I am distributing a macOS application outside the App Store using Developer ID and need to provide provisioning profiles to customers for installation during the package installation process.
I have two questions:
How can I package and provide the provisioning profile(s) so that the customer can install them easily during the application installation process? Are there any best practices or tools that could simplify this step?
In my case, there are multiple provisioning profiles. Should I instruct the customer to install each profile individually, or is there a way to combine them and have them installed all at once?
Any guidance on the best practices for this process would be greatly appreciated.
Demystify code signing and its importance in app development. Get help troubleshooting code signing issues and ensure your app is properly signed for distribution.
Selecting any option will automatically load the page
Post
Replies
Boosts
Views
Activity
I get the error message in Xcode signing certificate
Provisioning profile "iOS Team Provisioning Profile: com.example.app" doesn't include the pushkit entitlement.
I have push notifications ticked in my Identifier in the online developer account. There is no other dedicated pushkit capability available to select.
Push notifications, time sensitive notifications and background mode-> voice over ip are added as capabilities in the Xcode project.
The team provisioning profile for the app states under its enabled capabilities: both push notifications and time sensitive notifications.
Is pushkit part of another capability that I need to select?
I have read the guide below and it just says to add the push notification capability. https://developer.apple.com/documentation/pushkit/supporting-pushkit-notifications-in-your-app
I have gone round and round in circles trying to get this profile to work for this, so any pointers would be much appreciated.
Thanks
Topic:
Code Signing
SubTopic:
Certificates, Identifiers & Profiles
Tags:
Provisioning Profiles
PushKit
I am a new macOS developer, and the codesign issue is persistent. I've been trying to resolve it for days. There are two issues:
1.) When downloading and installing frameworks, they are not showing up in Xcode templates.
2.) Regarding codesigning, even though I've installed it on my external drive and placed it in various locations (Library, Templates, Frameworks, Application Contents, macOS Templates and Frameworks) and added through General Libraries in Xcode, persistently encountering issues. I'm experiencing a codesign problem. I've cleaned the build, cleared derived data, downloaded certificates, added them to the access key, and linked the binary. However, the issue persists. Please help me, as this is making the process much more difficult. I've been stuck on this for weeks.
Topic:
Code Signing
SubTopic:
General
I developed a macOS application and have already signed the pkg package. However, when I submitted it for notarization using the following command:
xcrun notarytool submit --signed.pkg --apple-id "**@gmail.com" --team-id "2*******M" --password "this is password" --wait
I received a "Rejected" status. The log provided the following details:
"logFormatVersion": 1,
"jobId": "f5f3751d-b449-4a2f-b905-32d38ab5963b",
"status": "Rejected",
"statusSummary": "Team is not yet configured for notarization. Please contact Developer Programs Support at developer.apple.com under the topic Development and Technical / Other Development or Technical Questions.",
"statusCode": 7000,
"archiveFilename": "*********.pkg",
"uploadDate": "2025-03-20T03:16:43.651Z",
"sha256": "3ca39700c531a66571721424a6c00668748011174b4ae20bbbec5c2d3a8a41f9",
"ticketContents": null,
"issues": null```
Can you help me, thank you.
Topic:
Code Signing
SubTopic:
Notarization
Hi,
I have a project that integrates the Firebase SDK via SPM as a dependency of an internal Swift Package:
My app ⟶ My Library ⟶ Firebase SDK
The project builds successfully and can be archived locally ✅. The uploaded .ipa is valid and gets published 🚀.
However, we are now trying to automate the release process using Xcode Cloud, but the iOS Archive action is failing ❌ on Xcode Cloud.
The logs show the following error ⬇️:
error: exportArchive codesign command failed (/Volumes/workspace/tmp/XcodeDistPipeline/XcodeDistPipeline.~~~oomCvM/Root/Payload/base-ios.app/Frameworks/FirebaseAnalytics.framework: replacing existing signature
/Volumes/workspace/tmp/XcodeDistPipeline/XcodeDistPipeline.~~~oomCvM/Root/Payload/base-ios.app/Frameworks/FirebaseAnalytics.framework: invalid or corrupted code requirement(s)
Requirement syntax error(s):
line 1:178: unexpected token: <COMPANY_NAME>
)
** EXPORT FAILED **
I have been researching this issue for a while and have tried several solutions to fix it, but with no luck. Even though the error points to a specific library—the Firebase SDK—I don’t believe Firebase is the root cause. There were related issues in the past, but those were already fixed by the Firebase team, and as I mentioned, the project archives correctly when built locally.
