Coding agents: Add full-stack auth to your app
Let your coding agents guide you into implementing Scalekit full-stack authentication in minutes
Use AI coding agents like Claude Code, GitHub Copilot CLI, Cursor, and OpenCode to implement Scalekit’s full-stack authentication end-to-end in your web applications. This guide shows you how to configure these agents so they analyze your codebase, apply consistent authentication patterns, and generate production-ready code for login, session management, and logout that follows security best practices while reducing implementation time from hours to minutes.
-
Add the Scalekit Auth Stack marketplace
Not yet on Claude Code? Follow the official quickstart guide to install it.
Register Scalekit’s plugin marketplace to access pre-configured authentication skills. This marketplace provides context-aware prompts and implementation guides that help coding agents generate correct Full Stack Auth code.
Start the Claude Code REPL:
Terminal claudeThen add the marketplace:
Claude REPL /plugin marketplace add scalekit-inc/claude-code-authstackWhen the marketplace registers successfully, you’ll see confirmation output:
Terminal ❯ /plugin marketplace add scalekit-inc/claude-code-authstack⎿ Successfully added marketplace: scalekit-auth-stackThe marketplace provides specialized authentication plugins that understand full-stack auth patterns and OAuth 2.0 security requirements. These plugins guide the coding agent to generate implementation code that matches your project structure.
To remove the Scalekit Auth Stack marketplace, use the uninstall command:
Claude REPL /plugin marketplace remove scalekit-auth-stack -
Enable authentication plugins
Select which authentication capabilities to activate in your development environment. Each plugin provides specific skills that the coding agent uses to generate authentication code.
Directly install the specific plugin:
Claude REPL /plugin install full-stack-auth@scalekit-auth-stackAlternative: Enable authentication plugins via plugin wizard
Run the plugin wizard to browse and enable available plugins:
Claude REPL /pluginsNavigate through the visual interface to enable the Full Stack Auth plugin.
-
Generate authentication implementation
Use a structured prompt to direct the coding agent. A well-formed prompt ensures the agent generates complete, production-ready Full Stack Auth code that includes all required security components.
Copy the following prompt into your coding agent:
Authentication implementation prompt Guide the coding agent to implement Scalekit full-stack auth — initialize ScalekitClient with environment credentials, implement the login redirect, handle the OAuth callback to exchange the code for tokens, store the session securely, and add a logout endpoint that clears the session. Code only.When you submit this prompt, Claude Code loads the Full Stack Auth skill from the marketplace -> analyzes your existing application structure -> generates Scalekit client initialization with environment credentials -> creates the login redirect handler -> implements the OAuth callback to exchange the authorization code for tokens -> adds secure session storage and a logout endpoint.
-
Verify the implementation
After the coding agent completes, verify that all authentication components are properly configured:
Check generated files:
- Scalekit client initialization with environment credentials (you may need to set up a
.envfile with your Scalekit API credentials) - Login route that redirects to Scalekit’s authorization endpoint
- OAuth callback route that exchanges the code for tokens
- Secure session storage with proper cookie attributes
- Logout endpoint that clears the session
The login flow should redirect users to Scalekit’s authorization page, where they authenticate. Your application should then exchange the returned authorization code for tokens, store the session, and redirect the user to the protected area of your app.
- Scalekit client initialization with environment credentials (you may need to set up a
When you connect, users authenticate through the OAuth 2.0 flow you configured. Verify that protected routes require a valid session and that the logout endpoint properly clears session state.
-
Add the Scalekit authstack marketplace
Need to install GitHub Copilot CLI? See the getting started guide — an active GitHub Copilot subscription is required.
Register Scalekit’s plugin marketplace to access pre-configured authentication plugins. This marketplace provides implementation skills that help GitHub Copilot generate correct Full Stack Auth code.
Terminal copilot plugin marketplace add scalekit-inc/github-copilot-authstackThe marketplace provides specialized plugins that understand full-stack auth patterns and OAuth 2.0 security requirements. These plugins guide GitHub Copilot to generate implementation code that matches your project structure.
