Configure Ideogram enterprise SSO, role-based access control, and organization management. Use when implementing SSO integration, configuring role-based permissions, or setting up organization-level controls for Ideogram. Trigger with phrases like "ideogram SSO", "ideogram RBAC", "ideogram enterprise", "ideogram roles", "ideogram permissions", "ideogram SAML".
View on GitHubjeremylongshore/claude-code-plugins-plus-skills
ideogram-pack
plugins/saas-packs/ideogram-pack/skills/ideogram-enterprise-rbac/SKILL.md
February 1, 2026
Select agents to install to:
npx add-skill https://github.com/jeremylongshore/claude-code-plugins-plus-skills/blob/main/plugins/saas-packs/ideogram-pack/skills/ideogram-enterprise-rbac/SKILL.md -a claude-code --skill ideogram-enterprise-rbacInstallation paths:
.claude/skills/ideogram-enterprise-rbac/# Ideogram Enterprise RBAC
## Overview
Configure enterprise-grade access control for Ideogram integrations.
## Prerequisites
- Ideogram Enterprise tier subscription
- Identity Provider (IdP) with SAML/OIDC support
- Understanding of role-based access patterns
- Audit logging infrastructure
## Role Definitions
| Role | Permissions | Use Case |
|------|-------------|----------|
| Admin | Full access | Platform administrators |
| Developer | Read/write, no delete | Active development |
| Viewer | Read-only | Stakeholders, auditors |
| Service | API access only | Automated systems |
## Role Implementation
```typescript
enum IdeogramRole {
Admin = 'admin',
Developer = 'developer',
Viewer = 'viewer',
Service = 'service',
}
interface IdeogramPermissions {
read: boolean;
write: boolean;
delete: boolean;
admin: boolean;
}
const ROLE_PERMISSIONS: Record<IdeogramRole, IdeogramPermissions> = {
admin: { read: true, write: true, delete: true, admin: true },
developer: { read: true, write: true, delete: false, admin: false },
viewer: { read: true, write: false, delete: false, admin: false },
service: { read: true, write: true, delete: false, admin: false },
};
function checkPermission(
role: IdeogramRole,
action: keyof IdeogramPermissions
): boolean {
return ROLE_PERMISSIONS[role][action];
}
```
## SSO Integration
### SAML Configuration
```typescript
// Ideogram SAML setup
const samlConfig = {
entryPoint: 'https://idp.company.com/saml/sso',
issuer: 'https://ideogram.com/saml/metadata',
cert: process.env.SAML_CERT,
callbackUrl: 'https://app.yourcompany.com/auth/ideogram/callback',
};
// Map IdP groups to Ideogram roles
const groupRoleMapping: Record<string, IdeogramRole> = {
'Engineering': IdeogramRole.Developer,
'Platform-Admins': IdeogramRole.Admin,
'Data-Team': IdeogramRole.Viewer,
};
```
### OAuth2/OIDC Integration
```typescript
import { OAuth2Client } from '@ideogram/sdk';
const oauthClient = new OAuth2Client({
clie