On the other hand, the error states:
line 1:178: unexpected token: <COMPANY_ACRONYM>
This makes me wonder if there’s an issue parsing our Team Name during the re-signing process, as it contains special characters ":
"name": "Apple Distribution: Company Full Name "COMPANY_ACRONYM""
The problem is the following:
We create a keychain item called NotaryTool (There are multiple accounts that use Notary tool and we created it for all of them )
This is created in the following way:
$ xcrun notarytool store-credentials
This process stores your credentials securely in the Keychain. You reference these credentials later using a profile name.
Profile name:
NotaryTool
We recommend using App Store Connect API keys for authentication. If you'd like to authenticate with an Apple ID and app-specific password instead, leave this unspecified.
Path to App Store Connect API private key:
//AuthKey_ABCDEFGH.p8
App Store Connect API Key ID:
<ABCDEFGH>
App Store Connect API Issuer ID:
ABCDEF-ABCD-1234-1234-1234567
Validating your credentials...
Success. Credentials validated.
Credentials saved to Keychain.
To use them, specify `--keychain-profile "NotaryTool"`
The key is downloaded from Apple and some other IDs are provided alongside.
These should remain in the keychain for as long as the user process is running (just like any other process)
A few runs are successful when we run with the profile that was created.
After a few runs we start seeing a failure.
Now we are seeing the following issue where the keychain item just vanishes:
Error: No Keychain password item found for profile: NotaryTool\n\nRun 'notarytool store-credentials' to create another credential profile.\nError during the not process\nTue Aug 26 06:02:09 2025 Notarization failed with notarytool with exit code 17664: \nTue Aug 26 06:02:09 2025 could not upload for notarization!!!
Topic:
Code Signing
SubTopic:
Notarization
I have attempted all upgrades:
updated xcode to 16.4
downloaded and installed Command Line Tools for Xcode 16.4
I have no issues with the installs, however when I run:
> xcrun notarytool --version
1.0.0 (38)
I need to be running v2.x
How can I resolve this issue.
I have app developed in electron.js and python and it works in ios 15 after codesigning but not in ios 14 or below
I need to understand if theres a specific instruction that we need to while building the app or do I need to codesign in lower version? what can I do solve this issue??
Topic:
Code Signing
SubTopic:
Notarization
Hello,
Our company's software successfully passes the notarization process when exported through Xcode Archive and compressed into a zip file. However, it fails notarization when packaged into a pkg using the Packages software (version 1.2.10), consistently returning the error "The signature of the binary is invalid." We need assistance to resolve this issue.
Here are some specific details on the signature statuses and notarization information:
xcrun stapler validation: Successful
xcrun stapler validate Maxi\ PC\ Suite.app
Processing: /Users/autel/Desktop/test11/files/Maxi PC Suite.app
The validate action worked!
pkgutil signature check: Successful
pkgutil --check-signature Maxi\ PC\ Suite.pkg
Package "Maxi PC Suite.pkg":
Status: signed by a developer certificate issued by Apple for distribution
Signed with a trusted timestamp on: 2025-01-09 08:09:17 +0000
Certificate Chain:
1. Developer ID Installer: Autel Intelligent Technology Co., Ltd. (MEXQ8HADL9)
Expires: 2027-02-01 22:12:15 +0000
SHA256 Fingerprint:
B7 F7 AC 05 19 78 CB 5D 66 C1 11 95 EE C9 2E 31 B9 AA BD F5 32
E4 B6 4D 8D 0D 06 04 EE BC 1B 5A
------------------------------------------------------------------------
2. Developer ID Certification Authority
Expires: 2027-02-01 22:12:15 +0000
SHA256 Fingerprint:
7A FC 9D 01 A6 2F 03 A2 DE 96 37 93 6D 4A FE 68 09 0D 2D E1
8D 03 F2 9C 88 CF B0 B1 BA 63 58 7F
------------------------------------------------------------------------
3. Apple Root CA
Expires: 2035-02-09 21:40:36 +0000
SHA256 Fingerprint:
B0 B1 73 0E CB C7 FF 45 05 14 2C 49 F1 29 5E 6E DA 6B CA ED
7E 2C 68 C5 BE 91 B5 A1 10 01 F0 24
pkg notarization: Failed
xcrun notarytool submit Maxi\ PC\ Suite.pkg --apple-id xxx --team-id xxx --password xxx --wait
Conducting pre-submission checks for Maxi PC Suite.pkg and initiating connection to the Apple notary service...
