Verkada Command supports Single Sign-On (SSO) through OpenID Connect (OIDC) with Azure Entra. This integration allows our users to seamlessly and securely authenticate using their existing Azure Entra credentials, streamlining access to Command and enhancing overall security.
Azure Entra configuration
Log in to your Azure Entra portal.
Search for and select App registrations.
Click New Registration.
Name the application Verkada SSO OIDC.
Under Supported account types, select Accounts in this organizational directory only (<customer-name> only - Single tenant).
Under Redirect URI, select Single-page application (SPA) as the platform and enter https://command.verkada.com/oidc/aad/callback as the callback URL.
Note: Verify there is no trailing slash in the callback URI.
Click Register.
Copy and store your Application (Client) ID and Directory (Tenant) ID in a safe place. You will need them to complete the setup in Verkada Command.
On the left, click Manage > Expose an API.
Verkada Command configuration
In Verkada Command, go to All Products > Admin.
In the left navigation, select Privacy & Security .
Under Authentication & User Configuration select Single Sign-On Configuration.
Next to OIDC Configuration, click Add New.
Under Select Provider, select Azure Entra.
Under Client and Tenant ID's click Add.
In the Client ID field paste the Client ID you copied from Azure Entra.
In the Tenant ID field enter the first part of your Azure Entra instance’s URL. It should look like this: https://YourInstanceName.okta.com/.
Click on Done to complete the configuration.
Under Login Test click Run Login Test.
A successful login test should redirect to the OIDC configuration page. Once you’re logged in, add the domain that you need to whitelist.
Once your domain is added, run the login test again. SSO will not be enabled until this second login test successfully completes.
Once your domain is verified, you should see it successfully validated.
Need more help? Contact Verkada Support.