Enterprise settings
You can centrally manage specific features of Cursor through device management solutions to ensure it meets the needs of your organization. When you specify a Cursor policy, its value overrides the corresponding Cursor setting on users’ devices. Settings editor showing that the ‘Extensions: Allowed’ setting is managed by the organization. Cursor currently provides policies to control the following admin-controlled features:Policy | Description | Cursor setting | Available since |
---|---|---|---|
AllowedExtensions | Controls which extensions can be installed. | extensions.allowed | 1.2 |
AllowedTeamId | Controls which team IDs are allowed to log in. Users with unauthorized team IDs are forcefully logged out. | cursorAuth.allowedTeamId | 1.3 |
Configure allowed extensions
Theextensions.allowed
Cursor setting controls which extensions can be installed. This setting accepts a JSON object where keys are publisher names and values are booleans indicating whether extensions from that publisher are allowed.
For example, setting extensions.allowed
to {"anysphere": true, "github": true}
allows extensions from Anysphere and GitHub publishers, while setting it to {"anysphere": false}
blocks Anysphere extensions.
To centrally manage allowed extensions for your organization, configure the AllowedExtensions
policy using your device management solution. This policy overrides the extensions.allowed
setting on users’ devices. The value of this policy is a JSON string that defines the allowed publishers.
If you want to learn more about extensions in Cursor, refer to the extensions documentation.
Configure allowed team IDs
ThecursorAuth.allowedTeamId
Cursor setting controls which team IDs are permitted to log into Cursor. This setting accepts a comma-separated list of team IDs that are authorized for access.
For example, setting cursorAuth.allowedTeamId
to "1,3,7"
allows users from those specific team IDs to log in.
When a user attempts to log in with a team ID that is not in the allowed list:
- They are forcefully logged out immediately
- An error message is displayed
- The application prevents further authentication attempts until a valid team ID is used
AllowedTeamId
policy using your device management solution. This policy overrides the cursorAuth.allowedTeamId
setting on users’ devices. The value of this policy is a string containing the comma-separated list of authorized team IDs.
Group Policy on Windows
Cursor has support for Windows Registry-based Group Policy. When policy definitions are installed, admins can use the Local Group Policy Editor to manage the policy values. To add a policy:- Copy the Policy ADMX and ADML files from
AppData\Local\Programs\cursor\policies
. - Paste the ADMX file into the
C:\Windows\PolicyDefinitions
directory, and the ADML file into theC:\Windows\PolicyDefinitions\<your-locale>\
directory. - Restart the Local Group Policy Editor.
- Set the appropriate policy values (e.x.
{"anysphere": true, "github": true}
for theAllowedExtensions
policy) in the Local Group Policy Editor.
Configuration profiles on macOS
Configuration profiles manage settings on macOS devices. A profile is an XML file with key/value pairs that correspond to available policy. These profiles can be deployed using Mobile Device Management (MDM) solutions, or installed manually.Example .mobileconfig file
Example .mobileconfig file
An example
.mobileconfig
file for macOS is shown below:String policies
The example below demonstrates configuration of theAllowedExtensions
policy. The policy value starts empty in the sample file (no extensions are allowed).
<string>
tags.
AllowedTeamId
policy, add the comma-separated list of team IDs:
.mobileconfig
file initializes all policies available in that version of Cursor. Delete any policies that are not needed.
If you do not edit or remove a policy from the sample .mobileconfig
, that policy will be enforced with its default (restrictive) policy value.
Manually install a configuration profile by double-clicking on the .mobileconfig
profile in Finder and then enabling it in System Preferences under General > Device Management. Removing the profile from System Preferences will remove the policies from Cursor.
For more information on configuration profiles, refer to Apple’s documentation.