Submission ID received
id: ccbf6330-b64a-4b42-87c0-b5db1fe25b2d
Upload progress: 100.00% (3.42 MB of 3.42 MB)
Successfully uploaded file
id: ccbf6330-b64a-4b42-87c0-b5db1fe25b2d
path: /Users/autel/Desktop/test11/build/Maxi PC Suite.pkg
Waiting for processing to complete.
Current status: Invalid.
Processing complete
id: ccbf6330-b64a-4b42-87c0-b5db1fe25b2d
status: Invalid
Detailed notarization failure information:
xcrun notarytool log ccbf6330-b64a-4b42-87c0-b5db1fe25b2d --keychain-profile "PC_Suit_Mac"
{
"logFormatVersion": 1,
"jobId": "ccbf6330-b64a-4b42-87c0-b5db1fe25b2d",
"status": "Invalid",
"statusSummary": "Archive contains critical validation errors",
"statusCode": 4000,
"archiveFilename": "Maxi PC Suite.pkg",
"uploadDate": "2025-01-09T08:18:22.374Z",
"sha256": "0d1bd15e5c30bc890d20086de865739d01e131e34386b73ac20f8a5d52229906",
"ticketContents": null,
"issues": [
{
"severity": "error",
"code": null,
"path": "Maxi PC Suite.pkg/Maxi_PC_Suite.pkg Contents/Payload/Applications/Maxi PC Suite.app/Contents/MacOS/Maxi PC Suite",
"message": "The signature of the binary is invalid.",
"docUrl": "https://developer.apple.com/documentation/security/notarizing_macos_software_before_distribution/resolving_common_notarization_issues#3087735",
"architecture": "x86_64"
}
]
}
We are looking for advice on how to resolve the error related to the invalid binary signature during the pkg notarization process.
Thank you.
Hi Team,
I have created multiple certificates for macOS application. Below are the certificates created-
Apple Development Certificate
DeveloperID Installer Certificate
Apple Distribution Certificate
others certificates
Later, I have imported the all these above certificates in keychain-access.
Now, I tried to compile the code through Xcode. I am getting error for code signing certificate.
Warning: unable to build chain to self-signed root for signer "Apple Development: Amit (M2WMF2YERI)”
....
Command CodeSign failed with a nonzero exit code
When I checked the TeamID of User(Amit) I can see that his current TeamID is [P8ZW3W9R2Q].
There is mismatch of teamID in apple development certificate generation.
Note-
All certificates are generated with current TeamID[P8ZW3W9R2Q] of user (Amit) except Apple Development certificate which has been generated with TeamID [M2WMF2YERI] which is generated with old TeamID of user (Amit).
I attempted to generate the apple development certificate multiple times but it is getting generated with old TeamID TeamID[M2WMF2YERI] of user(Amit)
Summary-
While creating a developer certificate using apple developer account and mapping it in keychain, the certificate is being generated with old apple account details (Inactive) instead of the current one. This is causing issues when using the certificate in keychain.
If anyone has encountered this issue, how it was resolved?
