Appfigurate™️
HomeDocumentation
  • Introducing Appfigurate™️ 3
  • Getting Started
    • Getting Started
    • Examples
    • Upgrade guide
      • v1.4.0 to v2.2.0
      • v2.1.1 to v2.2.0
      • v2.2.1 to v3.0.0
      • v3.2.1 to v4.0.0
    • iOS native app integration
      • iOS app extension integration
    • watchOS app integration
      • watchOS app extension integration
    • Android native app integration
    • Mobile Flutter integration
      • Flutter iOS
      • Flutter Android
    • React Native integration
      • iOS native module integration
      • Android native module integration
      • JavaScript integration
    • Third party remote configuration providers
      • Firebase Remote Config
      • Launch Darkly
      • Other third party remote configuration providers
  • Configuration subclasses
    • Supported property types
      • Boolean
      • Integer
      • Float
      • Double
      • Plain String
      • Encrypted String
    • Custom executable actions
    • Slider icon types
  • Additional reading
    • Info.plist options
    • AndroidManifest.xml options
    • Displaying overridden configuration
    • Security
      • Best practice
      • Encryption
      • Export compliance
      • App Store compliance
      • PrivacyInfo.xcprivacy
      • Rotating your private key
  • Automation testing
    • iOS native app automation testing
    • Android native automation testing
  • API
    • iOS and watchOS API
    • Android API
    • Mobile Flutter API
    • React Native API
  • Appfigurate User Guide
    • Introduction
    • Main menu
    • Select app
    • Add app
    • Import app
    • Install example apps
    • Settings
      • Passcode Lock
      • Restore
      • Backup
      • Delete all apps and Settings
      • Analytics
    • Edit app
    • Configure app
    • Permissions
  • Appfigurate SE user guide
    • Introduction
    • Manual encryption
      • ENCRYPTED_STRING macro/function
      • ENCRYPTED_STRING_IOS_WATCHOS macro/function
    • Setup iOS Simulator app
    • Setup Android Emulator app
    • Xcode source editor extension
      • Troubleshooting
    • Real device cloud testing services
      • BrowserStack
  • LEGAL
    • License Agreement
    • Privacy Policy
    • Release History
    • Third party notices
Powered by GitBook
On this page
  • Output method types
  • Console
  • macOS file system
  • Clipboard
  • Mail
  • Message
  • iOS Document Picker
  • QR code
  • iOS Share Sheet
  • Android File Picker
  • Android Share Sheet
  1. Appfigurate User Guide
  2. Settings

Backup

(not available in real device cloud testing services)

PreviousRestoreNextDelete all apps and Settings

Last updated 9 months ago

You can export/backup all exportable app metadata records so you can either share them to another Appfigurate instance, or for safe keeping.

Enter a passphrase used to encrypt the app metadata records. The passphrase must be 8 to 64 characters in length. Tap the Backup button to continue.

Output method types

The available output methods differ depending on your device type:

Console

You can export app metadata record(s) to the console.

  • iOS: In macOS open Console.app. Select the iOS Simulator device in the left hand pane. Type process:appfigurate in the search box in the top right. Tap Start to start streaming events. Due to the length restrictions per log, you'll need to select all the Appfigurate x of y: records and paste them into a text editor.

macOS file system

On a iOS Simulator, you can select a directory from the host macOS file system to store the resulting .apc file containing the encrypted app metadata record(s).

Clipboard

You can export app metadata record(s) to the iOS or Android clipboard. On an iOS Simulator or Android Emulator, the clipboard is shared with the macOS host.

Mail

On a device with an email account, you can email the resulting .apc file containing the encrypted app metadata record(s) to a recipient.

Tip: Don't send the passphrase in the same email as the .apc file.

Message

On a device with a text messaging app, you can send the resulting .apc file containing the encrypted app metadata record(s) to a phone number.

iOS Document Picker

On an iOS Simulator or physical device you can use system document picker to select a directory in the device's local file system or iCloud Drive to store the resulting .apc file containing the encrypted app metadata record(s).

QR code

iOS Share Sheet

On an iOS Simulator or physical device you can use the iOS Share Sheet to share or save the resulting .apc file containing the encrypted app metadata record(s).

Android File Picker

On an Android Emulator or physical device you can use the system file picker to select a directory in the device's local file system to save the resulting .apc file containing the encrypted app metadata record(s).

Android Share Sheet

On an Android Emulator or physical device you can use the Android Share Sheet to share or save the resulting .apc file containing the encrypted app metadata record(s).

Android: To view logs in Android Studio, open the , filter logs by nz.co.electricbolt.appfigurate. To view logs from the macOS command line, enter adb logcat | grep Appfigurate . You'll need to select all the Appfigurate: records and paste them into a text editor.

The QR code option is available when a single app metadata record. For best results, place the device on a flat stable surface, ensuring no bright overhead lights or reflections are visible on the screen. Another device with a camera can Import using QR code function.

logcat tool window
exporting