SlideShare a Scribd company logo
1 of 90
Download to read offline
Co musí banka
udělat pro zapojení
do Zingly?
Petr Dvořák
CEO at Lime
E-mail: petr@lime-company.eu
Twitter: @joshis_tweets
Sdílejte přátelům a známým
Otázky lze klást v Q&A boxu
Odkaz na Slideshare v popisu videa
Záznam bude dostupný on-line
Infrastruktura Zingly
PowerAuth Server PowerAuth Server
Zingly API Server Zingly API Server
Zingly Multi-Banking Hub Server
Banka A Banka B
BankyUživatelé
PowerAuth Server
Zingly
Internetové
bankovnictví
Internetové
bankovnictví
PowerAuth Server PowerAuth Server
Zingly API Server Zingly API Server
Zingly Multi-Banking Hub Server
Banka A Banka B
BankyUživatelé
PowerAuth Server
Zingly
Internetové
bankovnictví
Internetové
bankovnictví
PowerAuth Server PowerAuth Server
Zingly API Server Zingly API Server
Zingly Multi-Banking Hub Server
Banka A Banka B
BankyUživatelé
PowerAuth Server
Zingly
Internetové
bankovnictví
Internetové
bankovnictví
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
Internal Banking Infrastructure
Plugin / Adapter Plugin / Adapter
Connector
Použité technologie
Spring Boot
JPA + Hibernate
Aplikace - Java EE 7
OracleDB, IBM DB2,
MySQL, PostgreSQL
Databáze - JPA2.0
Github
Maven
Development
*
* komerční support
SOAP
REST
Service API
Postup nasazování
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
1. Nasazení PowerAuth 2.0 Serveru
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
2. Integrace s IB
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
3. Nasazení Zingly API Serveru
Nasazení PowerAuth 2.0
Serveru
https://github.com/lime-company/lime-security-powerauth/blob/master/powerauth-
docs/source/tutorial/deployment.md
1. Stáhněte si PowerAuth 2.0 Server
https://github.com/lime-company/lime-security-powerauth/releases/tag/0.8
2. Přidejte DB connector na classpath
mysql-connector-java-${VERSION}.jar
3. Vytvořte databázové schéma
4. Nastavte parametry pro připojení
PowerAuth serveru do DB
spring.datasource.url=jdbc:mysql://localhost:3306/powerauth
spring.datasource.username=powerauth
spring.datasource.password=
spring.datasource.driver-class-name=com.mysql.jdbc.Driver
spring.jpa.hibernate.ddl-auto=none
5. Nasaďte WAR soubor do Java EE
aplikačního containeru
Nebo spusťte ”java -jar powerauth-java-server.war”
Demo
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
SOAP
REST-ish
PowerAuth 2.0
Admin
Správa aplikací
Přehled aktivací uživatele
Nová aktivace
Detail a správa aktivace
1. Stáhněte si PowerAuth 2.0 Admin
https://github.com/lime-company/lime-security-powerauth/releases/tag/0.8
2. Nastavte cestu k PowerAuth Serveru
powerauth.service.url=http://localhost:8080/powerauth/soap
3. Nasaďte WAR soubor do Java EE
aplikačního containeru
Nebo spusťte ”java -jar powerauth-admin.war”
Demo
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
SOAP
REST-ish
PowerAuth
Admin
Integrace PowerAuth 2.0
a Internetbankingu
https://github.com/lime-company/lime-security-powerauth/blob/
master/powerauth-docs/source/tutorial/internet-banking.md
Admin ~ Internetbanking
1. Přidejte do projektu Maven závislost
<dependency>
<groupId>io.getlime.security</groupId>
<artifactId>powerauth-java-client</artifactId>
<version>0.0.8</version>
</dependency>
<dependency>
<groupId>io.getlime.security</groupId>
<artifactId>powerauth-java-client</artifactId>
