Skip to main content

Android signing

Generate an Android signing keystore and fingerprint summary

Create a PKCS#12 signing keystore for release builds, save the alias and fingerprints, and hand the output directly to Gradle, CI, or a cloud build provider.

Container

PKCS#12

Identity

Single release alias

Fingerprints

SHA-1 and SHA-256

Release checklist

  1. 1. Choose the alias and password that will stay with this app over time.
  2. 2. Download the keystore and save the metadata in your secret manager.
  3. 3. Configure the same alias and password in Gradle or your CI environment.
  4. 4. Keep the upload key stable so future Play releases do not break.

Input

Keystore details

Fill in the subject information that should be embedded in the signing certificate and pick a stable alias.

Output

Generated Android signing bundle

After generation you will get a downloadable keystore plus the certificate export and fingerprints needed for store setup or OAuth integrations.

Generate the signing bundle to display the alias, fingerprints, and file downloads here.

Play upload key setup

Use the generated keystore as your upload key for new apps or for internal testing pipelines that still sign artifacts before store submission.

Fingerprint reuse

The SHA-1 and SHA-256 values are useful for APIs that require signing identity registration, including Google services and enterprise integrations.

Recoverability

Store the generated bundle in a team-managed vault. Android signing outages usually happen because the alias or keystore password disappears after the first release.

FAQ

Frequently asked questions

Use this section to validate the container format, password handling, and release assumptions before you wire the keystore into a build job.

What file format does this Android keystore generator produce?

It produces a PKCS#12 keystore with a single signing identity plus a PEM certificate export. Modern Android tooling accepts PKCS#12, and if you need a classic JKS container later you can convert it with keytool.

Should the store password and key password be different?

This generator uses one password for the PKCS#12 container. In Gradle or CI you can reuse the same value for both the store password and the key password.

Can I use this keystore for Google Play releases?

Yes. It is suitable for release signing, internal testing, and direct distribution. If your app is already enrolled in Play App Signing, keep the original upload key stored securely because Google expects continuity across future releases.

What metadata should I save with the keystore?

Store the keystore file, alias, password, SHA-1 fingerprint, and SHA-256 fingerprint together in your secure team documentation so future releases are not blocked by missing signing details.