| name | workos |
| description | Use when the user asks for a WorkOS docs URL, term, or dashboard field (Sign-in endpoint, initiate_login_uri, Redirect URI, `WORKOS_*` env vars), or is implementing, debugging, or migrating WorkOS — AuthKit, SSO/SAML, Directory Sync, RBAC, FGA, MFA, Vault, Audit Logs, Admin Portal, Pipes (Connected Apps), Feature Flags, Radar (bot/fraud detection), webhooks, Custom Domains, running the `workos` CLI in agent or sandbox sessions (`WORKOS_MODE`, `workos doctor`), or migrating from Auth0, Clerk, Cognito, Firebase, Supabase, Stytch, Descope, or Better Auth. Also triggers on @workos-inc/* imports. |
WorkOS Skill Router
How to Use
This file is a router, NOT the answer. Before responding to the user:
- Match the request to a reference file using Rule 0 and the decision tree below.
- You MUST Read the matched reference file with the Read tool before producing any answer, URL, or code. If you have not Read a reference, you have not followed this skill.
- Follow the instructions inside the reference (it will tell you which live docs to fetch with WebFetch and which gotchas to avoid).
Exception: Widget requests use the workos-widgets skill via the Skill tool — it has its own multi-framework orchestration.
Guardrails (apply to every response)
These apply regardless of which routing rule fires. They exist because the most common failure mode of past WorkOS agent interactions has been plausibly-shaped fabrication of CLI commands and Dashboard paths.
- Never invent
workos CLI commands. If the user asks about CLI support or you're about to suggest a command, verify the command tree first. The authoritative source is WORKOS_MODE=agent workos --help --json — it emits the complete registered command tree. Do not assume a create subcommand exists because list/get/delete do. See references/workos-management.md.
- Prefer
WORKOS_MODE=agent when invoking the workos CLI from a coding-agent session. The CLI auto-detects most agent environments (CLAUDECODE, CLAUDE_CODE, CURSOR_AGENT, CODEX_SANDBOX, non-TTY), but the explicit env var is more reliable across sandbox configurations. See the WorkOS CLI in Coding-Agent Sessions section below.
- Never invent Dashboard click-paths. Phrases like "Dashboard > Organizations > X > Roles > Map Groups" or
dashboard.workos.com/some/specific/path should not appear unless you have verified them against a docs page you just fetched. The Dashboard UI reorganizes; docs pages are stable. Cite the docs URL and describe the destination conceptually ("the Authorization page", "the directory's settings") instead of committing to a click-path.
- When the user wants to do something not supported by the CLI, say so plainly. Users are better served by "this isn't in the CLI; here's the docs URL for how to do it" than by a fabricated command that fails. See the "Not in the CLI" section of
references/workos-management.md.
- Prefer docs URLs over prose when writing recipes. If a reference file tells you to cite a specific docs URL, cite it literally; don't paraphrase the URL's slug.
WorkOS CLI in Coding-Agent Sessions
The CLI resolves two independent axes: interaction mode (human/agent/ci) and output mode (human/json). The CLI auto-detects agent environments via known env vars (CLAUDECODE, CLAUDE_CODE, CURSOR_AGENT, CODEX_SANDBOX, CURSOR_TRACE_ID) and non-TTY detection, but explicit settings are more reliable across sandbox configurations.
Recommended preflight for any setup or debugging task:
WORKOS_MODE=agent workos doctor --json --skip-ai
--skip-ai disables the doctor's AI-powered diagnosis pass, which requires an API key and network round-trip — neither is guaranteed in a sandbox. If --skip-ai errors as an unknown flag, the CLI is outdated — see references/workos-cli-upgrade.md. The structured JSON output is sufficient for programmatic triage.
This returns a structured JSON report with interactionMode ({ mode, source }) and hostExecution ({ ok, failures[] }) fields. Read the JSON before suggesting fixes.
Rules:
- Use
--json when parsing command output. It controls formatting only — it does not change CLI behavior.
- Use
WORKOS_MODE=agent even when relaying human-readable messages. It controls prompts, browser launch, and host trust.
- Treat the doctor
HOST_EXECUTION_UNTRUSTED issue as a hard trust boundary. If the doctor report contains this issue (or hostExecution.ok is false), the current shell may be sandboxed. Auth, config, keychain, and API failures from this shell are not authoritative. Ask the user to re-run host-sensitive commands (workos auth login, workos doctor, workos env add) on their host shell before drawing conclusions.
- Do not assume browser-based auth (
workos auth login) works in a sandbox. If auth is required, surface the manual URL/code fallback that the CLI prints, or ask the user to run workos auth login on their host shell.
- For destructive CLI commands in agent mode, pass the explicit confirmation flag. Agent mode never prompts, so omitting the flag causes a
confirmation_required error. Known flags: --yes for workos api (mutating methods), --force for workos connection delete, workos directory delete, and workos debug reset. If unsure which flag a command expects, run workos <cmd> --help --json to check.
- Structured CLI errors (JSON on stderr) include an optional
error.recovery.hints array, where each hint has description, optional command, and optional hostShellRequired. Prefer those hints over guessing the next step.
Legacy compatibility you may encounter:
WORKOS_NO_PROMPT=1 is a legacy alias that sets both agent interaction behavior AND JSON output. To migrate, set WORKOS_MODE=agent and pass --json to the command to preserve both behaviors. Using WORKOS_MODE=agent alone drops the implicit JSON formatting.
WORKOS_FORCE_TTY=1 only affects output formatting; it does not change interaction mode.
Topic → Reference Map
Terminology lookups — "what is X", "docs URL for X" — are handled by Rule 0 below, not this topic map. They route to references/workos-terms.md.
AuthKit Installation (Read references/{name}.md)
| User wants to... | Read file |
|---|
| Install AuthKit in Next.js | references/workos-authkit-nextjs.md |
| Install AuthKit in React SPA | references/workos-authkit-react.md |
| Install AuthKit with React Router | references/workos-authkit-react-router.md |
| Install AuthKit with TanStack Start | references/workos-authkit-tanstack-start.md |
| Install AuthKit with SvelteKit | references/workos-authkit-sveltekit.md |
| Install AuthKit in vanilla JS | references/workos-authkit-vanilla-js.md |
| AuthKit architecture reference | references/workos-authkit-base.md |
| Add WorkOS Widgets | Load workos-widgets skill via Skill tool |
Backend SDK Installation (Read references/{name}.md)
| User wants to... | Read file |
|---|
| Install AuthKit in Node.js backend | references/workos-node.md |
| Install AuthKit in Python | references/workos-python.md |
| Install AuthKit in .NET | references/workos-dotnet.md |
| Install AuthKit in Go | references/workos-go.md |
| Install AuthKit in Ruby | references/workos-ruby.md |
| Install AuthKit in PHP | references/workos-php.md |
| Install AuthKit in PHP Laravel | references/workos-php-laravel.md |
| Install AuthKit in Kotlin | references/workos-kotlin.md |
| Install AuthKit in Elixir | references/workos-elixir.md |
Features (Read references/{name}.md)
| User wants to... | Read file |
|---|
| Configure Single Sign-On | references/workos-sso.md |
| Set up Directory Sync | references/workos-directory-sync.md |
| Implement RBAC / roles | references/workos-rbac.md |
| Encrypt data with Vault | references/workos-vault.md |
| Handle WorkOS Events / webhooks | references/workos-events.md |
| Set up Audit Logs | references/workos-audit-logs.md |
| Enable Admin Portal | references/workos-admin-portal.md |
| Add Multi-Factor Auth | references/workos-mfa.md |
| Configure email delivery | references/workos-email.md |
| Set up Custom Domains | references/workos-custom-domains.md |
| Set up IdP integration | references/workos-integrations.md |
| Implement FGA / fine-grained authz | references/workos-fga.md |
| Set up Pipes / Connected Apps | references/workos-pipes.md |
| Configure Feature Flags | references/workos-feature-flags.md |
| Set up Radar / fraud detection | references/workos-radar.md |
API References (Read references/{name}.md)
Feature topic files above include endpoint tables for their respective APIs. Use these API-only references when no feature topic exists:
| User wants to... | Read file |
|---|
| AuthKit API Reference | references/workos-api-authkit.md |
| Organization API Reference | references/workos-api-organization.md |
Migrations (Read references/{name}.md)
| User wants to... | Read file |
|---|
| Migrate from Auth0 | references/workos-migrate-auth0.md |
| Migrate from AWS Cognito | references/workos-migrate-aws-cognito.md |
| Migrate from Better Auth | references/workos-migrate-better-auth.md |
| Migrate from Clerk | references/workos-migrate-clerk.md |
| Migrate from Descope | references/workos-migrate-descope.md |
| Migrate from Firebase | references/workos-migrate-firebase.md |
| Migrate from Stytch | references/workos-migrate-stytch.md |
| Migrate from Supabase Auth | references/workos-migrate-supabase-auth.md |
| Migrate from the standalone SSO API | references/workos-migrate-the-standalone-sso-api.md |
| Migrate from other services | references/workos-migrate-other-services.md |
Management & CLI Lifecycle (Read references/{name}.md)
| User wants to... | Read file |
|---|
| Manage WorkOS resources via CLI commands | references/workos-management.md |
Upgrade the workos CLI to a newer version | references/workos-cli-upgrade.md |
Routing Decision Tree
Apply these rules in order. First match wins.
0. Terminology / Docs URL Lookup
Triggers: Lookup-shaped phrasing — "what is X", "what does X mean", "docs URL for X", "where's the docs on X", "canonical link for X", "where do I configure X in the dashboard" — where X is a WorkOS-specific config field, endpoint, env var, or term. Examples: initiate_login_uri, "Sign-in endpoint", "Redirect URI", dashboard field names, WORKOS_* environment variables.
Do NOT fire Rule 0 for setup-shaped phrasing like "set up Vault", "enable Admin Portal", "configure MFA" — those route to Rule 3 (Feature-Specific).
Action:
- Read
references/workos-terms.md — a curated table mapping WorkOS terms to canonical docs URLs.
- If the term is in the table, use the summary to answer; WebFetch the listed URL only if the user wants more detail.
- If the term is NOT in the table, follow the "Still not here?" fallback at the bottom of that file. When you find the canonical URL, answer the user and suggest they open a PR to add a row.
For terminology lookups, do NOT WebFetch llms.txt or guess workos.com/docs/... URLs before reading the terms file. (Rules 7 and 8 use llms.txt for different purposes — this prohibition is scoped to Rule 0 only.)
Why this wins: Terminology lookups happen independent of feature/framework/migration context. They need to short-circuit routing, not fall through to "Vague or General" (Rule 7).
1. Migration Context
Triggers: User mentions migrating FROM another provider (Auth0, Clerk, Cognito, Firebase, Supabase, Stytch, Descope, Better Auth, standalone SSO API).
Action: Read references/workos-migrate-[provider].md where [provider] matches the source system. If provider is not in the table, read references/workos-migrate-other-services.md.
Why this wins: Migration context overrides feature-specific routing because users need provider-specific data export and transformation steps.
2. API Reference Request
Triggers: User explicitly asks about "API endpoints", "request format", "response schema", "API reference", or mentions inspecting HTTP details.
Action: For features with topic files (SSO, Directory Sync, RBAC, Vault, Events, Audit Logs, Admin Portal), read the feature topic file — it includes an endpoint table. For AuthKit or Organization APIs, read references/workos-api-[domain].md.
Why this wins: API references are low-level; feature topics are high-level but include endpoint tables for quick reference.
3. Feature-Specific Request
Triggers: User mentions a specific WorkOS feature by name (SSO, MFA, Directory Sync, Audit Logs, Vault, RBAC, FGA, Admin Portal, Custom Domains, Events, Integrations, Email, Pipes, Feature Flags, Radar).
Action: Read references/workos-[feature].md where [feature] is the lowercase slug (sso, mfa, directory-sync, audit-logs, vault, rbac, fga, admin-portal, custom-domains, events, integrations, email, pipes, feature-flags, radar).
Exception: Widget requests load the workos-widgets skill via the Skill tool — it has its own orchestration.
Disambiguation: If user mentions BOTH a feature and "API", route to the feature topic file (it includes endpoints). If they mention MULTIPLE features, route to the MOST SPECIFIC one first (e.g., "SSO with MFA" → route to SSO; user can request MFA separately). If user mentions "FGA" or "fine-grained authorization", route to workos-fga — NOT workos-rbac. RBAC is org-level roles; FGA is resource-scoped roles on top of RBAC.
Special case — IdP group → role mapping: If the user asks about mapping Entra / Azure AD / Okta / Google Workspace / SCIM / directory / SSO groups to WorkOS roles (regardless of exact phrasing), read BOTH workos-rbac.md AND the source-specific reference:
- Directory Sync / SCIM / Google Workspace groups → also read
workos-directory-sync.md
- SSO-only groups → also read
workos-sso.md
Both files now have a canonical recipe. Do not answer from memory or paraphrase dashboard menu paths — the docs don't commit to exact click-paths, so neither should you. This mapping is not a WorkOS CLI operation; if asked for a CLI command, state that it's not in the CLI and link the docs.
4. AuthKit Installation
Triggers: User mentions authentication setup, login flow, sign-up, session management, or explicitly says "AuthKit" WITHOUT mentioning a specific feature like SSO or MFA.
Action: Detect framework and language using the priority-ordered checks below. Read the corresponding reference file.
Disambiguation:
- If user says "SSO login via AuthKit", route to
workos-sso (#3) — feature wins over framework.
- If user says "React login with Google", route to AuthKit React (#4) — this is AuthKit-level auth, not SSO API.
- If user is ALREADY using AuthKit and wants to add a feature (e.g., "add MFA to my AuthKit app"), route to the feature reference (#3), not back to AuthKit installation.
Framework Detection Priority (AuthKit only)
Check in this exact order. First match wins:
1. `@tanstack/start` in package.json dependencies
→ Read: references/workos-authkit-tanstack-start.md
2. `@sveltejs/kit` in package.json dependencies
→ Read: references/workos-authkit-sveltekit.md
3. `react-router` or `react-router-dom` in package.json dependencies
→ Read: references/workos-authkit-react-router.md
4. `next.config.js` OR `next.config.mjs` OR `next.config.ts` exists in project root
→ Read: references/workos-authkit-nextjs.md
5. (`vite.config.js` OR `vite.config.ts` exists) AND `react` in package.json dependencies
→ Read: references/workos-authkit-react.md
6. NONE of the above detected
→ Read: references/workos-authkit-vanilla-js.md
Language Detection (Backend SDKs)
If the project is NOT a JavaScript/TypeScript frontend framework, check:
1. `pyproject.toml` OR `requirements.txt` OR `setup.py` exists
→ Read: references/workos-python.md
2. `go.mod` exists
→ Read: references/workos-go.md
3. `Gemfile` exists OR `config/routes.rb` exists
→ Read: references/workos-ruby.md
4. `composer.json` exists AND `laravel/framework` in dependencies
→ Read: references/workos-php-laravel.md
5. `composer.json` exists (without Laravel)
→ Read: references/workos-php.md
6. `*.csproj` OR `*.sln` exists
→ Read: references/workos-dotnet.md
7. `build.gradle.kts` OR `build.gradle` exists
→ Read: references/workos-kotlin.md
8. `mix.exs` exists
→ Read: references/workos-elixir.md
9. `package.json` exists with `express` / `fastify` / `hono` / `koa` (backend JS)
→ Read: references/workos-node.md
Why this order: TanStack, SvelteKit, and React Router are MORE specific than Next.js/Vite+React. A project can have both Next.js AND React Router; in that case, React Router wins because it's more specific. Vanilla JS is the fallback when no framework is detected. Backend languages are checked when no frontend framework is found.
