Visual C++ - Send email using Microsoft OAuth 2.0 (Modern Authentication) + EWS/Ms Graph API/SMTP protocol from Office 365 in background service

You can send email using traditional user/password authentication from Office 365 account by EWS/SMTP Protocol.

However Microsoft has disabled traditional user authentication in many tenants, switching to Microsoft OAuth (Modern Authentication) is strongly recommended now.

In this topic, I will introduce how to send email using VC++ and Microsoft OAuth (Modern Authentication) in background service.

Installation

EASendMail is a SMTP component which supports all operations of SMTP/ESMTP protocols (RFC 821, RFC 822, RFC 2554). Before you can use the following example codes, you should download the EASendMail Installer and install it on your machine at first.

Add reference

To use EASendMail SMTP ActiveX Object in your C++ project, the first step is “Add header files of EASendMail to your project”. Please go to C:\Program Files\EASendMail\Include\tlh or C:\Program Files (x86)\EASendMail\Include\tlh folder, find easendmailobj.tlh and easendmailobj.tli, and then copy these files to your project folder.

add reference in Visual C++

Office 365 OAuth 2.0 client credentials grant

Normal OAuth requires user to input user and password in browser for authentication. Obviously, it is not suitable for background service.

The solution is granting admin consent to the azure application, then the application can use the client secret value to request the access token directly. This way doesn’t require user attending, it is suitable for background service.

This tutorial introduces how to register application for background service in Azure Portal, then assign the Graph API/EWS/SMTP/POP/IMAP API permission to the application and add the access right to the mailbox of specific user.

Register the application in Azure Portal

Sign in to the Azure Portal using the Microsoft account of the Office 365 administrator. If your account gives you access to more than one tenant, select your account in the top right corner, and set your portal session to the Azure AD tenant that you want.

Search Microsoft Entra ID (old name “Azure Active Directory”) and go to this service:

go to azure active directory

Register application

In the left-hand navigation pane, select the Microsoft Entra ID service, and then select -> Manage -> App registrations -> New registration.

register app in azure

Input a name to to register the application:

register app in azure

Find the application id (client id) and tenant id

After the application is registered, you can click Overview to find the client id and tenant id. These are required parameters for requesting access token.

client int of azure app

Assign API permission

Now you need to assign API permission to the application by clicking Manage -> API Permission -> Add a permission.

add api permission to app in azure

You don’t have to assign all the API permissions below to the application, just assign the API permission(s) you need.

Protocol Permission Scope
Graph API Mail.Send, Mail.ReadWrite https://graph.microsoft.com/.default
EWS full_access_as_app https://outlook.office365.com/.default
SMTP SMTP.AccessAsApp https://outlook.office365.com/.default
POP POP.AccessAsApp https://outlook.office365.com/.default
IMAP IMAP.AccessAsApp https://outlook.office365.com/.default

Graph API permission

Go to Microsoft APIs -> Microsoft Graph -> Application Permission ->

add graph api permission to app in azure

Add Mail.Send and Mail.ReadWrite permission

add Graph Mail.Send Mail.ReadWrite permission to app in azure

EWS and SMTP/POP/IMAP permission

Go to APIs in my organization uses -> Office 365 Exchange Online -> Application Permission ->

add exchange online permission to app in azure

Add full_access_app permission

add exchange online EWS permission to app in azure

Add POP.AccessAsApp permission

add exchange online POP permission to app in azure

Add IMAP.AccessAsApp permission

add exchange online IMAP permission to app in azure

Add SMTP.AccessAsApp permission

add exchange online SMTP permission to app in azure

Complete permissions list

api permission overview in azure

Create client secret

Now we need to create a client secret for the application, click Certificates and secrets -> client secrets and add a new client secret.

add client secret in azure add client secret in azure

Store client secret value

After client secret is created, store the client secret value to somewhere. It is another required parameter for requesting access token.

copy client secret value

Important

Please store client secret value by yourself, because it is hidden when you view it at next time.

Now you can use the client id, tenant id and client secret value to request access token. But to use SMTP/POP/IMAP protocol, you need to Register SMTP/POP/IMAP service principals in Exchange as well.

Important

You should create your client id and client secret, do not use the client id from example codes in production environment, it is used for test purpose. If you got "This app isn't verified" information, please click "Advanced" -> Go to ... for test.

