Drop an iOS .mobileprovision file to see what's inside. Team name & ID, App ID, entitlements, expiration date, every registered UDID, and the signing certificates — all the data Xcode shows you in Signing & Capabilities, without opening Xcode.
application-identifierget-task-allowA provisioning profile is Apple's way of binding three things together: which app (App ID), which devices (UDIDs), and which developer (signing certificate). Without a matching profile, iOS refuses to launch a sideloaded app.
The file itself is a PKCS#7-signed plist. Apple signs the inner XML so iOS can verify it came from Apple's authority and hasn't been tampered with. The plist itself isn't encrypted — you can extract it with security cms -D -i profile.mobileprovision on macOS, or by scanning for the <?xml marker (which is what this tool does).
get-task-allow = true so debuggers can attach.ProvisionsAllDevices = true, no UDID list — runs on any device that trusts the enterprise certificate.aps-environment entitlement.application-identifier tells you, including the team prefix.The UDIDs in a development or ad-hoc profile are PII — they uniquely identify specific physical iPhones and iPads. Don't post a decoded profile publicly; treat the UDID list the way you'd treat a list of email addresses.
This tool processes the file entirely in memory on our server. Nothing is saved; the decoded result lives only on this page in your browser.
Once the UDIDs are registered and signed in, App On The Go gives you an OTA install link those exact devices can tap.