Authentication Overview
View options for user authentication and provisioning
Secure your Verkada Command organization with multiple authentication options. Choose the method that best fits your security requirements.
Choose your authentication method
Authentication methods
By default, users use their email and password to log in. To enhance security, several additional login options are available.
OpenID Connect (OIDC)
OIDC is an authentication protocol built on OAuth 2.0 that enables secure user identity verification. It allows applications to authenticate users through a trusted identity provider (IdP) without storing credentials. OIDC enhances security by providing standardized identity tokens, enabling single sign-on (SSO) and seamless platform integration.
SAML/OAuth
SAML allows you to log in using a third-party authenticating service, such as Okta, Microsoft Entra ID, Google Workspace, or OneLogin. This method provides a single point of management for authentication across multiple applications.
Verkada Command is compatible with any SAML 2.0 provider. Learn more about setting up identity providers.
2-Factor Authentication
2-Factor Authentication (2FA) requires you to retrieve a code via SMS or through an authenticator app to log in. See Two-Factor Authentication for detailed setup instructions.
Provisioning
SCIM
If you have a large number of users, you may opt to use System for Cross-Domain Identity Management (SCIM) to automatically provision and manage users. This is particularly advantageous if your company uses Microsoft Entra ID or Okta as your Identity Provider.
SCIM allows you to sync users and groups between Verkada Command and your IdP, where you can easily add, remove, or modify multiple users and groups simultaneously.
See the Identity Providers section for detailed SCIM setup instructions.
Last updated
Was this helpful?

