SlideShare a Scribd company logo
1 of 90
Download to read offline
Co musí banka
udělat pro zapojení
do Zingly?
Petr Dvořák
CEO at Lime
E-mail: petr@lime-company.eu
Twitter: @joshis_tweets
Sdílejte přátelům a známým
Otázky lze klást v Q&A boxu
Odkaz na Slideshare v popisu videa
Záznam bude dostupný on-line
Infrastruktura Zingly
PowerAuth Server PowerAuth Server
Zingly API Server Zingly API Server
Zingly Multi-Banking Hub Server
Banka A Banka B
BankyUživatelé
PowerAuth Server
Zingly
Internetové
bankovnictví
Internetové
bankovnictví
PowerAuth Server PowerAuth Server
Zingly API Server Zingly API Server
Zingly Multi-Banking Hub Server
Banka A Banka B
BankyUživatelé
PowerAuth Server
Zingly
Internetové
bankovnictví
Internetové
bankovnictví
PowerAuth Server PowerAuth Server
Zingly API Server Zingly API Server
Zingly Multi-Banking Hub Server
Banka A Banka B
BankyUživatelé
PowerAuth Server
Zingly
Internetové
bankovnictví
Internetové
bankovnictví
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
Internal Banking Infrastructure
Plugin / Adapter Plugin / Adapter
Connector
Použité technologie
Spring Boot
JPA + Hibernate
Aplikace - Java EE 7
OracleDB, IBM DB2,
MySQL, PostgreSQL
Databáze - JPA2.0
Github
Maven
Development
*
* komerční support
SOAP
REST
Service API
Postup nasazování
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
1. Nasazení PowerAuth 2.0 Serveru
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
2. Integrace s IB
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
3. Nasazení Zingly API Serveru
Nasazení PowerAuth 2.0
Serveru
https://github.com/lime-company/lime-security-powerauth/blob/master/powerauth-
docs/source/tutorial/deployment.md
1. Stáhněte si PowerAuth 2.0 Server
https://github.com/lime-company/lime-security-powerauth/releases/tag/0.8
2. Přidejte DB connector na classpath
mysql-connector-java-${VERSION}.jar
3. Vytvořte databázové schéma
4. Nastavte parametry pro připojení
PowerAuth serveru do DB
spring.datasource.url=jdbc:mysql://localhost:3306/powerauth
spring.datasource.username=powerauth
spring.datasource.password=
spring.datasource.driver-class-name=com.mysql.jdbc.Driver
spring.jpa.hibernate.ddl-auto=none
5. Nasaďte WAR soubor do Java EE
aplikačního containeru
Nebo spusťte ”java -jar powerauth-java-server.war”
Demo
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
SOAP
REST-ish
PowerAuth 2.0
Admin
Správa aplikací
Přehled aktivací uživatele
Nová aktivace
Detail a správa aktivace
1. Stáhněte si PowerAuth 2.0 Admin
https://github.com/lime-company/lime-security-powerauth/releases/tag/0.8
2. Nastavte cestu k PowerAuth Serveru
powerauth.service.url=http://localhost:8080/powerauth/soap
3. Nasaďte WAR soubor do Java EE
aplikačního containeru
Nebo spusťte ”java -jar powerauth-admin.war”
Demo
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
SOAP
REST-ish
PowerAuth
Admin
Integrace PowerAuth 2.0
a Internetbankingu
https://github.com/lime-company/lime-security-powerauth/blob/
master/powerauth-docs/source/tutorial/internet-banking.md
Admin ~ Internetbanking
1. Přidejte do projektu Maven závislost
<dependency>
<groupId>io.getlime.security</groupId>
<artifactId>powerauth-java-client</artifactId>
<version>0.0.8</version>
</dependency>
<dependency>
<groupId>io.getlime.security</groupId>
<artifactId>powerauth-java-client</artifactId>
<version>0.0.8</version>
</dependency>
<dependency>
<groupId>io.getlime.security</groupId>
<artifactId>powerauth-java-client</artifactId>
<version>0.0.8</version>
</dependency>
<dependency>
