Play upload key setup
Use the generated keystore as your upload key for new apps or for internal testing pipelines that still sign artifacts before store submission.
Android signing
Create a PKCS#12 signing keystore for release builds, save the alias and fingerprints, and hand the output directly to Gradle, CI, or a cloud build provider.
Container
PKCS#12
Identity
Single release alias
Fingerprints
SHA-1 and SHA-256
Release checklist
Input
Fill in the subject information that should be embedded in the signing certificate and pick a stable alias.
Output
After generation you will get a downloadable keystore plus the certificate export and fingerprints needed for store setup or OAuth integrations.
Use the generated keystore as your upload key for new apps or for internal testing pipelines that still sign artifacts before store submission.
The SHA-1 and SHA-256 values are useful for APIs that require signing identity registration, including Google services and enterprise integrations.
Store the generated bundle in a team-managed vault. Android signing outages usually happen because the alias or keystore password disappears after the first release.
FAQ
Use this section to validate the container format, password handling, and release assumptions before you wire the keystore into a build job.
It produces a PKCS#12 keystore with a single signing identity plus a PEM certificate export. Modern Android tooling accepts PKCS#12, and if you need a classic JKS container later you can convert it with keytool.
This generator uses one password for the PKCS#12 container. In Gradle or CI you can reuse the same value for both the store password and the key password.
Yes. It is suitable for release signing, internal testing, and direct distribution. If your app is already enrolled in Play App Signing, keep the original upload key stored securely because Google expects continuity across future releases.
Store the keystore file, alias, password, SHA-1 fingerprint, and SHA-256 fingerprint together in your secure team documentation so future releases are not blocked by missing signing details.
Tool stack
Use these generators and device utilities together to keep signing, testing, and distribution moving without leaving the browser.
CSR + private key
Generate an Apple-ready certificate signing request and private key for manual signing, CI, and cloud builds.
Open toolProfile service
Install a lightweight profile on an iPhone or iPad and surface the UDID, model, serial, and iOS version in seconds.
Open tool