Okta SCIM Integration
Learn how to set up SCIM with Okta
Verkada Command integrates with Okta using System for Cross-Domain Identity Management (SCIM) for automated user and group provisioning.
SCIM synchronizes users and groups from Okta directly into Command. This lets you:
Retain Okta as your central IdP.
Automatically update users and groups in Command as changes occur in Okta.
Assign and manage permissions in Command using your existing identity structure.
See Okta SAML Integration for the SAML integration steps.
Before you begin
You need an API token to connect to the Verkada SCIM endpoint. This token is unique per the Verkada organization. Learn how to acquire a SCIM API token.
For a successful integration, choose the best path for your region:
For US orgs, follow the steps in Create a Verkada Okta app.
For EU and AUS orgs, follow the steps in Enable SCIM provisioning in Okta app.
To confirm which region you’re located, refer to where your organization was created for Verkada.
Create a Verkada Okta app
Configure the Verkada app in Okta
Provision users and groups
Users added to the app push automatically; groups need to be pushed manually.
Add attributes to SCIM-managed users (optional)
Delete SCIM-managed users from Command
When a SCIM-managed user is deactivated in your identity provider, you can remove the user from Command in two ways:
Delete the user – The account moves to the Deleted Users page but keeps historical records, roles, and permissions.
Permanently remove the user – All roles, credentials, access logs, and associated data are erased. If the user is re-provisioned via SCIM, Command creates a new user record.
You must deactivate the user in your identity provider (IdP) before either deletion option is available in Command.
Add access credentials to SCIM-managed users (optional)
On the left navigation, select Directory > Profile Editor.
a. Select User (default) as the user type. b. Click Add Attribute and add the custom attributes from the table below.
Click Add Attribute to create the attributes listed above using the exact same Data Type, Display Name, Variable Name, Description, and ENUM values.
a. Set the External namespace value for all attributes to:
urn:ietf:params:scim:schemas:extension:verkada:access:2.0:Userb. Set Attritbute type to Personal*.* c. Click Save toadd the attribute.
Click Mappings to map the attributes from the Okta User application to your SCIM application.
a. Select Okta User to YourSCIMApp at the top and map the custom attributes created for the Okta Default User to the ones created on your SCIM application. b. Click Save Mappings and Apply updates now to apply the changes.

Attribute table
Refer to this list of credentials for the list of acceptable card formats.
Data Type
Display Name
External Name
External Namespace
Description
ENUM
string
Card Format
cardFormat
urn:ietf:params:scim:schemas:extension:verkada:access:2.0:User
Card format for access credential
Leave unchecked
string
Card Number
cardNumber
urn:ietf:params:scim:schemas:extension:verkada:access:2.0:User
Card number for access credential
Leave unchecked
string
Card Number Hex
cardNumberHex
urn:ietf:params:scim:schemas:extension:verkada:access:2.0:User
Hexadecimal representation of the card number
Leave unchecked
string
Credential Status
credentialStatus
urn:ietf:params:scim:schemas:extension:verkada:access:2.0:User
Status of the card credential
Checkbox: active → active, deactivated → deactivated, deleted → deleted
string
Facility Code
facilityCode
urn:ietf:params:scim:schemas:extension:verkada:access:2.0:User
Facility code associated with the card
Leave unchecked
string
External ID
externalId
urn:ietf:params:scim:schemas:extension:verkada:core:2.0:User
Customer-defined unique ID, not exposed in UI
Leave unchecked
string
Department ID
costCenter
urn:ietf:params:scim:schemas:extension:verkada:core:2.0:User
Identifier used to map user’s department in Command
Leave unchecked
string
Title
title
urn:ietf:params:scim:schemas:core:2.0:User
User’s title or role
Leave unchecked
string
Employee Number
employeeNumber
urn:ietf:params:scim:schemas:core:2.0:User
Employee ID
Leave unchecked
string
Phone Number
phoneNumbers[type eq "work"].value
urn:ietf:params:scim:schemas:core:2.0:User
Work phone number
Leave unchecked
string
Department
department
urn:ietf:params:scim:schemas:core:2.0:User
User’s department
Leave unchecked
string
Organization
organization
urn:ietf:params:scim:schemas:core:2.0:User
Company or organization
Leave unchecked
Add externalId to SCIM-managed users (optional)
You can sync a unique identifier of your choice to Command by mapping it to the externalId field. This allows for advanced use cases like disambiguating users across systems or syncing access credentials to a unique user reference. This value is not shown in the Command UI but is stored in the database and can be queried via API.
To add the externalId attribute and map it from Okta:
Map the Attribute
Still in Profile Editor, click Mappings
Choose Okta User to [Your SCIM App]
Find the source field you want to map (e.g., user.nickName, employeeNumber, or another custom field)
Map it to verkadaExternalId
Click the arrow between fields and select Apply mapping on user create and update
Click Save Mappings

Refer to this list of credentials for the list of acceptable card formats.
Known issues
Updating usernames (emails) does not automatically take effect in Command. If you need to change a username, unassign the user from the SAML app, then re-add the user to the app for the change to take effect.
If a new user cannot log in via SSO, it could be because the email domain is not being added to the SSO configuration in the Verkada backend. If the user’s email is outside of the email domains provided when SSO was set up, this causes the user to be unable to use SSO. If this is the cause of the problem, you need to edit the SSO configuration and add this domain to remedy the issue.
If you run into this error while provisioning users "Error while trying to push profile update for user: Bad Request. Errors reported by remote server: Invalid request", see this Okta article for troubleshooting steps.
If you experience any other problems with setting up SSO, contact Verkada Support.
Need more help? Contact Verkada Support.
Last updated
Was this helpful?