<groupId>io.getlime.security</groupId>
<artifactId>powerauth-java-client</artifactId>
<version>0.0.8</version>
</dependency>
2. Napojte se na PowerAuth Server
@Configuration
@ComponentScan(basePackages = {"io.getlime"})
public class PowerAuthWebServiceConfiguration {
@Bean
public Jaxb2Marshaller marshaller() {
Jaxb2Marshaller marshaller = new Jaxb2Marshaller();
marshaller.setContextPath("io.getlime.powerauth.soap");
return marshaller;
}
@Bean
public PowerAuthServiceClient powerAuthClient(Jaxb2Marshaller m) {
PowerAuthServiceClient client = new PowerAuthServiceClient();
client.setDefaultUri("http://localhost:8080/powerauth/soap");
client.setMarshaller(marshaller);
client.setUnmarshaller(marshaller);
return client;
}
}
@Configuration
@ComponentScan(basePackages = {"io.getlime"})
public class PowerAuthWebServiceConfiguration {
@Bean
public Jaxb2Marshaller marshaller() {
Jaxb2Marshaller marshaller = new Jaxb2Marshaller();
marshaller.setContextPath("io.getlime.powerauth.soap");
return marshaller;
}
@Bean
public PowerAuthServiceClient powerAuthClient(Jaxb2Marshaller m) {
PowerAuthServiceClient client = new PowerAuthServiceClient();
client.setDefaultUri("http://localhost:8080/powerauth/soap");
client.setMarshaller(marshaller);
client.setUnmarshaller(marshaller);
return client;
}
}
@Configuration
@ComponentScan(basePackages = {"io.getlime"})
public class PowerAuthWebServiceConfiguration {
@Bean
public Jaxb2Marshaller marshaller() {
Jaxb2Marshaller marshaller = new Jaxb2Marshaller();
marshaller.setContextPath("io.getlime.powerauth.soap");
return marshaller;
}
@Bean
public PowerAuthServiceClient powerAuthClient(Jaxb2Marshaller m) {
PowerAuthServiceClient client = new PowerAuthServiceClient();
client.setDefaultUri("http://localhost:8080/powerauth/soap");
client.setMarshaller(marshaller);
client.setUnmarshaller(marshaller);
return client;
}
}
@Configuration
@ComponentScan(basePackages = {"io.getlime"})
public class PowerAuthWebServiceConfiguration {
@Bean
public Jaxb2Marshaller marshaller() {
Jaxb2Marshaller marshaller = new Jaxb2Marshaller();
marshaller.setContextPath("io.getlime.powerauth.soap");
return marshaller;
}
@Bean
public PowerAuthServiceClient powerAuthClient(Jaxb2Marshaller m) {
PowerAuthServiceClient client = new PowerAuthServiceClient();
client.setDefaultUri("http://localhost:8080/powerauth/soap");
client.setMarshaller(marshaller);
client.setUnmarshaller(marshaller);
return client;
}
}
3. Používejte PowerAuthServiceClient
ve vaší aplikaci
@Controller
@RequestMapping(value = "/ib/settings")
public class AuthenticationController {
@Autowired
private PowerAuthServiceClient client;
// ... Controller code
List<Activations> aL = client.getActivationListForUser(uid);
}
@Controller
@RequestMapping(value = "/ib/settings")
public class AuthenticationController {
@Autowired
private PowerAuthServiceClient client;
// ... Controller code
List<Activations> aL = client.getActivationListForUser(uid);
}
Blokace / odblokování aktivace
Odstranění aktivace
Nová aktivace a “commit” aktivace
Přehled aktivací
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
SOAP
REST-ish
PowerAuth
Admin
Nasazení Zingly API
Serveru
Open-source *
* již brzy
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
SOAP
REST-ish
PowerAuth
Admin
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
Bankovní služby
PowerAuth
Admin
Orchestruje obchodní logiku
Služby pro přehledy účtů a transakcí
Vystavuje PowerAuth 2.0 Standard API
Integrace s PowerAuth 2.0 Serverem
Služby pro realizaci platby
