Approved Lists for Guest
Use approved lists to streamline visitor checkin to your organization
An approved list is a versatile tool that can help organizations simplify checking in regular visitors. Organizations can configure guest types to ensure only visitors on an approved list can sign in. Guests can be added to the approved list through an application or by a CSV upload.
Create an approved list
You need Guest Site Admin permissions to create or delete approved lists.
Link an approved list to a Guest type
Guest types must require an email in order to add an approved Guest list.
Create an approved list application
One way visitors can be added to an approved list is through an application. An application allows organizations to consider a broad range of visitors for an approved list and also requires potential approved-list visitors to apply. Each approved list application has a unique URL from which people can apply.
Upload approved visitors via CSV
Organizations may want to add visitors directly to the list without an application. This can be accomplished with a CSV upload.
You can use multiple CSV files to add visitors, but uploads must be done one file at a time.
Configure Auto-Expiration
Organizations can configure rules that limit the period of time a visitor is active on an approved list.
Manage applications
You need Guest Site Admin permissions to create or delete approved lists.
Any Guest Site Admin can review applicants. Users who are configured as reviewers for the list will be notified daily of pending applications and will be alerted immediately when an application returns security screen results.
Applications must be reviewed before they are added to an approved list. You can review applications by clicking the application counter at the top right.

This menu lists all applications pending review. Users can approve, reject, or delete each application. If a security screening is required, the results appear here. The screen uses the applicant’s full name and date of birth. Reviewers should verify this information matches the uploaded ID before approving the applicant.

Applicants are notified by email when their application is approved or rejected. Rejected applications can be viewed from the counter in the top right of the Approved List page. If needed, you can return a rejected application to the Review menu by clicking Undo.

Manage visitors on the approved list
You can search for visitors on an approved list from the search bar at the top of the page. An approved list displays visitor name, the date added to the list, the Command user that added the visitor, and the date of their last security screen. Visitor details are available by clicking on a visitor.
Delete a visitor
Security screens
Visitors on an approved list can be screened against government databases at any time.
Screen a visitor
Screen all visitors
Changes made in this menu update the databases used for security screening.
Visitors who return results from the security screen must be reviewed before their status on the approved list is renewed. The results from these security screens are viewed in the Review Applications window.
Data Retention
Visitor-provided information, including responses, signed documents, contact information, and address, is saved indefinitely. The retention of ID photos is defined by the Guest org setting Retention of Saved Identification Info. This setting can only be modified by Org Admins.
Applications that elicit security screen results must be reviewed within 30 days.
Applications with security screen results that are not reviewed within 30 days may not be added to an Approved List.
Once an application is approved, a visitor’s date of birth is never exposed to Command users. Verkada Guest stores this date to perform precise security screens.
Need more help? Contact Verkada Support.
Last updated
Was this helpful?



