Configure Clay enterprise SSO, role-based access control, and organization management. Use when implementing SSO integration, configuring role-based permissions, or setting up organization-level controls for Clay. Trigger with phrases like "clay SSO", "clay RBAC", "clay enterprise", "clay roles", "clay permissions", "clay SAML".
View on GitHubjeremylongshore/claude-code-plugins-plus-skills
clay-pack
plugins/saas-packs/clay-pack/skills/clay-enterprise-rbac/SKILL.md
February 1, 2026
Select agents to install to:
npx add-skill https://github.com/jeremylongshore/claude-code-plugins-plus-skills/blob/main/plugins/saas-packs/clay-pack/skills/clay-enterprise-rbac/SKILL.md -a claude-code --skill clay-enterprise-rbacInstallation paths:
.claude/skills/clay-enterprise-rbac/# Clay Enterprise RBAC
## Overview
Configure enterprise-grade access control for Clay integrations.
## Prerequisites
- Clay Enterprise tier subscription
- Identity Provider (IdP) with SAML/OIDC support
- Understanding of role-based access patterns
- Audit logging infrastructure
## Role Definitions
| Role | Permissions | Use Case |
|------|-------------|----------|
| Admin | Full access | Platform administrators |
| Developer | Read/write, no delete | Active development |
| Viewer | Read-only | Stakeholders, auditors |
| Service | API access only | Automated systems |
## Role Implementation
```typescript
enum ClayRole {
Admin = 'admin',
Developer = 'developer',
Viewer = 'viewer',
Service = 'service',
}
interface ClayPermissions {
read: boolean;
write: boolean;
delete: boolean;
admin: boolean;
}
const ROLE_PERMISSIONS: Record<ClayRole, ClayPermissions> = {
admin: { read: true, write: true, delete: true, admin: true },
developer: { read: true, write: true, delete: false, admin: false },
viewer: { read: true, write: false, delete: false, admin: false },
service: { read: true, write: true, delete: false, admin: false },
};
function checkPermission(
role: ClayRole,
action: keyof ClayPermissions
): boolean {
return ROLE_PERMISSIONS[role][action];
}
```
## SSO Integration
### SAML Configuration
```typescript
// Clay SAML setup
const samlConfig = {
entryPoint: 'https://idp.company.com/saml/sso',
issuer: 'https://clay.com/saml/metadata',
cert: process.env.SAML_CERT,
callbackUrl: 'https://app.yourcompany.com/auth/clay/callback',
};
// Map IdP groups to Clay roles
const groupRoleMapping: Record<string, ClayRole> = {
'Engineering': ClayRole.Developer,
'Platform-Admins': ClayRole.Admin,
'Data-Team': ClayRole.Viewer,
};
```
### OAuth2/OIDC Integration
```typescript
import { OAuth2Client } from '@clay/sdk';
const oauthClient = new OAuth2Client({
clientId: process.env.CLAY_OAUTH_CLIENT_ID!,
clientSecret: process.env.CLA