workos

Use when the user asks for a WorkOS docs URL, term, or dashboard field (Sign-in endpoint, initiate_login_uri, Redirect URI, `WORKOS_*` env vars), or is…

INSTALLATION
npx skills add https://github.com/workos/skills --skill workos
Run in your project or agent environment. Adjust flags if your CLI version differs.

SKILL.md

WorkOS Skill Router

How to Use

This file is a router, NOT the answer. Before responding to the user:

  • Match the request to a reference file using Rule 0 and the decision tree below.
  • You MUST Read the matched reference file with the Read tool before producing any answer, URL, or code. If you have not Read a reference, you have not followed this skill.
  • Follow the instructions inside the reference (it will tell you which live docs to fetch with WebFetch and which gotchas to avoid).

Exception: Widget requests use the workos-widgets skill via the Skill tool — it has its own multi-framework orchestration.

Guardrails (apply to every response)

These apply regardless of which routing rule fires. They exist because the most common failure mode of past WorkOS agent interactions has been plausibly-shaped fabrication of CLI commands and Dashboard paths.

  • **Never invent workos CLI commands.** If the user asks about CLI support or you're about to suggest a command, verify the command tree first. The authoritative source is WORKOS_MODE=agent workos --help --json — it emits the complete registered command tree. Do not assume a create subcommand exists because list/get/delete do. See references/workos-management.md.
  • **Prefer WORKOS_MODE=agent when invoking the workos CLI from a coding-agent session.** The CLI auto-detects most agent environments (CLAUDECODE, CLAUDE_CODE, CURSOR_AGENT, CODEX_SANDBOX, non-TTY), but the explicit env var is more reliable across sandbox configurations. See the WorkOS CLI in Coding-Agent Sessions section below.
  • Never invent Dashboard click-paths. Phrases like "Dashboard > Organizations > X > Roles > Map Groups" or dashboard.workos.com/some/specific/path should not appear unless you have verified them against a docs page you just fetched. The Dashboard UI reorganizes; docs pages are stable. Cite the docs URL and describe the destination conceptually ("the Authorization page", "the directory's settings") instead of committing to a click-path.
  • When the user wants to do something not supported by the CLI, say so plainly. Users are better served by "this isn't in the CLI; here's the docs URL for how to do it" than by a fabricated command that fails. See the "Not in the CLI" section of references/workos-management.md.
  • Prefer docs URLs over prose when writing recipes. If a reference file tells you to cite a specific docs URL, cite it literally; don't paraphrase the URL's slug.

WorkOS CLI in Coding-Agent Sessions

The CLI resolves two independent axes: interaction mode (human/agent/ci) and output mode (human/json). The CLI auto-detects agent environments via known env vars (CLAUDECODE, CLAUDE_CODE, CURSOR_AGENT, CODEX_SANDBOX, CURSOR_TRACE_ID) and non-TTY detection, but explicit settings are more reliable across sandbox configurations.

Recommended preflight for any setup or debugging task:

WORKOS_MODE=agent workos doctor --json --skip-ai

--skip-ai disables the doctor's AI-powered diagnosis pass, which requires an API key and network round-trip — neither is guaranteed in a sandbox. If --skip-ai errors as an unknown flag, the CLI is outdated — see references/workos-cli-upgrade.md. The structured JSON output is sufficient for programmatic triage.

This returns a structured JSON report with interactionMode ({ mode, source }) and hostExecution ({ ok, failures[] }) fields. Read the JSON before suggesting fixes.

Rules:

  • Use --json when parsing command output. It controls formatting only — it does not change CLI behavior.
  • Use WORKOS_MODE=agent even when relaying human-readable messages. It controls prompts, browser launch, and host trust.
  • Treat the doctor HOST_EXECUTION_UNTRUSTED issue as a hard trust boundary. If the doctor report contains this issue (or hostExecution.ok is false), the current shell may be sandboxed. Auth, config, keychain, and API failures from this shell are not authoritative. Ask the user to re-run host-sensitive commands (workos auth login, workos doctor, workos env add) on their host shell before drawing conclusions.
  • Do not assume browser-based auth (workos auth login) works in a sandbox. If auth is required, surface the manual URL/code fallback that the CLI prints, or ask the user to run workos auth login on their host shell.
  • For destructive CLI commands in agent mode, pass the explicit confirmation flag. Agent mode never prompts, so omitting the flag causes a confirmation_required error. Known flags: --yes for workos api (mutating methods), --force for workos connection delete, workos directory delete, and workos debug reset. If unsure which flag a command expects, run workos <cmd> --help --json to check.
  • Structured CLI errors (JSON on stderr) include an optional error.recovery.hints array, where each hint has description, optional command, and optional hostShellRequired. Prefer those hints over guessing the next step.

