Configure SAML 2.0 and OIDC SSO for Cursor with Okta, Microsoft Entra ID, and Google Workspace. Triggers on "cursor sso", "cursor saml", "cursor oauth", "enterprise cursor auth", "cursor okta", "cursor entra", "cursor scim".
84
82%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Quality
Discovery
100%Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.
This is a strong skill description that clearly identifies its domain (Cursor SSO configuration), lists specific protocols and identity providers, and provides explicit trigger terms. It is concise, specific, and highly distinguishable from other skills. The only minor note is that it uses a 'Triggers on' format rather than the more conventional 'Use when' phrasing, but it effectively serves the same purpose.
| Dimension | Reasoning | Score |
|---|---|---|
Specificity | Lists specific concrete actions: configuring SAML 2.0 and OIDC SSO, names specific identity providers (Okta, Microsoft Entra ID, Google Workspace), and specifies the target application (Cursor). | 3 / 3 |
Completeness | Clearly answers both 'what' (configure SAML 2.0 and OIDC SSO for Cursor with specific IdPs) and 'when' (explicit trigger terms listed with 'Triggers on' clause serving as the equivalent of a 'Use when' clause). | 3 / 3 |
Trigger Term Quality | Includes excellent natural trigger terms that users would actually say: 'cursor sso', 'cursor saml', 'cursor oauth', 'enterprise cursor auth', 'cursor okta', 'cursor entra', 'cursor scim' — covering multiple common variations and specific provider names. | 3 / 3 |
Distinctiveness Conflict Risk | Highly distinctive — the combination of Cursor + SSO/SAML/OIDC + specific identity providers creates a very clear niche that is unlikely to conflict with other skills. The trigger terms are all Cursor-specific. | 3 / 3 |
Total | 12 / 12 Passed |
Implementation
64%Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.
This is a solid, actionable SSO configuration guide with concrete URLs, field values, and step-by-step instructions for three major identity providers. Its main weaknesses are the monolithic structure (could benefit from splitting IdP-specific guides into separate files), the inclusion of project management content (rollout strategy) that inflates token usage without adding technical value, and the missing OIDC configuration despite being mentioned in the introduction.
Suggestions
Split IdP-specific configurations (Okta, Entra ID, Google Workspace) into separate referenced files to improve progressive disclosure and reduce main file length.
Remove or significantly trim the Rollout Strategy section—this is project management guidance that doesn't help Claude configure SSO technically.
Add inline validation checkpoints within workflows, e.g., 'After uploading metadata, verify the SSO status shows Active before proceeding to test' or 'If metadata upload fails, verify XML is well-formed.'
Add the OIDC configuration that is promised in the introduction, or remove the OIDC mention to avoid a gap.
| Dimension | Reasoning | Score |
|---|---|---|
Conciseness | The skill is mostly efficient with good use of tables and code blocks, but includes some unnecessary content like the 'Understanding of SAML 2.0 or OIDC concepts' prerequisite, the rollout strategy checklists (which are project management guidance Claude doesn't need), and enterprise considerations that are more informational than actionable. The pricing note and compliance bullet are filler. | 2 / 3 |
Actionability | Provides specific URLs, exact field names, concrete attribute mappings, DNS record formats, and step-by-step instructions for three major IdPs. The SCIM configuration includes exact endpoint URLs and field values. Everything is copy-paste ready for someone configuring SSO. | 3 / 3 |
Workflow Clarity | Steps are clearly sequenced for each IdP with numbered workflows, and the testing step is included. However, there are no explicit validation checkpoints or error recovery loops within the configuration steps—e.g., no 'verify the metadata XML is valid before uploading' or 'if upload fails, check X.' The troubleshooting table is helpful but reactive rather than integrated into the workflow. | 2 / 3 |
Progressive Disclosure | The content is well-structured with clear headers and sections, but it's a monolithic document (~180 lines) with no bundle files. The three IdP configurations, SCIM setup, rollout strategy, and troubleshooting could be split into separate referenced files. The OIDC configuration mentioned in the intro is never actually covered, which is a gap. | 2 / 3 |
Total | 9 / 12 Passed |
Validation
81%Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.
Validation — 9 / 11 Passed
Validation for skill structure
| Criteria | Description | Result |
|---|---|---|
allowed_tools_field | 'allowed-tools' contains unusual tool name(s) | Warning |
frontmatter_unknown_keys | Unknown frontmatter key(s) found; consider removing or moving to metadata | Warning |
Total | 9 / 11 Passed | |
3a2d27d
Table of Contents
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.