2026-05-16·5 min read·sota.io Team

Ping Identity EU Alternative 2026: Thoma Bravo Delaware Corp, PingOne CLOUD Act Exposure & EU-Native IAM

Post #2 in the sota.io EU Identity Management Series

Ping Identity EU Alternative — CLOUD Act and GDPR risk analysis for IAM

Most EU enterprises treat their identity provider as a commodity — a checkbox, not a compliance surface. They are wrong. Your Identity and Access Management (IAM) platform is the single point through which every user authentication, every credential hash, every MFA secret, and every access decision flows. When a US federal agency issues a CLOUD Act warrant against your IAM vendor, the result is not a data breach of order history or analytics events — it is a complete cryptographic map of your entire workforce: who exists, how they prove identity, what roles they hold, and when they last accessed every resource in your estate.

Ping Identity is one of the world's most widely deployed enterprise IAM platforms, used by hundreds of large enterprises across banking, insurance, healthcare, and public sector in Europe. Since 2022, it has operated as a private equity-backed Delaware corporation under Thoma Bravo — and since 2023, it has been merged with ForgeRock into a unified Ping Identity product portfolio. For EU organisations operating under GDPR, NIS2, and DORA, that corporate structure creates a structural compliance problem with no contractual fix.

This guide analyses Ping Identity's CLOUD Act exposure, examines the GDPR risks under Art.28/46, reviews PingOne cloud's data residency controls and their limits, and presents every credible EU-native identity provider alternative.


1. What Is Ping Identity?

Ping Identity was founded in 2002 in Denver, Colorado, as one of the early pioneers of federated identity and SAML-based SSO. Over two decades it evolved from a pure federation gateway (PingFederate) into a full enterprise IAM suite:

Pricing model (PingOne cloud):

Market position: Ping Identity consistently appears in Gartner Magic Quadrant for Access Management (2023 Leader). Deployed by many of Europe's largest banks, insurance groups, and public sector bodies — often as the successor to legacy CA SiteMinder or RSA Access Manager deployments.


2. The Thoma Bravo Acquisition and Corporate Restructuring

Understanding Ping Identity's GDPR risk requires understanding its 2022–2023 corporate transformation:

Timeline

DateEventCompliance Implication
Aug 2022Thoma Bravo announces $2.8B acquisition of Ping Identity Holdings, Inc.Takes private — reduced disclosure obligations
Oct 2022Acquisition closes. Ping Identity delisted from NYSE.Delaware Corp now privately held PE portfolio company
Aug 2023Thoma Bravo merges Ping Identity with ForgeRock (another Thoma Bravo IAM portfolio company, acquired May 2023)Creates unified "Ping Identity" — combining PingFederate/PingOne with ForgeRock Platform
2023–2024Product integration — ForgeRock AM/IDM/DS absorbed into Ping portfolioPingOne Advanced Identity Cloud = ForgeRock Identity Cloud rebranded

Key facts:

What the PE Acquisition Means for GDPR

Private equity ownership of an IAM vendor introduces compliance risks beyond the standard US-CLOUD Act exposure:

  1. Reduced transparency — As a private company, Ping Identity no longer files quarterly 10-Q or annual 10-K reports with the SEC. DPA controllers cannot review financial statements to assess long-term viability or data security investment levels.

  2. Opaque sub-processor chains — Thoma Bravo manages ~40 portfolio companies under multiple Delaware holding structures. Data processing agreements may not accurately reflect the actual processing chain across portfolio company infrastructure sharing.

  3. Exit risk — PE funds typically hold assets 5–7 years before exit (IPO or trade sale). A future acquisition could change the data processor — triggering GDPR Art.28(2) notification obligations with short notice.

  4. Leverage / cost-cutting pressure — Thoma Bravo typically applies aggressive cost optimisation post-acquisition. Security and compliance teams are often reduced, increasing data breach risk during the holding period.


3. US CLOUD Act Exposure

Corporate Jurisdiction

EntityIncorporationLocationCLOUD Act
Ping Identity Holding, Inc.Delaware, USADenver, CO✅ Yes
Thoma Bravo, L.P.Delaware, USAChicago, IL✅ Yes (control entity)
Ping Identity Ireland LtdIreland (subsidiary)Dublin, IE✅ Yes (US parent control)
ForgeRock Inc. (merged)California (now DE)San Francisco, CA✅ Yes

The US CLOUD Act (Clarifying Lawful Overseas Use of Data Act, 18 U.S.C. § 2523, enacted March 2018) requires US-incorporated entities — regardless of where their data is physically stored — to comply with US law enforcement data requests for data under their control or possession. A validly issued CLOUD Act warrant or FBI National Security Letter (NSL) to Ping Identity Holding, Inc. would require production of data stored in Ping's EU data centres, with no notification to the EU data subject or controller, and no EU judicial authorisation.