Orchestruje obchodní logiku
Služby pro přehledy účtů a transakcí
Vystavuje PowerAuth 2.0 Standard API
Integrace s PowerAuth 2.0 Serverem
Služby pro realizaci platby
1. Stáhněte si Zingly API Server
TBD - TODO - SOON
2. Nastavte cestu k PowerAuth Serveru
powerauth.service.url=http://localhost:8080/powerauth/soap
3. Rozšiřte projekt o vaše specifické
technologie a knihovny
4. Naimplementujte bankovní službu
public interface ZinglyService {
public List<AccountModel> getAccountsForUser(String userId);
public boolean canGetTransactions(String userId, String iban);
public List<TransactionModel> getTransactionsForAccount(
String iban,
Date dateFrom,
Date dateTo,
BigInteger offset,
BigInteger itemCount
);
public boolean canExecutePayment(String userId, String iban);
public List<ErrorModel> validatePayment(PaymentModel payment);
public PaymentModel executePayment(PaymentModel payment);
// ...
}
public interface ZinglyService {
public List<AccountModel> getAccountsForUser(String userId);
public boolean canGetTransactions(String userId, String iban);
public List<TransactionModel> getTransactionsForAccount(
String iban,
Date dateFrom,
Date dateTo,
BigInteger offset,
BigInteger itemCount
);
public boolean canExecutePayment(String userId, String iban);
public List<ErrorModel> validatePayment(PaymentModel payment);
public PaymentModel executePayment(PaymentModel payment);
// ...
}
Ukázka kódu
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
Bankovní služby
PowerAuth
Admin
Testování integrace
https://github.com/lime-company/lime-security-powerauth/blob/
master/powerauth-docs/source/tutorial/console-client-app.md
1. Stáhněte si PowerAuth 2.0 CMD
https://github.com/lime-company/lime-security-powerauth/releases
2. Připravte si konfigurační soubor
$ cat /tmp/pamk.json
{
"applicationName": "PowerAuth 2.0 Reference Client",
"applicationId": "Xg2sNup4wH7UQdchEld10w==",
"applicationSecret": "+k9EBCszvcDOalMK9FZYiQ==",
"masterPublicKey": "BByU43YKRNkzB+1/rahhaJC4kiGNiciYrcTBrL8="
}
3. Testujte integraci :-)
$ java -jar powerauth-java-cmd.jar
--url "http://localhost:8080/zingly-api"
--config-file "/tmp/pamk.json"
--status-file "/tmp/pa_status.json"
--method "prepare"
--password "1234"
--activation-code "F3CCT-FNOUS-GEVJF-O3HMV"
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : “WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
$ cat /tmp/pa_status.json
{
"activationId" : "24ac43a6-375e-4428-843a-84a2faa87e8e"
"counter" : 4,
"signaturePossessionKey" : "CwCviJR/wGqm8wNrNe4JGA==",
"signatureKnowledgeKeyEncrypted" : "WFKHFrezmYuFAUToAQ==",
"signatureKnowledgeKeySalt" : "RmDQ8hwsy0V/Gi1GHDKjWw==",
"signatureBiometryKey" : "K2ZrnBP/AU2dWheFJOQKvw==",
"transportMasterKey" : "kp2sNKVGepV9xtTwLXs/5g==",
"encryptedDevicePrivateKey" : "17LLl/C8pYo/YA+w4Z6z1LLZa2U",
"serverPublicKey" : "BEWx7a6LnkW7ckbJKUz2IINY5VSL0U6INwM="
}
PowerAuth Server
Zingly API Server
Internetové
bankovnictví
SOAP
REST-ish
SOAP
REST-ish
PowerAuth 2.0 Standard API
Zingly Banking API
Bankovní služby
PowerAuth
Admin
PowerAuth Server PowerAuth Server
Zingly API Server Zingly API Server
Zingly Multi-Banking Hub Server
Banka A Banka B
BankyUživatelé
PowerAuth Server
Zingly
Internetové
bankovnictví
Internetové
bankovnictví
Děkuji
Petr Dvořák
e-mail: petr@lime-company.eu
twitter: @zinglyapp
http://zingly.cz/
31.3., 15:00 - 16:00
Dopad multi-bankingu a otevřených
bankovních API do obchodního fungování
bank
Otázky? :-)
Petr Dvořák
e-mail: petr@lime-company.eu
twitter: @zinglyapp
http://zingly.cz/

More Related Content

What's hot

Stateless authentication for microservices - Greach 2015
Stateless authentication for microservices - Greach 2015Stateless authentication for microservices - Greach 2015
Stateless authentication for microservices - Greach 2015Alvaro Sanchez-Mariscal
 
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...Brian Campbell
 
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security ProfileAPIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security ProfileHitachi, Ltd. OSS Solution Center.
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...Salesforce Developers
 
Stateless authentication for microservices - GR8Conf 2015
Stateless authentication for microservices - GR8Conf 2015Stateless authentication for microservices - GR8Conf 2015
Stateless authentication for microservices - GR8Conf 2015Alvaro Sanchez-Mariscal
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Hitachi, Ltd. OSS Solution Center.
 
The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)Nordic APIs
 
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)Nordic APIs
 
Secure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID ConnectSecure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID ConnectNordic APIs
 
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018MikeLeszcz
 
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...Tatsuo Kudo
 
A How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API SecurityA How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API SecurityCA API Management
 
OAuth for your API - The Big Picture
OAuth for your API - The Big PictureOAuth for your API - The Big Picture
OAuth for your API - The Big PictureApigee | Google Cloud
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCloudIDSummit
 
Trends in Banking APIs
Trends in Banking APIsTrends in Banking APIs
Trends in Banking APIsTatsuo Kudo
 
Enterprise Single Sign On
Enterprise Single Sign On Enterprise Single Sign On
Enterprise Single Sign On WSO2
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...CA API Management
 
Launching a Successful and Secure API
Launching a Successful and Secure APILaunching a Successful and Secure API
Launching a Successful and Secure APINordic APIs
 
Integrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsIntegrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsNordic APIs
 

What's hot (20)

Stateless authentication for microservices - Greach 2015
Stateless authentication for microservices - Greach 2015Stateless authentication for microservices - Greach 2015
Stateless authentication for microservices - Greach 2015
 
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
OAuth 2.0 and Mobile Devices: Is that a token in your phone in your pocket or...
 
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security ProfileAPIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
APIdays Paris 2019 : Financial-grade API (FAPI) Security Profile
 
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...OpenID Connect: The new standard for connecting to your Customers, Partners, ...
OpenID Connect: The new standard for connecting to your Customers, Partners, ...
 
Stateless authentication for microservices - GR8Conf 2015
Stateless authentication for microservices - GR8Conf 2015Stateless authentication for microservices - GR8Conf 2015
Stateless authentication for microservices - GR8Conf 2015
 
Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?Why Assertion-based Access Token is preferred to Handle-based one?
Why Assertion-based Access Token is preferred to Handle-based one?
 
The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)The “I” in API is for Identity (Nordic APIS April 2014)
The “I” in API is for Identity (Nordic APIS April 2014)
 
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
OAuth 2.0 and the Internet of Things (IoT) (Jacob Ideskog)
 
Secure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID ConnectSecure your APIs using OAuth 2 and OpenID Connect
Secure your APIs using OAuth 2 and OpenID Connect
 
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
 
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
Authorization Architecture Patterns: How to Avoid Pitfalls in #OAuth / #OIDC ...
 
