JumpCloud EU Alternative 2026: Colorado Corp, CLOUD Act Exposure & EU-Native Directory + MDM
Post #4 in the sota.io EU Identity Management Series
JumpCloud has positioned itself as the all-in-one cloud directory for the modern, device-diverse enterprise: a single platform that replaces Active Directory, provides SSO and MFA, manages macOS and Windows devices via MDM, authenticates network access via RADIUS, and provisions users across SaaS applications via SCIM. For IT teams that have outgrown their on-premises AD but cannot justify the per-seat cost of Microsoft Entra ID + Intune, JumpCloud has been a compelling proposition.
The problem is straightforward: JumpCloud Inc. is a private company incorporated in Delaware and headquartered in Louisville, Colorado. That corporate structure places every directory object, every device inventory record, every MDM configuration profile, every RADIUS credential, and every SSO token your European employees have ever created inside the CLOUD Act's jurisdictional reach. A US government subpoena, court order, or national security letter served on JumpCloud requires the company to produce that data — without notifying your European users, and without any EU judicial review.
For European organisations managing workforces under GDPR, processing employee identity data in a US-jurisdictioned cloud directory is not a minor compliance footnote. It is a structural risk to GDPR Art. 46 transfer mechanisms, a potential NIS2 Art. 21 supply chain security failure, and — for financial sector organisations — a DORA Art. 28 ICT third-party risk that regulators are increasingly flagging in supervisory reviews.
This guide provides a complete analysis of JumpCloud's CLOUD Act exposure, the 2023 Lazarus Group breach, GDPR risk dimensions, and every credible EU-native alternative for organisations that need cloud directory, device management, and identity services under European legal control.
1. What Is JumpCloud?
JumpCloud was founded in 2012 in Boulder, Colorado, by Rajat Bhargava, previously CEO of Brainware. Its founding thesis was that the enterprise directory — long controlled by Microsoft Active Directory — should move to the cloud and become device-agnostic. Twelve years later that vision has largely materialised into a product suite that covers the complete device-identity lifecycle:
Cloud Directory Platform — JumpCloud's core: an LDAP-compatible, cloud-hosted directory that stores user identities, group memberships, and attributes. Acts as the authoritative source of truth for user identity across the estate.
SSO and OIDC/SAML Broker — Pre-built app connectors for over 700 SaaS applications. Users authenticate once to JumpCloud and receive single sign-on access across their SaaS tools via SAML 2.0, OIDC, and OAuth 2.0.
Multi-Factor Authentication — TOTP, push notifications, WebAuthn/FIDO2, hardware security keys, and JumpCloud's proprietary Protect mobile app. Adaptive MFA with risk-based policies.
Device Management (MDM) — Zero-touch provisioning for macOS and Windows. Configuration profiles, software management, disk encryption enforcement, compliance policy enforcement, remote lock and wipe.
RADIUS-as-a-Service — Cloud-hosted RADIUS server for WiFi and VPN authentication. Eliminates the need for an on-premises RADIUS infrastructure.
SCIM Provisioning — Automated user lifecycle management (provisioning and deprovisioning) across SaaS applications. JIT provisioning via SAML.
Zero Trust Network Access — Conditional access policies based on device compliance, user risk score, and location.
JumpCloud serves primarily the 50–5,000 employee SME and mid-market segment: companies large enough to need enterprise identity management but not large enough to justify Microsoft's full E5 licensing stack.
2. Corporate Structure and CLOUD Act Jurisdiction
2.1 JumpCloud Inc. — A US Private Company
JumpCloud Inc. is incorporated in Delaware and operates from its headquarters in Louisville, Colorado. It is a venture-backed private company that has raised over $400 million from investors including General Atlantic, BlackRock, H.I.G. Capital, and Vista Credit Partners. As of 2026 JumpCloud has not been acquired by a private equity firm and remains operationally independent — unlike OneLogin (Francisco Partners), Ping Identity (Thoma Bravo), or Duo Security (Cisco).
That independence, however, does not change the jurisdictional reality. JumpCloud is a US company, its infrastructure runs primarily in US cloud regions (AWS us-east-1, us-west-2), and it is subject to US law in the same way as any Delaware corporation.
2.2 CLOUD Act Mechanics
The Clarifying Lawful Overseas Use of Data (CLOUD) Act (18 U.S.C. § 2713) requires US-incorporated companies to produce stored communications and data upon lawful US government order — regardless of where the data is physically stored. AWS eu-west-1 data centres in Dublin or Frankfurt are not a CLOUD Act shield if the company controlling the data is a US entity.
For a cloud directory platform like JumpCloud, CLOUD Act exposure covers every data category the platform processes for EU customers:
- User directory objects — names, email addresses, employee IDs, department attributes, manager relationships, custom attributes
- Credential material — hashed passwords (bcrypt with salt), password change history
- MFA secrets — TOTP seeds, WebAuthn credential IDs, hardware key registrations
- Device inventory — serial numbers, hardware UUIDs, installed applications, OS versions, hardware specifications
- MDM configuration — enrolled profiles, policy assignments, compliance states, remote wipe history
- RADIUS credentials — per-user network authentication secrets
- SSO session data — authentication events, application access logs, session tokens
- Zero Trust telemetry — device compliance signals, location data (if enabled), risk scores
The combination of directory credentials and device inventory is particularly sensitive from a CLOUD Act perspective: it gives a requesting authority not just the ability to impersonate a user (credentials) but also to identify, locate, and enumerate every device in the organisation (MDM inventory). For organisations that include security-sensitive employees — executives, IT administrators, legal counsel, R&D staff — this exposure is material.
2.3 Data Residency: JumpCloud's Approach
JumpCloud offers EU data residency as an option for customers on higher pricing tiers. This means user data is processed and stored in AWS eu-west-1 (Ireland) or eu-central-1 (Frankfurt). However, data residency does not eliminate CLOUD Act exposure. The legal obligation runs to JumpCloud Inc. the corporate entity, not to the data centre location. A CLOUD Act order served on JumpCloud's US parent requires production of EU-residency data.
JumpCloud's Data Processing Agreement includes Standard Contractual Clauses (SCCs) per GDPR Art. 46(2)(c). As the CJEU's Schrems II judgment (C-311/18) and subsequent EDPB guidance make clear, SCCs cannot override US government access obligations. The SCCs are legally valid transfer mechanisms but do not protect against lawful CLOUD Act compulsion.
3. The 2023 Lazarus Group Breach
In July 2023 JumpCloud disclosed a sophisticated security incident that materially differs from the typical credential-stuffing or phishing attack affecting SaaS vendors. The incident warrants detailed analysis for any CISO evaluating JumpCloud as an identity provider.
3.1 Timeline of Events
Late June 2023 — JumpCloud's security team detected anomalous activity in its internal orchestration system. The attacker had gained access to a component used to push device commands and configuration updates to enrolled JumpCloud agents.
1 July 2023 — JumpCloud rotated all existing API keys for all customers as a precautionary measure. This was a major operational disruption: any automated system using a JumpCloud API key ceased to function until keys were regenerated and updated.
12 July 2023 — JumpCloud published its first detailed disclosure. The company attributed the attack to a "sophisticated nation-state sponsored threat actor" that used a spear-phishing campaign to gain initial access to JumpCloud's internal systems.
19 July 2023 — Cybersecurity firms CrowdStrike and Mandiant independently attributed the attack to Lazarus Group (also known as APT38), a North Korean state-sponsored threat actor. Lazarus Group's characteristic operational pattern — targeting cryptocurrency companies and their technology supply chains — was evident in the JumpCloud incident: the attacker used JumpCloud's admin access to reach specific JumpCloud customers operating in the cryptocurrency sector.
3.2 Significance for EU Customers
The JumpCloud breach is not simply a vendor security incident. It is a supply chain attack: an adversary compromised a trusted identity provider's internal systems and used that position to reach downstream customers through the identity provider's legitimate administrative channels.
This attack pattern — adversary positions inside identity infrastructure to reach target organisations — is precisely the threat model that NIS2 Directive Art. 21 (security of network and information systems in supply chains) and DORA Art. 28 (ICT third-party risk) are designed to address. The incident demonstrates that the confidentiality risk of a US-jurisdictioned identity provider is not merely theoretical CLOUD Act compulsion: it also includes the provider's own attack surface becoming a vector into customer environments.
For EU organisations, the 2023 incident creates an additional GDPR obligation. Under GDPR Art. 33, a personal data breach at a data processor requires notification to the relevant supervisory authority within 72 hours. JumpCloud, as a US entity, is the data processor for EU-resident user directory data. Its security incident — particularly the nation-state access to the orchestration system that manages device commands — constitutes a potential personal data breach affecting European data subjects. Documenting this incident in your GDPR Art. 30 Records of Processing Activities (RoPA) and your DPIA for JumpCloud is now mandatory.