Now you can use the following example codes to send email with Graph API or EWS protocol:

Visual C++ - Send email using Ms Graph API + Microsoft OAuth from Office 365 account in background service - example

#include "stdafx.h" // pre-compile header

#include "C:\Program Files (x86)\EASendMail\Include\tlh\EASendMailObj.tlh"
using namespace EASendMailObjLib;

#include "C:\Program Files (x86)\EASendMail\Include\tlh\msxml3.tlh"
using namespace MSXML2;

const int ConnectNormal = 0;
const int ConnectSSLAuto = 1;
const int ConnectSTARTTLS = 2;
const int ConnectDirectSSL = 3;
const int ConnectTryTLS = 4;

const int AuthAuto = -1;
const int AuthLogin = 0;
const int AuthNtlm = 1;
const int AuthCramMd5 = 2;
const int AuthPlain = 3;
const int AuthMsn = 4;
const int AuthXoauth2 = 5;

BOOL RequestAccessToken(const char* requestData, _bstr_t &accessToken)
{
    try
    {
        IServerXMLHTTPRequestPtr httpRequest = NULL;
        httpRequest.CreateInstance(__uuidof(MSXML2::ServerXMLHTTP));
        if (httpRequest == NULL)
        {
            printf("Failed to create XML HTTP Object, please make sure you install MSXML 3.0 on your machine.\r\n");
            return FALSE;
        }

        _bstr_t fullRequest = requestData;

        const char* postData = (const char*)fullRequest;
        LONG cdata = strlen(postData);
        LPSAFEARRAY psaHunk = ::SafeArrayCreateVectorEx(VT_UI1, 0, cdata, NULL);
        for (LONG k = 0; k < (int)cdata; k++)
        {
            BYTE ch = (BYTE)postData[k];
            ::SafeArrayPutElement(psaHunk, &k, &ch);
        }

        _variant_t requestBuffer;
        requestBuffer.vt = (VT_ARRAY | VT_UI1);
        requestBuffer.parray = psaHunk;

        // If your application is not created by Office365 administrator,
        // please use Office365 directory tenant id, you should ask Offic365 administrator to send it to you.
        // Office365 administrator can query tenant id in https://portal.azure.com/ - Azure Active Directory.
        const char* tenant_id = "2ea4955d-830e-4aa7-8ab5-661a6b9aa84d";

        _variant_t async(true);
        _bstr_t tokenUri("https://login.microsoftonline.com/");
        tokenUri += _bstr_t(tenant_id);
        tokenUri += _bstr_t("/oauth2/v2.0/token");

        httpRequest->setOption((MSXML2::SERVERXMLHTTP_OPTION)2, 13056);
        httpRequest->open(L"POST", tokenUri, async, vtMissing, vtMissing);
        httpRequest->setRequestHeader(L"Content-Type", L"application/x-www-form-urlencoded");
        httpRequest->send(requestBuffer);

        while (httpRequest->readyState != 4) {
            httpRequest->waitForResponse(1);
        }

        long status = httpRequest->status;
        _bstr_t responseText = httpRequest->responseText;

        if (status < 200 || status >= 300)
        {
            printf("Failed to get access token from server: %d %s\r\n", status, (const char*)responseText);
            return FALSE;
        }

        IOAuthResponseParserPtr oauthParser = NULL;
        oauthParser.CreateInstance(__uuidof(EASendMailObjLib::OAuthResponseParser));
        oauthParser->Load(responseText);

        accessToken = oauthParser->AccessToken;
        if (accessToken.length() == 0)
        {
            printf("Failed to parse access token from server response: %d %s\r\n", status, (const char*)responseText);
            return FALSE;
        }

        return TRUE;
    }
    catch (_com_error &ep)
    {
        printf("Failed to get access token: %s", (const char*)ep.Description());
        return FALSE;
    }
}

_bstr_t GenerateRequestData()
{
    // You should create your client id and client secret,
    // do not use the following client id in production environment, it is used for test purpose only.
    const char* client_id = "b22194da-44d6-4320-a067-e86a275d6fa4";
    const char* client_secret = "VTO8Q~eo0JCXc291jcM4wnhZ_GXyKMu.";
    const char* scope = "https://graph.microsoft.com/.default";

    _bstr_t buffer = "client_id=";
    buffer += client_id;
    buffer += "&client_secret=";
    buffer += client_secret;
    buffer += "&scope=";
    buffer += scope;
    buffer += "&grant_type=client_credentials";

    return buffer;
}

void SendEmail()
{
    ::CoInitialize(NULL);

    _bstr_t accessToken;
    // request access token from MS server without user interaction
    if (!RequestAccessToken((const char*)GenerateRequestData(), accessToken))
    {
        return;
    }

    const char* Office365User = "user@mydomain.onmicrosoft.com";

    IMailPtr oSmtp = NULL;
    oSmtp.CreateInstance(__uuidof(EASendMailObjLib::Mail));
    oSmtp->LicenseCode = _bstr_t("TryIt");

    _bstr_t server = "graph.microsoft.com";

    // Office365 Ms Graph API server address
    oSmtp->ServerAddr = server;

    // Set Office365 Ms Graph API Protocol
    oSmtp->Protocol = 4;

    // Enable SSL/TLS connection
    oSmtp->ConnectType = ConnectSSLAuto;

    // OAUTH/XOAUTH2 type
    oSmtp->AuthType = AuthXoauth2;
    oSmtp->UserName = _bstr_t(Office365User);
    oSmtp->Password = accessToken;

    oSmtp->FromAddr = _bstr_t(Office365User);

    // Please change recipient address to yours for test
    oSmtp->AddRecipient(_bstr_t("Support Team"),
        _bstr_t("support@emailarchitect.net"), 0);

    oSmtp->Subject = _bstr_t("Test email from Office 365 using EWS OAUTH");
    oSmtp->BodyText = _bstr_t("Hello, this is a test....");

    if (oSmtp->SendMail() == 0)
        printf("Message delivered!");
    else
        printf((const char*)oSmtp->GetLastErrDescription());
}

Visual C++ - Send email using EWS + Microsoft OAuth from Office 365 account in background service - example

#include "stdafx.h" // pre-compile header

#include "C:\Program Files (x86)\EASendMail\Include\tlh\EASendMailObj.tlh"
using namespace EASendMailObjLib;

#include "C:\Program Files (x86)\EASendMail\Include\tlh\msxml3.tlh"
using namespace MSXML2;

const int ConnectNormal = 0;
const int ConnectSSLAuto = 1;
const int ConnectSTARTTLS = 2;
const int ConnectDirectSSL = 3;
const int ConnectTryTLS = 4;

const int AuthAuto = -1;
const int AuthLogin = 0;
const int AuthNtlm = 1;
const int AuthCramMd5 = 2;
const int AuthPlain = 3;
const int AuthMsn = 4;
const int AuthXoauth2 = 5;

BOOL RequestAccessToken(const char* requestData, _bstr_t &accessToken)
{
    try
    {
        IServerXMLHTTPRequestPtr httpRequest = NULL;
        httpRequest.CreateInstance(__uuidof(MSXML2::ServerXMLHTTP));
        if (httpRequest == NULL)
        {
            printf("Failed to create XML HTTP Object, please make sure you install MSXML 3.0 on your machine.\r\n");
            return FALSE;
        }

        _bstr_t fullRequest = requestData;

        const char* postData = (const char*)fullRequest;
        LONG cdata = strlen(postData);
        LPSAFEARRAY psaHunk = ::SafeArrayCreateVectorEx(VT_UI1, 0, cdata, NULL);
        for (LONG k = 0; k < (int)cdata; k++)
        {
            BYTE ch = (BYTE)postData[k];
            ::SafeArrayPutElement(psaHunk, &k, &ch);
        }

        _variant_t requestBuffer;
        requestBuffer.vt = (VT_ARRAY | VT_UI1);
        requestBuffer.parray = psaHunk;

        // If your application is not created by Office365 administrator,
        // please use Office365 directory tenant id, you should ask Offic365 administrator to send it to you.
        // Office365 administrator can query tenant id in https://portal.azure.com/ - Azure Active Directory.
        const char* tenant_id = "2ea4955d-830e-4aa7-8ab5-661a6b9aa84d";