A How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API SecurityA How-to Guide to OAuth & API Security
A How-to Guide to OAuth & API Security
 
OAuth for your API - The Big Picture
OAuth for your API - The Big PictureOAuth for your API - The Big Picture
OAuth for your API - The Big Picture
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID ConnectCIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
CIS14: Consolidating Authorization for API and Web SSO using OpenID Connect
 
Trends in Banking APIs
Trends in Banking APIsTrends in Banking APIs
Trends in Banking APIs
 
Enterprise Single Sign On
Enterprise Single Sign On Enterprise Single Sign On
Enterprise Single Sign On
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
Launching a Successful and Secure API
Launching a Successful and Secure APILaunching a Successful and Secure API
Launching a Successful and Secure API
 
Integrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashupsIntegrated social solutions, the power and pitfalls of mashups
Integrated social solutions, the power and pitfalls of mashups
 

Viewers also liked

PSD2 a bankovní API: Top 5 mýtů, které dnes slyšíte
PSD2 a bankovní API: Top 5 mýtů, které dnes slyšítePSD2 a bankovní API: Top 5 mýtů, které dnes slyšíte
PSD2 a bankovní API: Top 5 mýtů, které dnes slyšítePetr Dvorak
 
Představení Zingly API Serveru a popis integrace
Představení Zingly API Serveru a popis integracePředstavení Zingly API Serveru a popis integrace
Představení Zingly API Serveru a popis integracePetr Dvorak
 
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014Miroslav Krejčík
 
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...Petr Dvorak
 
Sedm zabijáků inovaci ve velkých firmách
Sedm zabijáků inovaci ve velkých firmáchSedm zabijáků inovaci ve velkých firmách
Sedm zabijáků inovaci ve velkých firmáchZdeněk Macháček
 
Bankovní API ve světě
Bankovní API ve světěBankovní API ve světě
Bankovní API ve světěPetr Dvorak
 
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0Bezpečnost Zingly a detaily protokolu PowerAuth 2.0
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0Petr Dvorak
 
Jak vypadá ideální bankovní API?
Jak vypadá ideální bankovní API? Jak vypadá ideální bankovní API?
Jak vypadá ideální bankovní API? Petr Dvorak
 

Viewers also liked (8)

PSD2 a bankovní API: Top 5 mýtů, které dnes slyšíte
PSD2 a bankovní API: Top 5 mýtů, které dnes slyšítePSD2 a bankovní API: Top 5 mýtů, které dnes slyšíte
PSD2 a bankovní API: Top 5 mýtů, které dnes slyšíte
 
Představení Zingly API Serveru a popis integrace
Představení Zingly API Serveru a popis integracePředstavení Zingly API Serveru a popis integrace
Představení Zingly API Serveru a popis integrace
 
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014
140519 krejcik ceska_posta_seminar_semovna_kyberbezpecnost2014
 
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...
Zingly - Dopad multi-bankingu a otevřených bankovních API do obchodního fungo...
 
Sedm zabijáků inovaci ve velkých firmách
Sedm zabijáků inovaci ve velkých firmáchSedm zabijáků inovaci ve velkých firmách
Sedm zabijáků inovaci ve velkých firmách
 
Bankovní API ve světě
Bankovní API ve světěBankovní API ve světě
Bankovní API ve světě
 
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0Bezpečnost Zingly a detaily protokolu PowerAuth 2.0
Bezpečnost Zingly a detaily protokolu PowerAuth 2.0
 
Jak vypadá ideální bankovní API?
Jak vypadá ideální bankovní API? Jak vypadá ideální bankovní API?
Jak vypadá ideální bankovní API?
 

Similar to Co musí banka udělat pro zapojení do Zingly?

Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Codit
 
SaltStack's NetAPI at Photobucket - Denver SaltStack Meetup
SaltStack's NetAPI at Photobucket - Denver SaltStack MeetupSaltStack's NetAPI at Photobucket - Denver SaltStack Meetup
SaltStack's NetAPI at Photobucket - Denver SaltStack MeetupJon Henry
 
Crystal clear service interfaces w/ Swagger/OpenAPI
Crystal clear service interfaces w/ Swagger/OpenAPICrystal clear service interfaces w/ Swagger/OpenAPI
Crystal clear service interfaces w/ Swagger/OpenAPIScott Triglia
 
How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...CA Technologies
 
RefCard API Architecture Strategy
RefCard API Architecture StrategyRefCard API Architecture Strategy
RefCard API Architecture StrategyOCTO Technology
 
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...Edureka!
 