Legacy compatibility you may encounter:

  • WORKOS_NO_PROMPT=1 is a legacy alias that sets both agent interaction behavior AND JSON output. To migrate, set WORKOS_MODE=agent and pass --json to the command to preserve both behaviors. Using WORKOS_MODE=agent alone drops the implicit JSON formatting.
  • WORKOS_FORCE_TTY=1 only affects output formatting; it does not change interaction mode.

Topic → Reference Map

Terminology lookups — "what is X", "docs URL for X" — are handled by Rule 0 below, not this topic map. They route to references/workos-terms.md.

AuthKit Installation (Read references/{name}.md )

User wants to...

Read file

Install AuthKit in Next.js

references/workos-authkit-nextjs.md

Install AuthKit in React SPA

references/workos-authkit-react.md

Install AuthKit with React Router

references/workos-authkit-react-router.md

Install AuthKit with TanStack Start

references/workos-authkit-tanstack-start.md

Install AuthKit with SvelteKit

references/workos-authkit-sveltekit.md

Install AuthKit in vanilla JS

references/workos-authkit-vanilla-js.md

AuthKit architecture reference

references/workos-authkit-base.md

Add WorkOS Widgets

Load workos-widgets skill via Skill tool

Backend SDK Installation (Read references/{name}.md )

User wants to...

Read file

Install AuthKit in Node.js backend

references/workos-node.md

Install AuthKit in Python

references/workos-python.md

Install AuthKit in .NET

references/workos-dotnet.md

Install AuthKit in Go

references/workos-go.md

Install AuthKit in Ruby

references/workos-ruby.md

Install AuthKit in PHP

references/workos-php.md

Install AuthKit in PHP Laravel

references/workos-php-laravel.md

Install AuthKit in Kotlin

references/workos-kotlin.md

Install AuthKit in Elixir

references/workos-elixir.md

Features (Read references/{name}.md )

User wants to...

Read file

Configure Single Sign-On

references/workos-sso.md

Set up Directory Sync

references/workos-directory-sync.md

Implement RBAC / roles

references/workos-rbac.md

Encrypt data with Vault

references/workos-vault.md

Handle WorkOS Events / webhooks

references/workos-events.md

Set up Audit Logs

references/workos-audit-logs.md

Enable Admin Portal

references/workos-admin-portal.md

Add Multi-Factor Auth

references/workos-mfa.md

Configure email delivery

references/workos-email.md

Set up Custom Domains

references/workos-custom-domains.md

Set up IdP integration

references/workos-integrations.md

Implement FGA / fine-grained authz

references/workos-fga.md

Set up Pipes / Connected Apps

references/workos-pipes.md

Configure Feature Flags

references/workos-feature-flags.md

Set up Radar / fraud detection

references/workos-radar.md

API References (Read references/{name}.md )

Feature topic files above include endpoint tables for their respective APIs. Use these API-only references when no feature topic exists:

User wants to...

Read file

AuthKit API Reference

references/workos-api-authkit.md

Organization API Reference

references/workos-api-organization.md

Migrations (Read references/{name}.md )

User wants to...

Read file

Migrate from Auth0

references/workos-migrate-auth0.md

Migrate from AWS Cognito

references/workos-migrate-aws-cognito.md

Migrate from Better Auth

references/workos-migrate-better-auth.md

Migrate from Clerk

references/workos-migrate-clerk.md

Migrate from Descope

references/workos-migrate-descope.md

Migrate from Firebase

references/workos-migrate-firebase.md

Migrate from Stytch

references/workos-migrate-stytch.md

Migrate from Supabase Auth

references/workos-migrate-supabase-auth.md

Migrate from the standalone SSO API

references/workos-migrate-the-standalone-sso-api.md

Migrate from other services

references/workos-migrate-other-services.md

Management &#x26; CLI Lifecycle (Read references/{name}.md )

User wants to...

Read file

Manage WorkOS resources via CLI commands

references/workos-management.md

Upgrade the workos CLI to a newer version

references/workos-cli-upgrade.md

Routing Decision Tree

Apply these rules in order. First match wins.

0. Terminology / Docs URL Lookup

Triggers: Lookup-shaped phrasing — "what is X", "what does X mean", "docs URL for X", "where's the docs on X", "canonical link for X", "where do I configure X in the dashboard" — where X is a WorkOS-specific config field, endpoint, env var, or term. Examples: initiate_login_uri, "Sign-in endpoint", "Redirect URI", dashboard field names, WORKOS_* environment variables.

Do NOT fire Rule 0 for setup-shaped phrasing like "set up Vault", "enable Admin Portal", "configure MFA" — those route to Rule 3 (Feature-Specific).