Thanks
Hi,
I got the error:
/usr/bin/codesign exited with code 1:
Warning: unable to build chain to self-signed root for signer "Apple Distribution: Q.A.C.F. - Quality Academy Consultoria E Formacao, Unipessoal, Lda (xxxxxx)"
/Users/pedroramalho/Library/Caches/Xamarin/mtbs/builds/drBoxSaude.iOS/3bed3d51415af2e100a4d2bc57e1d36fb42d76ceb190de1db1c4d0dbccbff863/bin/iPhone/Release/drBoxSaude.iOS.app: errSecInternalComponent
and
/usr/bin/codesign exited with code 1:
/Users/pedroramalho/Library/Caches/Xamarin/mtbs/builds/drBoxSaude.iOS/3bed3d51415af2e100a4d2bc57e1d36fb42d76ceb190de1db1c4d0dbccbff863/bin/iPhone/Release/drBoxSaude.iOS.app/Frameworks/libSkiaSharp.framework: replacing existing signature
Warning: unable to build chain to self-signed root for signer "Apple Distribution: Q.A.C.F. - Quality Academy Consultoria E Formacao, Unipessoal, Lda (xxxxx)"
/Users/pedroramalho/Library/Caches/Xamarin/mtbs/builds/drBoxSaude.iOS/3bed3d51415af2e100a4d2bc57e1d36fb42d76ceb190de1db1c4d0dbccbff863/bin/iPhone/Release/drBoxSaude.iOS.app/Frameworks/libSkiaSharp.framework: errSecInternalComponent
Some one can help please
Topic:
Code Signing
SubTopic:
Certificates, Identifiers & Profiles
Tags:
Sign in with Apple
Signing Certificates
Hello,
After deploying our app, we encountered an issue where the app fails to launch properly on certain devices.
To rule out potential code issues, we created a new clean project and tested it with the basic setup (certificate, bundle ID, and team).
The app installs and runs fine on most devices, but it fails to open immediately on specific models.
(The affected model is listed below.)
Version: iOS 18.3.1
Model: iPhone 14 Pro
After reviewing the console logs, we found an issue related to the app launching process.
Could this issue be related to the app's configuration or the provisioning profile?
We would appreciate any insight into why this issue occurs only on certain devices.
Thank you for your help!
Hello,
We have a working application with several entitlements - com.apple.developer.endpoint-security.client and com.apple.developer.team-identifier.
Recently, the Developer ID signing certificate expired and we created a new one according to the instructions on the website. Also the provisioning profile for those entitlements expired so we edited it to use the new certificate.
We built using xcodebuild in a script and signed with codesign, We supply the certificate id and the entitlement in a plist file like this :
codesign --timestamp --force --sign "${application_signature}" --options=runtime "${obj}" --entitlements "${SR_ENTITLEMENT_PATH}"
(those env vars hold the correct values for the cert id and plist path as far as we checked).
The signing works and looks ok with "codesign -dvvv":
(XXXX replaces the real file name for privacy)
Signature size=9050
Authority=Developer ID Application: XXXXXX. (XXXXX)
Authority=Developer ID Certification Authority
Authority=Apple Root CA
Timestamp=16 Oct 2025 at 11:09:53 AM
Info.plist=not bound
TeamIdentifier=XXXXX
Runtime Version=14.5.0
Sealed Resources=none
Internal requirements count=1 size=184
[Dict]
[Key] com.apple.application-identifier
[Value]
[String] XXXXX.com.XXXX.XXXX
[Key] com.apple.developer.endpoint-security.client
[Value]
[Bool] true
[Key] com.apple.developer.team-identifier
[Value]
[String] XXXXXX`
But when the app need to run it is killed and the console shows the following:
amfid: /private/tmp/XXXXX not valid: Error Domain=AppleMobileFileIntegrityError Code=-420 "The signature on the file is invalid" UserInfo={NSURL=file:///private/tmp/XXXXX, NSLocalizedDescription=The signature on the file is invalid} kernel: mac_vnode_check_signature: /private/tmp/CybereasonSensor: code signature validation failed fatally: When validating /private/tmp/XXXXX: Code has restricted entitlements, but the validation of its code signature failed.
We didn't change any code or build differently (it's done by a CI jenkins job.
So if the file is signed and the and has the entitlements why does it fail? what should be done?
Thanks,
Boaz
Topic:
Code Signing
SubTopic:
Entitlements
I have added an in-app purchase function into my app, and have enabled in-app purchase profile in developer portal(it's on by default and is marked gray in developer portal, I don't know if that's how it supposed to look like). I have issued the agreements and tried signing the app both manually and automatically, but neither of that worked. App can be built successfully in simulator but does not show the simulation window, but cannot build on real device or archive.
