Verkada Command supports Single Sign-On (SSO) through OpenID Connect (OIDC) with Okta. This integration allows our users to seamlessly and securely authenticate using their existing Okta credentials, streamlining access to Command and enhancing overall security.
OIDC configuration
Navigate to your Okta instance to create a new application to manage your OIDC configuration. Click on Applications from the Applications sidebar option and click Create App Integration.
Under Create a new app integration, select OIDC - OpenID Connect as your Sign-in method and Single-Page Application as your Application type.
Under Sign-in redirect URIs give your application an identifiable name and add https://command.verkada.com/oidc/okta/callback/ to the list of permitted URIs.
Under Assignments, select Skip Group Assignment for now and click Save.
Under Assignments, click on the Assign dropdown to assign this application to your (and other relevant) user profiles.
Under General tab, copy the Client ID displayed under Client Credentials.
Command configuration
In Verkada Command, go to All Products > Admin.
In the left navigation, select Privacy & Security .
Under Authentication & User Configuration select Single Sign-On Configuration.
Next to OIDC Configuration, click Add New.
Under Select Provider, select Okta.
Under Client and Tenant ID's click Add.
In the Client ID field paste the Client ID you copied from Okta.
In the Tenant ID field enter the first part of your Okta instance’s URL. It should look like this: https://YourInstanceName.okta.com/.
Click on Done to complete the configuration.
Under Login Test click Run Login Test.
A successful login test should redirect to the OIDC configuration page. Once you’re logged in, add the domain that you need to whitelist.
Once your domain is added, run the login test again. SSO will not be enabled until this second login test successfully completes.
Once your domain is verified, you should see it successfully validated.
Need more help? Contact Verkada Support.