Monthly Archives: diciembre 2013

Updating your Apple Push Notification Service certificates

http://goto0.cubelogic.org/a/186

Just a quick checklist to get up to speed when your APN certificates expire.

  1. Login into the Provisioning Portal, click “App IDs” on the left side column
  2. Click “Configure” on the App ID of your app
  3. Click Revoke for the expired Push SSL certificate
  4. Open Keychain Access on your Mac. Click the “Certificates” category, find the expired cert and just delete it.
  5. From the Provisioning Portal website, start creating a brand new Push SSL certificate. Just follow the instructions.
  6. Don’t forget to download the signed cert and double-click it to install it (aps_developer_identity.cer) in your default keychain.
  7. Find the newly created cert in Keychain Access and click the disclose triangle. Then:
    • – Right-click on the private key entry without selecting the parent, and select Export. A .p12 file will be saved
    • – Right-click on the actual certificate without selecting the child key, and select Export. Another .p12 file will be saved
  8. If your server requires .pemstyle certificates, run this:
    $ openssl pkcs12 -in apn_cert.p12 -out apn_cert.pem -nodes
    $ openssl pkcs12 -in apn_key.p12 -out apn_key.pem -nodes
  9. Deploy the .pem files in the right location accessible by your application server that will be sending the Push notifications.

Now push notifications should be up and running once again.

Escribir la arroba en un Mac durante una sesion Terminal Server o RemoteApp

Agradecimiento : http://toninger.blogspot.com.es/2012/05/escribir-la-arroba-en-un-mac-durante.html

Encontre una entrada en un blog en el que se explica el funcionamiento del teclado de un Mac, teclas especiales, etc,  http://carrero.es/mac-os-x-con-el-teclado-mucho-mejor/2478/ me interesaba mucho, ya que a mis clientes con equipos Mac que acceden a nuestra aplicacion mediante RemoteApp, no les funcionaba la insercion de la arroba @ en los campos de email de clientes, proveedores, etc…

Read more