<version>0.0.8</version>
</dependency>
<dependency>
<groupId>io.getlime.security</groupId>
<artifactId>powerauth-java-client</artifactId>
<version>0.0.8</version>
</dependency>
<dependency>
<groupId>io.getlime.security</groupId>
<artifactId>powerauth-java-client</artifactId>
<version>0.0.8</version>
</dependency>
2. Napojte se na PowerAuth Server
@Configuration
@ComponentScan(basePackages = {"io.getlime"})
public class PowerAuthWebServiceConfiguration {
@Bean
public Jaxb2Marshaller marshaller() {
Jaxb2Marshaller marshaller = new Jaxb2Marshaller();
marshaller.setContextPath("io.getlime.powerauth.soap");
return marshaller;
}
@Bean
public PowerAuthServiceClient powerAuthClient(Jaxb2Marshaller m) {
PowerAuthServiceClient client = new PowerAuthServiceClient();
client.setDefaultUri("http://localhost:8080/powerauth/soap");
client.setMarshaller(marshaller);
client.setUnmarshaller(marshaller);
return client;
}
}
@Configuration
@ComponentScan(basePackages = {"io.getlime"})
public class PowerAuthWebServiceConfiguration {
@Bean
public Jaxb2Marshaller marshaller() {
Jaxb2Marshaller marshaller = new Jaxb2Marshaller();
marshaller.setContextPath("io.getlime.powerauth.soap");
return marshaller;
}
@Bean
public PowerAuthServiceClient powerAuthClient(Jaxb2Marshaller m) {
PowerAuthServiceClient client = new PowerAuthServiceClient();
client.setDefaultUri("http://localhost:8080/powerauth/soap");
client.setMarshaller(marshaller);
client.setUnmarshaller(marshaller);
return client;
}
}
@Configuration
@ComponentScan(basePackages = {"io.getlime"})
public class PowerAuthWebServiceConfiguration {
@Bean
public Jaxb2Marshaller marshaller() {
Jaxb2Marshaller marshaller = new Jaxb2Marshaller();
marshaller.setContextPath("io.getlime.powerauth.soap");
return marshaller;
}
@Bean
public PowerAuthServiceClient powerAuthClient(Jaxb2Marshaller m) {
PowerAuthServiceClient client = new PowerAuthServiceClient();
client.setDefaultUri("http://localhost:8080/powerauth/soap");
client.setMarshaller(marshaller);
client.setUnmarshaller(marshaller);
return client;
}
}
@Configuration
@ComponentScan(basePackages = {"io.getlime"})
public class PowerAuthWebServiceConfiguration {
@Bean
public Jaxb2Marshaller marshaller() {
Jaxb2Marshaller marshaller = new Jaxb2Marshaller();
marshaller.setContextPath("io.getlime.powerauth.soap");
return marshaller;
}
@Bean
public PowerAuthServiceClient powerAuthClient(Jaxb2Marshaller m) {
PowerAuthServiceClient client = new PowerAuthServiceClient();
client.setDefaultUri("http://localhost:8080/powerauth/soap");
client.setMarshaller(marshaller);
client.setUnmarshaller(marshaller);
return client;
}
}
3. Používejte PowerAuthServiceClient
ve vaší aplikaci
@Controller
@RequestMapping(value = "/ib/settings")
public class AuthenticationController {
@Autowired
private PowerAuthServiceClient client;
// ... Controller code
List<Activations> aL = client.getActivationListForUser(uid);
}
@Controller
@RequestMapping(value = "/ib/settings")
public class AuthenticationController {
@Autowired
private PowerAuthServiceClient client;
// ... Controller code
List<Activations> aL = client.getActivationListForUser(uid);
}
Blokace / odblokování aktivace
Odstranění aktivace
Nová aktivace a “commit” aktivace
Přehled aktivací
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
