Configure Replit enterprise SSO, role-based access control, and organization management. Use when implementing SSO integration, configuring role-based permissions, or setting up organization-level controls for Replit. Trigger with phrases like "replit SSO", "replit RBAC", "replit enterprise", "replit roles", "replit permissions", "replit SAML".
View on GitHubjeremylongshore/claude-code-plugins-plus-skills
replit-pack
plugins/saas-packs/replit-pack/skills/replit-enterprise-rbac/SKILL.md
February 1, 2026
Select agents to install to:
npx add-skill https://github.com/jeremylongshore/claude-code-plugins-plus-skills/blob/main/plugins/saas-packs/replit-pack/skills/replit-enterprise-rbac/SKILL.md -a claude-code --skill replit-enterprise-rbacInstallation paths:
.claude/skills/replit-enterprise-rbac/# Replit Enterprise RBAC
## Overview
Configure enterprise-grade access control for Replit integrations.
## Prerequisites
- Replit Enterprise tier subscription
- Identity Provider (IdP) with SAML/OIDC support
- Understanding of role-based access patterns
- Audit logging infrastructure
## Role Definitions
| Role | Permissions | Use Case |
|------|-------------|----------|
| Admin | Full access | Platform administrators |
| Developer | Read/write, no delete | Active development |
| Viewer | Read-only | Stakeholders, auditors |
| Service | API access only | Automated systems |
## Role Implementation
```typescript
enum ReplitRole {
Admin = 'admin',
Developer = 'developer',
Viewer = 'viewer',
Service = 'service',
}
interface ReplitPermissions {
read: boolean;
write: boolean;
delete: boolean;
admin: boolean;
}
const ROLE_PERMISSIONS: Record<ReplitRole, ReplitPermissions> = {
admin: { read: true, write: true, delete: true, admin: true },
developer: { read: true, write: true, delete: false, admin: false },
viewer: { read: true, write: false, delete: false, admin: false },
service: { read: true, write: true, delete: false, admin: false },
};
function checkPermission(
role: ReplitRole,
action: keyof ReplitPermissions
): boolean {
return ROLE_PERMISSIONS[role][action];
}
```
## SSO Integration
### SAML Configuration
```typescript
// Replit SAML setup
const samlConfig = {
entryPoint: 'https://idp.company.com/saml/sso',
issuer: 'https://replit.com/saml/metadata',
cert: process.env.SAML_CERT,
callbackUrl: 'https://app.yourcompany.com/auth/replit/callback',
};
// Map IdP groups to Replit roles
const groupRoleMapping: Record<string, ReplitRole> = {
'Engineering': ReplitRole.Developer,
'Platform-Admins': ReplitRole.Admin,
'Data-Team': ReplitRole.Viewer,
};
```
### OAuth2/OIDC Integration
```typescript
import { OAuth2Client } from '@replit/sdk';
const oauthClient = new OAuth2Client({
clientId: process.env.REPLIT_OAUTH_CLIEN