts to input one of the label IDs
- Prompts for a file path of a file to label
- Applies the label
- Reads the label from the document and displays metadata
This sample application illustrates using the MIP File API to list labels, apply a label, then read the label. All SDK actions are implemented in action.cs.
- Visual Studio 2015 or later with Visual C# development features installed
In Visual Studio 2017:
- Right-click the project and select Manage NuGet Packages
- On the Browse tab, search for Microsoft.InformationProtection.File
- Select the package and click Install
Authentication against the Azure AD tenant requires creating a native application registration. The client ID created in this step is used in a later step to generate an OAuth2 token.
Skip this step if you've already created a registration for previous sample. You may continue to use that client ID.
- Go to https://portal.azure.com and log in as a global admin.
Your tenant may permit standard users to register applications. If you aren't a global admin, you can attempt these steps, but may need to work with a tenant administrator to have an application registered or be granted access to register applications.
- Click Azure Active Directory, then App Registrations in the menu blade.
- Click View all applications
- Click New Applications Registration
- For name, enter MipSdk-Sample-Apps
- Set Application Type to Native
- For Redirect URI, enter mipsdk-auth-sample://authorize
Note: This can be anything you'd like, but should be unique in the tenant.
- Click Create
The Registered app blade should now be displayed.
- Click Settings
- Click Required Permissions
- Click Add
- Click Select an API
- Select Microsoft Rights Management Services and click Select
- Under Select Permissions select Create and access protected content for users
- Click Select then Done
- Click Add
- Click Select an API
- In the search box, type Microsoft Information Protection Sync Service then select the service and click Select
- Under Select Permissions select Read all unified policies a user has access to.
- Click Select then Done
- In the Required Permissions blade, click Grant Permissions and confirm.
- Open app.config.
- Find line 7 and replace YOUR CLIENT ID with the client ID copied from the AAD App Registration.
- Find line 8 and replace YOUR REDIRECT URI with the Redirect URI copied from the AAD App Registration.
- Find line 8 and replace YOUR APP NAME with the friendly name for your application.
- Find line 9 and replace YOUR APP VERSION with the version of your application.
Press F5 to run the sample. The console application will start and after a brief moment displays the labels available for the user.
- Copy a label ID to the clipboard.
- Paste the label in to the input prompt.
- Next, the app asks for a path to a file. Enter the path to an Office document or PDF file.
- Finally, the app will display the name of the applied label.
- Attempt to open the file in a viewer that supports labeling or protection (Office or Adobe Reader)