SOAP
REST-ish
PowerAuth
Admin
Nasazení Zingly API
Serveru
Open-source *
* již brzy
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
SOAP
REST-ish
PowerAuth
Admin
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
Bankovní služby
PowerAuth
Admin
Orchestruje obchodní logiku
Služby pro přehledy účtů a transakcí
Vystavuje PowerAuth 2.0 Standard API
Integrace s PowerAuth 2.0 Serverem
Služby pro realizaci platby
Orchestruje obchodní logiku
Služby pro přehledy účtů a transakcí
Vystavuje PowerAuth 2.0 Standard API
Integrace s PowerAuth 2.0 Serverem
Služby pro realizaci platby
1. Stáhněte si Zingly API Server
TBD - TODO - SOON
2. Nastavte cestu k PowerAuth Serveru
powerauth.service.url=http://localhost:8080/powerauth/soap
3. Rozšiřte projekt o vaše specifické
technologie a knihovny
4. Naimplementujte bankovní službu
public interface ZinglyService {
public List<AccountModel> getAccountsForUser(String userId);
public boolean canGetTransactions(String userId, String iban);
public List<TransactionModel> getTransactionsForAccount(
String iban,
Date dateFrom,
Date dateTo,
BigInteger offset,
BigInteger itemCount
);
public boolean canExecutePayment(String userId, String iban);
public List<ErrorModel> validatePayment(PaymentModel payment);
public PaymentModel executePayment(PaymentModel payment);
// ...
}
public interface ZinglyService {
public List<AccountModel> getAccountsForUser(String userId);
public boolean canGetTransactions(String userId, String iban);
public List<TransactionModel> getTransactionsForAccount(
String iban,
Date dateFrom,
Date dateTo,
BigInteger offset,
BigInteger itemCount
);
public boolean canExecutePayment(String userId, String iban);
public List<ErrorModel> validatePayment(PaymentModel payment);
public PaymentModel executePayment(PaymentModel payment);
// ...
}
Ukázka kódu
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
Bankovní služby
PowerAuth
Admin
Testování integrace
https://github.com/lime-company/lime-security-powerauth/blob/
master/powerauth-docs/source/tutorial/console-client-app.md
1. Stáhněte si PowerAuth 2.0 CMD
https://github.com/lime-company/lime-security-powerauth/releases
2. Připravte si konfigurační soubor
$ cat /tmp/pamk.json
{
"applicationName": "PowerAuth 2.0 Reference Client",
"applicationId": "Xg2sNup4wH7UQdchEld10w==",
"applicationSecret": "+k9EBCszvcDOalMK9FZYiQ==",
"masterPublicKey": "BByU43YKRNkzB+1/rahhaJC4kiGNiciYrcTBrL8="
}
3. Testujte integraci :-)
$ java -jar powerauth-java-cmd.jar
--url "http://localhost:8080/zingly-api"
--config-file "/tmp/pamk.json"
--status-file "/tmp/pa_status.json"
--method "prepare"
--password "1234"
--activation-code "F3CCT-FNOUS-GEVJF-O3HMV"
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : “WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
Bankovní služby
PowerAuth
Admin
PowerAuth Server PowerAuth Server
Zingly API Server Zingly API Server
Zingly Multi-Banking Hub Server
Banka A Banka B
BankyUživatelé
PowerAuth Server
Zingly
Internetové
bankovnictví
Internetové
bankovnictví
Děkuji
Petr Dvořák
e-mail: petr@lime-company.eu
twitter: @zinglyapp
http://zingly.cz/
31.3., 15:00 - 16:00
Dopad multi-bankingu a otevřených
bankovních API do obchodního fungování
bank
Otázky? :-)
Petr Dvořák
e-mail: petr@lime-company.eu
twitter: @zinglyapp
http://zingly.cz/

