Documentation

Go to Portal Website

SDK Integration - Standard Mode

Overview

Standard Mode is the default way to protect a mobile app with AppTego. Upload a compiled APK, AAB, or IPA and AppTego applies MobileDefender protection according to the selected security configuration. No source code changes are required.

Use Standard Mode when you are evaluating AppTego, protecting an existing release candidate, or moving protection into CI/CD. The protected app should behave like the original app with the selected security controls active, but every protected artifact should be validated before release.

How It Works

  1. Configure controls and response actions in the AppTego Portal.
  2. Upload the compiled app through the portal, a CI/CD integration, or the Automation API.
  3. AppTego protects, packages, and signs the app according to the selected configuration and signing option.
  4. Download the protected output when the build completes.
  5. Validate the protected app on representative devices.
  6. Distribute through your normal release channel after QA approval.

Supported Formats

FormatPlatformPublic output
.apkAndroidProtected APK
.aabAndroidProtected Android App Bundle; a universal test APK may also be available for QA
.ipaiOSProtected IPA

Upload Via The Portal

  1. Open Application Builds in the sidebar.
  2. Click Upload.
  3. Select Android or iOS.
  4. Choose the configuration version: Development, Staging, or Production.
  5. Select the APK, AAB, or IPA file.
  6. Select a signing key when the build should use customer signing material.
  7. Click Upload.

The build appears in the Application Builds list with a live status indicator. When complete, download the protected artifact from the build record.

Upload Via CI/CD

For repeatable CI/CD integration, use one of these paths:

OptionBest for
Automation APIDirect HTTP integration from any CI system
GitHub ActionGitHub workflows using apptego-mobile-protect
CircleCI OrbCircleCI workflows using apptego/mobile-protect

Build Limits

Default build and application limits depend on your subscription plan. Contract-specific or support-configured limits can override these defaults.

PlanConcurrent buildsApplication allowanceProtected build allowance
Free11 app per platform2 builds per platform and configuration version over 7 days
Team23 apps per platform10 builds per platform and configuration version over 7 days
Enterprise5Effectively unlimited unless a tenant cap is setEffectively unlimited unless a tenant cap is set

Build history, retention, signing, and detailed build behavior are covered in Uploading and Building Apps. Plan details are covered in Subscription Plans and Billing.

What Standard Mode Applies

During protected build creation, AppTego can apply the selected configuration, including:

  1. MobileDefender runtime protection.
  2. Detection controls and configured response actions.
  3. Prevention controls and platform hardening.
  4. AppTego obfuscation and build-time hardening supported by the tenant plan and platform.
  5. Protected configuration packaging for the selected environment.
  6. Signing using the selected signing key or temporary test signing.

Controls are plan-gated at configuration and build time. Many controls are build-time protections, so changing a configuration usually requires a new protected build before the app contains that change.

Signing

If no custom signing key is selected, AppTego can produce an installable test build using temporary signing. Temporary test signing is useful for QA and smoke testing, but it is not intended for app store distribution.

For production workflows, upload and select your own signing identity:

  1. Open Application Builds.
  2. Add the Android or iOS signing material in the Signing Keys panel.
  3. Select the signing key during upload, or set it as the default for future builds.

Custom signing keys are available on paid plans. Always validate that the protected artifact uses the expected signing identity for its distribution path.

Architecture Settings

Standard Mode protected outputs are device-focused by default. Enterprise tenants can enable optional build settings for Android x86/x86_64 support or iOS simulator support when QA or CI needs emulator/simulator installation. See Uploading and Building Apps for the current portal settings and tradeoffs.

Validation Checklist

CheckWhat to verify
InstallationThe protected app installs through the intended QA or release channel.
Launch and loginStartup, authentication, and session restore still work.
Critical workflowsPayments, uploads, offline mode, deep links, push notifications, and core user journeys behave as expected.
ControlsSelected controls trigger, block, or harden behavior as expected for the environment.
NetworkAPI calls, certificate policy, and third-party SDKs work as expected.
SigningThe artifact uses the correct signing identity for its distribution path.

Comparison with Library Mode

FeatureStandard ModeLibrary Mode
Source code access requiredNoYes
AppTego protects an uploaded binaryYesNo
Final app build and signing owned by your pipelineOptionalYes
Runtime detection callbacks in app codeNoYes
Controls enabled from app codeNoYes
AppTego post-build obfuscation workflowYes, where plan and platform support itNo
Plan requirementAll plansEnterprise

For source-level setup, see Library Mode.