Entity Linking and REST Patterns in SOA
Entity Linking and REST Patterns in SOA Entity Linking and REST Patterns in SOA
Entity Linking and REST Patterns in SOA WSO2
 
WAC Network APIs @ OverTheAir 2011
WAC Network APIs @ OverTheAir 2011WAC Network APIs @ OverTheAir 2011
WAC Network APIs @ OverTheAir 2011Ricardo Varela
 
Mastering Microservices with Kong (DevoxxUK 2019)
Mastering Microservices with Kong (DevoxxUK 2019)Mastering Microservices with Kong (DevoxxUK 2019)
Mastering Microservices with Kong (DevoxxUK 2019)Maarten Mulders
 
Dev309 from asgard to zuul - netflix oss-final
Dev309  from asgard to zuul - netflix oss-finalDev309  from asgard to zuul - netflix oss-final
Dev309 from asgard to zuul - netflix oss-finalRuslan Meshenberg
 
Seattle StrongLoop Node.js Workshop
Seattle StrongLoop Node.js WorkshopSeattle StrongLoop Node.js Workshop
Seattle StrongLoop Node.js WorkshopJimmy Guerrero
 
Webscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumWebscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumPhilippe Bogaerts
 
使用 Spring boot 快速打造 hateoas 應用
使用 Spring boot 快速打造 hateoas 應用使用 Spring boot 快速打造 hateoas 應用
使用 Spring boot 快速打造 hateoas 應用Shin-Jan Wu
 
Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Adam Lewis
 
Jsp & Ajax
Jsp & AjaxJsp & Ajax
Jsp & AjaxAng Chen
 
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Hitachi, Ltd. OSS Solution Center.
 
Creating APIs with the WSO2 Platform
Creating APIs with the WSO2 PlatformCreating APIs with the WSO2 Platform
Creating APIs with the WSO2 PlatformSagara Gunathunga
 
Explore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsExplore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsCA Technologies
 
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg PROIDEA
 
REST - What's It All About? (SAP TechEd 2012, CD110)
REST - What's It All About? (SAP TechEd 2012, CD110)REST - What's It All About? (SAP TechEd 2012, CD110)
REST - What's It All About? (SAP TechEd 2012, CD110)Sascha Wenninger
 

Similar to Co musí banka udělat pro zapojení do Zingly? (20)

Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
 
SaltStack's NetAPI at Photobucket - Denver SaltStack Meetup
SaltStack's NetAPI at Photobucket - Denver SaltStack MeetupSaltStack's NetAPI at Photobucket - Denver SaltStack Meetup
SaltStack's NetAPI at Photobucket - Denver SaltStack Meetup
 
Crystal clear service interfaces w/ Swagger/OpenAPI
Crystal clear service interfaces w/ Swagger/OpenAPICrystal clear service interfaces w/ Swagger/OpenAPI
Crystal clear service interfaces w/ Swagger/OpenAPI
 
How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...How to Use the CA Application Performance Management Command Center for Appli...
How to Use the CA Application Performance Management Command Center for Appli...
 
RefCard API Architecture Strategy
RefCard API Architecture StrategyRefCard API Architecture Strategy
RefCard API Architecture Strategy
 
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...
Java Servlets Tutorial | Introduction to Servlets | Java Certification Traini...
 
Entity Linking and REST Patterns in SOA
Entity Linking and REST Patterns in SOA Entity Linking and REST Patterns in SOA
Entity Linking and REST Patterns in SOA
 
WAC Network APIs @ OverTheAir 2011
WAC Network APIs @ OverTheAir 2011WAC Network APIs @ OverTheAir 2011
WAC Network APIs @ OverTheAir 2011
 
Mastering Microservices with Kong (DevoxxUK 2019)
Mastering Microservices with Kong (DevoxxUK 2019)Mastering Microservices with Kong (DevoxxUK 2019)
Mastering Microservices with Kong (DevoxxUK 2019)
 
