转自:http://blog.csdn.net/frank2336/article/details/7468904
将Apple development provisioning profiles放在其它的机子上,在“TEAMS”中提示“Unable to code design using identities in this team: no private keys available”
解决方法参考https://developer.apple.com/ios/manage/certificates/team/howto.action
Saving your Private Key and Transferring to other Systems
It is critical that you save your private key somewhere safe in the event that you need to develop on multiple computers or decide to reinstall your system OS. Without your private key, you will be unable to sign binaries in Xcode and test your application on any Apple device. When a CSR is generated, the Keychain Access application creates a private key on your login keychain. This private key is tied to your user account and cannot be reproduced if lost due to an OS reinstall. If you plan to do development and testing on multiple systems, you will need to import your private key onto all of the systems you’ll be doing work on.
- To export your private key and certificate for safe-keeping and for enabling development on multiple systems, open up the Keychain Access Application and select the ‘Keys’ category.
- Control-Click on the private key associated with your iOS Development Certificate and click ‘Export Items’ in the menu. The private key is identified by the iOS Developer: <First Name> <Last Name> public certificate that is paired with it.
- Save your key in the Personal Information Exchange (.p12) file format.
- You will be prompted to create a password which is used when you attempt to import this key on another computer.
- You can now transfer this .p12 file between systems. Double-click on the .p12 to install it on a system. You will be prompted for the password you entered in Step 4.
分享到:
相关推荐
Constructing identities in Indian networks
Research Basics: Design to Data Analysis in Six Steps offers a fresh and creative approach to the research process based on author James V. Spickard’s decades of teaching experience. Using an ...
this code for elastic-plastic model
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
Each published article was reviewed by a minimum of two independent reviewers using a single-blind peer review process, where the identities of the reviewers are not known to the authors, but the ...
atlas-identities-0.8.1.jar
前端开源库-fantasy-identities幻想身份,身份数据结构。
Aside from its practical use in training teachers and students engaged in mathematical competitions, it is a source of enrichment that is bound to stimulate interest in a variety of mathematical ...
Analysis of the relationship between available information and performance in facility logistics.PDF Challenges of Urban Sensing.PDF Critical Elements and Lessons Learnt from the Implementation of an ...
This book is intended to serve as a resource for both beginners and experts in the counterfeit electronic components domain. For newcomers to the area, it shall introduce all of the necessary ...