Verkada supports Security Assertion Markup Language (SAML) authentication using OneLogin as your Identity Provider (IdP).
Configure Verkada SSO with OneLogin
Before you can enable OneLogin SAML, you must generate your client ID.
Launch OneLogin and on the menu bar, select Applications > Add App.
Search for SAML Custom Connector (Advanced).
Choose a Display Name and click Save.
Go to Applications > SAML Custom Connector (Advanced), select Configuration, and use these values to copy and paste, where you replace
CLIENT-ID
with the client ID generated earlier.For Audience (EntityID) and Recipient:
For EU orgs: https://saml.prod2.verkada.com/saml/sso/<client-ID>
Required. For ACS (Consumer) URL Validator:
For EU orgs: https://saml.prod2.verkada.com/saml/sso/<client-ID>
Required. For ACS (Consumer) URL:
For EU orgs: https://saml.prod2.verkada.com/saml/sso/<client-ID>
For SAML signature element, click the dropdown and select Both.
Note: To confirm which region you're located, refer to where your organization was created for Verkada.
On Applications > SAML Custom Connector (Advanced), select Parameters.
Click the plus (+) icon, configure the parameters:
For Name, enter the first and last name.
Click the Value dropdown and select Email > First Name.
Under Flags, check Include in SAML assertion, and click Save.
Click the plus (+) icon and in the next open dialog, select Configured by admin.
Your parameters should look like this:
Return to Applications > SAML Custom Connector (Advanced) and select SSO.
Click the More Actions drop-down and select SAML Metadata to download the metadata.
Required. To complete the setup process, you must upload the metadata to Command.
Log in with the SAML Login URL.
Learn more
Watch this video to learn how to log in with the SAML login URL.
Need more help? Contact Verkada Support.