Overview
This guide provides instructions for configuring SDK signing in the Apptrove iOS SDK to enhance the security of your integration. SDK signing authenticates API requests with a secretId and secretKey, ensuring that tracking data (e.g., installs, events) is securely attributed to your app and protected against unauthorized access.
Prerequisites
- iOS 10.0 or later and Xcode 12.0 or later
- Access to the Trackier Panel to retrieve
secretIdandsecretKey - Basic knowledge of Swift and secure credential management
SDK Signing
SDK signing enhances the security of your Apptrove iOS SDK integration by authenticating API requests with a unique secretId and secretKey. This ensures that only legitimate data from your app is processed, preventing fraudulent attribution and unauthorized access.
Overview
- Purpose: Authenticate SDK requests to Trackier's servers using unique credentials.
- Benefits: Prevents spoofing, secures attribution, and protects API requests from unauthorized sources.
Step 1: Retrieve secretId and secretKey
- Log in to your Trackier Panel and select your application.
- In the Dashboard, click the three dots in the left bottom corner.
- Locate the SDK Key section and click on the Advanced tab to generate the credentials.
- Click the Add secret key button to generate the
secretIdandsecretKey.
Refer to the screenshot in the Trackier Panel for visual reference when generating credentials.
Step 2: Configure SDK Signing
Set the secretId and secretKey in the TrackierSDKConfig during SDK initialization to enable SDK signing.
Swift Example
let config = TrackierSDKConfig(appToken: "xx-182a-4584-aca3-xx", env: TrackierSDKConfig.ENV_PRODUCTION)
config.setAppSecret(secretId: "xxxx", secretKey: "xxx-xx")
TrackierSDK.initialize(config: config)
Parameters
- appToken: Your SDK key from the Trackier Panel.
- env: Environment setting (
ENV_DEVELOPMENT,ENV_TESTING, orENV_PRODUCTION). - secretId: The unique identifier for SDK signing.
- secretKey: The secret key paired with the
secretIdfor authentication.
Best Practices
- Keep Credentials Confidential: Never expose
secretIdorsecretKeyin client-side code or version control. - Use Secure Storage: Store credentials in iOS Keychain to prevent unauthorized access.
- Rotate Keys Periodically: Regenerate the
secretKeyin the Trackier Panel if compromised or as a routine security measure. - Test in Development Mode: Use
ENV_TESTINGorENV_DEVELOPMENTto validate SDK signing before deploying to production.
Troubleshooting
- Authentication Failures: Verify that the
secretIdandsecretKeymatch those generated in the Trackier Panel. - Tracking Data Rejected: Ensure
setAppSecretis called beforeTrackierSDK.initializeand credentials are correctly set. - Exposed Credentials: If credentials are compromised, regenerate the
secretKeyimmediately and update your app.
For further assistance, refer to the Trackier Documentation Portal or contact Trackier support at support@trackier.com.