IDENTITY & ACCESS MANAGEMENT
I help you go from security review to compliant — with SSO and SCIM in your .NET SaaS. Without vendor lock-in. Without per-connection fees. Without your team having to become identity experts.
I'm Chaïm. I make sure your team owns it when I'm done.
Got a security questionnaire on your desk? I'll tell you exactly what you need.
Recognize this?
Send your security questionnaire
I'm Chaïm Zonnenberg. 20+ years in .NET, 2x cum laude university degree, Microsoft Certified Identity & Access Associate, 4 SSO implementations at organisations like ABN AMRO. I also build my own SaaS products with 135+ paying customers. I work 2 days a week with your team, deliver fast, and transfer everything.
More about meI work with .NET SaaS companies that are ready to serve enterprise customers. That means this is probably not a fit if:
I review your current authentication stack, database model, and target customers' identity providers. You get a concrete plan: what needs to change, what stays, and how long it takes.
I build SSO (OpenID Connect) and SCIM endpoints in your .NET application. I integrate with your existing user model. Your team reviews every PR. No black box.
I help you onboard your first enterprise customer. We test the SSO flow with their Azure Entra ID or Auth0 tenant, verify SCIM provisioning, and make sure their security team signs off.
I transfer knowledge to your team so they independently manage the identity integration, onboard new customers, and troubleshoot issues.
20+ years at ABN AMRO, PGGM, Van Lanschot & more · 2x cum laude university · Microsoft Certified Identity & Access
IdentityServer4 is no longer maintained. I compare Duende IdentityServer, OpenIddict, and Azure Entra ID, with practical migration advice.
Read articleWhat SCIM is, why you need it, and how to build SCIM endpoints in .NET. No more manually creating accounts for 500 employees.
Read articleWorkOS charges $125/connection/month. Keycloak is a separate Java stack. I compare the options with building custom in .NET: cost, control, data sovereignty and vendor lock-in.
Read articleSend me your security questionnaire or describe your situation. Within a day, you know what's needed and how long it takes.
Chaïm Zonnenberg | .NET Developer & Identity Specialist | Available 2 days per week