| Numéro d’ID de bogue |
BUG-000119048 |
| Envoi | December 27, 2018 |
| Dernière modification | June 5, 2024 |
| S’applique à | ArcGIS Runtime SDK |
| Version trouvée | 100.2.1 |
| Système d’exploitation | Apple iOS |
| Version du système d’exploitation | 11.0x |
| Statut | Known Limit
Après examen par l’équipe de développement, il a été déterminé que ce problème est lié à une limitation connue du logiciel sur laquelle Esri n’a aucun contrôle. Pour d’autres explications, reportez-vous à la section Informations supplémentaires correspondant au problème.
|
Informations supplémentaires
Explorer app does not support signing in using PKI certificates.
This capability is supported in Runtime, but Explorer doesn't take advantage of it.
Simply installing the pfx certificate on an iOS device is not enough for custom apps. Custom apps do not get access to the certificate the way that inbuilt iOS apps such as Safari does.
Custom apps need to explicitly install the certificate into their own keychain. Runtime provides a convenient method on AGSCredential call importCertificateData:password:overwrite:error:() which allows certificates to be installed into the app's keychain.
Then, when the user tries to sign in to a portal with PKI, the default handler in runtime can present a list of certificates that are available in the keychain for that portal. If the app wants to customize the sign in process and present its own UI, it can use the identitiesForProtectionSpace:()
mehod on AGSCredential to get a list of available certificates, and then create a credential with the chosen certificate to handle the authentication challenge
Étapes pour reproduire
ID de bogue: BUG-000119048
Logiciel: