# MobileID InApp app attestation

# Introduction

We offer App Attestation as a security feature to guarantee that our Encap server is communicating with the correct app.

By default, any client with a valid AppID and E2E public key can call and use our Encap mobile client APIs. This could allow a third party to create a malicious app, which can pose security and privacy risks. App Attestation gives applications additional security as it prevents third-party use of our APIs.

# How does app attestation work?

# Android

On Android devices, we offer SafetyNet, which is provided by Google as part of the Android platform.

# SafetyNet

SafetyNet provides a set of services and APIs that help protect an app against security threats, including device tampering, bad URLs, potentially harmful apps and fake users.

Specifically, we make use of the SafetyNet Attestation API (opens new window), which assesses the integrity of the device that an app is running on. No similar API currently exists for iOS.

SafetyNet Attestation can be used in different modes:

  • OFF: This is the default mode until Signicat has completed configuring the feature for you. No SafetyNet attestation is performed.
  • OPTIONAL: Useful for temporary use transition periods, such as upgrading existing Encap server and client SDK installations. Authentication will be possible even if a SafetyNet check fails, but you will be able to monitor logs for successful vs. failed SafetyNet checks.
  • REQUIRED: If a SafetyNet check fails, the authentication request will be blocked.


If your app generates more traffic than the default SafetyNet API quota, your API requests may return errors. You can find more details in the section on SafetyNet API quota and monitoring (opens new window) in the Android developer documentation.

# iOS

On iOS devices, app attestation relies on the app signature, which guarantees that the server communicates with the correct app. This is achieved by using intermediate push notifications.

# Intermediate push notifications

Intermediate push prevents emulated devices and other apps from performing successful activations and authentications. No configuration is necessary from your side.

The usual flow is as follows:

  1. The client sends the push address during the initial request for the session.
  2. The server creates a nonce and sends it to the push address.
  3. The legitimate client app receives the nonce in the push message.
  4. The client app creates a MAC of this nonce and sends it to the server along with the subsequent request.
  5. The server validates the MAC of this latest nonce against the original one.


The binding between the app and the push message is based on the app's publishing certificate as well as the push certificate, which must both belong to the same app or developer account, depending on configuration.

Contact Signicat at if you would like us to set up app attestation for you.

# Further reading

Last updated: 30/11/2022 11:28 UTC