diff --git a/src/components/templates/agent-connectors/_section-after-setup-twitter-common-workflows.mdx b/src/components/templates/agent-connectors/_section-after-setup-twitter-common-workflows.mdx
index 560a9ea98..8a0b405b9 100644
--- a/src/components/templates/agent-connectors/_section-after-setup-twitter-common-workflows.mdx
+++ b/src/components/templates/agent-connectors/_section-after-setup-twitter-common-workflows.mdx
@@ -23,7 +23,7 @@ import { Tabs, TabItem } from '@astrojs/starlight/components'
identifier: 'user_123',
path: '/2/tweets',
method: 'POST',
- body: { text: 'Hello from Scalekit Agent Auth!' },
+ body: { text: 'Hello from Scalekit AgentKit!' },
});
console.log('Posted tweet:', tweet);
@@ -55,7 +55,7 @@ import { Tabs, TabItem } from '@astrojs/starlight/components'
identifier='user_123',
path="/2/tweets",
method="POST",
- body={"text": "Hello from Scalekit Agent Auth!"}
+ body={"text": "Hello from Scalekit AgentKit!"}
)
print("Posted tweet:", tweet)
diff --git a/src/components/templates/agent-connectors/_setup-apifymcp.mdx b/src/components/templates/agent-connectors/_setup-apifymcp.mdx
index 71e667ad0..e4875da85 100644
--- a/src/components/templates/agent-connectors/_setup-apifymcp.mdx
+++ b/src/components/templates/agent-connectors/_setup-apifymcp.mdx
@@ -9,7 +9,7 @@ Register your Apify API token with Scalekit so it can authenticate and proxy Act
- In the left sidebar, click your avatar → **Settings** → **API & Integrations** → **API tokens**.
- - Click **+ Create new token**. Give it a name (e.g., `Agent Auth`) and click **Create token**.
+ - Click **+ Create new token**. Give it a name (e.g., `AgentKit`) and click **Create token**.
- Copy the token immediately — it will not be shown again.
diff --git a/src/components/templates/agent-connectors/_setup-attio.mdx b/src/components/templates/agent-connectors/_setup-attio.mdx
index fadbdadb8..d6f7e2115 100644
--- a/src/components/templates/agent-connectors/_setup-attio.mdx
+++ b/src/components/templates/agent-connectors/_setup-attio.mdx
@@ -17,7 +17,7 @@ Register your Attio OAuth app credentials with Scalekit so it can manage the OAu
- Click the copy icon next to the Redirect URI to copy it to your clipboard.
-
+
Keep this tab open — you'll return to it in step 3.
diff --git a/src/components/templates/agent-connectors/_setup-brave-search.mdx b/src/components/templates/agent-connectors/_setup-brave-search.mdx
index 5be5ca728..e912c5e44 100644
--- a/src/components/templates/agent-connectors/_setup-brave-search.mdx
+++ b/src/components/templates/agent-connectors/_setup-brave-search.mdx
@@ -7,7 +7,7 @@ Register your Brave Search API key with Scalekit so it can authenticate and prox
- Go to [api.search.brave.com](https://api.search.brave.com) and sign in or create a free account.
- - In the left sidebar, click **API Keys** → **+ New Key**. Give it a name (e.g., `Agent Auth`) and click **Create**.
+ - In the left sidebar, click **API Keys** → **+ New Key**. Give it a name (e.g., `AgentKit`) and click **Create**.
- Copy the key immediately — it is shown only once.
diff --git a/src/components/templates/agent-connectors/_setup-diarize.mdx b/src/components/templates/agent-connectors/_setup-diarize.mdx
index 81c473d55..4d7fe198d 100644
--- a/src/components/templates/agent-connectors/_setup-diarize.mdx
+++ b/src/components/templates/agent-connectors/_setup-diarize.mdx
@@ -7,7 +7,7 @@ Register your Diarize API key with Scalekit so it can authenticate and proxy tra
- Sign in to [diarize.io](https://diarize.io) and go to **Settings** → **API Keys**.
- - Click **+ Create New Key**, give it a name (e.g., `Agent Auth`), and confirm.
+ - Click **+ Create New Key**, give it a name (e.g., `AgentKit`), and confirm.
- Copy the key value — store it securely, as you will not be able to view it again.
diff --git a/src/components/templates/agent-connectors/_setup-exa.mdx b/src/components/templates/agent-connectors/_setup-exa.mdx
index 430eeac22..70ebf124e 100644
--- a/src/components/templates/agent-connectors/_setup-exa.mdx
+++ b/src/components/templates/agent-connectors/_setup-exa.mdx
@@ -7,7 +7,7 @@ Register your Exa API key with Scalekit so it can authenticate and proxy request
- Sign in to [dashboard.exa.ai/api-keys](https://dashboard.exa.ai/api-keys). Under **Management**, click **API Keys**.
- - Click **+ Create Key**, enter a name (e.g., `Agent Auth`), and confirm.
+ - Click **+ Create Key**, enter a name (e.g., `AgentKit`), and confirm.
- In the **Secret Key** column, click the eye icon to reveal the key and copy it. Store it somewhere safe — you will not be able to view it again.
diff --git a/src/components/templates/agent-connectors/_setup-parallelaitaskmcp.mdx b/src/components/templates/agent-connectors/_setup-parallelaitaskmcp.mdx
index 399543859..b9a6bff7b 100644
--- a/src/components/templates/agent-connectors/_setup-parallelaitaskmcp.mdx
+++ b/src/components/templates/agent-connectors/_setup-parallelaitaskmcp.mdx
@@ -9,7 +9,7 @@ Register your Parallel AI API key with Scalekit so it can authenticate and proxy
- Navigate to **Settings** → **API Keys** and click **Create new key**.
- - Give the key a name (e.g., `Agent Auth`) and copy it immediately — it will not be shown again.
+ - Give the key a name (e.g., `AgentKit`) and copy it immediately — it will not be shown again.
2. ## Create a connection in Scalekit
diff --git a/src/components/templates/agent-connectors/_setup-supadata.mdx b/src/components/templates/agent-connectors/_setup-supadata.mdx
index bc4fa3864..bc4a207ed 100644
--- a/src/components/templates/agent-connectors/_setup-supadata.mdx
+++ b/src/components/templates/agent-connectors/_setup-supadata.mdx
@@ -10,7 +10,7 @@ Register your Scalekit environment with the Supadata connector so Scalekit can p
- Go to [dash.supadata.ai](https://dash.supadata.ai) and sign up or sign in. No credit card is required for the free tier.
- After signing in, click **API Keys** in the left sidebar.
- Your auto-generated key is listed in the table. Click the key row to reveal or copy it.
- - To create a new dedicated key for this integration, click **+ New Key**, give it a name (e.g., `Agent Auth`), and click **Create**.
+ - To create a new dedicated key for this integration, click **+ New Key**, give it a name (e.g., `AgentKit`), and click **Create**.

diff --git a/src/components/templates/agent-connectors/_setup-tableau.mdx b/src/components/templates/agent-connectors/_setup-tableau.mdx
index b02fb84a2..52c858f49 100644
--- a/src/components/templates/agent-connectors/_setup-tableau.mdx
+++ b/src/components/templates/agent-connectors/_setup-tableau.mdx
@@ -24,7 +24,7 @@ Scalekit handles session token management automatically. You store your Personal
2. ### Create a connection in Scalekit
- - In [Scalekit dashboard](https://app.scalekit.com), go to **Agent Auth** → **Create Connection**.
+ - In [Scalekit dashboard](https://app.scalekit.com), go to **AgentKit** → **Create Connection**.
- Search for **Tableau** and click **Create**.
- Note the **Connection name** — use this as `connection_name` in your code (e.g., `tableau`).
- Click **Save**.
diff --git a/src/components/templates/agent-connectors/_setup-twitter.mdx b/src/components/templates/agent-connectors/_setup-twitter.mdx
index 4293a5891..6d6805535 100644
--- a/src/components/templates/agent-connectors/_setup-twitter.mdx
+++ b/src/components/templates/agent-connectors/_setup-twitter.mdx
@@ -7,7 +7,7 @@ Register your Twitter app credentials with Scalekit so it can manage the OAuth 2
- In [Scalekit dashboard](https://app.scalekit.com), go to **AgentKit** > **Connections** > **Create Connection**. Search for **Twitter** and click **Create**.
- 
+ 
- In the **Configure Twitter Connection** panel, copy the **Redirect URI**. It looks like `https:///sso/v1/oauth//callback`. You'll paste this into Twitter in the next step.
diff --git a/src/components/templates/agent-connectors/_setup-youtube.mdx b/src/components/templates/agent-connectors/_setup-youtube.mdx
index d426763c8..67e4b3e67 100644
--- a/src/components/templates/agent-connectors/_setup-youtube.mdx
+++ b/src/components/templates/agent-connectors/_setup-youtube.mdx
@@ -40,7 +40,7 @@ Register your Google OAuth 2.0 credentials with Scalekit so it can manage the OA
- In Scalekit dashboard , go to **AgentKit** > **Connections** > **Create Connection**.
-
+
- Search for **YouTube** and click **Create**.
diff --git a/src/components/templates/coding-agents/_agentkit-claude-code.mdx b/src/components/templates/coding-agents/_agentkit-claude-code.mdx
index dbe190cbe..c375ec263 100644
--- a/src/components/templates/coding-agents/_agentkit-claude-code.mdx
+++ b/src/components/templates/coding-agents/_agentkit-claude-code.mdx
@@ -5,7 +5,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Not yet on Claude Code? Follow the [official quickstart guide](https://code.claude.com/docs/en/quickstart) to install it.
- Register Scalekit's plugin marketplace to access pre-configured authentication skills. This marketplace provides context-aware prompts and implementation guides that help coding agents generate correct Agent Auth code.
+ Register Scalekit's plugin marketplace to access pre-configured authentication skills. This marketplace provides context-aware prompts and implementation guides that help coding agents generate correct AgentKit code.
Start the Claude Code REPL:
@@ -26,7 +26,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
⎿ Successfully added marketplace: scalekit-auth-stack
```
- The marketplace provides specialized authentication plugins that understand Agent Auth patterns and OAuth 2.0 security requirements. These plugins guide the coding agent to generate implementation code that matches your project structure.
