OIDC Based SSO for Azure Entra
Verkada Command supports Single Sign-On (SSO) through OpenID Connect (OIDC) with Azure Entra. This integration allows our users to seamlessly and securely authenticate using their existing Azure Entra credentials, streamlining access to Command and enhancing overall security.
OIDC is not supported on the Pass app or Desk Station apps.
Azure Entra configuration
Log in to your Azure Entra portal.
Click New Registration.
a. Name the application Verkada SSO OIDC. b. Under Supported account types, select Accounts in this organizational directory only ( only - Single tenant). c. Under Redirect URI, select Single-page application (SPA) as the platform and add the following callback URLs:
https://org-short-name.command.verkada.com/oidc/aad/callback (replace org-short-name in the URI with your Command organization’s short-name.)Note: Verify there is no trailing slash in the callback URI.
On the left, click Manage > Expose an API.
a. Click Add a scope. b. Click Save and continue. c. Enter verkada_ece for the following fields:
Scope name
Admin consent display name
Admin consent description
User consent display name
User consent description
i. Set Who can consent? to Admins and users. j. Click Add scope.

Verkada Command configuration
Under OIDC Configuration, click Add New.
a. Toggle on Enable. b. (Optional) Toggle on Require OIDC SSO. c. Under Select Provider, select Azure Entra. d. Under Add Client and Tenant, click .
In the Client ID field, paste the Client ID you copied from Azure Entra.
In the Tenant ID field, paste the Tenant ID you copied from Azure Entra.
Click Done.
h. Under Email Domains, click .
Enter your domain name present (e.g., @verkada.com).
Click Done.

Need more help? Contact Verkada Support.
Last updated
Was this helpful?