Dev309 from asgard to zuul - netflix oss-final
Dev309  from asgard to zuul - netflix oss-finalDev309  from asgard to zuul - netflix oss-final
Dev309 from asgard to zuul - netflix oss-final
 
Seattle StrongLoop Node.js Workshop
Seattle StrongLoop Node.js WorkshopSeattle StrongLoop Node.js Workshop
Seattle StrongLoop Node.js Workshop
 
Webscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumWebscarab demo @ OWASP Belgium
Webscarab demo @ OWASP Belgium
 
使用 Spring boot 快速打造 hateoas 應用
使用 Spring boot 快速打造 hateoas 應用使用 Spring boot 快速打造 hateoas 應用
使用 Spring boot 快速打造 hateoas 應用
 
Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0Securing APIs using OAuth 2.0
Securing APIs using OAuth 2.0
 
Jsp & Ajax
Jsp & AjaxJsp & Ajax
Jsp & Ajax
 
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
 
Creating APIs with the WSO2 Platform
Creating APIs with the WSO2 PlatformCreating APIs with the WSO2 Platform
Creating APIs with the WSO2 Platform
 
Explore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration TopicsExplore Advanced CA Release Automation Configuration Topics
Explore Advanced CA Release Automation Configuration Topics
 
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
PLNOG15: The Power of the Open Standards SDN API’s - Mikael Holmberg
 
REST - What's It All About? (SAP TechEd 2012, CD110)
REST - What's It All About? (SAP TechEd 2012, CD110)REST - What's It All About? (SAP TechEd 2012, CD110)
REST - What's It All About? (SAP TechEd 2012, CD110)
 

More from Petr Dvorak

Czech Banks are Under Attack, Clients Lose Money.
Czech Banks are Under Attack, Clients Lose Money.Czech Banks are Under Attack, Clients Lose Money.
Czech Banks are Under Attack, Clients Lose Money.Petr Dvorak
 
Innovations on Banking - Digital Banking Security in the Age of Open Banking
Innovations on Banking - Digital Banking Security in the Age of Open BankingInnovations on Banking - Digital Banking Security in the Age of Open Banking
Innovations on Banking - Digital Banking Security in the Age of Open BankingPetr Dvorak
 
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikací
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikacíSmart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikací
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikacíPetr Dvorak
 
Lime - Push notifications. The big way.
Lime - Push notifications. The big way.Lime - Push notifications. The big way.
Lime - Push notifications. The big way.Petr Dvorak
 
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?Petr Dvorak
 
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?Webinář: Co je to iBeacon a proč by vás to mělo zajímat?
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?Petr Dvorak
 
Chytré telefony v ČR - H1/2015
Chytré telefony v ČR -  H1/2015Chytré telefony v ČR -  H1/2015
Chytré telefony v ČR - H1/2015Petr Dvorak
 
What are "virtual beacons"?
What are "virtual beacons"?What are "virtual beacons"?
What are "virtual beacons"?Petr Dvorak
 
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatele
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatelemDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatele
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatelePetr Dvorak
 
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatele
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživateleiCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatele
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatelePetr Dvorak
 
Lime - Brand Guidelines
Lime - Brand GuidelinesLime - Brand Guidelines
Lime - Brand GuidelinesPetr Dvorak
 
Internet of Things as a Leading Trend for 2015 - Examples for Personal Use
Internet of Things as a Leading Trend for 2015 - Examples for Personal UseInternet of Things as a Leading Trend for 2015 - Examples for Personal Use
Internet of Things as a Leading Trend for 2015 - Examples for Personal UsePetr Dvorak
 
New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...Petr Dvorak
 
Internet věcí
Internet věcíInternet věcí
Internet věcíPetr Dvorak
 
mDevCamp 2014 - Bezpečnost v kontextu internetu věcí
mDevCamp 2014 - Bezpečnost v kontextu internetu věcímDevCamp 2014 - Bezpečnost v kontextu internetu věcí
mDevCamp 2014 - Bezpečnost v kontextu internetu věcíPetr Dvorak
 