+ The marketplace provides specialized authentication plugins that understand AgentKit patterns and OAuth 2.0 security requirements. These plugins guide the coding agent to generate implementation code that matches your project structure.
2. ## Enable authentication plugins
@@ -35,7 +35,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Directly install the specific plugin:
```bash title="Claude REPL" showLineNumbers=false
- /plugin install agent-auth@scalekit-auth-stack
+ /plugin install agentkit@scalekit-auth-stack
```
@@ -47,7 +47,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
/plugins
```
- Navigate through the visual interface to enable the Agent Auth plugin.
+ Navigate through the visual interface to enable the AgentKit plugin.
Enable auto-updates for authentication plugins to receive security patches and improvements. Scalekit regularly updates plugins based on community feedback and security best practices.
@@ -57,7 +57,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
3. ## Generate authentication implementation
- Use a structured prompt to direct the coding agent. A well-formed prompt ensures the agent generates complete, production-ready Agent Auth code that includes all required security components.
+ Use a structured prompt to direct the coding agent. A well-formed prompt ensures the agent generates complete, production-ready AgentKit code that includes all required security components.
Copy the following prompt into your coding agent:
@@ -65,7 +65,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Guide me through configuring the installed Scalekit marketplace plugin to handle agent authentication for Gmail. Provide the code to trigger the auth flow, retrieve the secure user token, and then use that authenticated session to fetch and list the last 5 unread emails. Add logging to verify the flow.
```
- When you submit this prompt, Claude Code loads the Agent Auth skill from the marketplace -> analyzes your existing application structure -> generates Scalekit client initialization -> creates connected account management functions -> implements OAuth authorization link generation -> adds token fetching and refresh logic.
+ When you submit this prompt, Claude Code loads the AgentKit skills from the marketplace -> analyzes your existing application structure -> generates Scalekit client initialization -> creates connected account management functions -> implements OAuth authorization link generation -> adds token fetching and refresh logic.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_agentkit-codex.mdx b/src/components/templates/coding-agents/_agentkit-codex.mdx
index 9676fffe4..3a98c741a 100644
--- a/src/components/templates/coding-agents/_agentkit-codex.mdx
+++ b/src/components/templates/coding-agents/_agentkit-codex.mdx
@@ -17,15 +17,15 @@ import { Steps, Aside } from '@astrojs/starlight/components'
The installer avoids overwriting another personal marketplace by default. If it skips that file, follow the installer's manual path and select the marketplace from `~/.codex/marketplaces/scalekit-auth-stack/.agents/plugins/marketplace.json`.
-2. ## Enable the Agent Auth plugin
+2. ## Enable the AgentKit plugin
Restart Codex so it reloads installed marketplaces, then open the Plugin Directory and select **Scalekit Auth Stack**.
- Install the `agent-auth` plugin. This plugin includes the workflows, connector guidance, and references Codex uses to generate Agent Auth code for connected accounts and delegated OAuth flows.
+ Install the `agentkit` plugin. This plugin includes the workflows, connector guidance, and references Codex uses to generate AgentKit code for connected accounts and delegated OAuth flows.
3. ## Generate the authentication implementation
- Use a structured prompt to direct Codex. A well-formed prompt helps Codex generate complete, production-ready Agent Auth code that includes all required security components.
+ Use a structured prompt to direct Codex. A well-formed prompt helps Codex generate complete, production-ready AgentKit code that includes all required security components.
Copy the following prompt into Codex:
@@ -33,7 +33,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Guide me through configuring the installed Scalekit marketplace plugin to handle agent authentication for Gmail. Provide the code to trigger the auth flow, retrieve the secure user token, and then use that authenticated session to fetch and list the last 5 unread emails. Add logging to verify the flow.
```
- When you submit this prompt, Codex loads the Agent Auth plugin from the Scalekit Auth Stack marketplace, analyzes your existing application structure, generates Scalekit client initialization, creates connected account management functions, implements OAuth authorization link generation, and adds token fetching and refresh logic.
+ When you submit this prompt, Codex loads the AgentKit plugin from the Scalekit Auth Stack marketplace, analyzes your existing application structure, generates Scalekit client initialization, creates connected account management functions, implements OAuth authorization link generation, and adds token fetching and refresh logic.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_agentkit-github-copilot-cli.mdx b/src/components/templates/coding-agents/_agentkit-github-copilot-cli.mdx
index 81cbf625f..0507a8be1 100644
--- a/src/components/templates/coding-agents/_agentkit-github-copilot-cli.mdx
+++ b/src/components/templates/coding-agents/_agentkit-github-copilot-cli.mdx
@@ -5,20 +5,20 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Need to install GitHub Copilot CLI? See the [getting started guide](https://docs.github.com/en/copilot/how-tos/copilot-cli/cli-getting-started) — an active GitHub Copilot subscription is required.
- Register Scalekit's plugin marketplace to access pre-configured authentication plugins. This marketplace provides implementation skills that help GitHub Copilot generate correct Agent Auth code.
+ Register Scalekit's plugin marketplace to access pre-configured authentication plugins. This marketplace provides implementation skills that help GitHub Copilot generate correct AgentKit code.
```bash title="Terminal" frame="terminal" showLineNumbers=false
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
```
- The marketplace provides specialized plugins that understand Agent Auth patterns and OAuth 2.0 security requirements. These plugins guide GitHub Copilot to generate implementation code that matches your project structure.
+ The marketplace provides specialized plugins that understand AgentKit patterns and OAuth 2.0 security requirements. These plugins guide GitHub Copilot to generate implementation code that matches your project structure.
-2. ## Install the Agent Auth plugin
+2. ## Install the AgentKit plugin
- Install the Agent Auth plugin to give GitHub Copilot the skills needed to generate agent authentication code:
+ Install the AgentKit plugin to give GitHub Copilot the skills needed to generate agent authentication code:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- copilot plugin install agent-auth@scalekit-auth-stack
+ copilot plugin install agentkit@scalekit-auth-stack
```
@@ -34,7 +34,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Update authentication plugins regularly to receive security patches and improvements:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- copilot plugin update agent-auth@scalekit-auth-stack
+ copilot plugin update agentkit@scalekit-auth-stack
```
@@ -42,7 +42,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
3. ## Generate authentication implementation
- Use a structured prompt to direct GitHub Copilot. A well-formed prompt ensures the agent generates complete, production-ready Agent Auth code that includes all required security components.
+ Use a structured prompt to direct GitHub Copilot. A well-formed prompt ensures the agent generates complete, production-ready AgentKit code that includes all required security components.
Copy the following command into your terminal:
@@ -50,7 +50,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
copilot "Configure Scalekit agent authentication for Gmail — provide the code to trigger the auth flow, retrieve the secure user token, and then use that authenticated session to fetch and list the last 5 unread emails. Add logging to verify the flow."
```
- GitHub Copilot uses the Agent Auth plugin to analyze your existing application structure, generate Scalekit client initialization code, create connected account management functions, implement OAuth authorization link generation, and add token fetching and refresh logic.
+ GitHub Copilot uses the AgentKit plugin to analyze your existing application structure, generate Scalekit client initialization code, create connected account management functions, implement OAuth authorization link generation, and add token fetching and refresh logic.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_cursor.mdx b/src/components/templates/coding-agents/_cursor.mdx
index 930800cce..43882ad29 100644
--- a/src/components/templates/coding-agents/_cursor.mdx
+++ b/src/components/templates/coding-agents/_cursor.mdx
@@ -25,7 +25,7 @@ Until then, use the local installer to load the plugins into Cursor.
{/* IMAGE PLACEHOLDER: Screenshot of Cursor Settings > Plugins showing Scalekit Auth Stack */}
- Select the authentication plugin you need, such as **Full Stack Auth**, **Modular SSO**, or **MCP Auth**, and enable it.
+ Select the authentication plugin you need, such as **AgentKit** or **SaaSKit**, and enable it.
You can also install Scalekit skills with the Vercel Skills CLI:
diff --git a/src/components/templates/coding-agents/_fsa-claude-code.mdx b/src/components/templates/coding-agents/_fsa-claude-code.mdx
index 824b4e8e2..fd6462c5e 100644
--- a/src/components/templates/coding-agents/_fsa-claude-code.mdx
+++ b/src/components/templates/coding-agents/_fsa-claude-code.mdx
@@ -6,7 +6,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Not yet on Claude Code? Follow the [official quickstart guide](https://code.claude.com/docs/en/quickstart) to install it.
- Register Scalekit's plugin marketplace to access pre-configured authentication skills. This marketplace provides context-aware prompts and implementation guides that help coding agents generate correct Full Stack Auth code.
+ Register Scalekit's plugin marketplace to access pre-configured authentication skills. This marketplace provides context-aware prompts and implementation guides that help coding agents generate correct SaaSKit auth code.
Start the Claude Code REPL:
@@ -27,7 +27,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
⎿ Successfully added marketplace: scalekit-auth-stack
```
- The marketplace provides specialized authentication plugins that understand full-stack auth patterns and OAuth 2.0 security requirements. These plugins guide the coding agent to generate implementation code that matches your project structure.
+ The marketplace provides specialized authentication plugins that understand SaaSKit auth patterns and OAuth 2.0 security requirements. These plugins guide the coding agent to generate implementation code that matches your project structure.
2. ## Enable authentication plugins
@@ -36,7 +36,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Directly install the specific plugin:
```bash title="Claude REPL" showLineNumbers=false
- /plugin install full-stack-auth@scalekit-auth-stack
+ /plugin install saaskit@scalekit-auth-stack
```
@@ -48,7 +48,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
/plugins
```
- Navigate through the visual interface to enable the Full Stack Auth plugin.
+ Navigate through the visual interface to enable the SaaSKit plugin.
Enable auto-updates for authentication plugins to receive security patches and improvements. Scalekit regularly updates plugins based on community feedback and security best practices.
@@ -58,7 +58,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
3. ## Generate authentication implementation
- Use a structured prompt to direct the coding agent. A well-formed prompt ensures the agent generates complete, production-ready Full Stack Auth code that includes all required security components.
+ Use a structured prompt to direct the coding agent. A well-formed prompt ensures the agent generates complete, production-ready SaaSKit auth code that includes all required security components.
Copy the following prompt into your coding agent:
@@ -66,7 +66,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Guide the coding agent to implement Scalekit full-stack auth — initialize ScalekitClient with environment credentials, implement the login redirect, handle the OAuth callback to exchange the code for tokens, store the session securely, and add a logout endpoint that clears the session. Code only.
