JumpCloud
Learn how to set up SAML with JumpCloud
Verkada supports Security Assertion Markup Language (SAML) authentication using JumpCloud as your Identity Provider (IdP).
OIDC SSO
—
SAML SSO
Yes
SCIM Provisioning
—
ECE Support
—
Before you begin
To integrate SAML, you must first generate a client ID.
Step 1: Set up SSO in Command
In Verkada Command, go to All Products > Admin > Privacy & Security > Authentication & User Management.
Click Add New to set up single sign-on (SSO).
Step 2: Create your Verkada app
Navigate to your JumpCloud dashboard and click SSO to view your SSO applications.
Click the plus (+) icon to create a new application.

Click Custom SAML App.

Name your application, add a description, and (optionally) change the icon.
At the top menu, select SSO and click activate.

Configure the IdP Entity ID, SP Entity ID, and ACS URL:
IdP Entity ID:
US orgs:
https://vauth.command.verkada.com/saml/ssoEU orgs:
https://saml.prod2.verkada.com/saml/ssoAUS orgs:
https://saml.prod-ap-syd.verkada.com/saml/sso
SP Entity ID:
US orgs:
https://vauth.command.verkada.com/saml/ssoEU orgs:
https://saml.prod2.verkada.com/saml/ssoAUS orgs:
https://saml.prod-ap-syd.verkada.com/saml/sso
Sign on URL:
US orgs:
https://vauth.command.verkada.com/saml/loginEU orgs:
https://saml.prod2.verkada.com/saml/loginAUS orgs:
https://saml.prod-ap-syd.verkada.com/saml/login
Click activate.
Set SAML Subject NameID Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress.
Check the Sign Assertion box.
Set the Login URL (replace <client-ID> with your client ID):
US orgs:
https://vauth.command.verkada.com/saml/login/<client-ID>EU orgs:
https://saml.prod2.verkada.com/saml/login/<client-ID>AUS orgs:
https://saml.prod-ap-syd.verkada.com/saml/sso/<client-ID>
Check the Declare Redirect Endpoint box and click activate.

Step 3: Configure SAML attributes
Scroll down and click add attribute THREE times to open 3 attribute fields.
Enter the information exactly as shown (case-sensitive):
email→ EmailfirstName→ First NamelastName→ Last Name
Select User Groups and confirm the groups you want to enable SSO access for.

Click activate to enable group access to your Verkada application.
Click activate > confirm to complete your new SSO connector.

Step 4: Export XML metadata
Once activated, go back to the application to download your XML metadata file.

Select SSO and click Export Metadata.

Save the exported file with a relevant name.

Step 5: Upload XML metadata
Go to Command and upload your IdP XML metadata file.
Click Add Domain to add the Fully Qualified Domain Name (FQDN) that your users log in with.
Type the domain name and press Enter.

Run the login test. A successful test redirects to your IdP and then back to Command.
(Optional) Enable Require SSO to force users to use SSO instead of Command login.
Log in using SSO
Make sure your users are already provisioned in Command (via SCIM or manually) before using SSO.
Users can access:
JumpCloud User Console (IdP-initiated flow)
Single sign-on via Command (SP-initiated flow)
Last updated
Was this helpful?