To remove the Scalekit authstack marketplace, use the remove command:
Terminal copilot plugin marketplace remove github-copilot-authstack -
Install the Full Stack Auth plugin
Install the Full Stack Auth plugin to give GitHub Copilot the skills needed to generate complete authentication code:
Terminal copilot plugin install full-stack-auth@scalekit-auth-stackVerify the plugin is installed
Confirm the plugin installed successfully:
Terminal copilot plugin list -
Generate authentication implementation
Use a structured prompt to direct GitHub Copilot. A well-formed prompt ensures the agent generates complete, production-ready Full Stack Auth code that includes all required security components.
Copy the following command into your terminal:
Terminal copilot "Implement Scalekit full-stack auth — initialize ScalekitClient with environment credentials, implement the login redirect, handle the OAuth callback to exchange the code for tokens, store the session securely, and add a logout endpoint that clears the session. Code only."GitHub Copilot uses the Full Stack Auth plugin to analyze your existing application structure, generate Scalekit client initialization code, create the login redirect handler, implement the OAuth callback for token exchange, add secure session storage, and provide a logout endpoint.
-
Verify the implementation
After GitHub Copilot completes, verify that all authentication components are properly configured:
Check generated files:
- Scalekit client initialization with environment credentials (you may need to set up a
.envfile with your Scalekit API credentials) - Login route that redirects to Scalekit’s authorization endpoint
- OAuth callback route that exchanges the code for tokens
- Secure session storage with proper cookie attributes
- Logout endpoint that clears the session
The login flow should redirect users to Scalekit’s authorization page, where they authenticate. Your application should then exchange the returned authorization code for tokens, store the session, and redirect the user to the protected area of your app.
- Scalekit client initialization with environment credentials (you may need to set up a
When you connect, users authenticate through the OAuth 2.0 flow you configured. Verify that protected routes require a valid session and that the logout endpoint properly clears session state.
-
Register the Scalekit Auth Stack marketplace
Cursor surfaces Claude Code plugins in Settings > Plugins. If you haven’t installed Claude Code yet, follow the Claude Code quickstart first.
Open the Claude Code REPL:
Terminal claudeThen add the Scalekit marketplace:
Claude REPL /plugin marketplace add scalekit-inc/claude-code-authstackWhen the marketplace registers successfully, you’ll see:
Terminal ❯ /plugin marketplace add scalekit-inc/claude-code-authstack⎿ Successfully added marketplace: scalekit-auth-stack -
Open the plugin in Cursor
Launch Cursor and go to Settings > Plugins. The Scalekit Auth Stack plugins appear here automatically — Cursor picks them up from Claude Code’s plugin registry.
Select the authentication plugin you need (for example, Modular SSO, Full Stack Auth, or MCP Auth) and enable it.
-
Generate the implementation
Open Cursor’s chat panel with Cmd+L (macOS) or Ctrl+L (Windows/Linux) and paste in an implementation prompt. Use the same prompt from the corresponding Claude Code tab — the Scalekit plugins and their authentication skills work identically in Cursor.
-
Verify the implementation
After Cursor finishes generating code, confirm all authentication components are in place:
- Scalekit client initialized with your API credentials (set up a
.envfile with your Scalekit environment variables) - Authorization URL generation and callback handler
- Session or token integration matching your application’s existing patterns
- Scalekit client initialized with your API credentials (set up a
Once the Scalekit Auth Stack is live on cursor.com/marketplace, you can skip steps 1–2 entirely. A single click on the Add to Cursor button will install the plugin directly into Cursor, and it will appear immediately in Settings > Plugins.
Support for additional coding agents is coming soon:
- OpenCode
- Windsurf
- Gemini CLI
- Amazon Q Developer
Join the Slack community to share feedback and get notified when support for your agent launches.
In the meantime, use the Claude Code tab — the implementation prompts work with any coding agent that supports custom instructions.