```
- When you submit this prompt, Claude Code loads the Full Stack Auth skill from the marketplace -> analyzes your existing application structure -> generates Scalekit client initialization with environment credentials -> creates the login redirect handler -> implements the OAuth callback to exchange the authorization code for tokens -> adds secure session storage and a logout endpoint.
+ When you submit this prompt, Claude Code loads the SaaSKit auth skills from the marketplace -> analyzes your existing application structure -> generates Scalekit client initialization with environment credentials -> creates the login redirect handler -> implements the OAuth callback to exchange the authorization code for tokens -> adds secure session storage and a logout endpoint.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_fsa-codex.mdx b/src/components/templates/coding-agents/_fsa-codex.mdx
index 92405c3f8..89e732e8c 100644
--- a/src/components/templates/coding-agents/_fsa-codex.mdx
+++ b/src/components/templates/coding-agents/_fsa-codex.mdx
@@ -18,15 +18,15 @@ import { Steps, Aside } from '@astrojs/starlight/components'
The installer avoids overwriting another personal marketplace by default. If it skips that file, follow the installer's manual path and select the marketplace from `~/.codex/marketplaces/scalekit-auth-stack/.agents/plugins/marketplace.json`.
-2. ## Enable the Full Stack Auth plugin
+2. ## Enable the SaaSKit plugin
Restart Codex so it reloads installed marketplaces, then open the Plugin Directory and select **Scalekit Auth Stack**.
- Install the `full-stack-auth` plugin. This plugin includes the workflows, references, and prompts Codex uses to generate Full Stack Auth code that matches your existing project structure.
+ Install the `saaskit` plugin. This plugin includes the workflows, references, and prompts Codex uses to generate SaaSKit auth code that matches your existing project structure.
3. ## Generate the authentication implementation
- Use a structured prompt to direct Codex. A well-formed prompt helps Codex generate complete, production-ready Full Stack Auth code that includes the core security components.
+ Use a structured prompt to direct Codex. A well-formed prompt helps Codex generate complete, production-ready SaaSKit auth code that includes the core security components.
Copy the following prompt into Codex:
@@ -34,7 +34,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Guide the coding agent to implement Scalekit full-stack auth — initialize ScalekitClient with environment credentials, implement the login redirect, handle the OAuth callback to exchange the code for tokens, store the session securely, and add a logout endpoint that clears the session. Code only.
```
- When you submit this prompt, Codex loads the Full Stack Auth plugin from the Scalekit Auth Stack marketplace, analyzes your existing application structure, generates Scalekit client initialization with environment credentials, creates the login redirect handler, implements the OAuth callback to exchange the authorization code for tokens, and adds secure session storage with a logout endpoint.
+ When you submit this prompt, Codex loads the SaaSKit plugin from the Scalekit Auth Stack marketplace, analyzes your existing application structure, generates Scalekit client initialization with environment credentials, creates the login redirect handler, implements the OAuth callback to exchange the authorization code for tokens, and adds secure session storage with a logout endpoint.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_fsa-github-copilot-cli.mdx b/src/components/templates/coding-agents/_fsa-github-copilot-cli.mdx
index 2162d1725..d479703d3 100644
--- a/src/components/templates/coding-agents/_fsa-github-copilot-cli.mdx
+++ b/src/components/templates/coding-agents/_fsa-github-copilot-cli.mdx
@@ -5,20 +5,20 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Need to install GitHub Copilot CLI? See the [getting started guide](https://docs.github.com/en/copilot/how-tos/copilot-cli/cli-getting-started) — an active GitHub Copilot subscription is required.
- Register Scalekit's plugin marketplace to access pre-configured authentication plugins. This marketplace provides implementation skills that help GitHub Copilot generate correct Full Stack Auth code.
+ Register Scalekit's plugin marketplace to access pre-configured authentication plugins. This marketplace provides implementation skills that help GitHub Copilot generate correct SaaSKit auth code.
```bash title="Terminal" frame="terminal" showLineNumbers=false
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
```
- The marketplace provides specialized plugins that understand full-stack auth patterns and OAuth 2.0 security requirements. These plugins guide GitHub Copilot to generate implementation code that matches your project structure.
+ The marketplace provides specialized plugins that understand SaaSKit auth patterns and OAuth 2.0 security requirements. These plugins guide GitHub Copilot to generate implementation code that matches your project structure.
-2. ## Install the Full Stack Auth plugin
+2. ## Install the SaaSKit plugin
- Install the Full Stack Auth plugin to give GitHub Copilot the skills needed to generate complete authentication code:
+ Install the SaaSKit plugin to give GitHub Copilot the skills needed to generate complete authentication code:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- copilot plugin install full-stack-auth@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
@@ -34,7 +34,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Update authentication plugins regularly to receive security patches and improvements:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- copilot plugin update full-stack-auth@scalekit-auth-stack
+ copilot plugin update saaskit@scalekit-auth-stack
```
@@ -42,7 +42,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
3. ## Generate authentication implementation
- Use a structured prompt to direct GitHub Copilot. A well-formed prompt ensures the agent generates complete, production-ready Full Stack Auth code that includes all required security components.
+ Use a structured prompt to direct GitHub Copilot. A well-formed prompt ensures the agent generates complete, production-ready SaaSKit auth code that includes all required security components.
Copy the following command into your terminal:
@@ -50,7 +50,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
copilot "Implement Scalekit full-stack auth — initialize ScalekitClient with environment credentials, implement the login redirect, handle the OAuth callback to exchange the code for tokens, store the session securely, and add a logout endpoint that clears the session. Code only."
```
- GitHub Copilot uses the Full Stack Auth plugin to analyze your existing application structure, generate Scalekit client initialization code, create the login redirect handler, implement the OAuth callback for token exchange, add secure session storage, and provide a logout endpoint.
+ GitHub Copilot uses the SaaSKit plugin to analyze your existing application structure, generate Scalekit client initialization code, create the login redirect handler, implement the OAuth callback for token exchange, add secure session storage, and provide a logout endpoint.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_mcp-auth-claude-code.mdx b/src/components/templates/coding-agents/_mcp-auth-claude-code.mdx
index 504234fa6..282693b34 100644
--- a/src/components/templates/coding-agents/_mcp-auth-claude-code.mdx
+++ b/src/components/templates/coding-agents/_mcp-auth-claude-code.mdx
@@ -39,7 +39,7 @@ import skillActivationImage from '@/assets/docs/ai-assisted-mcp-quickstart/skill
Directly install the specific plugin:
```bash title="Claude REPL" showLineNumbers=false
- /plugin install mcp-auth@scalekit-auth-stack
+ /plugin install saaskit@scalekit-auth-stack
```
diff --git a/src/components/templates/coding-agents/_mcp-auth-codex.mdx b/src/components/templates/coding-agents/_mcp-auth-codex.mdx
index 906051199..6df59d248 100644
--- a/src/components/templates/coding-agents/_mcp-auth-codex.mdx
+++ b/src/components/templates/coding-agents/_mcp-auth-codex.mdx
@@ -18,11 +18,11 @@ import { Steps, Aside } from '@astrojs/starlight/components'
The installer avoids overwriting another personal marketplace by default. If it skips that file, follow the installer's manual path and select the marketplace from `~/.codex/marketplaces/scalekit-auth-stack/.agents/plugins/marketplace.json`.
-2. ## Enable the MCP Auth plugin
+2. ## Enable the SaaSKit plugin
Restart Codex so it reloads installed marketplaces, then open the Plugin Directory and select **Scalekit Auth Stack**.
- Install the `mcp-auth` plugin. This plugin includes the workflows, framework-specific guidance, and references Codex uses to generate OAuth 2.1 protection for remote MCP servers.
+ Install the `saaskit` plugin. This plugin includes the workflows, framework-specific guidance, and references Codex uses to generate OAuth 2.1 protection for remote MCP servers.
3. ## Generate the authentication implementation
@@ -34,7 +34,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Add OAuth 2.1 authentication to my MCP server using Scalekit. Initialize ScalekitClient with environment credentials, implement /.well-known/ metadata endpoint for discovery, and add authentication middleware that validates JWT bearer tokens on all MCP requests. Code only.
```
- When you submit this prompt, Codex loads the MCP Auth plugin from the Scalekit Auth Stack marketplace, analyzes your existing MCP server structure, generates authentication middleware with token validation, creates the OAuth discovery endpoint, and configures environment variable handling.
+ When you submit this prompt, Codex loads the SaaSKit plugin from the Scalekit Auth Stack marketplace, analyzes your existing MCP server structure, generates authentication middleware with token validation, creates the OAuth discovery endpoint, and configures environment variable handling.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_mcp-auth-github-copilot-cli.mdx b/src/components/templates/coding-agents/_mcp-auth-github-copilot-cli.mdx
index 899d87c34..eab4481c9 100644
--- a/src/components/templates/coding-agents/_mcp-auth-github-copilot-cli.mdx
+++ b/src/components/templates/coding-agents/_mcp-auth-github-copilot-cli.mdx
@@ -13,12 +13,12 @@ import { Steps, Aside } from '@astrojs/starlight/components'
The marketplace provides specialized plugins that understand MCP server architectures and OAuth 2.1 security requirements. These plugins guide GitHub Copilot to generate implementation code that matches your project structure.
-2. ## Install the MCP Auth plugin
+2. ## Install the SaaSKit plugin
- Install the MCP Auth plugin to give GitHub Copilot the skills needed to generate OAuth 2.1 authentication code for MCP servers:
+ Install the SaaSKit plugin to give GitHub Copilot the skills needed to generate OAuth 2.1 authentication code for MCP servers:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- copilot plugin install mcp-auth@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
@@ -34,7 +34,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Update authentication plugins regularly to receive security patches and improvements:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- copilot plugin update mcp-auth@scalekit-auth-stack
+ copilot plugin update saaskit@scalekit-auth-stack
```
@@ -50,7 +50,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
copilot "Add OAuth 2.1 authentication to my MCP server using Scalekit. Initialize ScalekitClient with environment credentials, implement /.well-known/ metadata endpoint for discovery, and add authentication middleware that validates JWT bearer tokens on all MCP requests. Code only."
```
- GitHub Copilot uses the MCP Auth plugin to analyze your existing MCP server structure, generate authentication middleware with token validation, create the OAuth discovery endpoint, and configure environment variable handling.