Errors: Missing com.apple.developer.in-app-purchase,
com.apple.developer.in-app-purchase.non-consumable, and com.apple.developer.in-app-purchase.subscription entitlements.
Automatic signing failed
Xcode failed to provision this target.
Topic:
Code Signing
SubTopic:
Certificates, Identifiers & Profiles
Tags:
StoreKit
Entitlements
Provisioning Profiles
Signing Certificates
Its just stuck in progress.
$ xcrun notarytool history --keychain-profile X
Successfully received submission history.
history
--------------------------------------------------
createdDate: 2025-07-21T16:46:13.233Z
id: X
name: X.dmg
status: In Progress
--------------------------------------------------
createdDate: 2025-07-20T18:44:35.683Z
id: X
name: X.dmg
status: In Progress
--------------------------------------------------
createdDate: 2025-07-20T11:24:20.319Z
id: X
name: X.dmg
status: In Progress
Its a go app; not simple but not very complicated. It is my first time notarising but even then should it take this long?? 3 days is ridiculous!
Hello Apple Developer Community,
I'm experiencing a persistent issue with App Groups configuration for an iOS app extension that I can't resolve despite trying multiple approaches. I hope someone can help identify what I'm missing.
Problem Description
I'm getting this error when trying to build my iOS App Extension:
Provisioning profile "iOS Team Provisioning Profile: com.idlrapp.Spleeft.SpleeftDataSaver" doesn't include the com.apple.developer.app-groups entitlement.
My Setup
Main App Bundle ID: com.idlrapp.Spleeft
Extension Bundle ID: com.idlrapp.Spleeft.SpleeftDataSaver
App Group ID: group.com.idlrapp.spleeft.shared
Extension Type: Action Extension (Share Sheet)
What I've Verified
App Group Creation
✅ Created App Group group.com.idlrapp.spleeft.shared in Apple Developer Portal
✅ App Group shows as "Active" in the portal
App ID Configuration
✅ Both App IDs (com.idlrapp.Spleeft and com.idlrapp.Spleeft.SpleeftDataSaver) have "App Groups" capability enabled
✅ Both App IDs are configured with the same App Group: group.com.idlrapp.spleeft.shared
Entitlements Files
Main App (Spleeft.entitlements):
<key>com.apple.developer.app-groups</key>
<array>
<string>group.com.idlrapp.spleeft.shared</string>
</array>
Extension (SpleeftDataSaver.entitlements):
<key>com.apple.developer.app-groups</key>
<array>
<string>group.com.idlrapp.spleeft.shared</string>
</array>
Xcode Configuration
✅ Both targets use "Automatically manage signing" ✅ Same Apple Developer Team selected for both ✅ App Groups capability shows correctly in Signing & Capabilities for both targets
The Issue
When I examine the downloaded .mobileprovision file, I can see it contains:
<dict>
<key>com.apple.security.application-groups</key>
<array>
<string>group.com.idlrapp.spleeft.shared</string>
</array>
<!-- Other entitlements... -->
</dict>
However, Xcode expects to find:
<array>
<string>group.com.idlrapp.spleeft.shared</string>
</array>
What I've Tried
Multiple regenerations of provisioning profiles:
Deleted all local provisioning profiles
Toggled "Automatically manage signing" off/on
Downloaded manual profiles from Developer Portal
Verified App Group configuration:
Double-checked App Group exists and is active
Confirmed both App IDs have App Groups capability enabled
Verified App Group assignment in both App IDs
Entitlements cleanup:
Ensured consistent App Group IDs across all files
Removed duplicate/conflicting entries
Clean builds and cache clearing:
Product → Clean Build Folder
Derived Data deletion
Xcode restart
Key Observation
The provisioning profile contains com.apple.security.application-groups (which appears to be macOS-style) but Xcode expects com.apple.developer.app-groups (iOS-style) for the App Extension.
Questions
Is there a known issue with App Groups entitlement generation for iOS App Extensions?
Should the provisioning profile contain com.apple.developer.app-groups instead of com.apple.security.application-groups?