4. GDPR Risk Score
| Dimension | Score | Rationale |
|---|---|---|
| Jurisdiction | 8/10 | US entity (Delaware/Colorado), no EU parent |
| Data sensitivity | 4/5 | Directory credentials + MDM device data = highest sensitivity tier |
| Historical breach | 3/5 | 2023 Lazarus Group nation-state attack via supply chain |
| EU data residency | 2/5 | Available but does not eliminate CLOUD Act |
| Regulatory alignment | 2/5 | SCCs in DPA but NIS2/DORA supply chain risk unresolved |
Total GDPR Risk Score: 19/25 (HIGH)
This score reflects the compounding effect of US jurisdiction, the sensitivity of combined credential-and-device data, and the 2023 supply chain breach. For organisations subject to NIS2 (critical infrastructure, digital service providers, essential service operators) or DORA (financial entities and ICT third-party providers), JumpCloud's combined risk profile warrants a formal ICT third-party risk assessment under Art. 28 DORA and a GDPR DPIA.
5. EU-Native Alternatives
JumpCloud's product covers three distinct capability areas: cloud directory (LDAP/identity store), SSO and IAM, and device management (MDM). EU-native alternatives exist for each area, and an integration of multiple EU-native components can replicate or exceed JumpCloud's capabilities with full European legal control.
5.1 Univention Corporate Server (UCS) — German, Enterprise-Grade Directory
Univention GmbH is a German software company founded in 2002 and headquartered in Bremen, Germany. Univention Corporate Server is an enterprise Linux distribution built specifically as an open-source, fully EU-controllable alternative to Microsoft Active Directory and cloud directory services.
What UCS provides:
- Full LDAP directory with a graphical management console (Univention Management Console)
- Kerberos for native Windows domain authentication
- Built-in Samba 4 for Active Directory compatibility — Windows workstations join UCS domains as they would join an AD domain
- RADIUS server integration for WiFi and VPN authentication
- Single Sign-On via SAML, OpenID Connect, and Kerberos
- App Centre with pre-packaged integrations: Nextcloud, Rocket.Chat, Kopano (email), OX App Suite, Seafile, and dozens more
- Extended Management for Microsoft 365 — UCS can serve as the authoritative directory for hybrid M365 deployments
Deployment: Self-hosted on-premises or in a European cloud provider. Univention offers managed hosting on partner infrastructure in Germany and other EU countries.
Pricing: UCS Core Edition is free and open source. Univention offers commercial subscriptions (UCS for schools, UCS Enterprise) with support SLAs.
GDPR score: 5/25 — German company, self-hosted, zero US jurisdiction exposure.
Best for: Organisations migrating from on-premises Active Directory that need a full domain controller replacement with native Windows client compatibility. Particularly strong in German-speaking markets and public sector (numerous German Länder use UCS as their directory backbone).
Limitation: Less suited to cloud-native environments without existing on-premises infrastructure. MDM is not native to UCS (requires integration with baramundi or another EU MDM solution — see 5.5).
5.2 FreeIPA — Open Source, Community Supported
FreeIPA (Free Identity, Policy, and Audit) is an open-source identity management solution developed by Red Hat (IBM subsidiary) and the broader Linux community. It combines LDAP (389 Directory Server), Kerberos, DNS, and certificate management (Dogtag PKI) into an integrated identity infrastructure.
What FreeIPA provides:
- LDAP directory with Kerberos-based authentication
- PKI and certificate lifecycle management for users, hosts, and services
- DNS integration with automatic SRV record management
- Centralised sudo, HBAC (host-based access control), and SELinux policy management
- FreeIPA Trust — bidirectional cross-realm trust with Active Directory for mixed environments
- Web UI and CLI for administration
Deployment: Self-hosted on Red Hat Enterprise Linux, CentOS Stream, Fedora, or Ubuntu. Can be deployed in any European cloud provider or on-premises.
GDPR score: 2/25 — Fully self-hosted. No US SaaS dependency. Complete EU control.
Best for: Organisations with strong Linux infrastructure teams that want the maximum control over their identity infrastructure. Popular in research institutions, universities, and highly regulated environments.