More Related Content

What's hot

Stateless authentication for microservices - Greach 2015
Stateless authentication for microservices - Greach 2015Stateless authentication for microservices - Greach 2015
Stateless authentication for microservices - Greach 2015Alvaro Sanchez-Mariscal
 
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...Brian Campbell
 
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security ProfileAPIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security ProfileHitachi, Ltd. OSS Solution Center.
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...Salesforce Developers
 
Stateless authentication for microservices - GR8Conf 2015
Stateless authentication for microservices - GR8Conf 2015Stateless authentication for microservices - GR8Conf 2015
Stateless authentication for microservices - GR8Conf 2015Alvaro Sanchez-Mariscal
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Hitachi, Ltd. OSS Solution Center.
 
The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)Nordic APIs
 
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)Nordic APIs
 
Secure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID ConnectSecure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID ConnectNordic APIs
 
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018MikeLeszcz
 
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...Tatsuo Kudo
 
A How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API SecurityA How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API SecurityCA API Management
 
OAuth for your API - The Big Picture
OAuth for your API - The Big PictureOAuth for your API - The Big Picture
OAuth for your API - The Big PictureApigee | Google Cloud
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCloudIDSummit
 
Trends in Banking APIs
Trends in Banking APIsTrends in Banking APIs
Trends in Banking APIsTatsuo Kudo
 
Enterprise Single Sign On
Enterprise Single Sign On Enterprise Single Sign On
Enterprise Single Sign On WSO2
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
Launching a Successful and Secure API
Launching a Successful and Secure APILaunching a Successful and Secure API
Launching a Successful and Secure APINordic APIs
 
Integrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsIntegrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsNordic APIs
 

What's hot (20)

Stateless authentication for microservices - Greach 2015
Stateless authentication for microservices - Greach 2015Stateless authentication for microservices - Greach 2015
Stateless authentication for microservices - Greach 2015
 
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
 
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security ProfileAPIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
 
Stateless authentication for microservices - GR8Conf 2015
Stateless authentication for microservices - GR8Conf 2015Stateless authentication for microservices - GR8Conf 2015
Stateless authentication for microservices - GR8Conf 2015
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
 
The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)
 
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
 
Secure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID ConnectSecure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID Connect
 
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
 
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
 
A How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API SecurityA How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API Security
 
OAuth for your API - The Big Picture
OAuth for your API - The Big PictureOAuth for your API - The Big Picture
OAuth for your API - The Big Picture
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
 
Trends in Banking APIs
Trends in Banking APIsTrends in Banking APIs
Trends in Banking APIs
 
Enterprise Single Sign On
Enterprise Single Sign On Enterprise Single Sign On
Enterprise Single Sign On
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
Launching a Successful and Secure API
Launching a Successful and Secure APILaunching a Successful and Secure API
Launching a Successful and Secure API
 
Integrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsIntegrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashups
 

Viewers also liked

PSD2 a bankovní API: Top 5 mýtů, které dnes slyšíte
PSD2 a bankovní API: Top 5 mýtů, které dnes slyšítePSD2 a bankovní API: Top 5 mýtů, které dnes slyšíte
PSD2 a bankovní API: Top 5 mýtů, které dnes slyšítePetr Dvorak
 
Představení Zingly API Serveru a popis integrace
Představení Zingly API Serveru a popis integracePředstavení Zingly API Serveru a popis integrace
Představení Zingly API Serveru a popis integracePetr Dvorak
 
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014Miroslav Krejčík
 
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...Petr Dvorak
 
Sedm zabijáků inovaci ve velkých firmách
Sedm zabijáků inovaci ve velkých firmáchSedm zabijáků inovaci ve velkých firmách
Sedm zabijáků inovaci ve velkých firmáchZdeněk Macháček
 
Bankovní API ve světě
Bankovní API ve světěBankovní API ve světě
Bankovní API ve světěPetr Dvorak
 
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0Bezpečnost Zingly a detaily protokolu PowerAuth 2.0
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0Petr Dvorak
 
Jak vypadá ideální bankovní API?
Jak vypadá ideální bankovní API? Jak vypadá ideální bankovní API?
Jak vypadá ideální bankovní API? Petr Dvorak
 

Viewers also liked (8)

PSD2 a bankovní API: Top 5 mýtů, které dnes slyšíte
PSD2 a bankovní API: Top 5 mýtů, které dnes slyšítePSD2 a bankovní API: Top 5 mýtů, které dnes slyšíte
PSD2 a bankovní API: Top 5 mýtů, které dnes slyšíte
 
Představení Zingly API Serveru a popis integrace
Představení Zingly API Serveru a popis integracePředstavení Zingly API Serveru a popis integrace
Představení Zingly API Serveru a popis integrace
 
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014
 
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...
 
