1. Configure SSO
Configure SSO in the Claude Admin Console to enforce identity controls across web, desktop, and CLI from a single place. Claude supports SAML 2.0 and OIDC with any compliant IdP — including Okta, Azure AD (Entra ID), Auth0, and Google Workspace. Setup guideConnect your IdP
In the Claude Admin Console, configure your SAML 2.0 or OIDC connection. Enable
Require SSO for Console and Require SSO for Claude to enforce SSO-based authentication and inherit MFA from your IdP.Enable domain capture
Claim your corporate email domains so that any sign-in attempt with a corporate address is automatically routed to the enterprise workspace — preventing employees from using personal accounts on any interface.
Map IdP groups to roles
Use IdP groups to automatically assign Claude roles to users. Revoking a user in your IdP immediately blocks access across web, desktop, and CLI.

| Role | Capabilities |
|---|---|
| Primary Owner | Full admin access including billing, SSO config, and admin role assignment |
| Admin | Manage users, configure policies, view audit logs — cannot change billing or ownership |
| Member | Use Claude within the policies set by admins |

API Key Management
Claude Code and programmatic integrations authenticate via API keys — they are required for CLI usage, CI/CD pipelines, and any automation that calls Claude’s API outside of a browser session. SSO covers interactive web and desktop logins, but API keys are the identity layer for everything else.- Issue API keys through the Admin Console — developers should never use personal keys in a corporate context
- Store keys in a centralized secrets manager (AWS Secrets Manager, HashiCorp Vault, Azure Key Vault)
- Rotate keys quarterly and revoke immediately upon suspected compromise or employee offboarding
2. Configure Models Access
Control which models are available to your organization and how Claude traffic is routed.Model Restrictions
Prevent developers from switching to higher-cost or unapproved models.Proxy Routing
Use your own LLM Gateway to inspect, log and control all Claude traffic at the network layer and governance layer. Set these environment variables on developer machines (Claude docs):These environment variables apply to Claude Code (CLI) and Claude Desktop only. Model routing for Claude.ai (Web) is controlled at the organization level through the Admin Console.
Enforcing Model Routing Across Developer Machines
Setting environment variables on a single machine is straightforward — the challenge is enforcing them consistently across every developer in your organization. There are 3 approaches, each with different trade-offs.- MDM / Endpoint-Managed
- Server-Managed Settings (Beta)
- Direct Cloud Provider (Bedrock / Vertex)
Push a System-level paths:
managed-settings.json file to every machine via your MDM solution (Jamf, Kandji, Mosyle, Intune) and lock it against modification at the OS level. This is Claude Code’s endpoint-managed settings approach (Claude docs).- macOS:
/Library/Application Support/ClaudeCode/managed-settings.json - Linux:
/etc/claude-code/managed-settings.json
Route Through TrueFoundry AI Gateway
TrueFoundry AI Gateway acts as a unified proxy layer between Claude Code and your model providers. Instead of configuring each provider directly, route all Claude traffic through the Gateway to get centralized access control, routing, rate limiting, and cost governance in one place. Point Claude Code at TrueFoundry AI Gateway:Summary: Model Access Approaches
| Approach | Enforcement | Security Level | Key Trade-offs |
|---|---|---|---|
| MDM + TrueFoundry AI Gateway | OS-level settings lock + centralized gateway | Very High | Route to any model across providers, configure fallback and load balancing, full tracing and guardrails. Requires MDM infrastructure. |
| MDM + Anthropic Direct | OS-level settings lock + direct API | High | Simplest MDM setup — single provider, no gateway needed. Limited to Anthropic models only, no cross-provider fallback or centralized governance. |
| MDM + AWS Bedrock | OS-level settings lock + cloud IAM | Very High | Traffic stays within your VPC, cloud-native audit logging via CloudTrail. Locked to a single cloud provider, complex IAM setup. |
| MDM + Google Vertex AI | OS-level settings lock + cloud IAM | Very High | Traffic stays within your GCP project, cloud-native audit logging. Locked to a single cloud provider, complex IAM setup. |
| Server-Managed Settings (Beta) | Admin Console (client-side) | Medium | No MDM required — works on BYOD devices, centralized web UI. Client-side enforcement only (users with sudo can tamper), not available with third-party providers or custom ANTHROPIC_BASE_URL. |
| Direct AWS Bedrock | Cloud IAM only | High | No MDM or gateway needed, VPC-native traffic isolation. No OS-level enforcement — developers can reconfigure locally. Single provider only. |
| Direct Google Vertex AI | Cloud IAM only | High | No MDM or gateway needed, GCP-native traffic isolation. No OS-level enforcement — developers can reconfigure locally. Single provider only. |
| TrueFoundry AI Gateway (no MDM) | Gateway-level controls | High | Multi-provider routing, fallback, tracing, and guardrails without MDM infrastructure. No OS-level enforcement — developers can bypass the gateway locally. |
3. Configure Local Tool Access & Sandboxing
Claude Code operates directly in developers’ terminals with the same permissions as the local user — reading files, executing shell commands, and connecting to external services. Claude Desktop can also execute local tools through its sandboxed environment.- Claude.ai (Web)
- Claude Desktop
- Claude Code CLI
The Claude.ai web interface runs entirely in the browser — there is no local code execution. The primary risks are data exfiltration through prompts and shadow IT (employees using personal accounts to bypass corporate controls).Domain capture is the most effective web control. Once enabled, any sign-in attempt with a corporate email address is routed to the enterprise workspace — employees cannot fall back to personal accounts.From the Admin Console you can also configure:
Restrict network egressAllow Claude to execute code and create and edit docs, spreadsheets, presentations, PDFs, and data reports. Available on web and desktop. Control Claude network access to install packages and libraries in order to perform advanced data analysis, custom visualizations, and specialized file processing. Monitor chats closely as this comes with security risks.
Best practices for web:
| Setting | Purpose |
|---|---|
| File upload restrictions | Disable document uploads if your data classification policies require it |
| Artifacts | Disable the in-browser code execution environment if developers should not run untrusted code in-browser |
| Conversation retention | Control how long conversation history is stored and whether employees can export transcripts |
| Acceptable use notices | Display policy notices at login to set expectations on what data may be used with Claude |