Data Categories with Maximum CLOUD Act Sensitivity

PingOne cloud processes the following identity data categories for every active user:

Category                             Sensitivity  CLOUD Act Value
────────────────────────────────────────────────────────────────
User credentials (hashed passwords) CRITICAL     ★★★★★ — offline cracking risk
TOTP seeds / FIDO2 keys              CRITICAL     ★★★★★ — MFA bypass risk
Session tokens / OAuth tokens        CRITICAL     ★★★★★ — live access risk
User Principal Names / emails        HIGH         ★★★★★ — full user enumeration
Authentication logs (IP, UA, time)   HIGH         ★★★★☆ — geo-correlation
Group memberships / role bindings    HIGH         ★★★★★ — privilege mapping
Device fingerprints (PingID)         MEDIUM       ★★★★☆ — corporate device inventory
App registrations / client secrets   CRITICAL     ★★★★★ — service-to-service access
PingAuthorize policies               HIGH         ★★★★☆ — organisational access logic
ForgeRock AM policy sets             HIGH         ★★★★☆ — merged product data

A CLOUD Act warrant against Ping Identity would provide the requesting agency with a cryptographic reconstruction of your entire workforce: who exists, how they authenticate, which applications they access, and which sessions are currently active.

The PingOne EU Data Residency Limitation

Ping Identity offers EU data residency options for PingOne cloud — data is stored in AWS eu-west-1 (Ireland) or eu-central-1 (Frankfurt). However, data residency is not the same as data sovereignty:

  1. CLOUD Act supersedes physical location — As a Delaware corporation, Ping Identity must comply with CLOUD Act warrants regardless of where data is stored. An EU data centre does not create a legal barrier against US law enforcement access.

  2. AWS infrastructure dependency — PingOne cloud runs on Amazon Web Services. AWS Inc. is also a US corporation (Delaware). A CLOUD Act warrant could be directed at AWS (for infrastructure-level data) independently of Ping Identity.

  3. Support access — Ping Identity's US-based support and engineering teams retain administrative access to production systems for troubleshooting. This constitutes a "transfer" under GDPR Art.44 to a US entity.

  4. PingOne Advanced Identity Cloud (ForgeRock) — runs on Google Cloud Platform (GCP) europe-west regions. GCP is also Google LLC (Delaware) — CLOUD Act applies to Google as well.


4. GDPR Risk Analysis

Art.28 — Processor Requirements

Ping Identity provides Data Processing Agreements (DPA) for both PingOne cloud and PingFederate SaaS deployments. However, several Art.28 requirements create tensions:

Sub-processor disclosure: Ping Identity's sub-processor list (publicly available at pingidentity.com/en/legal/sub-processors.html) includes:

All primary sub-processors are US corporations subject to CLOUD Act jurisdiction.

Art.28(2) change notification: The Thoma Bravo / ForgeRock merger constituted a material change to the processing chain. Controllers using ForgeRock products were effectively notified through product rebranding — not through formal Art.28(2) sub-processor change notifications.

Art.46 — Transfer Mechanisms

Ping Identity relies on Standard Contractual Clauses (SCCs, 2021 EU Commission version) for transfers to the United States. Following Schrems II (CJEU C-311/18, 2020), SCCs alone are insufficient when US law allows compelled disclosure without judicial oversight.

The Data Privacy Framework (DPF, Jul 2023) provides a supplementary adequacy decision for US entities certified under DPF. Ping Identity is listed in the DPF registry. However:

  1. DPF does not remove CLOUD Act exposure — it addresses commercial privacy, not law enforcement compelled access.
  2. DPF faces legal challenge — Max Schrems / noyb has announced a third challenge ("Schrems III"). A successful challenge would again invalidate transfers to DPF-certified entities.
  3. NSL gag orders — National Security Letters can prohibit Ping Identity from informing you that your data has been accessed. Your DPA notification obligations under GDPR Art.33/34 cannot be fulfilled if your processor is gagged.