Limitation: No native MDM. No commercial cloud offering. Requires dedicated Linux administration capability. Not suitable for Windows-heavy environments without additional Samba/AD integration.
5.3 Keycloak — SSO and IAM Layer
Keycloak is an open-source Identity and Access Management solution developed by Red Hat. It provides SSO, OIDC, SAML, OAuth 2.0, and identity brokering, but unlike JumpCloud or UCS it is not a full directory — it is an IAM and authentication layer that typically sits in front of an existing directory (LDAP, AD, FreeIPA).
What Keycloak provides:
- SSO across web applications and services
- OIDC and SAML 2.0 provider
- Social login, identity brokering, and federated identity
- User self-registration and account management
- Fine-grained authorization (UMA 2.0)
- Admin console and REST API
GDPR score: 3/25 — Self-hosted. Zero US SaaS dependency.
Best for: Replacing JumpCloud's SSO functionality specifically, when the directory is already managed by FreeIPA, UCS, or an on-premises LDAP. Many organisations use Keycloak + FreeIPA as a complete, EU-native alternative to JumpCloud's directory + SSO combination.
Limitation: Not a cloud directory itself. Requires a separate LDAP/directory backend. No MDM.
5.4 Zitadel — Swiss, Cloud-Native IAM
CAOS AG is a Swiss company founded in 2019, headquartered in Lucerne, Switzerland. Its product Zitadel is a cloud-native identity platform built API-first with a focus on FIDO2 passwordless authentication and modern developer experience.
What Zitadel provides:
- Multi-tenant cloud directory with organisation hierarchy
- OIDC, OAuth 2.0, and SAML 2.0
- FIDO2/WebAuthn passwordless natively (not an afterthought)
- Machine-to-machine authentication (service accounts, API keys, JWT grants)
- Audit log with full event sourcing
- Self-hosted (open source) or Zitadel Cloud (EU-hosted)
GDPR score: 6/25 — Swiss company (Swiss data protection law, adequacy decision since 2000). EU cloud hosting available. Zitadel Cloud is hosted on Google Cloud Platform EU regions — minor point.
Best for: Cloud-native organisations building new identity infrastructure or migrating from Auth0/Okta/JumpCloud SSO. Strong developer API. Excellent passwordless story.
Limitation: No MDM. Swiss (not EU), but Switzerland has a long-standing adequacy decision. Less mature enterprise support than Keycloak or UCS.
5.5 baramundi MDM — German Enterprise Device Management
For the device management (MDM) component of JumpCloud, the strongest EU-native replacement is baramundi software GmbH, headquartered in Augsburg, Bavaria, Germany.
What baramundi provides:
- Unified Endpoint Management (UEM) for Windows, macOS, Linux, iOS, Android
- Software deployment, patch management, and OS deployment
- Compliance policies, hardware and software inventory
- Remote control and device management
- Integration with Active Directory, FreeIPA, and Keycloak/SAML for authentication
GDPR score: 4/25 — German GmbH. Data processing in Germany. No US jurisdiction.
Best for: German-speaking market enterprises. baramundi is used by public sector, manufacturing, and financial services organisations across Germany, Austria, and Switzerland that require device management under full EU legal control.
Limitation: Less well-known internationally than Jamf or Microsoft Intune. German-language primary support.
5.6 Miradore — Finnish MDM for SME
Miradore Ltd is a Finnish company (now wholly owned by GoTo Group, which is a LogMeIn brand — note: LogMeIn is US/Francisco Partners owned). ⚠️ Miradore's EU-friendliness was higher before the GoTo acquisition. Post-acquisition, verify current ownership and CLOUD Act exposure before selecting.
Update 2026: Miradore is now part of GoTo Group (Francisco Partners PE, US). This changes the GDPR risk profile. Not recommended for EU-sovereignty-focused deployments.
5.7 EU Identity + Device Management Stack Recommendation
For a complete JumpCloud replacement under EU legal control:
| JumpCloud Capability | EU-Native Replacement | Vendor | Jurisdiction |
|---|---|---|---|
| Cloud Directory (LDAP) | Univention Corporate Server | Univention GmbH | Germany |
| SSO and SAML/OIDC | Keycloak | Red Hat / Community | Self-hosted |
| MFA | Keycloak (TOTP, FIDO2) | Community | Self-hosted |
| MDM (macOS, Windows) | baramundi UEM | baramundi GmbH | Germany |
| RADIUS | FreeRADIUS | Community | Self-hosted |
| SCIM Provisioning | Keycloak SCIM extension | Community | Self-hosted |
This stack creates no dependency on any US-jurisdictioned SaaS vendor. All components can run on European cloud infrastructure (Hetzner, OVHcloud, Deutsche Telekom Cloud, IONOS) or on-premises.