- Enable domain capture and SSO enforcement before broad rollout
- Communicate clear acceptable-use policies covering what data employees may paste into Claude
- Classify Claude.ai as a third-party SaaS tool in your DLP tooling — apply the same controls you would to Google Docs or Notion
Sandboxing
Claude Code features native sandboxing that enforces filesystem and network isolation at the OS level (Seatbelt on macOS, bubblewrap on Linux). Instead of asking permission for each bash command, sandboxing creates defined boundaries upfront where Claude Code can work more freely with reduced risk. Claude docs The recommended posture is enabling sandbox for all developers with restrictions on network egress and filesystem writes:- Filesystem protection — cannot modify system-level files in
/bin/, cannot access~/.bashrc, and cannot read files denied in your permission settings - Network protection — cannot contact domains not explicitly allowed, preventing data exfiltration to attacker-controlled servers
- Prompt injection defense — even if an attacker manipulates Claude’s behavior, the sandbox ensures the system remains secure at the OS level
4. Configure MCP Server Access
MCP (Model Context Protocol) servers connect Claude to external databases, APIs, SaaS tools, and internal services. Every MCP server a developer connects to expands the attack surface. This section covers how to govern which MCP servers your organization allows — a separate concern from local tool access covered above.Risks of Unmanaged MCP Servers
Without centralized governance, MCP servers introduce prompt injection risks (malicious tool descriptions can alter Claude’s behavior), credential sprawl across developer machines, and shadow IT from ad-hoc installations of unvetted public servers. There is no audit trail of which tools were called, by whom, or what data was returned — and content retrieved by MCP servers from external sources can be weaponized for indirect data exfiltration.Recommended Approach: MCP Gateway with Allowlisting
The recommended posture is to route all MCP server access through a centralized gateway and allowlist only that gateway URL in Claude’s managed settings. This gives you a single control point — regardless of how many MCP servers your organization uses. TrueFoundry MCP Gateway implements this pattern, purpose-built for enterprise MCP governance:- Centralized MCP registry — register and manage all approved MCP servers in one place. Developers connect to the Gateway instead of managing individual server connections locally.
- Unified authentication — developers authenticate once with a TrueFoundry API key or external IdP token (Okta, Azure AD, Auth0). The Gateway handles outbound authentication to each downstream server via API keys, OAuth 2.1, or token passthrough. Learn more
- Role-based access control — control which users and teams can access which MCP servers and tools, enforcing least-privilege from the dashboard.
- Tool-level governance — selectively disable individual tools within a server, or aggregate tools from multiple servers into a virtual MCP server exposing only an approved subset per team.
- Guardrails — apply pre-execution checks, real-time blocking, and post-execution validation on tool calls. Configure user approval workflows for high-risk operations. Learn more
- Full audit trail — every tool invocation is traced with user attribution, request/response payloads, and latency data — viewable in the dashboard and exportable via OpenTelemetry. Learn more
managed-settings.json to allowlist only the gateway URL:
Developer Workflow
Admin registers MCP servers in TrueFoundry
Register approved MCP servers in the TrueFoundry Control Plane — configuring outbound authentication, access control policies, and guardrails for each server.
Developer accesses MCP servers from TrueFoundry UI
Developers log into the TrueFoundry UI to see available MCP servers and copy the ready-to-use connection URL for each.
Automate Developer Setup with MDM
On managed devices, deploy amanaged-mcp.json file via MDM to pre-seed every machine with approved gateway-backed MCP servers. When deployed, this file takes exclusive control — developers cannot add or use MCP servers beyond what is defined here.
/Library/Application Support/ClaudeCode/managed-mcp.json · Linux: /etc/claude-code/managed-mcp.json
Combined with allowedMcpServers in managed-settings.json, this creates a fully locked-down MCP configuration. Access control decisions happen at the gateway, so you only need to update the MDM-deployed file when adding or removing entire server integrations.
Overall Managed Settings
Here is a recommendedmanaged-settings.json that combines local tool governance, sandbox enforcement, MCP gateway allowlisting, and model routing:
managed-settings.json. Policies placed at the system-level path apply to all users on the machine and cannot be overridden by developers.
System-level paths:
- macOS:
/Library/Application Support/ClaudeCode/managed-settings.json - Linux:
/etc/claude-code/managed-settings.json
allowManagedPermissionRulesOnly is set to true, system-level rules are the only rules that apply — project and user settings cannot add new permissions.
- Apply via MDM (recommended)
- Apply via Server-Side setting
For Claude Code on managed macOS fleets, push both
managed-settings.json and managed-mcp.json via your MDM (Jamf, Mosyle, Kandji, or any MDM supporting script execution) and lock them against modification.chflags schg sets the macOS system immutable flag. Even root cannot
overwrite the file without first running chflags noschg — providing an
explicit friction layer against accidental or malicious policy changes. The
script handles this automatically on re-runs.| Path | Owner | Mode | Effect |
|---|---|---|---|
/Library/Application Support/ClaudeCode/ | root:wheel | 755 | Users can read the directory but cannot write to it |
managed-settings.json | root:wheel | 644 + schg | Readable by all; writable only after root removes the flag |
managed-mcp.json | root:wheel | 644 + schg | Exclusive MCP server control; locked against modification |
5. Configure Data Retention
By default, Anthropic may retain prompts and outputs for safety and quality improvement. Audit log exports contain metadata only — not chat content or code. Review your enterprise agreement for the full scope of default retention.Claude.ai (Web) Retention
Claude.ai (Web) Retention
Set retention to a maximum of 30 days at Organization Settings > Data and Privacy.

Claude Code (CLI) Transcript Retention
Claude Code (CLI) Transcript Retention
Local session transcripts are stored on the developer’s machine. Use
transcriptRetentionDays in managed-settings.json to auto-delete after a set period (recommended 7–14 days):Zero Data Retention (ZDR)
Zero Data Retention (ZDR)
Enterprise add-on that prevents Anthropic from storing prompts and outputs beyond what is needed to serve the request. Prompts are not retained after the response, session data is not used for training, and it applies across all interfaces.ZDR must be requested through your Claude account team — it requires a contractual addendum. Learn more
6. Configure Audit Logging and Monitoring
What to Capture
Enterprise audit logging should record every Claude interaction with full user attribution across all interfaces:| Interface | What to Log |
|---|---|
| Web | Session start/end, file uploads, conversation metadata |
| Desktop | MCP server connections, tool invocations, external service calls |
| CLI | Tool invocations, file access patterns, shell command execution, denied actions |
OpenTelemetry Settings
Administrators can configure OpenTelemetry settings for all users through the managed settings file. Claude docsUsing TrueFoundry AI Gateway for Observability
When Claude traffic flows through TrueFoundry AI Gateway, you get built-in observability across both LLM and MCP requests — without additional instrumentation. Request tracing — every request through the Gateway is traced with full attribution (user, model, MCP server, tool).

7. Configure Custom Usage
Usage Limits
Set hard monthly spending limits per user and per team to prevent runaway costs. Admins configure this in the Admin Console under Usage & Billing → Limits. Claude docsUsage Reporting
The Admin Console provides per-user, per-team, and per-model usage breakdowns. Use these to:- Identify top consumers for cost optimization conversations
- Attribute costs to teams for chargeback/showback reporting
- Detect anomalous usage spikes that may indicate misuse

8. Compliance
SOC 2 Type II
SOC 2 Type II
Anthropic holds SOC 2 Type II certification, available under NDA. As an enterprise admin, your responsibilities include:
- User provisioning and deprovisioning — document procedures and test them regularly
- Audit log retention — retain logs for 90+ days and export them to your SIEM
- Vendor risk assessment — maintain a current assessment of Anthropic’s security posture and contractual obligations
HIPAA
HIPAA
Additional HIPAA requirements:
- All outputs involving patient data require mandatory human review before use
- Maintain a complete audit trail of every PHI interaction across all interfaces
- Document your AI processing use cases in your HIPAA risk analysis
GDPR
GDPR
| Requirement | Implementation |
|---|---|
| Data residency | Deploy via AWS EU regions or Google Vertex AI with Private Service Connect |
| Right to erasure | Use the Compliance API and documented deletion workflows; coordinate DSARs with Anthropic |
| Data minimization | Configure deny rules (CLI) and upload restrictions (Web) to block PII-containing content |
| Purpose limitation | Document approved AI processing use cases in your Records of Processing Activities |