Appfigurate™️
HomeDocumentation
  • Introducing Appfigurate™️ 3
  • Getting Started
    • Getting Started
    • Examples
    • Upgrade guide
      • v1.4.0 to v2.2.0
      • v2.1.1 to v2.2.0
      • v2.2.1 to v3.0.0
      • v3.2.1 to v4.0.0
    • iOS native app integration
      • iOS app extension integration
    • watchOS app integration
      • watchOS app extension integration
    • Android native app integration
    • Mobile Flutter integration
      • Flutter iOS
      • Flutter Android
    • React Native integration
      • iOS native module integration
      • Android native module integration
      • JavaScript integration
    • Third party remote configuration providers
      • Firebase Remote Config
      • Launch Darkly
      • Other third party remote configuration providers
  • Configuration subclasses
    • Supported property types
      • Boolean
      • Integer
      • Float
      • Double
      • Plain String
      • Encrypted String
    • Custom executable actions
    • Slider icon types
  • Additional reading
    • Info.plist options
    • AndroidManifest.xml options
    • Displaying overridden configuration
    • Security
      • Best practice
      • Encryption
      • Export compliance
      • App Store compliance
      • PrivacyInfo.xcprivacy
      • Rotating your private key
  • Automation testing
    • iOS native app automation testing
    • Android native automation testing
  • API
    • iOS and watchOS API
    • Android API
    • Mobile Flutter API
    • React Native API
  • Appfigurate User Guide
    • Introduction
    • Main menu
    • Select app
    • Add app
    • Import app
    • Install example apps
    • Settings
      • Passcode Lock
      • Restore
      • Backup
      • Delete all apps and Settings
      • Analytics
    • Edit app
    • Configure app
    • Permissions
  • Appfigurate SE user guide
    • Introduction
    • Manual encryption
      • ENCRYPTED_STRING macro/function
      • ENCRYPTED_STRING_IOS_WATCHOS macro/function
    • Setup iOS Simulator app
    • Setup Android Emulator app
    • Xcode source editor extension
      • Troubleshooting
    • Real device cloud testing services
      • BrowserStack
  • LEGAL
    • License Agreement
    • Privacy Policy
    • Release History
    • Third party notices
Powered by GitBook
On this page
  • Database encryption
  • iOS Simulator
  • Android Emulator
  • Physical devices
  • Real device cloud testing services
  • App metadata exports & backup
  1. Additional reading
  2. Security

Encryption

PreviousBest practiceNextExport compliance

Last updated 10 months ago

Database encryption

iOS Simulator

For Appfigurate Simulator, we rely upon you and your Mac's security to secure your app metadata records. The database that stores your app metadata records is not encrypted and is located in the host macOS filesystem:

~/Library/Application Support/Appfigurate/

This allows us to share your app metadata records across all iOS Simulators where Appfigurate is installed.

Android Emulator

For Appfigurate Emulator, we rely upon you and your Mac or Windows PC's security to secure your app metadata records. The database that stores your app metadata records is not encrypted and is located in the Android Emulator's file system:

/data/data/nz.co.electricbolt.appfigurate/

The AppfigurateSE app can be used to the iOS shared database stored in the host macOS filesystem (see above) to and from the Android Emulator. For Windows PC's the database that stores your app metadata records is not encrypted and is located in the host Windows filesystem:

%LOCALAPPDATA%\Appfigurate\

Physical devices

For device builds (installed from the or ), the database that stores your app metadata records is encrypted on device.

Real device cloud testing services

When pre-packaging the local database that stores your app metadata records into the Appfigurate iOS or Android physical device build, the database is stored unencrypted in the resulting ipa or apk file. We recommend using wrong app metadata records for development in this scenario.

App metadata exports & backup

Exported app metadata is secured using the following:

  • Passphrase derivation function uses 11-rounds of bcrypt.

  • App metadata blob is encrypted with AES256.

Apple App Store
Google Play Store
iOS Simulator
copy