Understanding iOS Certificates
by Jon (Updated on 2015-10-22)
- The Key Parts
- Provisioning Profiles
Apple requires you to sign your apps in order to tell the end user’s iOS device that you actually developed them and that they haven’t been tampered with. Wouldn’t it be disastrous if someone else could publish an app under your identity and embed spyware into it?
Inevitably, you're going to run into problems with certificates. Knowing the fundamentals will spare you many hours of frustration and anger.
Please take the time to read this article, so that when you hit a problem related to certificates, you have the knowledge required to reach a solution quickly.
Note: To be clear, this article doesn't cover how you set up certificates. The next article in the series covers the how-to portion.
The Key Parts
In the realm of signing apps, you’re responsible for providing 3 key pieces in order to perform the signing.
- A P12 - A document that contains your credentials for signing the app.
- A Provisioning Profile - A “policy” (permission) that allows a specific app to run on a device while not on others.
- An App ID that uniquely identifies your app.
We’ll go over what each is about.
A certificate is a document that Apple issues to you. This certificate states that you are a trusted developer and that you are in fact, who you claim to be, rather than someone else posing as you. It’s much like how a restaurant undergoes food inspections and posts that information at its door.
In order to receive a certificate, you must generate a Certificate Signing Request (CSR) on your Mac using the Keychain Access app. A CSR is like filing for a permit which you then send to Apple for verification. If they approve, they send you back your certificate.
Now, we’ll talk about keys, the actual “things” that perform the signing and verification of apps.
Private Key = Your Signature
A private key is your signature. It’s something you “stamp” on an app when signing it to signify that you made it.
Public Key = Signature Checker
A public key is a special code that lets anybody (in this case, the end user’s iOS device) verify that your app was published by you and hasn’t been tampered with. It’s similar to how a cashier will swipe a $20 bill with a marker to check that it’s not counterfeit.
Where do these 2 keys come into play?
The Certificate Signing Request (CSR) that you send to Apple contains your public key, some personal information about you and is signed using your private key. Apple then uses the public key in the CSR to verify that your CSR came from you before issuing your certificate (which contains your public key).
In the end, you have two things at this point.
- A certificate (.cer) that contains your public key.
- Your private key.
In the next section, we’ll now go into how these two parts combine to sign your app for the App Store.
A P12 file bundles a certificate (which already contains a public key) and private key into a single file.
When your app is “signed”, the p12 is broken apart. The private key is used to “sign” your app, while the certificate is embedded inside of the app, so that an end user’s device can use the public key within the certificate to verify the app’s authenticity.
To summarize, you form a p12 by combining your certificate and your private key. Keychain Access does this for you. You then pass the P12 to Stencyl to do the hard work.
A provisioning profile is a permission policy that allows certain devices to run a specific app. This is used in two ways: Ad Hoc (off-store) and App Store.
During beta testing, a profile lets you send your app to a tester and guarantee that only designated testers can run your app. Even if your app leaked, others wouldn’t be able to run it.
Ensures that officially published apps can be placed on the App Store and played on end user’s devices. (Conversely, apps that aren’t from the App Store are not allowed to run)
What do profiles contain?
In order for a profile to work, it must know two pieces of information.
- What the App is (App ID)
- Who can run the app (Device ID)
App ID’s are unique identifiers that let you tell any app apart from another. They take on a “reverse domain name” form, such as com.stencyl.platformer.
A Device ID (formally known as a UDID) is similar to a serial number for your iOS device. The UDID can be found via iTunes.
With these two facts, a profile can work its magic and only allow the devices you specify (on Apple’s site) to run your app.
- Signing is Apple’s way of guaranteeing that your app was published by you and hasn’t been tampered with.
- Certificates represent your “signature” and present a way for you to “sign” your app and for an end user to verify that an app came from you.
- A P12 (certificate + private key) is the actual file you provide to Stencyl.
- A Provisioning Profile is a permissions policy that allows a specific device (defined by a UDID) to run a specific app (defined by an App ID).
Given all of this, what do you do in practice?
- Generate a Certificate Signing Request (CSR) and upload that to the Apple Developer's Portal.
- Receive a certificate back. Download and install it.
- Form a P12 from the certificate and private key (which is stored in Keychain Access).
- Set up an App ID.
- Set up Devices for beta-testing.
- Form a pair of provisioning profiles, one for the App Store and one for Ad Hoc (beta testing) of your app. Download and install both.
Now that you understand the concepts and the general procedure, let’s go over how you carry this all out in practice.Print Article Edit Article How to Edit an Article