Is there a way to force regeneration of provisioning profiles with the correct entitlements?
Are there additional steps required for App Extensions that differ from main apps?
Any guidance would be greatly appreciated. This is blocking our App Extension development and we've exhausted our troubleshooting options.
Thank you for your time and assistance.
Topic:
Code Signing
SubTopic:
Certificates, Identifiers & Profiles
Tags:
Entitlements
Signing Certificates
Hi,
I recently got a consistent delay from notary tool. I have viewed all your suggestions and understand that it "occasionally" will have further review and take longer time, but then it will be faster.
However, in my case, my app although is accepted many times. It is still significantly delay.
It is a native macOS app called ConniePad. Whenever I submit, it took me 2 days or more to finish notarise, which significantly affect my business. Could you please have a look on it.
For log detail about the time, and the ids:
--------------------------------------------------
createdDate: 2025-04-05T22:54:45.815Z
id: 998b5aa8-fc9c-4469-98fe-950d815e734e
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-05T21:32:22.679Z
id: c7b1ab49-6f46-4998-8d06-2ffe8a180c8f
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-03T08:39:52.594Z
id: aa33d9d0-9d2f-4296-8fc3-d7e0b404596b
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-03T01:23:31.077Z
id: b0333d78-497d-491c-b36c-bdfb64520296
name: ConniePad.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-03T01:17:20.925Z
id: 83aa12f2-f1bb-457f-940a-4c2281cf8a5f
name: ConniePad.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-03T01:12:52.932Z
id: 0a921069-fb37-469a-bfb0-6be82e9320ba
name: ConniePad.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-03T01:03:30.584Z
id: a607fe3c-d10f-43d6-a184-e97df7b632fd
name: ConniePad.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-03T00:52:47.322Z
id: c42d0ca0-db8a-4431-b5b4-646ccfcad003
name: ConniePad.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-03T00:28:18.626Z
id: 7ef8777f-7add-4440-abb5-3c0b19cf92d4
name: ConniePad.app.zip
status: Invalid
--------------------------------------------------
createdDate: 2025-04-03T00:24:37.320Z
id: 36bb1285-0aeb-4c48-b23c-fac737a3d93f
name: ConniePad.app.zip
status: Invalid
--------------------------------------------------
createdDate: 2025-04-02T23:59:27.940Z
id: bb4578a5-a67b-49e8-afd0-a9d707c10091
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-02T08:51:38.295Z
id: 93ff89f4-98d3-45ac-9ee8-9483726a9666
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-02T08:19:13.762Z
id: 9e4a62df-3d8a-4cfa-ae9e-56ff35ffe137
name: ConniePad-ConverterTool.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-02T04:15:34.508Z
id: 7ee43b74-f73f-462a-bb3d-f6bc53b1cb80
name: ConniePad-ConverterTool.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-02T02:11:53.312Z
id: d675e8f6-dc30-48e9-9269-9bc376f1b29e
name: ConniePad-ConverterTool.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-02T01:30:32.768Z
id: 9901f125-4355-4812-936b-97578ac2de2f
name: ConniePad-ConverterTool.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-04-01T20:47:26.035Z
id: a79265bc-8ad3-4a4b-ae39-150801aa9da9
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-18T22:39:54.189Z
id: b808b676-a41c-4536-b4fd-4b567701adcb
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-18T05:21:23.607Z
id: 797f5d4f-cd94-4511-9217-11e57c2c7ac3
name: ConniePad.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-18T05:18:30.707Z
id: c5b5c260-fb7f-4bda-9548-f5b7e57cb2f3
name: ConniePad.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-17T06:45:37.831Z
id: f24c1017-9171-4796-bf97-ea47ef83f7ce
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-17T06:38:17.981Z
id: 8dd0ea7e-e810-48f9-a48f-62dcc1406284
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-17T06:33:27.649Z
id: 704e339a-4d99-4e5e-8414-deb8b26c57ac
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-17T06:32:06.925Z
id: 8e9b09b6-e061-4361-abc1-0bbd8f33b599
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-17T06:26:52.444Z
id: 2b564641-eb87-4de9-a59c-ff5362b8bf4a
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-17T06:22:04.790Z
id: 1aa158bd-0afd-4c60-8e2f-3029388710ab
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-17T06:17:17.141Z
id: 3bffcf1d-2fd7-41ba-b70c-f85837499736
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-17T02:38:47.102Z
id: 2dd2fb47-7dff-4f30-b2e0-d8c2bfcf10f5
name: ConniePad.app.zip
status: Accepted
--------------------------------------------------
createdDate: 2025-03-14T03:23:54.671Z
id: 5cafb2a9-03e3-468e-b918-ff24b17fceee
name: ConniePad.app.zip
status: Accepted
There is something wrong with my keychain. Can someone point me in the right direction?