        _variant_t async(true);
        _bstr_t tokenUri("https://login.microsoftonline.com/");
        tokenUri += _bstr_t(tenant_id);
        tokenUri += _bstr_t("/oauth2/v2.0/token");

        httpRequest->setOption((MSXML2::SERVERXMLHTTP_OPTION)2, 13056);
        httpRequest->open(L"POST", tokenUri, async, vtMissing, vtMissing);
        httpRequest->setRequestHeader(L"Content-Type", L"application/x-www-form-urlencoded");
        httpRequest->send(requestBuffer);

        while (httpRequest->readyState != 4) {
            httpRequest->waitForResponse(1);
        }

        long status = httpRequest->status;
        _bstr_t responseText = httpRequest->responseText;

        if (status < 200 || status >= 300)
        {
            printf("Failed to get access token from server: %d %s\r\n", status, (const char*)responseText);
            return FALSE;
        }

        IOAuthResponseParserPtr oauthParser = NULL;
        oauthParser.CreateInstance(__uuidof(EASendMailObjLib::OAuthResponseParser));
        oauthParser->Load(responseText);

        accessToken = oauthParser->AccessToken;
        if (accessToken.length() == 0)
        {
            printf("Failed to parse access token from server response: %d %s\r\n", status, (const char*)responseText);
            return FALSE;
        }

        return TRUE;
    }
    catch (_com_error &ep)
    {
        printf("Failed to get access token: %s", (const char*)ep.Description());
        return FALSE;
    }
}

_bstr_t GenerateRequestData()
{
    // You should create your client id and client secret,
    // do not use the following client id in production environment, it is used for test purpose only.
    const char* client_id = "b22194da-44d6-4320-a067-e86a275d6fa4";
    const char* client_secret = "VTO8Q~eo0JCXc291jcM4wnhZ_GXyKMu.";
    const char* scope = "https://outlook.office365.com/.default";

    _bstr_t buffer = "client_id=";
    buffer += client_id;
    buffer += "&client_secret=";
    buffer += client_secret;
    buffer += "&scope=";
    buffer += scope;
    buffer += "&grant_type=client_credentials";

    return buffer;
}

void SendEmail()
{
    ::CoInitialize(NULL);

    _bstr_t accessToken;
    // request access token from MS server without user interaction
    if (!RequestAccessToken((const char*)GenerateRequestData(), accessToken))
    {
        return;
    }

    const char* Office365User = "user@mydomain.onmicrosoft.com";

    IMailPtr oSmtp = NULL;
    oSmtp.CreateInstance(__uuidof(EASendMailObjLib::Mail));
    oSmtp->LicenseCode = _bstr_t("TryIt");

    // Office365 EWS server address
    oSmtp->ServerAddr = _bstr_t("outlook.office365.com");

    // Set Exchange Web Service Protocol - EWS - Exchange 2007/2010/2013/2016/2019/Office365
    oSmtp->Protocol = 1;

    // Enable SSL/TLS connection
    oSmtp->ConnectType = ConnectSSLAuto;

    // OAUTH/XOAUTH2 type
    oSmtp->AuthType = AuthXoauth2;
    oSmtp->UserName = _bstr_t(Office365User);
    oSmtp->Password = accessToken;

    oSmtp->FromAddr = _bstr_t(Office365User);

    // Please change recipient address to yours for test
    oSmtp->AddRecipient(_bstr_t("Support Team"),
        _bstr_t("support@emailarchitect.net"), 0);

    oSmtp->Subject = _bstr_t("Test email from Office 365 using EWS OAUTH");
    oSmtp->BodyText = _bstr_t("Hello, this is a test....");

    if (oSmtp->SendMail() == 0)
        printf("Message delivered!");
    else
        printf((const char*)oSmtp->GetLastErrDescription());
}

Register SMTP/POP/IMAP service principals in Exchange

Although the application is consented by the tenant admin, but to access SMTP/POP/IMAP service, the tenant administrator still need to register your application as service principal in Exchange via Exchange Online PowerShell. This is enabled by the New-ServicePrincipal cmdlet.

New-ServicePrincipal -AppId <APPLICATION_ID> -ServiceId <OBJECT_ID>

Find APPLICATION_ID and OBJECT_ID

You should find your APPLICATION_ID and OBJECT_ID before running above cmdlet. Go to Overview -> Managed application in local directory:

Managed application in local directory

After you click your application name in Managed application in l..., you can see Application ID and Object ID for New-ServicePrincipal cmdlet.

find object id in Managed application in local directory

Open Exchange Online PowerShell

Now you need to open Exchange Online PowerShell to run the cmdlet. If you have not installed the module, you can use the Install-Module cmdlet to install the module from the PowerShell Gallery.