+ GitHub Copilot uses the SaaSKit plugin to analyze your existing MCP server structure, generate authentication middleware with token validation, create the OAuth discovery endpoint, and configure environment variable handling.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_scim-claude-code.mdx b/src/components/templates/coding-agents/_scim-claude-code.mdx
index 8cf2aa545..b6d4110cd 100644
--- a/src/components/templates/coding-agents/_scim-claude-code.mdx
+++ b/src/components/templates/coding-agents/_scim-claude-code.mdx
@@ -36,7 +36,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Directly install the specific plugin:
```bash title="Claude REPL" showLineNumbers=false
- /plugin install modular-scim@scalekit-auth-stack
+ /plugin install saaskit@scalekit-auth-stack
```
@@ -48,7 +48,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
/plugins
```
- Navigate through the visual interface to enable the Modular SCIM plugin.
+ Navigate through the visual interface to enable the SaaSKit plugin.
Enable auto-updates for SCIM plugins to receive security patches and improvements. Scalekit regularly updates plugins based on community feedback and security best practices.
@@ -66,7 +66,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Guide the coding agent to add Scalekit SCIM directory sync to my app — set up the webhook endpoint to receive SCIM events, validate the webhook signature, and handle user provisioning and deprovisioning events to create, update, and delete users in my database. Code only.
```
- When you submit this prompt, Claude Code loads the Modular SCIM skill from the marketplace -> analyzes your existing application structure -> generates a webhook endpoint to receive SCIM events from Scalekit -> implements webhook signature validation to prevent unauthorized requests -> creates handlers for user provisioning events (create and update) -> adds deprovisioning logic to delete or deactivate users in your database.
+ When you submit this prompt, Claude Code loads the SaaSKit SCIM skill from the marketplace -> analyzes your existing application structure -> generates a webhook endpoint to receive SCIM events from Scalekit -> implements webhook signature validation to prevent unauthorized requests -> creates handlers for user provisioning events (create and update) -> adds deprovisioning logic to delete or deactivate users in your database.
Always review AI-generated SCIM code before deployment. Verify that webhook signature validation, event handling logic, and database operations match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_scim-codex.mdx b/src/components/templates/coding-agents/_scim-codex.mdx
index e27d659f6..f63dca4a6 100644
--- a/src/components/templates/coding-agents/_scim-codex.mdx
+++ b/src/components/templates/coding-agents/_scim-codex.mdx
@@ -18,11 +18,11 @@ import { Steps, Aside } from '@astrojs/starlight/components'
The installer avoids overwriting another personal marketplace by default. If it skips that file, follow the installer's manual path and select the marketplace from `~/.codex/marketplaces/scalekit-auth-stack/.agents/plugins/marketplace.json`.
-2. ## Enable the Modular SCIM plugin
+2. ## Enable the SaaSKit plugin
Restart Codex so it reloads installed marketplaces, then open the Plugin Directory and select **Scalekit Auth Stack**.
- Install the `modular-scim` plugin. This plugin includes the workflows, references, and prompts Codex uses to generate SCIM provisioning and deprovisioning code for your application.
+ Install the `saaskit` plugin. This plugin includes the workflows, references, and prompts Codex uses to generate SCIM provisioning and deprovisioning code for your application.
3. ## Generate the SCIM implementation
@@ -34,7 +34,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Guide the coding agent to add Scalekit SCIM directory sync to my app — set up the webhook endpoint to receive SCIM events, validate the webhook signature, and handle user provisioning and deprovisioning events to create, update, and delete users in my database. Code only.
```
- When you submit this prompt, Codex loads the Modular SCIM plugin from the Scalekit Auth Stack marketplace, analyzes your existing application structure, generates a webhook endpoint to receive SCIM events from Scalekit, implements webhook signature validation to prevent unauthorized requests, creates handlers for user provisioning events, and adds deprovisioning logic to delete or deactivate users in your database.
+ When you submit this prompt, Codex loads the SaaSKit plugin from the Scalekit Auth Stack marketplace, analyzes your existing application structure, generates a webhook endpoint to receive SCIM events from Scalekit, implements webhook signature validation to prevent unauthorized requests, creates handlers for user provisioning events, and adds deprovisioning logic to delete or deactivate users in your database.
Always review AI-generated SCIM code before deployment. Verify that webhook signature validation, event handling logic, and database operations match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_scim-github-copilot-cli.mdx b/src/components/templates/coding-agents/_scim-github-copilot-cli.mdx
index 0bb1951d5..7b7a20b1a 100644
--- a/src/components/templates/coding-agents/_scim-github-copilot-cli.mdx
+++ b/src/components/templates/coding-agents/_scim-github-copilot-cli.mdx
@@ -14,12 +14,12 @@ import { Steps, Aside } from '@astrojs/starlight/components'
The marketplace provides specialized plugins that understand directory sync patterns and webhook security requirements. These plugins guide GitHub Copilot to generate implementation code that matches your project structure.
-2. ## Install the Modular SCIM plugin
+2. ## Install the SaaSKit plugin
- Install the Modular SCIM plugin to give GitHub Copilot the skills needed to generate SCIM webhook handling code:
+ Install the SaaSKit plugin to give GitHub Copilot the skills needed to generate SCIM webhook handling code:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- copilot plugin install modular-scim@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
@@ -35,7 +35,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Update SCIM plugins regularly to receive security patches and improvements:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- copilot plugin update modular-scim@scalekit-auth-stack
+ copilot plugin update saaskit@scalekit-auth-stack
```
@@ -51,7 +51,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
copilot "Add Scalekit SCIM directory sync to my app — set up the webhook endpoint to receive SCIM events, validate the webhook signature, and handle user provisioning and deprovisioning events to create, update, and delete users in my database. Code only."
```
- GitHub Copilot uses the Modular SCIM plugin to analyze your existing application structure, generate a webhook endpoint to receive SCIM events from Scalekit, implement webhook signature validation to prevent unauthorized requests, create handlers for user provisioning events (create and update), and add deprovisioning logic to delete or deactivate users in your database.
+ GitHub Copilot uses the SaaSKit plugin to analyze your existing application structure, generate a webhook endpoint to receive SCIM events from Scalekit, implement webhook signature validation to prevent unauthorized requests, create handlers for user provisioning events (create and update), and add deprovisioning logic to delete or deactivate users in your database.
Always review AI-generated SCIM code before deployment. Verify that webhook signature validation, event handling logic, and database operations match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_skills-cli.mdx b/src/components/templates/coding-agents/_skills-cli.mdx
index 250d3a322..008491a82 100644
--- a/src/components/templates/coding-agents/_skills-cli.mdx
+++ b/src/components/templates/coding-agents/_skills-cli.mdx
@@ -48,6 +48,6 @@ Supported agents include Claude Code, Cursor, GitHub Copilot CLI, OpenCode, Wind
npx skills add scalekit-inc/skills --all --global
```
- This installs skills for Full Stack Auth, Agent Auth, MCP Auth, Modular SSO, and Modular SCIM.
+ This installs skills for AgentKit and SaaSKit — covering agent auth, full-stack auth, MCP OAuth, SSO, SCIM, and more.
diff --git a/src/components/templates/coding-agents/_sso-claude-code.mdx b/src/components/templates/coding-agents/_sso-claude-code.mdx
index 7673f7ce5..7649c8ddb 100644
--- a/src/components/templates/coding-agents/_sso-claude-code.mdx
+++ b/src/components/templates/coding-agents/_sso-claude-code.mdx
@@ -6,7 +6,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Not yet on Claude Code? Follow the [official quickstart guide](https://code.claude.com/docs/en/quickstart) to install it.
- Register Scalekit's plugin marketplace to access pre-configured authentication skills. This marketplace provides context-aware prompts and implementation guides that help coding agents generate correct Modular SSO code.
+ Register Scalekit's plugin marketplace to access pre-configured authentication skills. This marketplace provides context-aware prompts and implementation guides that help coding agents generate correct SSO code.
Start the Claude Code REPL:
@@ -36,7 +36,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Directly install the specific plugin:
```bash title="Claude REPL" showLineNumbers=false
- /plugin install modular-sso@scalekit-auth-stack
+ /plugin install saaskit@scalekit-auth-stack
```
@@ -48,7 +48,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
/plugins
```
- Navigate through the visual interface to enable the Modular SSO plugin.
+ Navigate through the visual interface to enable the SaaSKit plugin.
Enable auto-updates for authentication plugins to receive security patches and improvements. Scalekit regularly updates plugins based on community feedback and security best practices.
@@ -66,7 +66,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Guide the coding agent to add Scalekit SSO to my existing app — initialize ScalekitClient, generate an SSO authorization URL for a given organization, handle the SSO callback to validate and exchange the code for user identity, and integrate the SSO user into my existing session system. Code only.
```
- When you submit this prompt, Claude Code loads the Modular SSO skill from the marketplace -> analyzes your existing application structure -> generates Scalekit client initialization with environment credentials -> creates an SSO authorization URL generator for organization-based routing -> implements the SSO callback handler to validate and exchange the code for user identity -> integrates SSO user data into your existing session system.
+ When you submit this prompt, Claude Code loads the SaaSKit SSO skill from the marketplace -> analyzes your existing application structure -> generates Scalekit client initialization with environment credentials -> creates an SSO authorization URL generator for organization-based routing -> implements the SSO callback handler to validate and exchange the code for user identity -> integrates SSO user data into your existing session system.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_sso-codex.mdx b/src/components/templates/coding-agents/_sso-codex.mdx
index 506a3e2cc..a1450e9d4 100644
--- a/src/components/templates/coding-agents/_sso-codex.mdx
+++ b/src/components/templates/coding-agents/_sso-codex.mdx
@@ -18,11 +18,11 @@ import { Steps, Aside } from '@astrojs/starlight/components'
The installer avoids overwriting another personal marketplace by default. If it skips that file, follow the installer's manual path and select the marketplace from `~/.codex/marketplaces/scalekit-auth-stack/.agents/plugins/marketplace.json`.
-2. ## Enable the Modular SSO plugin
+2. ## Enable the SaaSKit plugin
Restart Codex so it reloads installed marketplaces, then open the Plugin Directory and select **Scalekit Auth Stack**.
- Install the `modular-sso` plugin. This plugin includes the workflows, references, and prompts Codex uses to generate SAML and OIDC SSO code for your existing application.