6. GDPR Art. 28 Obligations for Existing JumpCloud Customers
If your organisation currently uses JumpCloud for EU workforce identity management, the following GDPR compliance obligations apply:
6.1 Data Processing Agreement
Verify that you have a current GDPR Art. 28 Data Processing Agreement with JumpCloud. JumpCloud provides a DPA through its customer portal. This DPA must include:
- The categories of personal data processed (user attributes, credentials, device data)
- Processing purposes and legal basis
- Sub-processor list (JumpCloud uses AWS for infrastructure)
- Standard Contractual Clauses for US transfers
- Breach notification obligations (72-hour notification to you; then you notify your supervisory authority)
6.2 Transfer Impact Assessment
Following Schrems II, Standard Contractual Clauses alone are not sufficient when the importer is subject to conflicting laws (CLOUD Act). You must complete a Transfer Impact Assessment (TIA) that:
- Documents the CLOUD Act risk to the transferred data categories
- Assesses whether SCCs provide effective protection given US law
- Implements supplementary measures (encryption with EU-controlled keys, pseudonymisation)
- Concludes whether the transfer can lawfully continue or must be suspended
For credential and device inventory data processed by a US cloud directory, a TIA is unlikely to reach a "transfer can continue" conclusion without significant supplementary technical measures.
6.3 Records of Processing Activities (RoPA)
Your GDPR Art. 30 RoPA entry for JumpCloud must now document:
- The 2023 Lazarus Group breach as a historical security incident at the processor
- The CLOUD Act exposure for all transferred data categories
- The result of your Transfer Impact Assessment
- Any data residency configuration (EU region) and the reason it does not eliminate CLOUD Act risk
6.4 Data Protection Impact Assessment
Processing employee identity data (including credentials and device records) via a US cloud provider requires a GDPR Art. 35 DPIA given:
- The systematic monitoring dimension (all SSO events logged)
- The scale of processing (all employees)
- The special-context processing (security clearance, executive access patterns visible)
- The cross-border transfer to a CLOUD Act-subject entity
7. NIS2 and DORA Implications
7.1 NIS2 Directive Art. 21 — Supply Chain Security
Under the NIS2 Directive (2022/2555/EU), essential and important entities must implement appropriate security measures for their supply chain, including identity and access management providers.
JumpCloud qualifies as a supply chain dependency for any organisation using it for workforce authentication. The 2023 Lazarus Group breach — where the identity provider itself was compromised and used as a pivot point to reach customers — is precisely the supply chain attack scenario NIS2 Art. 21(2)(d) addresses.
NIS2 entities that have not yet assessed the JumpCloud supply chain dependency should add it to their ICT third-party risk register. If JumpCloud is identified as a "critical" or "important" supplier (as it likely is for workforce authentication), a formal security review and contingency plan is required.
7.2 DORA Art. 28 — ICT Third-Party Risk Management
Under the Digital Operational Resilience Act (DORA, effective 17 January 2025), financial entities — banks, investment firms, insurance companies, payment institutions, crypto-asset service providers, and their ICT service providers — must maintain a Register of Information (RoI) of all ICT third-party service providers.
JumpCloud, as a cloud directory and IAM provider, is an ICT service provider under DORA. Financial entities using JumpCloud must:
- Register JumpCloud in their RoI with the correct risk classification
- Conduct annual due diligence of JumpCloud's security posture (including the 2023 breach response)
- Assess concentration risk (is JumpCloud the only identity provider for critical functions?)
- Document exit plans and substitutability (can they migrate to an EU alternative within the DORA-required timeframes?)
The 2023 Lazarus Group breach is a material security event that DORA-regulated entities must have documented in their ICT third-party risk management framework. If your financial entity used JumpCloud in 2023 and did not document this incident in your ICT risk register, that is a regulatory gap.