Install-Module -Name ExchangeOnlineManagement

After you’ve installed the module, open a PowerShell window and load the module by running the following command:

Import-Module ExchangeOnlineManagement
Connect-ExchangeOnline -UserPrincipalName "admin@yourdomain.onmicrosoft.com"

Create service principal

After Exchange Online PowerShell is connected successfully, run the following cmdlet to create a new service principal: The ServiceId is the OBJECT_ID and the AppId is APPLICATION_ID found in Find APPLICATION_ID and OBJECT_ID

New-ServicePrincipal -AppId "b22194da-44d6-4320-a067-e86a275d6fa4" -ServiceId "71941e67-ef24-45e8-bd22-dfd53790bb77"

Query service principal

After you create the service principal, you can query it by:

Get-ServicePrincipal

Add permission to specific user

You can now add the specific mailboxes in the tenant that will be allowed to be access by your application. This is done with the Add-MailboxPermission cmdlet.

Add-MailboxPermission -Identity <mailboxIdParameter> -User <SecurityPrincipalIdParameter|OBJECT_ID>  -AccessRights <MailboxRights[]>

For example:

Add-MailboxPermission -Identity "grant-test@emailarchitect.net" -User "71941e67-ef24-45e8-bd22-dfd53790bb77" -AccessRights FullAccess

Query permission

You can also query the permission by:

Get-MailboxPermission -Identity "grant-test@emailarchitect.net"

Now you can use SMTP protocol to send email by the following codes:

Visual C++ - Send email using SMTP + Microsoft OAuth from Office 365 account in background service - example

#include "stdafx.h" // pre-compile header

#include "C:\Program Files (x86)\EASendMail\Include\tlh\EASendMailObj.tlh"
using namespace EASendMailObjLib;

#include "C:\Program Files (x86)\EASendMail\Include\tlh\msxml3.tlh"
using namespace MSXML2;

const int ConnectNormal = 0;
const int ConnectSSLAuto = 1;
const int ConnectSTARTTLS = 2;
const int ConnectDirectSSL = 3;
const int ConnectTryTLS = 4;

const int AuthAuto = -1;
const int AuthLogin = 0;
const int AuthNtlm = 1;
const int AuthCramMd5 = 2;
const int AuthPlain = 3;
const int AuthMsn = 4;
const int AuthXoauth2 = 5;

BOOL RequestAccessToken(const char* requestData, _bstr_t &accessToken)
{
    try
    {
        IServerXMLHTTPRequestPtr httpRequest = NULL;
        httpRequest.CreateInstance(__uuidof(MSXML2::ServerXMLHTTP));
        if (httpRequest == NULL)
        {
            printf("Failed to create XML HTTP Object, please make sure you install MSXML 3.0 on your machine.\r\n");
            return FALSE;
        }

        _bstr_t fullRequest = requestData;

        const char* postData = (const char*)fullRequest;
        LONG cdata = strlen(postData);
        LPSAFEARRAY psaHunk = ::SafeArrayCreateVectorEx(VT_UI1, 0, cdata, NULL);
        for (LONG k = 0; k < (int)cdata; k++)
        {
            BYTE ch = (BYTE)postData[k];
            ::SafeArrayPutElement(psaHunk, &k, &ch);
        }

        _variant_t requestBuffer;
        requestBuffer.vt = (VT_ARRAY | VT_UI1);
        requestBuffer.parray = psaHunk;

        // If your application is not created by Office365 administrator,
        // please use Office365 directory tenant id, you should ask Offic365 administrator to send it to you.
        // Office365 administrator can query tenant id in https://portal.azure.com/ - Azure Active Directory.
        const char* tenant_id = "2ea4955d-830e-4aa7-8ab5-661a6b9aa84d";

        _variant_t async(true);
        _bstr_t tokenUri("https://login.microsoftonline.com/");
        tokenUri += _bstr_t(tenant_id);
        tokenUri += _bstr_t("/oauth2/v2.0/token");

        httpRequest->setOption((MSXML2::SERVERXMLHTTP_OPTION)2, 13056);
        httpRequest->open(L"POST", tokenUri, async, vtMissing, vtMissing);
        httpRequest->setRequestHeader(L"Content-Type", L"application/x-www-form-urlencoded");
        httpRequest->send(requestBuffer);

        while (httpRequest->readyState != 4) {
            httpRequest->waitForResponse(1);
        }

        long status = httpRequest->status;
        _bstr_t responseText = httpRequest->responseText;

        if (status < 200 || status >= 300)
        {
            printf("Failed to get access token from server: %d %s\r\n", status, (const char*)responseText);
            return FALSE;
        }

