Marketplace

cursor-sso-integration

Configure SSO and enterprise authentication in Cursor. Triggers on "cursor sso", "cursor saml", "cursor oauth", "enterprise cursor auth", "cursor okta". Use when working with cursor sso integration functionality. Trigger with phrases like "cursor sso integration", "cursor integration", "cursor".

allowed_tools: Read, Write, Edit, Bash(cmd:*)

$ Instalar

git clone https://github.com/jeremylongshore/claude-code-plugins-plus-skills /tmp/claude-code-plugins-plus-skills && cp -r /tmp/claude-code-plugins-plus-skills/plugins/saas-packs/cursor-pack/skills/cursor-sso-integration ~/.claude/skills/claude-code-plugins-plus-skills

// tip: Run this command in your terminal to install the skill


name: "cursor-sso-integration" description: | Configure SSO and enterprise authentication in Cursor. Triggers on "cursor sso", "cursor saml", "cursor oauth", "enterprise cursor auth", "cursor okta". Use when working with cursor sso integration functionality. Trigger with phrases like "cursor sso integration", "cursor integration", "cursor". allowed-tools: "Read, Write, Edit, Bash(cmd:*)" version: 1.0.0 license: MIT author: "Jeremy Longshore jeremy@intentsolutions.io"

Cursor Sso Integration

Overview

This skill guides you through configuring SSO and enterprise authentication in Cursor. It covers SAML 2.0 and OAuth 2.0/OIDC setup for popular identity providers like Okta, Azure AD, and Google Workspace with step-by-step configuration instructions.

Prerequisites

  • Cursor Business or Enterprise subscription
  • Admin access to Identity Provider (Okta, Azure AD, etc.)
  • Admin access to Cursor organization
  • Verified company domain in Cursor
  • Understanding of SAML 2.0 or OAuth 2.0/OIDC

Instructions

  1. Verify domain in Cursor Admin
  2. Create SAML application in Identity Provider
  3. Configure ACS URL and Entity ID
  4. Set up attribute mapping (email, name)
  5. Download IdP metadata and upload to Cursor
  6. Test SSO with admin account
  7. Roll out to organization

Output

  • SSO authentication configured
  • SAML/OIDC integration active
  • User provisioning enabled
  • Role mapping configured
  • Security policies enforced

Error Handling

See {baseDir}/references/errors.md for comprehensive error handling.

Examples

See {baseDir}/references/examples.md for detailed examples.

Resources

Repository

jeremylongshore
jeremylongshore
Author
jeremylongshore/claude-code-plugins-plus-skills/plugins/saas-packs/cursor-pack/skills/cursor-sso-integration
878
Stars
101
Forks
Updated4d ago
Added5d ago