8. Migration Strategy: JumpCloud to EU-Native Stack
Phase 1: Audit and Inventory (2-4 weeks)
- Export JumpCloud user directory — CSV export of all user objects, group memberships, and attributes from the JumpCloud admin console
- Map application integrations — list all SAML/OIDC-integrated applications and their JumpCloud app configurations
- Inventory enrolled devices — export MDM device inventory (serial numbers, assigned users, installed profiles)
- Document RADIUS dependencies — identify all WiFi SSIDs and VPN configurations using JumpCloud RADIUS
- SCIM integration audit — list all applications using JumpCloud SCIM for provisioning
Phase 2: EU-Native Stack Deployment (4-8 weeks)
- Deploy Univention Corporate Server — install UCS on EU-hosted infrastructure; configure LDAP schema to match JumpCloud user attributes
- Migrate user accounts — LDIF export from JumpCloud, import to UCS LDAP; trigger password resets (hashed passwords cannot be migrated cross-platform)
- Deploy Keycloak — connect Keycloak to UCS LDAP as identity provider; reconfigure SAML and OIDC integrations to point to Keycloak
- Test SSO for each application — verify SAML/OIDC flows for every integrated application before cutover
- Deploy baramundi UEM — install baramundi management server; configure MDM profiles for macOS and Windows devices
Phase 3: Device Migration (4-6 weeks, overlapping)
MDM migration is the most operationally intensive step:
- macOS devices — unenroll from JumpCloud MDM, enroll in baramundi via MDM profile; user impact is minimal if enrollment profiles are pre-staged
- Windows devices — migrate from JumpCloud agent to UCS domain join + baramundi agent
- RADIUS migration — update WiFi and VPN configurations to authenticate against FreeRADIUS backed by UCS LDAP
Phase 4: Cutover and Cleanup (1-2 weeks)
- DNS cutover (SSO redirect URLs, SCIM endpoints)
- JumpCloud agent removal from all endpoints
- JumpCloud account termination and data deletion request (GDPR Art. 17)
- Update GDPR RoPA and TIA to reflect completed migration
9. Total Cost of Ownership Comparison
| Component | JumpCloud Business (per user/mo) | EU-Native Alternative | Estimated Cost |
|---|---|---|---|
| Cloud Directory | Included | Univention UCS Community | Free (self-hosted) |
| SSO | Included | Keycloak | Free (self-hosted) |
| MDM (macOS/Win) | Included | baramundi UEM | ~€4-8/device/mo |
| RADIUS | Included | FreeRADIUS | Free (self-hosted) |
| Support | Included | Univention Enterprise | ~€3-6/user/mo |
| Infrastructure | Included | EU Cloud VMs | ~€100-400/mo fixed |
JumpCloud Business pricing is approximately $11/user/month. For a 200-employee organisation that is ~$2,200/month. The EU-native stack's per-user cost is lower at scale, with a higher fixed infrastructure cost. At 200 users: ~€800-1,200/month total for the EU stack (Univention subscription + baramundi + EU cloud infrastructure).
At larger scale (500+ users) the EU-native stack is typically 20-40% cheaper than JumpCloud, with the additional benefit of data sovereignty and regulatory compliance.
10. Summary: JumpCloud CLOUD Act Risk and EU Alternatives
JumpCloud is a well-engineered cloud directory platform with a strong product-market fit for mid-market IT teams. Its CLOUD Act risk is structural and not addressable through contractual mechanisms. The 2023 Lazarus Group breach adds a demonstrated supply chain attack surface to that structural risk. For European organisations managing workforce identity under GDPR, NIS2, or DORA, a JumpCloud dependency requires either a comprehensive compliance remediation program or a migration to an EU-native directory and device management stack.
The EU-native alternative stack — Univention Corporate Server + Keycloak + baramundi + FreeRADIUS — provides equivalent or superior capabilities with full European legal control, self-hosting options, and at lower per-user cost at scale.
GDPR Risk Score: 19/25 (HIGH) — US jurisdiction + 2023 supply chain breach + combined credential-and-device data sensitivity
Recommended EU Alternative: Univention Corporate Server (directory) + Keycloak (SSO) + baramundi (MDM)
For information on EU-native hosting platforms that support secure, GDPR-compliant deployment of identity infrastructure, see sota.io.
EU-Native Hosting
Ready to move to EU-sovereign infrastructure?
sota.io is a German-hosted PaaS — no CLOUD Act exposure, no US jurisdiction, full GDPR compliance by design. Deploy your first app in minutes.