        IOAuthResponseParserPtr oauthParser = NULL;
        oauthParser.CreateInstance(__uuidof(EASendMailObjLib::OAuthResponseParser));
        oauthParser->Load(responseText);

        accessToken = oauthParser->AccessToken;
        if (accessToken.length() == 0)
        {
            printf("Failed to parse access token from server response: %d %s\r\n", status, (const char*)responseText);
            return FALSE;
        }

        return TRUE;
    }
    catch (_com_error &ep)
    {
        printf("Failed to get access token: %s", (const char*)ep.Description());
        return FALSE;
    }
}

_bstr_t GenerateRequestData()
{
    // You should create your client id and client secret,
    // do not use the following client id in production environment, it is used for test purpose only.
    const char* client_id = "b22194da-44d6-4320-a067-e86a275d6fa4";
    const char* client_secret = "VTO8Q~eo0JCXc291jcM4wnhZ_GXyKMu.";
    const char* scope = "https://outlook.office365.com/.default";

    _bstr_t buffer = "client_id=";
    buffer += client_id;
    buffer += "&client_secret=";
    buffer += client_secret;
    buffer += "&scope=";
    buffer += scope;
    buffer += "&grant_type=client_credentials";

    return buffer;
}

void SendEmail()
{
    ::CoInitialize(NULL);

    _bstr_t accessToken;
    // request access token from MS server without user interaction
    if (!RequestAccessToken((const char*)GenerateRequestData(), accessToken))
    {
        return;
    }

    const char* Office365User = "grant-test@emailarchitect.net";

    IMailPtr oSmtp = NULL;
    oSmtp.CreateInstance(__uuidof(EASendMailObjLib::Mail));
    oSmtp->LicenseCode = _bstr_t("TryIt");

    // Office365 SMTP server address
    oSmtp->ServerAddr = _bstr_t("outlook.office365.com");
    oSmtp->ServerPort = 587;

    // Don't set protocol, use default SMTP protocol

    // Enable SSL/TLS connection
    oSmtp->ConnectType = ConnectSSLAuto;

    // OAUTH/XOAUTH2 type
    oSmtp->AuthType = AuthXoauth2;
    oSmtp->UserName = _bstr_t(Office365User);
    oSmtp->Password = accessToken;

    oSmtp->FromAddr = _bstr_t(Office365User);

    // Please change recipient address to yours for test
    oSmtp->AddRecipient(_bstr_t("Support Team"),
        _bstr_t("support@emailarchitect.net"), 0);

    oSmtp->Subject = _bstr_t("Test email from Office 365 using EWS OAUTH");
    oSmtp->BodyText = _bstr_t("Hello, this is a test....");

    if (oSmtp->SendMail() == 0)
        printf("Message delivered!");
    else
        printf((const char*)oSmtp->GetLastErrDescription());
}

Access token lifetime

You don’t have to request access token every time. By default, access token expiration time is 3600 seconds, you can reuse the access token repeatedly before it is expired.

TLS 1.2 protocol

TLS is the successor of SSL, more and more SMTP servers require TLS 1.2 encryption now.

If your operating system is Windows XP/Vista/Windows 7/Windows 2003/2008/2008 R2/2012/2012 R2, you need to enable TLS 1.2 protocol in your operating system like this:

Enable TLS 1.2 on Windows XP/Vista/7/10/Windows 2008/2008 R2/2012

EA Oauth Service for Office 365

If you are not the tenant administrator and you don’t have the permission to create or grant the application in Azure, or if your code is too complex or out of maintenance, and you don’t want to change anything in your source codes, then you can have a try with EA Oauth Service for Offic365. It provides an easy way for the legacy email application that doesn’t support OAUTH 2.0 to send and retrieve email from Office 365 without changing any codes. SMTP, POP, IMAP and SSL/TLS protocols are supported.

Appendix

Comments

If you have any comments or questions about above example codes, please click here to add your comments.