Centrally manage Cursor settings for your organization
Policy | Description | Cursor setting | Available since |
---|---|---|---|
AllowedExtensions | Controls which extensions can be installed. | extensions.allowed | 1.2 |
AllowedTeamId | Controls which team IDs are allowed to log in. Users with unauthorized team IDs are forcefully logged out. | cursorAuth.allowedTeamId | 1.3 |
extensions.allowed
Cursor setting controls which extensions can be installed. This setting accepts a JSON object where keys are publisher names and values are booleans indicating whether extensions from that publisher are allowed.
For example, setting extensions.allowed
to {"anysphere": true, "github": true}
allows extensions from Anysphere and GitHub publishers, while setting it to {"anysphere": false}
blocks Anysphere extensions.
To centrally manage allowed extensions for your organization, configure the AllowedExtensions
policy using your device management solution. This policy overrides the extensions.allowed
setting on users’ devices. The value of this policy is a JSON string that defines the allowed publishers.
If you want to learn more about extensions in Cursor, refer to the extensions documentation.
cursorAuth.allowedTeamId
Cursor setting controls which team IDs are permitted to log into Cursor. This setting accepts a comma-separated list of team IDs that are authorized for access.
For example, setting cursorAuth.allowedTeamId
to "1,3,7"
allows users from those specific team IDs to log in.
When a user attempts to log in with a team ID that is not in the allowed list:
AllowedTeamId
policy using your device management solution. This policy overrides the cursorAuth.allowedTeamId
setting on users’ devices. The value of this policy is a string containing the comma-separated list of authorized team IDs.
Example .mobileconfig file
.mobileconfig
file for macOS is shown below:AllowedExtensions
policy. The policy value starts empty in the sample file (no extensions are allowed).
<string>
tags.
AllowedTeamId
policy, add the comma-separated list of team IDs:
.mobileconfig
file initializes all policies available in that version of Cursor. Delete any policies that are not needed.
If you do not edit or remove a policy from the sample .mobileconfig
, that policy will be enforced with its default (restrictive) policy value.
Manually install a configuration profile by double-clicking on the .mobileconfig
profile in Finder and then enabling it in System Preferences under General > Device Management. Removing the profile from System Preferences will remove the policies from Cursor.
For more information on configuration profiles, refer to Apple’s documentation.