Action:

  • Read references/workos-terms.md — a curated table mapping WorkOS terms to canonical docs URLs.
  • If the term is in the table, use the summary to answer; WebFetch the listed URL only if the user wants more detail.
  • If the term is NOT in the table, follow the "Still not here?" fallback at the bottom of that file. When you find the canonical URL, answer the user and suggest they open a PR to add a row.

For terminology lookups, do NOT WebFetch llms.txt or guess workos.com/docs/... URLs before reading the terms file. (Rules 7 and 8 use llms.txt for different purposes — this prohibition is scoped to Rule 0 only.)

Why this wins: Terminology lookups happen independent of feature/framework/migration context. They need to short-circuit routing, not fall through to "Vague or General" (Rule 7).

1. Migration Context

Triggers: User mentions migrating FROM another provider (Auth0, Clerk, Cognito, Firebase, Supabase, Stytch, Descope, Better Auth, standalone SSO API).

Action: Read references/workos-migrate-[provider].md where [provider] matches the source system. If provider is not in the table, read references/workos-migrate-other-services.md.

Why this wins: Migration context overrides feature-specific routing because users need provider-specific data export and transformation steps.

2. API Reference Request

Triggers: User explicitly asks about "API endpoints", "request format", "response schema", "API reference", or mentions inspecting HTTP details.

Action: For features with topic files (SSO, Directory Sync, RBAC, Vault, Events, Audit Logs, Admin Portal), read the feature topic file — it includes an endpoint table. For AuthKit or Organization APIs, read references/workos-api-[domain].md.

Why this wins: API references are low-level; feature topics are high-level but include endpoint tables for quick reference.

3. Feature-Specific Request

Triggers: User mentions a specific WorkOS feature by name (SSO, MFA, Directory Sync, Audit Logs, Vault, RBAC, FGA, Admin Portal, Custom Domains, Events, Integrations, Email, Pipes, Feature Flags, Radar).

Action: Read references/workos-[feature].md where [feature] is the lowercase slug (sso, mfa, directory-sync, audit-logs, vault, rbac, fga, admin-portal, custom-domains, events, integrations, email, pipes, feature-flags, radar).

Exception: Widget requests load the workos-widgets skill via the Skill tool — it has its own orchestration.

Disambiguation: If user mentions BOTH a feature and "API", route to the feature topic file (it includes endpoints). If they mention MULTIPLE features, route to the MOST SPECIFIC one first (e.g., "SSO with MFA" → route to SSO; user can request MFA separately). If user mentions "FGA" or "fine-grained authorization", route to workos-fga — NOT workos-rbac. RBAC is org-level roles; FGA is resource-scoped roles on top of RBAC.

Special case — IdP group → role mapping: If the user asks about mapping Entra / Azure AD / Okta / Google Workspace / SCIM / directory / SSO groups to WorkOS roles (regardless of exact phrasing), read BOTH workos-rbac.md AND the source-specific reference:

  • Directory Sync / SCIM / Google Workspace groups → also read workos-directory-sync.md
  • SSO-only groups → also read workos-sso.md

Both files now have a canonical recipe. Do not answer from memory or paraphrase dashboard menu paths — the docs don't commit to exact click-paths, so neither should you. This mapping is not a WorkOS CLI operation; if asked for a CLI command, state that it's not in the CLI and link the docs.

4. AuthKit Installation

Triggers: User mentions authentication setup, login flow, sign-up, session management, or explicitly says "AuthKit" WITHOUT mentioning a specific feature like SSO or MFA.

Action: Detect framework and language using the priority-ordered checks below. Read the corresponding reference file.

Disambiguation:

  • If user says "SSO login via AuthKit", route to workos-sso (#3) — feature wins over framework.
  • If user says "React login with Google", route to AuthKit React (#4) — this is AuthKit-level auth, not SSO API.
  • If user is ALREADY using AuthKit and wants to add a feature (e.g., "add MFA to my AuthKit app"), route to the feature reference (#3), not back to AuthKit installation.

#### Framework Detection Priority (AuthKit only)

Check in this exact order. First match wins:

1. `@tanstack/start` in package.json dependencies

   → Read: references/workos-authkit-tanstack-start.md

2. `@sveltejs/kit` in package.json dependencies

   → Read: references/workos-authkit-sveltekit.md

3. `react-router` or `react-router-dom` in package.json dependencies

   → Read: references/workos-authkit-react-router.md

4. `next.config.js` OR `next.config.mjs` OR `next.config.ts` exists in project root

   → Read: references/workos-authkit-nextjs.md

5. (`vite.config.js` OR `vite.config.ts` exists) AND `react` in package.json dependencies

   → Read: references/workos-authkit-react.md

6. NONE of the above detected

   → Read: references/workos-authkit-vanilla-js.md

#### Language Detection (Backend SDKs)

If the project is NOT a JavaScript/TypeScript frontend framework, check:

