I understand the math behind RSA cryptography, however, I'm having trouble reconciling that with Apple's lingo and authentication process. We have the following entities:
And the following different run modes:
How do all these work together to accomplish the goal? And by "work together", I mean explicitly what signs what, when, and where.
My current stab is:
I'm at a loss for what Apple's Worldwide certificate is for though?
Provisioning profiles created via developer portal are signed by Apple. Your provisioning profiles contain your certificate in them, thus the codesign identity of the ipa must match the one in profile. When app is launched, iOS is probably checking if the codesign matches the provisioning profile, and if the provisioning profile is valid. When profile is development/ad-hoc, it also checks if the device has permissions to launch the app. And in addition, when app is submitted to ITC (for AppStore or TestFlight), it is signed and encrypted by Apple using their cert/keys.
The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.