+ Install the `saaskit` plugin. This plugin includes the workflows, references, and prompts Codex uses to generate SAML and OIDC SSO code for your existing application.
3. ## Generate the SSO implementation
@@ -34,7 +34,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Guide the coding agent to add Scalekit SSO to my existing app — initialize ScalekitClient, generate an SSO authorization URL for a given organization, handle the SSO callback to validate and exchange the code for user identity, and integrate the SSO user into my existing session system. Code only.
```
- When you submit this prompt, Codex loads the Modular SSO plugin from the Scalekit Auth Stack marketplace, analyzes your existing application structure, generates Scalekit client initialization with environment credentials, creates an SSO authorization URL generator for organization-based routing, implements the SSO callback handler to validate and exchange the code for user identity, and integrates SSO user data into your existing session system.
+ When you submit this prompt, Codex loads the SaaSKit plugin from the Scalekit Auth Stack marketplace, analyzes your existing application structure, generates Scalekit client initialization with environment credentials, creates an SSO authorization URL generator for organization-based routing, implements the SSO callback handler to validate and exchange the code for user identity, and integrates SSO user data into your existing session system.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/components/templates/coding-agents/_sso-github-copilot-cli.mdx b/src/components/templates/coding-agents/_sso-github-copilot-cli.mdx
index ae237d50f..c5bb397c1 100644
--- a/src/components/templates/coding-agents/_sso-github-copilot-cli.mdx
+++ b/src/components/templates/coding-agents/_sso-github-copilot-cli.mdx
@@ -5,7 +5,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Need to install GitHub Copilot CLI? See the [getting started guide](https://docs.github.com/en/copilot/how-tos/copilot-cli/cli-getting-started) — an active GitHub Copilot subscription is required.
- Register Scalekit's plugin marketplace to access pre-configured authentication plugins. This marketplace provides implementation skills that help GitHub Copilot generate correct Modular SSO code.
+ Register Scalekit's plugin marketplace to access pre-configured authentication plugins. This marketplace provides implementation skills that help GitHub Copilot generate correct SSO code.
```bash title="Terminal" frame="terminal" showLineNumbers=false
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
@@ -13,12 +13,12 @@ import { Steps, Aside } from '@astrojs/starlight/components'
The marketplace provides specialized plugins that understand SSO patterns and SAML/OIDC security requirements. These plugins guide GitHub Copilot to generate implementation code that matches your project structure.
-2. ## Install the Modular SSO plugin
+2. ## Install the SaaSKit plugin
- Install the Modular SSO plugin to give GitHub Copilot the skills needed to generate SSO code:
+ Install the SaaSKit plugin to give GitHub Copilot the skills needed to generate SSO code:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- copilot plugin install modular-sso@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
@@ -34,7 +34,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
Update authentication plugins regularly to receive security patches and improvements:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- copilot plugin update modular-sso@scalekit-auth-stack
+ copilot plugin update saaskit@scalekit-auth-stack
```
@@ -50,7 +50,7 @@ import { Steps, Aside } from '@astrojs/starlight/components'
copilot "Add Scalekit SSO to my existing app — initialize ScalekitClient, generate an SSO authorization URL for a given organization, handle the SSO callback to validate and exchange the code for user identity, and integrate the SSO user into my existing session system. Code only."
```
- GitHub Copilot uses the Modular SSO plugin to analyze your existing application structure, generate Scalekit client initialization code, create an SSO authorization URL generator for organization-based routing, implement the SSO callback handler to validate and exchange the code for user identity, and integrate SSO user data into your existing session system.
+ GitHub Copilot uses the SaaSKit plugin to analyze your existing application structure, generate Scalekit client initialization code, create an SSO authorization URL generator for organization-based routing, implement the SSO callback handler to validate and exchange the code for user identity, and integrate SSO user data into your existing session system.
Always review AI-generated authentication code before deployment. Verify that environment variables, token validation logic, and error handling match your security requirements. The coding agent provides a foundation, but you must ensure it aligns with your application's specific needs.
diff --git a/src/configs/agent-instructions.ts b/src/configs/agent-instructions.ts
index 194d578d6..7fe7aa04a 100644
--- a/src/configs/agent-instructions.ts
+++ b/src/configs/agent-instructions.ts
@@ -24,7 +24,7 @@ Skills CLI (Windsurf, Cline, and 40+ agents):
npx skills add scalekit-inc/skills --list
npx skills add scalekit-inc/skills --skill
- / : agentkit, full-stack-auth, mcp-auth, modular-sso, modular-scim
+ / : agentkit, saaskit
Full guide: https://docs.scalekit.com/dev-kit/build-with-ai/ -->
`
@@ -38,7 +38,7 @@ GitHub Copilot CLI: copilot plugin marketplace add scalekit-inc/github-copilot-a
Codex: run the bash installer, restart Codex, then open Plugin Directory and enable
Skills CLI (Windsurf, Cline, and 40+ agents): npx skills add scalekit-inc/skills --list then npx skills add scalekit-inc/skills --skill
- / : agentkit, full-stack-auth, mcp-auth, modular-sso, modular-scim
+ / : agentkit, saaskit
Full guide: https://docs.scalekit.com/dev-kit/build-with-ai/`
/**
diff --git a/src/configs/llms.config.ts b/src/configs/llms.config.ts
index 54fa423c4..2dcbed755 100644
--- a/src/configs/llms.config.ts
+++ b/src/configs/llms.config.ts
@@ -16,7 +16,7 @@ for in-depth answers. Load \`llms-full.txt\` only when exhaustive context is nee
## Product → Documentation routing
-- **AgentKit** (AI agents, tool calling, connectors) → load Agent Authentication set
+- **AgentKit** (AI agents, tool calling, connectors) → load AgentKit documentation set
- **AgentKit + specific framework** → fetch the framework page directly (see Framework routing below)
- **SaaSKit / FSA** (login, sessions, RBAC) → load SaaSKit Complete set
- **MCP Authentication** (OAuth 2.1 for MCP servers) → load MCP Authentication set
diff --git a/src/content/docs/agentkit/advanced/overview.mdx b/src/content/docs/agentkit/advanced/overview.mdx
index e09281b61..88fabd691 100644
--- a/src/content/docs/agentkit/advanced/overview.mdx
+++ b/src/content/docs/agentkit/advanced/overview.mdx
@@ -1,6 +1,6 @@
---
title: Authorization - Overview
-description: Learn about authorization options in Agent Auth, including OAuth flows, permissions, and security best practices.
+description: Learn about authorization options in AgentKit, including OAuth flows, permissions, and security best practices.
tags: [agentauth, advanced, guide, overview]
head:
- tag: meta
@@ -11,11 +11,11 @@ head:
import { LinkCard, CardGrid, Aside, Steps } from '@astrojs/starlight/components';
-Agents that need to take actions on-behalf-of users in third party applications like gmail, calendar, slack, notion, hubspot etc need to do so in a secure, authorized manner. Scalekit's Agent Auth solution helps developers build agents to act on-behalf-of users by managing user's authentication and authorization for those tools.
+Agents that need to take actions on-behalf-of users in third party applications like gmail, calendar, slack, notion, hubspot etc need to do so in a secure, authorized manner. Scalekit's AgentKit solution helps developers build agents to act on-behalf-of users by managing user's authentication and authorization for those tools.
## Supported Auth Methods
-Agent Auth supports all the different types of authentication and authorization methods that are adopted by different applications so that you don't have to worry about handling and managing user authorization tokens.
+AgentKit supports all the different types of authentication and authorization methods that are adopted by different applications so that you don't have to worry about handling and managing user authorization tokens.
- OAuth 2.0
- API Keys
diff --git a/src/content/docs/agentkit/advanced/proxy-api-calls.mdx b/src/content/docs/agentkit/advanced/proxy-api-calls.mdx
index bc359f899..35845bd75 100644
--- a/src/content/docs/agentkit/advanced/proxy-api-calls.mdx
+++ b/src/content/docs/agentkit/advanced/proxy-api-calls.mdx
@@ -10,7 +10,7 @@ head:
---
import { Steps, Aside } from '@astrojs/starlight/components';
-Even though Scalekit Agent Auth offers pre-built connector tools out of the box for the supported applications, if you would like to make direct API calls to the third party applications for any custom behaviour, you can leverage proxy_api tool to directly invoke the third party application.
+Even though Scalekit AgentKit offers pre-built connector tools out of the box for the supported applications, if you would like to make direct API calls to the third party applications for any custom behaviour, you can leverage proxy_api tool to directly invoke the third party application.
Based on the connected account or user identifier details, Scalekit will automatically inject the user authorization tokens so that API calls to the third application will be successful.
diff --git a/src/content/docs/agentkit/authentication/auth-flows-comparison.mdx b/src/content/docs/agentkit/authentication/auth-flows-comparison.mdx
index d548c51ec..bb2b50c05 100644
--- a/src/content/docs/agentkit/authentication/auth-flows-comparison.mdx
+++ b/src/content/docs/agentkit/authentication/auth-flows-comparison.mdx
@@ -1,7 +1,7 @@
---
title: Authentication Methods Comparison
description: Compare different authentication methods supported by AgentKit including OAuth 2.0, API Keys, Bearer Tokens, and Custom JWT to choose the right approach.
-tags: [agent-auth, authentication, oauth2, api-keys, bearer-tokens, jwt, comparison]
+tags: [agentkit, authentication, oauth2, api-keys, bearer-tokens, jwt, comparison]
sidebar:
order: 4
label: "Auth methods"
diff --git a/src/content/docs/agentkit/authentication/multi-provider.mdx b/src/content/docs/agentkit/authentication/multi-provider.mdx
index 6ccfcd19d..67cd7f512 100644
--- a/src/content/docs/agentkit/authentication/multi-provider.mdx
+++ b/src/content/docs/agentkit/authentication/multi-provider.mdx
@@ -16,7 +16,7 @@ head:
import { Card, CardGrid, Aside, Steps, Tabs, TabItem } from '@astrojs/starlight/components';
-When building applications with Agent Auth, users often need to connect multiple third-party providers. This guide shows you how to manage multiple authenticated connections per user effectively.
+When building applications with AgentKit, users often need to connect multiple third-party providers. This guide shows you how to manage multiple authenticated connections per user effectively.
