docs/enterprise-solutions/onboarding.mdx
Cline Enterprise integrates with your existing identity provider (IdP) via WorkOS to deliver secure SSO and zero-touch user lifecycle management. In this guide, you'll connect your IdP (Okta, Azure AD, Google Workspace, or any SAML/OIDC provider), enable just-in-time (JIT) provisioning so new users are created automatically on first sign-in, and configure role mapping so permissions stay aligned with your directory-no manual invites or seat reconciliations required.
Your IdP administrator will receive an email with a link to register their organization with WorkOS during onboarding.
Connect your identity provider (IdP) to WorkOS:
Each identity provider (IdP) will have its own setup process and required fields. Be sure to follow the specific instructions in the WorkOS dashboard for your chosen provider. For more explicit instruction on connecting your IdP, refer to the WorkOS SSO documentation
Cline Enterprise uses just-in-time provisioning that works automatically:
No additional configuration is needed. Users are provisioned automatically when they sign in through SSO.
User roles are mapped automatically from your IdP:
If needed, you can configure additional user attributes in the Cline Admin console:
For information about available user attributes, see the WorkOS User Object Documentation.
Before allowing users to sign in, test the SSO flow to ensure everything is configured correctly.
To test the connection:
Expected outcome: The test user is authenticated, their account details are visible, and their role matches what's configured in your IdP.
If the test fails: Double-check your IdP configuration (redirect URIs, SAML certificates, attribute mappings). See the WorkOS SSO documentation for troubleshooting guidance.
Once SSO is configured, users in your IdP can access Cline automatically without manual invites or account setup.
First-time sign-in flow:
What happens automatically:
No action required: Users don't need to request access or wait for approval. Access is granted immediately upon successful IdP authentication.
All access management and revocation of users is currently handled by your IdP:
In order to change to a different IdP, please contact support and we will guide you through this process.
Steps to verify successful configuration: