Skip to main content
Multi-Org lets Enterprise customers manage multiple organizations inside a single CodeRabbit workspace. The current rollout is support-assisted and tied to Enterprise SSO, so use this guide when you are planning a Multi-Org onboarding with the CodeRabbit team.

Before you start

Make sure you have:
  • An Enterprise plan with Multi-Org support
  • A plan for Enterprise SSO and the SSO/SAML metadata your identity provider will provide
  • A list of the GitHub or GitHub Enterprise Cloud organizations that should live in the workspace

Current availability

Multi-Org is currently not self-serve. At this stage:
  • The rollout is handled with the CodeRabbit team
  • Multi-Org onboarding is paired with Enterprise SSO
  • GitHub and GitHub Enterprise Cloud are the supported providers today

Multi-Org setup flow

1

Share your SSO configuration with CodeRabbit

Send your SSO or SAML configuration details to the CodeRabbit team so they can prepare your Multi-Org workspace. If you are using Okta, start with the Okta SAML setup guide, and if you are using Keycloak, start with the Keycloak SAML setup guide.
2

CodeRabbit configures the authentication layer

After the required identity-provider details are received, the CodeRabbit team configures Clerk for your workspace and prepares the SSO-backed Multi-Org environment.
3

Choose the rollout path

CodeRabbit then completes one of two onboarding paths depending on your current state:
If the customer already has organizations onboarded in CodeRabbit without SSO:
  1. CodeRabbit creates a workspace for the customer.
  2. CodeRabbit migrates the existing organizations into that workspace.
  3. CodeRabbit updates or cancels subscriptions if the migration requires billing changes.
  4. Users can then sign in to the workspace through SSO.
Multi-Org access is an Enterprise feature. If you are evaluating Multi-Org for the first time, contact sales. If you are ready to begin setup, use the support page or your existing CodeRabbit contact to start the rollout.
Before the handoff to CodeRabbit, it helps to prepare:
  • Your identity-provider metadata and SSO contact owner
  • The list of organizations that should be grouped into the workspace
  • Whether any of those organizations already have active CodeRabbit subscriptions
  • The admin owners who should validate first login after SSO is enabled

Whatโ€™s next

Enterprise SSO

Review the shared SSO rollout flow and supported identity-provider guides

Okta SAML setup

Prepare the Okta-specific SAML metadata that CodeRabbit needs for enablement

Keycloak SAML setup

Prepare the Keycloak-specific SAML metadata that CodeRabbit needs for enablement