## Understanding multi-provider scenarios
diff --git a/src/content/docs/agentkit/authentication/token-management.mdx b/src/content/docs/agentkit/authentication/token-management.mdx
index 84b544848..4770c931f 100644
--- a/src/content/docs/agentkit/authentication/token-management.mdx
+++ b/src/content/docs/agentkit/authentication/token-management.mdx
@@ -1,7 +1,7 @@
---
title: Token Management
description: Learn how Scalekit manages access tokens, refresh tokens, and token lifecycle for AgentKit connections.
-tags: [agent-auth, tokens, refresh-token, access-token, token-lifecycle, oauth, authentication]
+tags: [agentkit, tokens, refresh-token, access-token, token-lifecycle, oauth, authentication]
draft: true
sidebar:
order: 5
@@ -16,7 +16,7 @@ Token management is a critical aspect of AgentKit that ensures your users' conne
## Understanding tokens
-When users authenticate with third-party providers through Agent Auth, Scalekit securely manages several types of tokens:
+When users authenticate with third-party providers through AgentKit, Scalekit securely manages several types of tokens:
### Access tokens
diff --git a/src/content/docs/agentkit/mcp/tool-access-via-mcp.mdx b/src/content/docs/agentkit/mcp/tool-access-via-mcp.mdx
index dc13e0766..2f79f2d4e 100644
--- a/src/content/docs/agentkit/mcp/tool-access-via-mcp.mdx
+++ b/src/content/docs/agentkit/mcp/tool-access-via-mcp.mdx
@@ -1,7 +1,7 @@
---
title: Give your agent tool access via MCP
description: Create a per-user MCP server with whitelisted, pre-authenticated tools; then hand your agent a single URL.
-tags: [agent-auth, quickstart, mcp, model-context-protocol, ai-agents, tools]
+tags: [agentkit, quickstart, mcp, model-context-protocol, ai-agents, tools]
sidebar:
label: Tool access via MCP
prev:
diff --git a/src/content/docs/agentkit/openclaw.mdx b/src/content/docs/agentkit/openclaw.mdx
index 1c7ec45ee..16c8c1a30 100644
--- a/src/content/docs/agentkit/openclaw.mdx
+++ b/src/content/docs/agentkit/openclaw.mdx
@@ -1,7 +1,7 @@
---
title: "OpenClaw skill"
description: Connect OpenClaw agents to third-party services through Scalekit. Supports LinkedIn, Notion, Slack, Gmail, and 50+ connectors.
-tags: [agent-auth, openclaw, ai-agents, tools, integrations]
+tags: [agentkit, openclaw, ai-agents, tools, integrations]
sidebar:
label: "OpenClaw"
prev:
diff --git a/src/content/docs/agentkit/quickstart.mdx b/src/content/docs/agentkit/quickstart.mdx
index fcd5decca..c857ba14d 100644
--- a/src/content/docs/agentkit/quickstart.mdx
+++ b/src/content/docs/agentkit/quickstart.mdx
@@ -1,7 +1,7 @@
---
title: "AgentKit: Connect my agent to apps"
description: Build a working agent that makes authenticated tool calls on behalf of users, using Gmail as the example connector.
-tags: [agent-auth, quickstart, ai-agents, oauth, token-vault, tool-integration, delegated-oauth]
+tags: [agentkit, quickstart, ai-agents, oauth, token-vault, tool-integration, delegated-oauth]
sidebar:
order: 1
---
@@ -50,7 +50,7 @@ Complete these steps in the Scalekit dashboard before writing any code:
```bash title="Terminal" frame="terminal" showLineNumbers=false
- claude plugin marketplace add scalekit-inc/claude-code-authstack && claude plugin install agent-auth@scalekit-auth-stack
+ claude plugin marketplace add scalekit-inc/claude-code-authstack && claude plugin install agentkit@scalekit-auth-stack
```
Installing the plugin sets up Scalekit's MCP server and triggers an OAuth authorization flow in your browser. Complete the authorization before continuing. This gives Claude Code direct access to your Scalekit environment to search docs, manage connections, and check connected account status. Then paste the prompt below.
@@ -59,12 +59,12 @@ Complete these steps in the Scalekit dashboard before writing any code:
```bash title="Terminal" frame="terminal" showLineNumbers=false
curl -fsSL https://raw.githubusercontent.com/scalekit-inc/codex-authstack/main/install.sh | bash
```
- Restart Codex → Plugin Directory → **Scalekit Auth Stack** → install **agent-auth**. If a browser authorization prompt appears, complete the OAuth flow before continuing. Then paste the prompt below.
+ Restart Codex → Plugin Directory → **Scalekit Auth Stack** → install **agentkit**. If a browser authorization prompt appears, complete the OAuth flow before continuing. Then paste the prompt below.
```bash title="Terminal" frame="terminal" showLineNumbers=false
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
- copilot plugin install agent-auth@scalekit-auth-stack
+ copilot plugin install agentkit@scalekit-auth-stack
```
If a browser authorization prompt appears, complete the OAuth flow before continuing. Then run:
```bash title="Terminal" frame="terminal" showLineNumbers=false wrap
@@ -78,11 +78,11 @@ Complete these steps in the Scalekit dashboard before writing any code:
```bash title="Terminal" frame="terminal" showLineNumbers=false
curl -fsSL https://raw.githubusercontent.com/scalekit-inc/cursor-authstack/main/install.sh | bash
```
- Reload Cursor → **Settings → Plugins** → enable **Agent Auth**. If a browser authorization prompt appears, complete the OAuth flow before continuing. Open chat (Cmd+L / Ctrl+L) and paste the prompt below.
+ Reload Cursor → **Settings → Plugins** → enable **AgentKit**. If a browser authorization prompt appears, complete the OAuth flow before continuing. Open chat (Cmd+L / Ctrl+L) and paste the prompt below.
```bash title="Terminal" frame="terminal" showLineNumbers=false
- npx skills add scalekit-inc/skills --skill integrating-agent-auth
+ npx skills add scalekit-inc/skills --skill integrating-agentkit
```
Then ask your agent: "Configure Scalekit agent authentication for Gmail, create a connected account, generate an authorization link, and fetch the last 5 unread emails using Scalekit's tool API."
diff --git a/src/content/docs/agentkit/tools/agent-tools-quickstart.mdx b/src/content/docs/agentkit/tools/agent-tools-quickstart.mdx
index 8a6883361..9cd7b7956 100644
--- a/src/content/docs/agentkit/tools/agent-tools-quickstart.mdx
+++ b/src/content/docs/agentkit/tools/agent-tools-quickstart.mdx
@@ -11,7 +11,7 @@ tableOfContents: true
import { LinkCard, CardGrid, Aside, Steps, Tabs, TabItem } from '@astrojs/starlight/components';
-Agent Auth supports three approaches to tool calling: execute tools directly with explicit parameters, customize tool behavior with pre- and post-modifiers, or let an LLM select and invoke tools automatically based on user input.
+AgentKit supports three approaches to tool calling: execute tools directly with explicit parameters, customize tool behavior with pre- and post-modifiers, or let an LLM select and invoke tools automatically based on user input.
## Find a tool name
diff --git a/src/content/docs/agentkit/tools/custom-processors.mdx b/src/content/docs/agentkit/tools/custom-processors.mdx
index b53761454..5a215c33c 100644
--- a/src/content/docs/agentkit/tools/custom-processors.mdx
+++ b/src/content/docs/agentkit/tools/custom-processors.mdx
@@ -1,6 +1,6 @@
---
title: Pre and Post Processors
-description: Learn how to create pre and post processor workflows that are run before or after tool execution with Agent Auth.
+description: Learn how to create pre and post processor workflows that are run before or after tool execution with AgentKit.
tags: [agentauth, tools, customization, api, integration, guide]
head:
- tag: meta
@@ -9,7 +9,7 @@ head:
content: noindex
---
-Custom pre and post processors are a way to create custom workflows that are run before or after tool execution with Agent Auth. They are useful for:
+Custom pre and post processors are a way to create custom workflows that are run before or after tool execution with AgentKit. They are useful for:
- Validating and transforming input data
- Processing and Formatting output data
diff --git a/src/content/docs/agentkit/tools/overview.mdx b/src/content/docs/agentkit/tools/overview.mdx
index afe58c066..382ef197d 100644
--- a/src/content/docs/agentkit/tools/overview.mdx
+++ b/src/content/docs/agentkit/tools/overview.mdx
@@ -1,7 +1,7 @@
---
title: Tools Overview
-description: Learn about tools in Agent Auth - the standardized functions that enable you to perform actions across different third-party providers.
-tags: [agent-auth, tools, overview, tool-calling, ai-agents, integrations]
+description: Learn about tools in AgentKit - the standardized functions that enable you to perform actions across different third-party providers.
+tags: [agentkit, tools, overview, tool-calling, ai-agents, integrations]
---
import { Card, CardGrid, Aside, Steps } from '@astrojs/starlight/components';
@@ -14,7 +14,7 @@ For example, if you would like to build an email summarizer agent, there are a f
2. How to authorize these agents access to my gmail account
3. What should be the appropriate input parameters to access gmail based on user context and query
-Agent Auth product solves these problems by giving you simple abstractions using our SDK to help you give additional capabilities to the agents you are building regardless of the underlying model and agent framework in three simple steps.
+AgentKit product solves these problems by giving you simple abstractions using our SDK to help you give additional capabilities to the agents you are building regardless of the underlying model and agent framework in three simple steps.
1. Use Scalekit SDK to fetch all the appropriate tools
2. Complete user authorization handling in one single line of code
@@ -22,7 +22,7 @@ Agent Auth product solves these problems by giving you simple abstractions using
## Tool Metadata
-Every tool in Agent Auth follows a consistent structure with a name, description and structured input and output schema. Agentic frameworks like Langchain can work with the underlying LLMs to select the right tool to solve the user's query based on the tool metadata.
+Every tool in AgentKit follows a consistent structure with a name, description and structured input and output schema. Agentic frameworks like Langchain can work with the underlying LLMs to select the right tool to solve the user's query based on the tool metadata.
### Sample Tool definition
diff --git a/src/content/docs/agentkit/tools/proxy-tools.mdx b/src/content/docs/agentkit/tools/proxy-tools.mdx
index 550637278..6388845fe 100644
--- a/src/content/docs/agentkit/tools/proxy-tools.mdx
+++ b/src/content/docs/agentkit/tools/proxy-tools.mdx
@@ -1,6 +1,6 @@
---
title: Proxy Tools
-description: Learn how to make direct API calls to providers using Agent Auth's proxy tools.