GDPR Risk Score

DimensionScore (0–5)Notes
Jurisdiction risk5/5Delaware Corp, CLOUD Act, no Treaty with EU
PE ownership opacity3/5Thoma Bravo, private company, exit risk
Data residency control3/5EU regions available but not CLOUD Act-proof
Sub-processor chain4/5All major sub-processors US corps
Transfer mechanism2/5SCCs + DPF (challengeable)
Incident notification2/5NSL gag orders possible

Total GDPR Risk: 19/25 — HIGH (🔴)


5. NIS2 and DORA Implications

NIS2 (Directive 2022/2555)

NIS2 applies to "essential entities" (energy, transport, banking, health, digital infrastructure) and "important entities" (postal, waste, food, manufacturing, digital providers). Identity providers qualify as digital infrastructure under NIS2 Annex I.

For NIS2-regulated organisations using PingOne cloud:

DORA (Regulation (EU) 2022/2554) — Financial Sector

DORA requires financial entities (banks, insurers, investment firms, payment institutions) to conduct ICT third-party risk assessments before engaging critical ICT service providers. Identity providers are typically classified as "critical" given their systemic access.

DORA-specific requirements for Ping Identity deployments:


6. PingFederate vs PingOne Cloud: The Compliance Trade-off

Ping Identity's product portfolio creates a genuine compliance fork:

PingFederate On-Premises: Lower CLOUD Act Risk

PingFederate can be deployed entirely within EU-controlled infrastructure:

Limitations:

PingOne Cloud: Full CLOUD Act Exposure

PingOne cloud is the modern IDaaS product — easier to deploy, maintain, and scale. But it is:

For EU organisations with serious GDPR/NIS2/DORA obligations, PingOne cloud creates a compliance position that cannot be resolved through contractual measures alone. PingFederate on-premises removes the data custody issue but introduces operational complexity.


7. EU-Native Alternatives to Ping Identity

The following alternatives are either EU-incorporated entities or open-source software deployable entirely within EU-controlled infrastructure:

7.1 Keycloak (Red Hat / IBM Open Source)

What it is: The leading open-source IAM platform, originally developed by Red Hat (Raleigh, NC) but now governed as a CNCF (Cloud Native Computing Foundation) project. Keycloak is MIT-licensed and can be self-hosted anywhere.

EU compliance position:

Technical capabilities:

PingFederate migration path: Keycloak supports PingFederate as an external identity provider via SAML/OIDC. Direct migration of PingFederate SP connections is possible using Keycloak's SP import tooling.

Managed options (EU):

Pricing: Keycloak itself is free. Managed Keycloak ranges from €200–€2,000/month depending on scale.


7.2 Zitadel (CAOS AG — Zurich, Switzerland)

What it is: A modern, cloud-native IAM platform built for developers. CAOS AG is a Swiss corporation (Zug canton) — outside EU but within EEA-adjacent jurisdiction (Switzerland has GDPR adequacy decision since 2000, Swiss nDSG 2023).

EU compliance position:

Technical capabilities:

Ping Identity migration path: PingOne cloud → Zitadel Cloud requires migrating user directory (SCIM 2.0 export/import), SSO application registrations (OIDC/SAML reconfiguration), and MFA enrolment. Zitadel's migration guides cover this path.

Pricing (Zitadel Cloud):


7.3 Authentik (Open Source — Germany Community)

What it is: A self-hosted identity provider with strong developer focus. Created by Jens Langhammer (Germany), maintained as open source. Authentik GmbH is incorporated in Germany.

EU compliance position:

Technical capabilities:

Use case fit: Particularly strong for organisations wanting to replace a legacy Ping Access (WAM) deployment with a self-hosted, EU-native solution. Authentik's proxy provider replicates the WAM pattern without US vendor dependency.

Pricing:


7.4 Gluu Server (Linux Foundation / Janssen Project)

What it is: Enterprise-grade open-source IAM, now developed as Janssen Project under the Linux Foundation. The Gluu Server itself is maintained by Gluu Inc. (Austin, TX — US), but the Janssen Project is foundation-governed and deployable independently.

EU compliance position:

Technical capabilities:

When to choose Gluu/Janssen: Financial institutions with DORA obligations and existing PingFederate FAPI 1.0 profiles. Janssen implements FAPI 2.0 (the current financial-grade API security standard) — making it a credible replacement for PingFederate in open banking contexts.


7.5 WALLIX Trustelem (France)

What it is: French SaaS IAM by WALLIX Group SA (Euronext Paris, FR0014000MR3). WALLIX is a publicly traded French cybersecurity company — EU-incorporated, EU-governed, no US parent.

