Configure CodeRabbit enterprise SSO, role-based access control, and organization management. Use when implementing SSO integration, configuring role-based permissions, or setting up organization-level controls for CodeRabbit. Trigger with phrases like "coderabbit SSO", "coderabbit RBAC", "coderabbit enterprise", "coderabbit roles", "coderabbit permissions", "coderabbit SAML".
From coderabbit-packnpx claudepluginhub nickloveinvesting/nick-love-plugins --plugin coderabbit-packThis skill is limited to using the following tools:
Guides Next.js Cache Components and Partial Prerendering (PPR) with cacheComponents enabled. Implements 'use cache', cacheLife(), cacheTag(), revalidateTag(), static/dynamic optimization, and cache debugging.
Migrates code, prompts, and API calls from Claude Sonnet 4.0/4.5 or Opus 4.1 to Opus 4.5, updating model strings on Anthropic, AWS, GCP, Azure platforms.
Details PluginEval's skill quality evaluation: 3 layers (static, LLM judge), 10 dimensions, rubrics, formulas, anti-patterns, badges. Use to interpret scores, improve triggering, calibrate thresholds.
Manage CodeRabbit AI code review access through GitHub or GitLab organization integration. CodeRabbit inherits repository permissions from your Git provider -- if a developer has write access to a repo, CodeRabbit will review their PRs.
# In GitHub Org Settings > Installed Apps > CodeRabbit:
# Select "Only select repositories" instead of "All repositories"
# This limits which repos CodeRabbit can review
enabled_repos:
- backend-api # Core service, always review
- frontend-app # High-traffic, always review
- infrastructure # IaC changes need review
disabled_repos:
- sandbox # Experimental, skip reviews
- docs-internal # Low-risk markdown only
# .coderabbit.yaml at the org level (applied to all repos)
reviews:
auto_review:
enabled: true
ignore_paths:
- "*.md"
- "*.lock"
- "vendor/**"
review_language: "en"
profile: "assertive" # Options: chill, assertive, nitpicky
seat_assignment: "active_committers" # Only count active devs as seats
CodeRabbit charges per seat. Control costs by limiting seats to active committers:
# .coderabbit.yaml in a specific repo (overrides org defaults)
reviews:
auto_review:
enabled: true
drafts: false # Skip draft PRs
base_branches:
- main # Only review PRs targeting main
path_instructions:
- path: "src/auth/**"
instructions: "Security-sensitive. Check for auth bypass and injection."
- path: "migrations/**"
instructions: "Verify backward compatibility and rollback safety."
Check the CodeRabbit dashboard for review metrics per repository and team member. Export data for compliance reporting: reviews generated, comments accepted vs dismissed, and average time-to-review.
| Issue | Cause | Solution |
|---|---|---|
| CodeRabbit not reviewing PRs | App not installed on repo | Add repo in GitHub App settings |
| Seat limit exceeded | Too many active committers | Remove inactive users or upgrade plan |
| Reviews on wrong branches | No base_branches filter | Add branch filter to .coderabbit.yaml |
| Bot reviewing bot PRs | Dependabot/Renovate triggers | Add bot usernames to ignore list |
Basic usage: Apply coderabbit enterprise rbac to a standard project setup with default configuration options.
Advanced scenario: Customize coderabbit enterprise rbac for production environments with multiple constraints and team-specific requirements.