+description: Learn how to make direct API calls to providers using AgentKit's proxy tools.
tags: [agentauth, tools, proxy, api, integration, guide]
head:
- tag: meta
@@ -379,7 +379,7 @@ const generateTeamReport = {
### Using the API
-Register your custom tools with Agent Auth:
+Register your custom tools with AgentKit:
@@ -443,7 +443,7 @@ The `context` object provides access to:
### Standard tools
-Execute any standard Agent Auth tool:
+Execute any standard AgentKit tool:
```javascript
// Execute standard tools
@@ -552,7 +552,7 @@ expect(mockContext.tools.execute).toHaveBeenCalledWith({
### Integration testing
-Test with real Agent Auth:
+Test with real AgentKit:
```javascript
// Test custom tool with real connections
@@ -749,4 +749,4 @@ await agentConnect.tools.deprecate(originalTool.name, '1.0.0');
**Ready to build?** Start with simple custom tools and gradually add complexity. Test thoroughly before deploying to production, and consider the impact on your users when making changes.
-Custom tools unlock the full potential of Agent Auth by allowing you to create specialized workflows that perfectly match your business needs. With proper design, testing, and deployment practices, you can build powerful tools that enhance your team's productivity and streamline complex operations.
+Custom tools unlock the full potential of AgentKit by allowing you to create specialized workflows that perfectly match your business needs. With proper design, testing, and deployment practices, you can build powerful tools that enhance your team's productivity and streamline complex operations.
diff --git a/src/content/docs/authenticate/fsa/quickstart.mdx b/src/content/docs/authenticate/fsa/quickstart.mdx
index 71a939afa..deafb8a08 100644
--- a/src/content/docs/authenticate/fsa/quickstart.mdx
+++ b/src/content/docs/authenticate/fsa/quickstart.mdx
@@ -84,7 +84,7 @@ Scalekit handles the complex authentication flow while you focus on your core pr
/plugin marketplace add scalekit-inc/claude-code-authstack
```
```bash title="Claude REPL" showLineNumbers=false frame="none"
- /plugin install full-stack-auth@scalekit-auth-stack
+ /plugin install saaskit@scalekit-auth-stack
```
@@ -93,7 +93,7 @@ Scalekit handles the complex authentication flow while you focus on your core pr
```
```bash title="Codex" showLineNumbers=false frame="none"
# Restart Codex
- # Plugin Directory -> Scalekit Auth Stack -> install full-stack-auth
+ # Plugin Directory -> Scalekit Auth Stack -> install saaskit
```
@@ -101,7 +101,7 @@ Scalekit handles the complex authentication flow while you focus on your core pr
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
```
```bash title="Terminal" showLineNumbers=false frame="none"
- copilot plugin install full-stack-auth@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
diff --git a/src/content/docs/authenticate/mcp/quickstart.mdx b/src/content/docs/authenticate/mcp/quickstart.mdx
index c5691b940..95fd95214 100644
--- a/src/content/docs/authenticate/mcp/quickstart.mdx
+++ b/src/content/docs/authenticate/mcp/quickstart.mdx
@@ -56,7 +56,7 @@ This guide shows you how to add production-ready OAuth 2.1 authorization to your
/plugin marketplace add scalekit-inc/claude-code-authstack
```
```bash title="Claude REPL" showLineNumbers=false frame="none"
- /plugin install mcp-auth@scalekit-auth-stack
+ /plugin install saaskit@scalekit-auth-stack
```
@@ -65,7 +65,7 @@ This guide shows you how to add production-ready OAuth 2.1 authorization to your
```
```bash title="Codex" showLineNumbers=false frame="none"
# Restart Codex
- # Plugin Directory -> Scalekit Auth Stack -> install mcp-auth
+ # Plugin Directory -> Scalekit Auth Stack -> install saaskit
```
@@ -73,7 +73,7 @@ This guide shows you how to add production-ready OAuth 2.1 authorization to your
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
```
```bash title="Terminal" showLineNumbers=false frame="none"
- copilot plugin install mcp-auth@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
diff --git a/src/content/docs/authenticate/sso/add-modular-sso.mdx b/src/content/docs/authenticate/sso/add-modular-sso.mdx
index 39beec1ff..0076bceb7 100644
--- a/src/content/docs/authenticate/sso/add-modular-sso.mdx
+++ b/src/content/docs/authenticate/sso/add-modular-sso.mdx
@@ -73,7 +73,7 @@ Choose Modular SSO when you:
/plugin marketplace add scalekit-inc/claude-code-authstack
```
```bash title="Claude REPL" showLineNumbers=false frame="none"
- /plugin install modular-sso@scalekit-auth-stack
+ /plugin install saaskit@scalekit-auth-stack
```
@@ -82,7 +82,7 @@ Choose Modular SSO when you:
```
```bash title="Codex" showLineNumbers=false frame="none"
# Restart Codex
- # Plugin Directory -> Scalekit Auth Stack -> install modular-sso
+ # Plugin Directory -> Scalekit Auth Stack -> install saaskit
```
@@ -90,12 +90,12 @@ Choose Modular SSO when you:
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
```
```bash title="Terminal" showLineNumbers=false frame="none"
- copilot plugin install modular-sso@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
```bash title="Terminal" showLineNumbers=false frame="none"
- npx skills add scalekit-inc/skills --skill modular-sso
+ npx skills add scalekit-inc/skills --skill implementing-modular-sso
```
diff --git a/src/content/docs/browse/code-samples/agent-framework-examples.mdx b/src/content/docs/browse/code-samples/agent-framework-examples.mdx
index c1f045dc7..678b24a50 100644
--- a/src/content/docs/browse/code-samples/agent-framework-examples.mdx
+++ b/src/content/docs/browse/code-samples/agent-framework-examples.mdx
@@ -1,6 +1,6 @@
---
title: "Agent framework integration examples"
-description: "Examples showing how to integrate Scalekit Agent Auth with various AI frameworks including LangChain, Google ADK, and direct integrations."
+description: "Examples showing how to integrate Scalekit AgentKit with various AI frameworks including LangChain, Google ADK, and direct integrations."
browseCentral:
label: "Agent framework examples"
filterType: ["code-sample"]
@@ -21,7 +21,7 @@ head:
import { LinkButton, Tabs, TabItem } from '@astrojs/starlight/components';
-These examples demonstrate how to integrate Scalekit Agent Auth with AI frameworks for identity-aware tool calling and authenticated agent operations.
+These examples demonstrate how to integrate Scalekit AgentKit with AI frameworks for identity-aware tool calling and authenticated agent operations.
@@ -52,9 +52,9 @@ This example shows how to integrate a Google ADK agent with Scalekit for authent
## Direct integration
-Direct Agent Auth integration examples in Python.
+Direct AgentKit integration examples in Python.
-This directory provides direct integration examples for Agent Auth using Python. It covers auth, tool definitions, and secured requests.
+This directory provides direct integration examples for AgentKit using Python. It covers auth, tool definitions, and secured requests.
View repository
diff --git a/src/content/docs/cookbooks/apify-actor-per-user-oauth.mdx b/src/content/docs/cookbooks/apify-actor-per-user-oauth.mdx
index 78b2d165e..6967c3bdd 100644
--- a/src/content/docs/cookbooks/apify-actor-per-user-oauth.mdx
+++ b/src/content/docs/cookbooks/apify-actor-per-user-oauth.mdx
@@ -1,6 +1,6 @@
---
title: 'Apify Actor with per-user OAuth via Scalekit'
-description: 'Build an Apify Actor that uses Scalekit Agent Auth so each user connects their OAuth accounts, keyed by Apify userId.'
+description: 'Build an Apify Actor that uses Scalekit AgentKit so each user connects their OAuth accounts, keyed by Apify userId.'
date: 2026-04-21
tags: ['Agent auth']
sidebar:
diff --git a/src/content/docs/cookbooks/daily-briefing-agent.mdx b/src/content/docs/cookbooks/daily-briefing-agent.mdx
index 35720a549..f1c32c7f2 100644
--- a/src/content/docs/cookbooks/daily-briefing-agent.mdx
+++ b/src/content/docs/cookbooks/daily-briefing-agent.mdx
@@ -1,6 +1,6 @@
---
-title: 'Build a daily briefing agent with Vercel AI SDK and Scalekit Agent Auth'
-description: 'Connect a TypeScript or Python agent via Vercel AI SDK and Scalekit Agent Auth to Google Calendar and Gmail using two integration patterns.'
+title: 'Build a daily briefing agent with Vercel AI SDK and Scalekit AgentKit'
+description: 'Connect a TypeScript or Python agent via Vercel AI SDK and Scalekit AgentKit to Google Calendar and Gmail using two integration patterns.'
date: 2026-03-27
tags: ['Agent auth']
sidebar:
diff --git a/src/content/docs/cookbooks/render-github-pr-summarizer.mdx b/src/content/docs/cookbooks/render-github-pr-summarizer.mdx
index bd31efa2f..89617891e 100644
--- a/src/content/docs/cookbooks/render-github-pr-summarizer.mdx
+++ b/src/content/docs/cookbooks/render-github-pr-summarizer.mdx
@@ -202,7 +202,7 @@ export const scalekit = new Proxy({} as ScalekitClient, {
const GITHUB_CONNECTION_NAME = process.env.GITHUB_CONNECTION_NAME;
if (!GITHUB_CONNECTION_NAME) {
throw new Error(
- "GITHUB_CONNECTION_NAME is required. Copy the connection name from Scalekit Dashboard > Agent Auth > Connectors.",
+ "GITHUB_CONNECTION_NAME is required. Copy the connection name from Scalekit Dashboard > AgentKit > Connectors.",
);
}
diff --git a/src/content/docs/cookbooks/set-up-agentkit-with-your-coding-agent.mdx b/src/content/docs/cookbooks/set-up-agentkit-with-your-coding-agent.mdx
index a8b7631c1..a48c549eb 100644
--- a/src/content/docs/cookbooks/set-up-agentkit-with-your-coding-agent.mdx
+++ b/src/content/docs/cookbooks/set-up-agentkit-with-your-coding-agent.mdx
@@ -1,6 +1,6 @@
---
title: 'Set up AgentKit with your coding agent'
-description: 'Add Scalekit Agent Auth to your codebase using Claude Code, Codex, GitHub Copilot CLI, Cursor, or any of 40+ coding agents.'