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...Petr Dvorak
 
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcí
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcíNew Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcí
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcíPetr Dvorak
 
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.Petr Dvorak
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013Petr Dvorak
 
mDevCamp 2013 - Bezpečnost mobilního bankovnictví
mDevCamp 2013 - Bezpečnost mobilního bankovnictvímDevCamp 2013 - Bezpečnost mobilního bankovnictví
mDevCamp 2013 - Bezpečnost mobilního bankovnictvíPetr Dvorak
 

More from Petr Dvorak (20)

Czech Banks are Under Attack, Clients Lose Money.
Czech Banks are Under Attack, Clients Lose Money.Czech Banks are Under Attack, Clients Lose Money.
Czech Banks are Under Attack, Clients Lose Money.
 
Innovations on Banking - Digital Banking Security in the Age of Open Banking
Innovations on Banking - Digital Banking Security in the Age of Open BankingInnovations on Banking - Digital Banking Security in the Age of Open Banking
Innovations on Banking - Digital Banking Security in the Age of Open Banking
 
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikací
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikacíSmart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikací
Smart Cards and Devices Forum 2016 - Bezpečnost multi-banking mobilních aplikací
 
Lime - Push notifications. The big way.
Lime - Push notifications. The big way.Lime - Push notifications. The big way.
Lime - Push notifications. The big way.
 
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?
Fashiontech 2015 - iBeacon: Co to je a k čemu je to dobré?
 
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?Webinář: Co je to iBeacon a proč by vás to mělo zajímat?
Webinář: Co je to iBeacon a proč by vás to mělo zajímat?
 
Chytré telefony v ČR - H1/2015
Chytré telefony v ČR -  H1/2015Chytré telefony v ČR -  H1/2015
Chytré telefony v ČR - H1/2015
 
What are "virtual beacons"?
What are "virtual beacons"?What are "virtual beacons"?
What are "virtual beacons"?
 
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatele
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatelemDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatele
mDevCamp 2015 - iBeacon aneb jak ochytřit vaše aplikace o kontext uživatele
 
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatele
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživateleiCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatele
iCON DEV - iBeacon, aneb jak ochytřit vaše aplikace o kontext uživatele
 
Lime - Brand Guidelines
Lime - Brand GuidelinesLime - Brand Guidelines
Lime - Brand Guidelines
 
Internet of Things as a Leading Trend for 2015 - Examples for Personal Use
Internet of Things as a Leading Trend for 2015 - Examples for Personal UseInternet of Things as a Leading Trend for 2015 - Examples for Personal Use
Internet of Things as a Leading Trend for 2015 - Examples for Personal Use
 
New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...New Media Inspiration 2015 - Invisible technologies and context inside and ar...
New Media Inspiration 2015 - Invisible technologies and context inside and ar...
 
Internet věcí
Internet věcíInternet věcí
Internet věcí
 
mDevCamp 2014 - Bezpečnost v kontextu internetu věcí
mDevCamp 2014 - Bezpečnost v kontextu internetu věcímDevCamp 2014 - Bezpečnost v kontextu internetu věcí
mDevCamp 2014 - Bezpečnost v kontextu internetu věcí
 
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...
Keynote prezentace - mDevCamp 2014 - Internet věcí jako příležitost
 pro mobi...
 
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcí
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcíNew Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcí
New Media Inspiration 2014 - Bezpečnost v kontextu Internetu věcí
 
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.
AIR BOND - Jednoduše lepší bezpečnost mobilního bankovnictví pro normální lidi.
 
SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013SmartDevCon - Katowice - 2013
SmartDevCon - Katowice - 2013
 
mDevCamp 2013 - Bezpečnost mobilního bankovnictví
mDevCamp 2013 - Bezpečnost mobilního bankovnictvímDevCamp 2013 - Bezpečnost mobilního bankovnictví
mDevCamp 2013 - Bezpečnost mobilního bankovnictví
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Co musí banka udělat pro zapojení do Zingly?