codesign --force --sign "Developer ID Application: Denis Putnam (2368694WQF)" --options runtime "/Users/denisputnam/git/expense_tracker/dist/ExpenseTracker.app"
/Users/denisputnam/git/expense_tracker/dist/ExpenseTracker.app: replacing existing signature
Warning: unable to build chain to self-signed root for signer "Developer ID Application: Denis Putnam (2368694WQF)"
/Users/denisputnam/git/expense_tracker/dist/ExpenseTracker.app: errSecInternalComponent
Deniss-MacBook-Pro:expense_tracker denisputnam$
security find-certificate -c "Developer ID Certification Authority" -p /Library/Keychains/System.keychain | openssl x509 -noout -dates
notBefore=Sep 22 18:55:10 2021 GMT
notAfter=Sep 17 00:00:00 2031 GMT
Deniss-MacBook-Pro:expense_tracker denisputnam$
Two months ago we got approval for using the Notification Filtering entitlement. We rushed out to implement it in our app, only to find out that the permission was set for the wrong bundle identifier.
We expected to get the permission for the notification extension's bundle identifier, yet it is added for the main app's bundle identifier.
Per the official docs, the entitlement permission should be in the notification service extension target:
After you receive permission to use the entitlement, add com.apple.developer.usernotifications.filtering to the entitlements file in the Notification Service Extension target.
However, this fails to get signed when compiling for non-simulator targets because of the bundle mismatch issue. Simulator perfectly filters notifications.
Adding the entitlement to the main app does compile, but filtering does not work (as expected).
We reached out to Apple twice (Case-ID: 14330583) but we have yet to receive any response.
Could there be something else wrong instead of the identifier mismatch?
Topic:
Code Signing
SubTopic:
Entitlements
Tags:
Entitlements
Code Signing
App ID
User Notifications
Hi support,
Currently we are in a process of migrating our Qt application for MAC OS - ventura -v13.4.
There is a specific feature in our application in which client tries to communicate with server (Socket communication) using Qt's QsslSocket Apis . To achieve this we are using self signed Ca certificate (.pem ) generated by using openSSl commands which uses IP address of the server.
We are manually installing the certificate inside MAC OS - keychain and trusting it manually as well after installing .
This is working fine in XCode environment in debug mode in MAC OS and client -server handshake is happening successfully. How ever after creating .dmg file (installer) the same handshake is not happening and we are getting error -Connection time out.
Upon investigating this online, we got to know there has to be codesigning (both app bundle and the dmg file )along with notarization of the .dmg file in order to access keychain of MAC OS at runtime to access the self signed certificate installed.
Now we have 2 queries here.
Is code signing mandatory if we want to verify our app through keychain with .dmg file ?
If yes, whats the best way to achieve this ?
We have tried 2 options without any luck.
option1 - Trying to build our specific target among 'ALL_BUILD' with signing key settings inside xcode where we are providing developer provisional certificate with apple team ID . After that we are trying to archive to generate dmg file which is code signed.
We are failing here as the signed dmg is not getting installed due to other app related dependencies are missing .
option 2- Code signing the dmg and the app bundle manually outside the environment of xcode with developer certificate and team ID.
We are failing here as notarization needs to be done it seems to access keychain for certificate verification
If Code signing is not mandatory then whats the best possible way to achieve this considering manually installation of certificate inside keychain with adding trust option is not working at the moment.
Please specify the best solution if possible.
Topic:
Code Signing
SubTopic:
General