+description: 'Add Scalekit AgentKit to your codebase using Claude Code, Codex, GitHub Copilot CLI, Cursor, or any of 40+ coding agents.'
date: 2026-04-15
tags: ['Agent auth']
sidebar:
@@ -33,7 +33,7 @@ Install the Scalekit Auth Stack plugin into your coding agent and paste one prom
```bash title="Terminal" frame="terminal" showLineNumbers=false
- claude plugin marketplace add scalekit-inc/claude-code-authstack && claude plugin install agent-auth@scalekit-auth-stack
+ claude plugin marketplace add scalekit-inc/claude-code-authstack && claude plugin install agentkit@scalekit-auth-stack
```
Installing the plugin sets up Scalekit's MCP server and triggers an OAuth authorization flow in your browser. Complete the authorization before continuing — this gives Claude Code direct access to your Scalekit environment to search docs, manage connections, and check connected account status.
@@ -47,12 +47,12 @@ Install the Scalekit Auth Stack plugin into your coding agent and paste one prom
```bash title="Terminal" frame="terminal" showLineNumbers=false
curl -fsSL https://raw.githubusercontent.com/scalekit-inc/codex-authstack/main/install.sh | bash
```
- Restart Codex → Plugin Directory → **Scalekit Auth Stack** → install **agent-auth**. If a browser authorization prompt appears, complete the OAuth flow before continuing. Then paste the implementation prompt above.
+ Restart Codex → Plugin Directory → **Scalekit Auth Stack** → install **agentkit**. If a browser authorization prompt appears, complete the OAuth flow before continuing. Then paste the implementation prompt above.
```bash title="Terminal" frame="terminal" showLineNumbers=false
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
- copilot plugin install agent-auth@scalekit-auth-stack
+ copilot plugin install agentkit@scalekit-auth-stack
```
Then run:
```bash title="Terminal" frame="terminal" showLineNumbers=false wrap
@@ -66,11 +66,11 @@ Install the Scalekit Auth Stack plugin into your coding agent and paste one prom
```bash title="Terminal" frame="terminal" showLineNumbers=false
curl -fsSL https://raw.githubusercontent.com/scalekit-inc/cursor-authstack/main/install.sh | bash
```
- Reload Cursor → **Settings → Plugins** → enable **Agent Auth**. If a browser authorization prompt appears, complete the OAuth flow before continuing. Open chat (Cmd+L / Ctrl+L) and paste the implementation prompt above.
+ Reload Cursor → **Settings → Plugins** → enable **AgentKit**. If a browser authorization prompt appears, complete the OAuth flow before continuing. Open chat (Cmd+L / Ctrl+L) and paste the implementation prompt above.
```bash title="Terminal" frame="terminal" showLineNumbers=false
- npx skills add scalekit-inc/skills --skill integrating-agent-auth
+ npx skills add scalekit-inc/skills --skill integrating-agentkit
```
Then ask your agent to configure Scalekit authentication for your connector and generate connected account, auth link, and token-fetch code.
diff --git a/src/content/docs/dev-kit/build-with-ai/full-stack-auth.mdx b/src/content/docs/dev-kit/build-with-ai/full-stack-auth.mdx
index 150ae4c5d..fee089700 100644
--- a/src/content/docs/dev-kit/build-with-ai/full-stack-auth.mdx
+++ b/src/content/docs/dev-kit/build-with-ai/full-stack-auth.mdx
@@ -1,7 +1,7 @@
---
title: 'Coding agents: Add full-stack auth to your app'
description: 'Let your coding agents guide you into implementing Scalekit full-stack authentication in minutes'
-tags: [full-stack-auth, quickstart]
+tags: [saaskit, full-stack-auth, quickstart]
sidebar:
label: 'Full stack auth'
tableOfContents: false
diff --git a/src/content/docs/dev-kit/build-with-ai/index.mdx b/src/content/docs/dev-kit/build-with-ai/index.mdx
index 83fd6096f..7656a3b70 100644
--- a/src/content/docs/dev-kit/build-with-ai/index.mdx
+++ b/src/content/docs/dev-kit/build-with-ai/index.mdx
@@ -25,8 +25,8 @@ Pick the auth feature you need below. Each page gives you a ready-to-paste promp
```
```bash title="Step 2 — Install your auth plugin (Claude REPL)" showLineNumbers=false
- # options: full-stack-auth, agent-auth, mcp-auth, modular-sso, modular-scim
- /plugin install agent-auth@scalekit-auth-stack
+ # options: agentkit, saaskit
+ /plugin install agentkit@scalekit-auth-stack
```
Now ask your agent to implement Scalekit auth in natural language.
@@ -46,8 +46,8 @@ Pick the auth feature you need below. Each page gives you a ready-to-paste promp
```
```bash title="Step 2 — Install your auth plugin" frame="terminal" showLineNumbers=false
- # options: full-stack-auth, agent-auth, mcp-auth, modular-sso, modular-scim
- copilot plugin install agent-auth@scalekit-auth-stack
+ # options: agentkit, saaskit
+ copilot plugin install agentkit@scalekit-auth-stack
```
Now ask your agent to implement Scalekit auth in natural language.
@@ -86,7 +86,7 @@ Pick the auth feature you need below. Each page gives you a ready-to-paste promp
clickable={true}
/>
Directory Provider: Fetch latest data \n from directory provider
/plugin marketplace add scalekit-inc/claude-code-authstack
```
```bash title="Claude REPL" showLineNumbers=false frame="none"
- /plugin install modular-scim@scalekit-auth-stack
+ /plugin install saaskit@scalekit-auth-stack
```
@@ -113,7 +113,7 @@ Scalekit -> Directory Provider: Fetch latest data \n from directory provider
```
```bash title="Codex" showLineNumbers=false frame="none"
# Restart Codex
- # Plugin Directory -> Scalekit Auth Stack -> install modular-scim
+ # Plugin Directory -> Scalekit Auth Stack -> install saaskit
```
@@ -121,7 +121,7 @@ Scalekit -> Directory Provider: Fetch latest data \n from directory provider
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
```
```bash title="Terminal" showLineNumbers=false frame="none"
- copilot plugin install modular-scim@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
diff --git a/src/content/docs/home/saaskit/index.mdx b/src/content/docs/home/saaskit/index.mdx
index 1a13b110f..79b336b93 100644
--- a/src/content/docs/home/saaskit/index.mdx
+++ b/src/content/docs/home/saaskit/index.mdx
@@ -207,8 +207,8 @@ import complianceImage from '@/content/docs/compliance.svg'
```
```bash title="Step 2 — Install your auth plugin (Claude REPL)" showLineNumbers=false
- # options: full-stack-auth, agent-auth, mcp-auth, modular-sso, modular-scim
- /plugin install full-stack-auth@scalekit-auth-stack
+ # options: agentkit, saaskit
+ /plugin install saaskit@scalekit-auth-stack
```
Now ask your agent to implement Scalekit auth in natural language. [See example starting prompts →](/agentkit/quickstart/)
@@ -228,8 +228,8 @@ import complianceImage from '@/content/docs/compliance.svg'
```
```bash title="Step 2 — Install your auth plugin" frame="terminal" showLineNumbers=false
- # options: full-stack-auth, agent-auth, mcp-auth, modular-sso, modular-scim
- copilot plugin install full-stack-auth@scalekit-auth-stack
+ # options: agentkit, saaskit
+ copilot plugin install saaskit@scalekit-auth-stack
```
Now ask your agent to implement Scalekit auth in natural language. [See example starting prompts →](/agentkit/quickstart/)
diff --git a/src/content/docs/passwordless/oidc.mdx b/src/content/docs/passwordless/oidc.mdx
index 1d274c880..a776f4aae 100644
--- a/src/content/docs/passwordless/oidc.mdx
+++ b/src/content/docs/passwordless/oidc.mdx
@@ -81,7 +81,7 @@ Your app -> User: "Create session and grant access"
/plugin marketplace add scalekit-inc/claude-code-authstack
```
```bash title="Claude REPL" showLineNumbers=false frame="none"
- /plugin install full-stack-auth@scalekit-auth-stack
+ /plugin install saaskit@scalekit-auth-stack
```
@@ -89,7 +89,7 @@ Your app -> User: "Create session and grant access"
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
```
```bash title="Terminal" showLineNumbers=false frame="none"
- copilot plugin install full-stack-auth@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
diff --git a/src/content/docs/passwordless/quickstart.mdx b/src/content/docs/passwordless/quickstart.mdx
index 2c7a2c70d..7022b2f20 100644
--- a/src/content/docs/passwordless/quickstart.mdx
+++ b/src/content/docs/passwordless/quickstart.mdx
@@ -93,7 +93,7 @@ Coming soon
/plugin marketplace add scalekit-inc/claude-code-authstack
```
```bash title="Claude REPL" showLineNumbers=false frame="none"
- /plugin install full-stack-auth@scalekit-auth-stack
+ /plugin install saaskit@scalekit-auth-stack
```
@@ -101,7 +101,7 @@ Coming soon
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
```
```bash title="Terminal" showLineNumbers=false frame="none"
- copilot plugin install full-stack-auth@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
diff --git a/src/content/docs/resources/code-samples/code-samples.mdx b/src/content/docs/resources/code-samples/code-samples.mdx
index 75664bb06..ddb34491d 100644
--- a/src/content/docs/resources/code-samples/code-samples.mdx
+++ b/src/content/docs/resources/code-samples/code-samples.mdx
@@ -31,7 +31,7 @@ import FoldCard from '@components/ui/FoldCard.astro'
MCP server authentication examples in Python and Node.js
@@ -130,12 +130,12 @@ Choose Modular SSO when you:
copilot plugin marketplace add scalekit-inc/github-copilot-authstack
```
```bash title="Terminal" showLineNumbers=false frame="none"
- copilot plugin install modular-sso@scalekit-auth-stack
+ copilot plugin install saaskit@scalekit-auth-stack
```
```bash title="Terminal" showLineNumbers=false frame="none"
- npx skills add scalekit-inc/skills --skill modular-sso
+ npx skills add scalekit-inc/skills --skill implementing-modular-sso
```