JumpCloud SAML Integration
Learn how to set up SAML with JumpCloud
Before you begin
To integrate Security Assertion Markup Language (SAML), you must first generate a client ID.
How it works
Step 1: Set up SSO
Step 2: Create your Verkada app
Configure the IdP Entity ID, SP Entity ID, and ACS URL as follows:
For IdP Entity ID: For US orgs: https://vauth.command.verkada.com/saml/sso For EU orgs: https://saml.prod2.verkada.com/saml/sso
For AUS orgs: https://saml.prod-ap-syd.verkada.com/saml/sso
For SP Entity ID: For US orgs: https://vauth.command.verkada.com/saml/sso For EU orgs: https://saml.prod2.verkada.com/saml/sso
For AUS orgs: https://saml.prod-ap-syd.verkada.com/saml/sso
For Sign on URL: For US orgs: https://vauth.command.verkada.com/saml/login For EU orgs: https://saml.prod2.verkada.com/saml/login
For AUS orgs: https://saml.prod-ap-syd.verkada.com/saml/login
Alternatively, you can copy the fields from Command. ​ ​Note: To confirm which region you’re located, please refer to where your organization was created for Verkada. ​
Set the Login URL where you can replace <client-ID> by your previously-generated client ID (in this application example, cto is the client ID):
<client-ID> by your previously-generated client ID (in this application example, cto is the client ID):For AUS orgs: https://saml.prod-ap-syd.verkada.com/saml/sso/%3Cclient-ID%3E ​ ​Note: To confirm which region you’re located, please refer to where your organization was created for Verkada. ​
Step 3: Configure SAML attributes
Step 4: Export XML metadata
Step 5: Upload XML metadata
Step 5: Ensure your SSO users are provisioned (optional)
Note: Make sure your users using SSO are already provisioned in Command, whether you use SCIM or you create their accounts manually; otherwise, SSO does not work.
To log in using SSO:
Need more help? Contact Verkada Support.
Last updated
Was this helpful?












