Overview
Cline Enterprise integrates with your existing identity provider (IdP) via WorkOS to deliver secure SSO and zero-touch user lifecycle management. In this guide, you’ll connect your IdP (Okta, Azure AD, Google Workspace, or any SAML/OIDC provider), enable just-in-time (JIT) provisioning so new users are created automatically on first sign-in, and configure role mapping so permissions stay aligned with your directory—no manual invites or seat reconciliations required.Prerequisites
- Cline Enterprise License
- Access to your identity provider (IdP) configuration (e.g., Okta, Azure AD, Google Workspace)
- Knowledge of your organization’s SSO requirements
Configuration Steps
Step 1: Onboard to Cline Enterprise license
Your IdP administrator will receive an email with a link to register their organization with WorkOS during onboarding.Step 2: Configure Your Identity Provider
Connect your identity provider (IdP) to WorkOS:- In the WorkOS dashboard, go to AuthKit → Connections
- Click Add Connection
- Select your identity provider (e.g., Okta, Azure AD, Google Workspace, Generic SAML/OIDC)
- Follow the provider-specific setup instructions
Step 3: Configure User Provisioning
Cline Enterprise uses just-in-time provisioning that works automatically:- Organizations are created automatically
- Users gain access automatically on their first SSO sign-in, once their credentials have been configured by the IdP administrator.
- Roles sync automatically from your IdP (Admin/Owner → Admin, Member → Member)
- No manual user invites or seat management required
Step 4: Configure User Attributes Mapping
User roles are mapped automatically from your IdP:- Admin in IdP → Admin role in Cline (Note: The first Owner of the org is created manually during onboarding)
- Member in IdP → Member role in Cline
For what each role can access, see the Roles and Permissions page.
- Go to Settings → Authentication → User Attributes
- Map attributes such as email and name based on your IdP configuration
Step 5: Test SSO Connection
Before allowing users to sign in, test the SSO flow to ensure everything is configured correctly. To test the connection:- In the WorkOS dashboard (or Cline Admin console if available), locate and click Test SSO Connection
- You’ll be redirected to your IdP’s login page
- Enter valid credentials for a test user
- After successful authentication, you should be redirected back
- Confirm that the user’s information (name, email, role) displays correctly
User Access
Once SSO is configured, users in your IdP can access Cline automatically without manual invites or account setup. First-time sign-in flow:- User navigates to Cline and clicks Sign in with SSO
- User authenticates via your organization’s IdP
- Cline automatically creates their account in your Organization
- Role is assigned based on their IdP role (see Step 4)
- User is redirected to Cline and can begin working
- Account creation with correct organization assignment
- Role and permission assignment
- Basic profile information (name, email) populated from IdP
Managing Access
All access management and revocation of users is currently handled by your IdP:- Add users → access granted automatically on first login
- Change roles → updated on next login
- Remove users → access revoked automatically
Role changes sync automatically on the user’s next sign-in.
Changing your IdP
In order to change to a different IdP, please contact support and we will guide you through this process.Verification
Steps to verify successful configuration:- Test User Sign-In: Have a test user sign in through the SSO flow (access is granted automatically on first login)
- Verify User Provisioning: Confirm that the user is automatically created and has appropriate role permissions
- Check User Attributes: Verify that user information (name, email, organization) is correctly populated
- Test Role Changes: Update a user’s role in your IdP and verify it syncs on their next login
- Test User Deprovisioning: Remove a user from your IdP and verify they lose access to Cline on their next login attempt
- Review Audit Logs: Check WorkOS audit logs to ensure authentication events are being recorded