1. `pyproject.toml` OR `requirements.txt` OR `setup.py` exists

   → Read: references/workos-python.md

2. `go.mod` exists

   → Read: references/workos-go.md

3. `Gemfile` exists OR `config/routes.rb` exists

   → Read: references/workos-ruby.md

4. `composer.json` exists AND `laravel/framework` in dependencies

   → Read: references/workos-php-laravel.md

5. `composer.json` exists (without Laravel)

   → Read: references/workos-php.md

6. `*.csproj` OR `*.sln` exists

   → Read: references/workos-dotnet.md

7. `build.gradle.kts` OR `build.gradle` exists

   → Read: references/workos-kotlin.md

8. `mix.exs` exists

   → Read: references/workos-elixir.md

9. `package.json` exists with `express` / `fastify` / `hono` / `koa` (backend JS)

   → Read: references/workos-node.md

Why this order: TanStack, SvelteKit, and React Router are MORE specific than Next.js/Vite+React. A project can have both Next.js AND React Router; in that case, React Router wins because it's more specific. Vanilla JS is the fallback when no framework is detected. Backend languages are checked when no frontend framework is found.

Edge case — multiple frameworks detected: If you detect conflicting signals (e.g., both next.config.js and @tanstack/start), ASK the user which one they want to use. Do NOT guess.

Edge case — framework unclear from context: If the user says "add login" but you cannot scan files (remote repo, no access), ASK: "Which framework/language are you using?" Do NOT default without confirmation.

5. Integration Setup

Triggers: User mentions connecting to external IdPs, configuring third-party integrations, or asks "how do I integrate with [provider]".

Action: Read references/workos-integrations.md.

Why separate from SSO: SSO covers the authentication flow; Integrations covers IdP configuration and connection setup. If user mentions BOTH ("set up Google SSO"), route to SSO (#3) — it will reference Integrations where needed.

6. Management / CLI Operations

Triggers: User mentions managing WorkOS resources (organizations, users, roles, permissions), seeding data, or CLI management commands.

Action: Read references/workos-management.md.

Sub-case — CLI upgrade: If the user reports an outdated workos CLI (workos --version shows an old release, unknown command errors after following recent docs, or asks "how do I update the workos CLI?"), read references/workos-cli-upgrade.md instead. Do NOT guess the latest version — that file tells you to instruct the user to run npm view workos version.

7. Vague or General Request

Triggers: User says "help with WorkOS", "WorkOS setup", "what can WorkOS do", or provides no feature-specific context.

Action:

  • Scan the index for the section that best matches the user's likely intent
  • WebFetch the specific section URL
  • Summarize capabilities and ASK the user what they want to accomplish

Do NOT guess a feature — force disambiguation by showing options.

8. No Match / Ambiguous

Triggers: None of the above rules match, OR the request is genuinely ambiguous.

Action:

  • Search the index for keywords from the user's request
  • If you find a match, WebFetch that section URL and proceed
  • If NO match, respond: "I couldn't find a WorkOS feature matching '[user's term]'. Could you clarify? For example: authentication, SSO, MFA, directory sync, audit logs, etc."

Edge Cases

User mentions multiple features

Route to the MOST SPECIFIC reference first. Example: "SSO with MFA and directory sync" → route to workos-sso first. After completing SSO setup, the user can request MFA and Directory Sync separately.

User mentions a feature + API reference

Route to the feature topic file — it includes an endpoint table. Example: "SSO API endpoints" → workos-sso.md.

User wants to ADD a feature to an existing AuthKit setup

Route to the feature reference (#3), not back to AuthKit installation. Example: "I'm using AuthKit in Next.js and want to add SSO" → workos-sso.md.

User mentions a provider but no feature

Route to Integrations (#5). Example: "How do I connect Okta?" → workos-integrations.md.

User mentions a provider AND a feature

Route to the feature reference (#3). Example: "Set up Okta SSO" → workos-sso.md (it will reference Integrations for Okta setup).

Unknown framework for AuthKit

If you cannot detect framework and the user hasn't specified, ASK: "Which framework/language are you using?" Do NOT default without confirmation.

Framework conflicts (multiple frameworks detected)

If detection finds conflicting signals (e.g., both Next.js and TanStack Start configs), ASK: "I see both [framework A] and [framework B]. Which one do you want to use for AuthKit?"

User provides no context at all

Follow step #7 (Vague or General Request): fetch llms.txt, show options, and force disambiguation.

BrowserAct

Let your agent run on any real-world website

Bypass CAPTCHA & anti-bot for free. Start local, scale to cloud.

Explore BrowserAct Skills →

Stop writing automation&scrapers

Install the CLI. Run your first Skill in 30 seconds. Scale when you're ready.

Start free
free · no credit card