EU compliance position:

Technical capabilities:

When to choose WALLIX Trustelem: Organisations in regulated French or EU sectors (public sector, defence, critical infrastructure) requiring ANSSI certification or combined SSO + PAM in a single EU-native vendor. The WALLIX Bastion PAM integration is a strong differentiator — Ping Identity required third-party PAM (BeyondTrust, CyberArk) for equivalent privileged access controls.


8. GDPR Risk Comparison Matrix

ProviderJurisdictionCLOUD ActData ResidencyGDPR Risk
Ping Identity (PingOne cloud)Delaware, USA✅ YesEU regions (AWS) — not CLOUD-Act-proof🔴 HIGH (19/25)
PingFederate on-premisesSoftware licence⚠️ LimitedYour infrastructure🟡 MEDIUM (8/25)
Keycloak (self-hosted EU)Open source / EU infra❌ None100% EU-controlled🟢 LOW (1/25)
Zitadel CloudSwiss SA❌ NoneCH (adequacy) / EU self-hosted🟢 LOW (3/25)
Authentik (self-hosted)German GmbH❌ None100% EU-controlled🟢 LOW (1/25)
Gluu/Janssen (self-hosted)Linux Foundation❌ None100% EU-controlled🟢 LOW (2/25)
WALLIX TrustelemFrench SA❌ NoneFrance (OVH)🟢 LOW (4/25)

Risk scores: 0–10 LOW, 11–17 MEDIUM, 18–25 HIGH. Score methodology: jurisdiction risk + data custody + sub-processor chain + transfer mechanism adequacy + incident notification constraints.


9. Migration Path from Ping Identity to EU-Native IAM

Assessment Phase (Weeks 1–4)

  1. Application inventory — enumerate all SAML/OIDC applications connected to PingFederate or PingOne. Export SP metadata XML from PingFederate's federation registry.
  2. User directory audit — document directory sources (AD, LDAP, SCIM upstream) and attribute mappings.
  3. MFA enrolment — document enrolled authenticators: PingID (TOTP/push), hardware tokens, FIDO2 keys. FIDO2 keys cannot be migrated — users must re-enrol.
  4. Authorisation policy review — PingAuthorize policies (ABAC rules, scope mappings) must be translated to target IAM policy language.
  5. PingIntelligence — if using AI-based anomaly detection, identify equivalent in target platform (Keycloak's risk-based authentication via SPI, or external SIEM integration).

Migration Execution

PingFederate → Keycloak

1. Import SAML SP connections
   $ keycloak-admin import-saml --sp-metadata ping-export.xml

2. Configure upstream LDAP/AD providers
   Keycloak admin console → User Federation → LDAP

3. Migrate application OIDC clients
   Export PingOne OAuth client list → convert to Keycloak client JSON

4. Configure MFA
   Keycloak → Authentication → Required Actions → OTP + WebAuthn

5. Dual-run period
   Run PingFederate + Keycloak in parallel (Keycloak as proxy SP)
   Migrate apps one-by-one, validate each SSO flow
   Decommission PingFederate after full migration (90–180 days)

Key Migration Risks


10. How sota.io Eliminates IAM Vendor Lock-in

Modern EU platform services — like sota.io — are built with deployment-agnostic identity integrations from day one:

The identity layer is the highest-risk point in your stack from a CLOUD Act perspective. Deploying it on an EU-native platform completes the sovereignty loop.


Conclusion

Ping Identity is a technically capable IAM platform with deep federation capabilities — but its 2022 Thoma Bravo acquisition, subsequent ForgeRock merger, and Delaware corporate structure create a GDPR/NIS2/DORA compliance position that contractual measures cannot resolve. PingOne cloud (hosted on AWS/GCP, under a US Delaware corporation) carries an inherent CLOUD Act exposure: any US law enforcement agency can compel production of your user credential store, session tokens, and access logs with no EU judicial oversight and no obligation to notify your organisation.

The compliance-grade alternatives are clear:

The identity layer carries the highest CLOUD Act risk in your SaaS stack. Migrating it to EU-native infrastructure is the highest-leverage GDPR Art.46 compliance action available to most EU enterprises today.


This analysis is current as of May 2026. Corporate structures, product lines, and legal frameworks change — verify all jurisdictional claims against primary sources before making procurement decisions.

EU-Native Hosting

Ready to move to EU-sovereign infrastructure?

sota.io is a German-hosted PaaS — no CLOUD Act exposure, no US jurisdiction, full GDPR compliance by design. Deploy your first app in minutes.