Edge case — multiple frameworks detected: If you detect conflicting signals (e.g., both next.config.js and @tanstack/start), ASK the user which one they want to use. Do NOT guess.
Edge case — framework unclear from context: If the user says "add login" but you cannot scan files (remote repo, no access), ASK: "Which framework/language are you using?" Do NOT default without confirmation.
5. Integration Setup
Triggers: User mentions connecting to external IdPs, configuring third-party integrations, or asks "how do I integrate with [provider]".
Action: Read references/workos-integrations.md.
Why separate from SSO: SSO covers the authentication flow; Integrations covers IdP configuration and connection setup. If user mentions BOTH ("set up Google SSO"), route to SSO (#3) — it will reference Integrations where needed.
6. Management / CLI Operations
Triggers: User mentions managing WorkOS resources (organizations, users, roles, permissions), seeding data, or CLI management commands.
Action: Read references/workos-management.md.
Sub-case — CLI upgrade: If the user reports an outdated workos CLI (workos --version shows an old release, unknown command errors after following recent docs, or asks "how do I update the workos CLI?"), read references/workos-cli-upgrade.md instead. Do NOT guess the latest version — that file tells you to instruct the user to run npm view workos version.
7. Vague or General Request
Triggers: User says "help with WorkOS", "WorkOS setup", "what can WorkOS do", or provides no feature-specific context.
Action:
- WebFetch https://workos.com/docs/llms.txt
- Scan the index for the section that best matches the user's likely intent
- WebFetch the specific section URL
- Summarize capabilities and ASK the user what they want to accomplish
Do NOT guess a feature — force disambiguation by showing options.
8. No Match / Ambiguous
Triggers: None of the above rules match, OR the request is genuinely ambiguous.
Action:
- WebFetch https://workos.com/docs/llms.txt
- Search the index for keywords from the user's request
- If you find a match, WebFetch that section URL and proceed
- If NO match, respond: "I couldn't find a WorkOS feature matching '[user's term]'. Could you clarify? For example: authentication, SSO, MFA, directory sync, audit logs, etc."
Edge Cases
User mentions multiple features
Route to the MOST SPECIFIC reference first. Example: "SSO with MFA and directory sync" → route to workos-sso first. After completing SSO setup, the user can request MFA and Directory Sync separately.
User mentions a feature + API reference
Route to the feature topic file — it includes an endpoint table. Example: "SSO API endpoints" → workos-sso.md.
User wants to ADD a feature to an existing AuthKit setup
Route to the feature reference (#3), not back to AuthKit installation. Example: "I'm using AuthKit in Next.js and want to add SSO" → workos-sso.md.
User mentions a provider but no feature
Route to Integrations (#5). Example: "How do I connect Okta?" → workos-integrations.md.
User mentions a provider AND a feature
Route to the feature reference (#3). Example: "Set up Okta SSO" → workos-sso.md (it will reference Integrations for Okta setup).
Unknown framework for AuthKit
If you cannot detect framework and the user hasn't specified, ASK: "Which framework/language are you using?" Do NOT default without confirmation.
Framework conflicts (multiple frameworks detected)
If detection finds conflicting signals (e.g., both Next.js and TanStack Start configs), ASK: "I see both [framework A] and [framework B]. Which one do you want to use for AuthKit?"
User provides no context at all
Follow step #7 (Vague or General Request): fetch llms.txt, show options, and force disambiguation.