Sedm zabijáků inovaci ve velkých firmách
Sedm zabijáků inovaci ve velkých firmáchSedm zabijáků inovaci ve velkých firmách
Sedm zabijáků inovaci ve velkých firmách
 
Bankovní API ve světě
Bankovní API ve světěBankovní API ve světě
Bankovní API ve světě
 
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0Bezpečnost Zingly a detaily protokolu PowerAuth 2.0
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0
 
Jak vypadá ideální bankovní API?
Jak vypadá ideální bankovní API? Jak vypadá ideální bankovní API?
Jak vypadá ideální bankovní API?
 

Similar to Co musí banka udělat pro zapojení do Zingly?

Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Codit
 
SaltStack's NetAPI at Photobucket - Denver SaltStack Meetup
SaltStack's NetAPI at Photobucket - Denver SaltStack MeetupSaltStack's NetAPI at Photobucket - Denver SaltStack Meetup
SaltStack's NetAPI at Photobucket - Denver SaltStack MeetupJon Henry
 
Crystal clear service interfaces w/ Swagger/OpenAPI
Crystal clear service interfaces w/ Swagger/OpenAPICrystal clear service interfaces w/ Swagger/OpenAPI
Crystal clear service interfaces w/ Swagger/OpenAPIScott Triglia
 
How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...CA Technologies
 
RefCard API Architecture Strategy
RefCard API Architecture StrategyRefCard API Architecture Strategy
RefCard API Architecture StrategyOCTO Technology
 
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...Edureka!
 
Entity Linking and REST Patterns in SOA
Entity Linking and REST Patterns in SOA Entity Linking and REST Patterns in SOA
Entity Linking and REST Patterns in SOA WSO2
 
WAC Network APIs @ OverTheAir 2011
WAC Network APIs @ OverTheAir 2011WAC Network APIs @ OverTheAir 2011
WAC Network APIs @ OverTheAir 2011Ricardo Varela
 
Mastering Microservices with Kong (DevoxxUK 2019)
Mastering Microservices with Kong (DevoxxUK 2019)Mastering Microservices with Kong (DevoxxUK 2019)
Mastering Microservices with Kong (DevoxxUK 2019)Maarten Mulders
 
Dev309 from asgard to zuul - netflix oss-final
Dev309  from asgard to zuul - netflix oss-finalDev309  from asgard to zuul - netflix oss-final
Dev309 from asgard to zuul - netflix oss-finalRuslan Meshenberg
 
Seattle StrongLoop Node.js Workshop
Seattle StrongLoop Node.js WorkshopSeattle StrongLoop Node.js Workshop
Seattle StrongLoop Node.js WorkshopJimmy Guerrero
 
Webscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumWebscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumPhilippe Bogaerts
 
使用 Spring boot 快速打造 hateoas 應用
使用 Spring boot 快速打造 hateoas 應用使用 Spring boot 快速打造 hateoas 應用
使用 Spring boot 快速打造 hateoas 應用Shin-Jan Wu
 
Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Adam Lewis
 
Jsp & Ajax
Jsp & AjaxJsp & Ajax
Jsp & AjaxAng Chen
 
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Hitachi, Ltd. OSS Solution Center.
 
Creating APIs with the WSO2 Platform
Creating APIs with the WSO2 PlatformCreating APIs with the WSO2 Platform
Creating APIs with the WSO2 PlatformSagara Gunathunga
 
Explore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsExplore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsCA Technologies
 
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg PROIDEA
 
REST - What's It All About? (SAP TechEd 2012, CD110)
REST - What's It All About? (SAP TechEd 2012, CD110)REST - What's It All About? (SAP TechEd 2012, CD110)
REST - What's It All About? (SAP TechEd 2012, CD110)Sascha Wenninger
 

Similar to Co musí banka udělat pro zapojení do Zingly? (20)

Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
 
SaltStack's NetAPI at Photobucket - Denver SaltStack Meetup
SaltStack's NetAPI at Photobucket - Denver SaltStack MeetupSaltStack's NetAPI at Photobucket - Denver SaltStack Meetup
SaltStack's NetAPI at Photobucket - Denver SaltStack Meetup
 
Crystal clear service interfaces w/ Swagger/OpenAPI
Crystal clear service interfaces w/ Swagger/OpenAPICrystal clear service interfaces w/ Swagger/OpenAPI
Crystal clear service interfaces w/ Swagger/OpenAPI
 
How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...
 
