OIDC based SSO for Okta
Verkada Command supports Single Sign-On (SSO) through OpenID Connect (OIDC) with Okta. This integration allows our users to seamlessly and securely authenticate using their existing Okta credentials, streamlining access to Command and enhancing overall security.
OIDC is not supported on the Pass app or Desk Station apps.
OIDC configuration
Under Sign-in redirect URIs give your application an identifiable name and add the following links to the list of Sign-in redirect URIs:
a. https://command.verkada.com/oidc/okta/callback b. https://.command.verkada.com/oidc/okta/callback where in the URL is the short-name of your Command organization.

(Optional) Under Sign-out redirect URIs add https://command.verkada.com/.

Command configuration
Under OIDC Configuration, click Add New.
a. Toggle on Enable. b. (Optional) Toggle on Require OIDC SSO. c. Under Select Provider, select Okta. d. Under Add Client and Tenant, click .
In the Client ID field paste the Client ID you copied from Okta.
In the Tenant ID field enter the first part of your Okta instance’s URL. It should look like this: https://yourinstancename.okta.com.
Click Done.

h. Email Domains, click .
Enter your domain name present (e.g. @verkada.com).
Click Done.

Need more help? Contact Verkada Support.
Last updated
Was this helpful?






