Coding agents: Add SSO to your app
Let your coding agents guide you into adding Scalekit SSO to your existing application in minutes
Use AI coding agents like Claude Code, GitHub Copilot CLI, Cursor, and OpenCode to add Scalekit’s Modular SSO to your existing applications. This guide shows you how to configure these agents so they analyze your codebase, apply SSO patterns, and generate production-ready code that integrates enterprise identity providers and follows security best practices while reducing implementation time from hours to minutes.
-
Add the Scalekit Auth Stack marketplace
Not yet on Claude Code? Follow the official quickstart guide to install it.
Register Scalekit’s plugin marketplace to access pre-configured authentication skills. This marketplace provides context-aware prompts and implementation guides that help coding agents generate correct Modular SSO code.
Start the Claude Code REPL:
Terminal claudeThen add the marketplace:
Claude REPL /plugin marketplace add scalekit-inc/claude-code-authstackWhen the marketplace registers successfully, you’ll see confirmation output:
Terminal ❯ /plugin marketplace add scalekit-inc/claude-code-authstack⎿ Successfully added marketplace: scalekit-auth-stackThe marketplace provides specialized authentication plugins that understand SSO patterns and SAML/OIDC security requirements. These plugins guide the coding agent to generate implementation code that matches your project structure.
To remove the Scalekit Auth Stack marketplace, use the uninstall command:
Claude REPL /plugin marketplace remove scalekit-auth-stack -
Enable authentication plugins
Select which authentication capabilities to activate in your development environment. Each plugin provides specific skills that the coding agent uses to generate SSO code.
Directly install the specific plugin:
Claude REPL /plugin install modular-sso@scalekit-auth-stackAlternative: Enable authentication plugins via plugin wizard
Run the plugin wizard to browse and enable available plugins:
Claude REPL /pluginsNavigate through the visual interface to enable the Modular SSO plugin.
-
Generate SSO implementation
Use a structured prompt to direct the coding agent. A well-formed prompt ensures the agent generates complete, production-ready SSO code that includes all required security components.
Copy the following prompt into your coding agent:
SSO implementation prompt Guide the coding agent to add Scalekit SSO to my existing app — initialize ScalekitClient, generate an SSO authorization URL for a given organization, handle the SSO callback to validate and exchange the code for user identity, and integrate the SSO user into my existing session system. Code only.When you submit this prompt, Claude Code loads the Modular SSO skill from the marketplace -> analyzes your existing application structure -> generates Scalekit client initialization with environment credentials -> creates an SSO authorization URL generator for organization-based routing -> implements the SSO callback handler to validate and exchange the code for user identity -> integrates SSO user data into your existing session system.
-
Verify the implementation
After the coding agent completes, verify that all SSO components are properly configured:
Check generated files:
- Scalekit client initialization with environment credentials (you may need to set up a
.envfile with your Scalekit API credentials) - SSO authorization URL generation for organization-based routing
- SSO callback handler that validates the authorization code and retrieves user identity
- Integration logic that maps SSO user identity into your existing session system
The SSO flow should redirect users to their organization’s identity provider, where they authenticate. Your application should then receive the callback, validate the code, extract the user’s identity, and create or update the user session accordingly.
- Scalekit client initialization with environment credentials (you may need to set up a
When users authenticate through SSO, your application receives verified identity claims from the identity provider. Verify that the SSO callback correctly maps user identity to your application’s user model and that the session is created with the appropriate access level.
-
Add the Scalekit authstack marketplace
Need to install GitHub Copilot CLI? See the getting started guide — an active GitHub Copilot subscription is required.
Register Scalekit’s plugin marketplace to access pre-configured authentication plugins. This marketplace provides implementation skills that help GitHub Copilot generate correct Modular SSO code.
Terminal copilot plugin marketplace add scalekit-inc/github-copilot-authstackThe marketplace provides specialized plugins that understand SSO patterns and SAML/OIDC security requirements. These plugins guide GitHub Copilot to generate implementation code that matches your project structure.