RefCard API Architecture Strategy
RefCard API Architecture StrategyRefCard API Architecture Strategy
RefCard API Architecture Strategy
 
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...
 
Entity Linking and REST Patterns in SOA
Entity Linking and REST Patterns in SOA Entity Linking and REST Patterns in SOA
Entity Linking and REST Patterns in SOA
 
WAC Network APIs @ OverTheAir 2011
WAC Network APIs @ OverTheAir 2011WAC Network APIs @ OverTheAir 2011
WAC Network APIs @ OverTheAir 2011
 
Mastering Microservices with Kong (DevoxxUK 2019)
Mastering Microservices with Kong (DevoxxUK 2019)Mastering Microservices with Kong (DevoxxUK 2019)
Mastering Microservices with Kong (DevoxxUK 2019)
 
Dev309 from asgard to zuul - netflix oss-final
Dev309  from asgard to zuul - netflix oss-finalDev309  from asgard to zuul - netflix oss-final
Dev309 from asgard to zuul - netflix oss-final
 
Seattle StrongLoop Node.js Workshop
Seattle StrongLoop Node.js WorkshopSeattle StrongLoop Node.js Workshop
Seattle StrongLoop Node.js Workshop
 
Webscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumWebscarab demo @ OWASP Belgium
Webscarab demo @ OWASP Belgium
 
使用 Spring boot 快速打造 hateoas 應用
使用 Spring boot 快速打造 hateoas 應用使用 Spring boot 快速打造 hateoas 應用
使用 Spring boot 快速打造 hateoas 應用
 
Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0
 
Jsp & Ajax
Jsp & AjaxJsp & Ajax
Jsp & Ajax
 
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
 
Creating APIs with the WSO2 Platform
Creating APIs with the WSO2 PlatformCreating APIs with the WSO2 Platform
Creating APIs with the WSO2 Platform
 
Explore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsExplore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration Topics
 
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
 
REST - What's It All About? (SAP TechEd 2012, CD110)
REST - What's It All About? (SAP TechEd 2012, CD110)REST - What's It All About? (SAP TechEd 2012, CD110)
REST - What's It All About? (SAP TechEd 2012, CD110)
 

More from Petr Dvorak

Czech Banks are Under Attack, Clients Lose Money.
Czech Banks are Under Attack, Clients Lose Money.Czech Banks are Under Attack, Clients Lose Money.
Czech Banks are Under Attack, Clients Lose Money.Petr Dvorak
 
Innovations on Banking - Digital Banking Security in the Age of Open Banking
Innovations on Banking - Digital Banking Security in the Age of Open BankingInnovations on Banking - Digital Banking Security in the Age of Open Banking
Innovations on Banking - Digital Banking Security in the Age of Open BankingPetr Dvorak
 
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikací
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikacíSmart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikací
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikacíPetr Dvorak
 
Lime - Push notifications. The big way.
Lime - Push notifications. The big way.Lime - Push notifications. The big way.
Lime - Push notifications. The big way.Petr Dvorak
 
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?Petr Dvorak
 
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?Webinář: Co je to iBeacon a proč by vás to mělo zajímat?
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?Petr Dvorak
 
Chytré telefony v ČR - H1/2015
Chytré telefony v ČR -  H1/2015Chytré telefony v ČR -  H1/2015
Chytré telefony v ČR - H1/2015Petr Dvorak
 
What are "virtual beacons"?
What are "virtual beacons"?What are "virtual beacons"?
What are "virtual beacons"?Petr Dvorak
 
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatele
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatelemDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatele
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatelePetr Dvorak
 
