Overview
Team-wide settings allow you to control your users’ Devin for Terminal usage through the Cognition web app. These settings apply across your entire organization. Regardless of whether you authenticate via Devin or Windsurf, the Devin for Terminal team settings are located in the same place: https://windsurf.com/team/cli-settingsAvailable Settings
Models
Control which models your users can access through Devin for Terminal. You can:- Whitelist specific models — Restrict users to a curated list of approved models
- Allow all models — Give users access to all available models
Enable Web Search
Allow the Devin for Terminal agent to perform web searches on the open Internet. This does not affect the agent’s ability to read specific URLs, which is performed locally on the user’s machine. This tool is disabled by default for enterprise teams.MCP Servers
Control whether your users can use MCP (Model Context Protocol) tools.- Toggle on/off — Enable or disable MCP server usage entirely
- Whitelisted MCP Servers — Specify which MCP servers users are allowed to connect to. If no servers are added, all servers are whitelisted by default. Click Add Server to restrict access to specific servers.
Terminal Permissions
Configure team-enforced permission rules for Devin for Terminal usage. These rules have the highest precedence and cannot be overridden by individual users’ local or project configurations. Click Configure to open the permissions editor. The configuration requires a JSON object with three fields:deny— Actions that are blocked entirely (takes highest priority)ask— Actions that always prompt the user for approvalallow— Actions that are automatically approved without prompting
| Type | Format | Example |
|---|---|---|
| File read | Read(/path) | Read(~/sensitive/**) |
| File write | Write(/path) | Write(.env*) |
| Command execution | Exec(cmd) | Exec(rm), Exec(sudo) |
| HTTP fetch | Fetch(url) | Fetch(https://internal.api/*) |
| Tool-based | Tool name | read, edit, exec |
Sandbox Enforcement
Control sandbox behavior for your organization. These settings enforce OS-level isolation on all CLI sessions, restricting file system access and network traffic.Sandbox Enforcement Mode
Set the enforcement level for the--sandbox flag across your organization:
- Optional (default) — Users choose whether to pass
--sandbox. No enforcement. - Required — The
--sandboxflag is forced on for all users, even if they don’t pass it on the command line. All CLI sessions run with OS-level file system sandboxing that enforces Read/Write permission scopes.
- Writable paths are derived from granted
Write(...)permission scopes plus the workspace directory - Readable paths are derived from granted
Read(...)scopes (platform defaults like/usr/binare always readable) - Scopes granted mid-session dynamically expand the sandbox for subsequent commands
Domain Filtering
Configure organization-wide domain allowlists and denylists for sandbox network filtering.-
Domain allowlist — When set, only the domains in this list are reachable through the sandbox network proxy. This list is authoritative: it completely replaces any user-configured
allowed_domainsin their local sandbox config. Users cannot add additional domains to bypass admin restrictions. -
Domain denylist — Domains that are always blocked. Enterprise denied domains are additive: they are merged with the user’s local
denied_domains, making the combined list more restrictive.
*.example.com, **.example.com).
How enterprise and user domain lists interact:
| Scenario | Enterprise config | User config | Effective result |
|---|---|---|---|
| Admin sets allowlist | allowed_domains: ["github.com"] | allowed_domains: ["npmjs.org"] | Only github.com is allowed (enterprise replaces user list) |
| Admin sets denylist | denied_domains: ["evil.com"] | denied_domains: ["risky.io"] | Both evil.com and risky.io are blocked (merged) |
| No admin allowlist | allowed_domains: [] | allowed_domains: ["github.com"] | User’s allowlist is used |
Because the user’s local
denied_domains are preserved and merged additively, a user could deny a domain that appears in the enterprise allowlist. This is intentional: the combined effect is always more restrictive, never less. If this causes access issues, the user should remove the conflicting entry from their local config.Show “Install Devin for Terminal” in the Windsurf Command Palette
Devin for Terminal is bundled with Windsurf (starting with version 1.9577.24) but requires explicit activation by an admin. Toggle this setting on to allow your users to install Devin for Terminal directly from the Windsurf Command Palette. Once enabled, users can open the Command Palette (Cmd+Shift+P on macOS or Ctrl+Shift+P on Windows/Linux) and run Install Devin for Terminal to add the devin binary to their PATH.
This setting is available on Windsurf Enterprise and Devin Enterprise plans and is off by default.