To remove the Scalekit authstack marketplace, use the remove command:
Terminal copilot plugin marketplace remove github-copilot-authstack -
Install the Modular SSO plugin
Install the Modular SSO plugin to give GitHub Copilot the skills needed to generate SSO code:
Terminal copilot plugin install modular-sso@scalekit-auth-stackVerify the plugin is installed
Confirm the plugin installed successfully:
Terminal copilot plugin list -
Generate SSO implementation
Use a structured prompt to direct GitHub Copilot. A well-formed prompt ensures the agent generates complete, production-ready SSO code that includes all required security components.
Copy the following command into your terminal:
Terminal copilot "Add Scalekit SSO to my existing app — initialize ScalekitClient, generate an SSO authorization URL for a given organization, handle the SSO callback to validate and exchange the code for user identity, and integrate the SSO user into my existing session system. Code only."GitHub Copilot uses the Modular SSO plugin to analyze your existing application structure, generate Scalekit client initialization code, create an SSO authorization URL generator for organization-based routing, implement the SSO callback handler to validate and exchange the code for user identity, and integrate SSO user data into your existing session system.
-
Verify the implementation
After GitHub Copilot completes, verify that all SSO components are properly configured:
Check generated files:
- Scalekit client initialization with environment credentials (you may need to set up a
.envfile with your Scalekit API credentials) - SSO authorization URL generation for organization-based routing
- SSO callback handler that validates the authorization code and retrieves user identity
- Integration logic that maps SSO user identity into your existing session system
The SSO flow should redirect users to their organization’s identity provider, where they authenticate. Your application should then receive the callback, validate the code, extract the user’s identity, and create or update the user session accordingly.
- Scalekit client initialization with environment credentials (you may need to set up a
When users authenticate through SSO, your application receives verified identity claims from the identity provider. Verify that the SSO callback correctly maps user identity to your application’s user model and that the session is created with the appropriate access level.
-
Register the Scalekit Auth Stack marketplace
Cursor surfaces Claude Code plugins in Settings > Plugins. If you haven’t installed Claude Code yet, follow the Claude Code quickstart first.
Open the Claude Code REPL:
Terminal claudeThen add the Scalekit marketplace:
Claude REPL /plugin marketplace add scalekit-inc/claude-code-authstackWhen the marketplace registers successfully, you’ll see:
Terminal ❯ /plugin marketplace add scalekit-inc/claude-code-authstack⎿ Successfully added marketplace: scalekit-auth-stack -
Open the plugin in Cursor
Launch Cursor and go to Settings > Plugins. The Scalekit Auth Stack plugins appear here automatically — Cursor picks them up from Claude Code’s plugin registry.
Select the authentication plugin you need (for example, Modular SSO, Full Stack Auth, or MCP Auth) and enable it.
-
Generate the implementation
Open Cursor’s chat panel with Cmd+L (macOS) or Ctrl+L (Windows/Linux) and paste in an implementation prompt. Use the same prompt from the corresponding Claude Code tab — the Scalekit plugins and their authentication skills work identically in Cursor.
-
Verify the implementation
After Cursor finishes generating code, confirm all authentication components are in place:
- Scalekit client initialized with your API credentials (set up a
.envfile with your Scalekit environment variables) - Authorization URL generation and callback handler
- Session or token integration matching your application’s existing patterns
- Scalekit client initialized with your API credentials (set up a
Once the Scalekit Auth Stack is live on cursor.com/marketplace, you can skip steps 1–2 entirely. A single click on the Add to Cursor button will install the plugin directly into Cursor, and it will appear immediately in Settings > Plugins.
Support for additional coding agents is coming soon:
- OpenCode
- Windsurf
- Gemini CLI
- Amazon Q Developer
Join the Slack community to share feedback and get notified when support for your agent launches.
In the meantime, use the Claude Code tab — the implementation prompts work with any coding agent that supports custom instructions.