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatele
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživateleiCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatele
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatelePetr Dvorak
 
Lime - Brand Guidelines
Lime - Brand GuidelinesLime - Brand Guidelines
Lime - Brand GuidelinesPetr Dvorak
 
Internet of Things as a Leading Trend for 2015 - Examples for Personal Use
Internet of Things as a Leading Trend for 2015 - Examples for Personal UseInternet of Things as a Leading Trend for 2015 - Examples for Personal Use
Internet of Things as a Leading Trend for 2015 - Examples for Personal UsePetr Dvorak
 
New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...Petr Dvorak
 
Internet věcí
Internet věcíInternet věcí
Internet věcíPetr Dvorak
 
mDevCamp 2014 - Bezpečnost v kontextu internetu věcí
mDevCamp 2014 - Bezpečnost v kontextu internetu věcímDevCamp 2014 - Bezpečnost v kontextu internetu věcí
mDevCamp 2014 - Bezpečnost v kontextu internetu věcíPetr Dvorak
 
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...Petr Dvorak
 
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcí
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcíNew Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcí
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcíPetr Dvorak
 
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.Petr Dvorak
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013Petr Dvorak
 
mDevCamp 2013 - Bezpečnost mobilního bankovnictví
mDevCamp 2013 - Bezpečnost mobilního bankovnictvímDevCamp 2013 - Bezpečnost mobilního bankovnictví
mDevCamp 2013 - Bezpečnost mobilního bankovnictvíPetr Dvorak
 

More from Petr Dvorak (20)

Czech Banks are Under Attack, Clients Lose Money.
Czech Banks are Under Attack, Clients Lose Money.Czech Banks are Under Attack, Clients Lose Money.
Czech Banks are Under Attack, Clients Lose Money.
 
Innovations on Banking - Digital Banking Security in the Age of Open Banking
Innovations on Banking - Digital Banking Security in the Age of Open BankingInnovations on Banking - Digital Banking Security in the Age of Open Banking
Innovations on Banking - Digital Banking Security in the Age of Open Banking
 
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikací
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikacíSmart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikací
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikací
 
Lime - Push notifications. The big way.
Lime - Push notifications. The big way.Lime - Push notifications. The big way.
Lime - Push notifications. The big way.
 
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?
 
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?Webinář: Co je to iBeacon a proč by vás to mělo zajímat?
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?
 
Chytré telefony v ČR - H1/2015
Chytré telefony v ČR -  H1/2015Chytré telefony v ČR -  H1/2015
Chytré telefony v ČR - H1/2015
 
What are "virtual beacons"?
What are "virtual beacons"?What are "virtual beacons"?
What are "virtual beacons"?
 
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatele
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatelemDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatele
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatele
 
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatele
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživateleiCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatele
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatele
 
Lime - Brand Guidelines
Lime - Brand GuidelinesLime - Brand Guidelines
Lime - Brand Guidelines
 
Internet of Things as a Leading Trend for 2015 - Examples for Personal Use
Internet of Things as a Leading Trend for 2015 - Examples for Personal UseInternet of Things as a Leading Trend for 2015 - Examples for Personal Use
Internet of Things as a Leading Trend for 2015 - Examples for Personal Use
 
New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...
 
Internet věcí
Internet věcíInternet věcí
Internet věcí
 
mDevCamp 2014 - Bezpečnost v kontextu internetu věcí
mDevCamp 2014 - Bezpečnost v kontextu internetu věcímDevCamp 2014 - Bezpečnost v kontextu internetu věcí
mDevCamp 2014 - Bezpečnost v kontextu internetu věcí
 
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...
 
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcí
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcíNew Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcí
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcí
 
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
mDevCamp 2013 - Bezpečnost mobilního bankovnictví
mDevCamp 2013 - Bezpečnost mobilního bankovnictvímDevCamp 2013 - Bezpečnost mobilního bankovnictví
mDevCamp 2013 - Bezpečnost mobilního bankovnictví
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Co musí banka udělat pro zapojení do Zingly?