Skip to content

Latest commit

 

History

History
142 lines (98 loc) · 17.6 KB

File metadata and controls

142 lines (98 loc) · 17.6 KB
title Set up Claude Code for your organization
source https://code.claude.com/docs/en/admin-setup
category code
generated true

Documentation Index

Fetch the complete documentation index at: https://code.claude.com/docs/llms.txt Use this file to discover all available pages before exploring further.

Set up Claude Code for your organization

A decision map for administrators deploying Claude Code, covering API providers, managed settings, policy enforcement, usage monitoring, and data handling.

Claude Code enforces organization policy through managed settings that take precedence over local developer configuration. You deliver those settings from the Claude admin console, your mobile device management (MDM) system, or a file on disk. The settings control which tools, commands, servers, and network destinations Claude can reach.

This page walks through the deployment decisions in order. Each row links to the section below and to the reference page for that area.

SSO, SCIM provisioning, and seat assignment are configured at the Claude account level. See the [Claude Enterprise Administrator Guide](https://claude.com/resources/tutorials/claude-enterprise-administrator-guide) and [seat assignment](https://support.claude.com/en/articles/11845131-use-claude-code-with-your-team-or-enterprise-plan) for those steps.
Decision What you're choosing Reference
Choose your API provider Where Claude Code authenticates and how it's billed Authentication, Bedrock, Vertex AI, Foundry
Decide how settings reach devices How managed policy reaches developer machines Server-managed settings, Settings files
Decide what to enforce Which tools, commands, and integrations are allowed Permissions, Sandboxing
Set up usage visibility How you track spend and adoption Analytics, Monitoring, Costs
Review data handling Data retention and compliance posture Data usage, Security

Choose your API provider

Claude Code connects to Claude through one of several API providers. Your choice affects billing, authentication, which compliance posture you inherit, and which Claude Code features your developers can use.

Provider Choose this when
Claude for Teams / Enterprise You want Claude Code and claude.ai under one per-seat subscription with no infrastructure to run. This is the default recommendation.
Claude Console You're API-first or want pay-as-you-go billing
Amazon Bedrock You want to inherit existing AWS compliance controls and billing
Google Vertex AI You want to inherit existing GCP compliance controls and billing
Microsoft Foundry You want to inherit existing Azure compliance controls and billing

Some Claude Code features require a Claude.ai account. Claude Code on the web, Routines, Code Review, Remote Control, and the Chrome extension are not available through Console API keys or cloud-provider credentials alone. If you deploy through Bedrock, Vertex, or Foundry, plan whether developers also need Claude for Teams or Enterprise seats. Each feature page lists its plan requirements.

For the full provider comparison covering authentication, regions, and feature parity, see the enterprise deployment overview. Each provider's auth setup is in Authentication.

Proxy and firewall requirements in Network configuration apply regardless of provider. If you want a single endpoint in front of multiple providers or centralized request logging, see LLM gateway.

Decide how settings reach devices

Managed settings define policy that takes precedence over local developer configuration. Claude Code looks for them in four places and uses the first one it finds on a given device.

Mechanism Delivery Priority Platforms
Server-managed Claude.ai admin console Highest All
plist / registry policy macOS: com.anthropic.claudecode plist
Windows: HKLM\SOFTWARE\Policies\ClaudeCode
High macOS, Windows
File-based managed macOS: /Library/Application Support/ClaudeCode/managed-settings.json
Linux and WSL: /etc/claude-code/managed-settings.json
Windows: C:\Program Files\ClaudeCode\managed-settings.json
Medium All
Windows user registry HKCU\SOFTWARE\Policies\ClaudeCode Lowest Windows only

Server-managed settings reach devices at authentication time and refresh hourly during active sessions, with no endpoint infrastructure. They require a Claude for Teams or Enterprise plan, so deployments on other providers need one of the file-based or OS-level mechanisms instead.

If your organization mixes providers, configure server-managed settings for Claude.ai users plus a file-based or plist/registry fallback so other users still receive managed policy.

The plist and HKLM registry locations work with any provider and resist tampering because they require admin privileges to write. The Windows user registry at HKCU is writable without elevation, so treat it as a convenience default rather than an enforcement channel.

By default WSL reads only the Linux file path at /etc/claude-code. To extend your Windows registry and C:\Program Files\ClaudeCode policy to WSL on the same machine, set wslInheritsWindowsSettings: true in either of those admin-only Windows sources.

Whichever mechanism you choose, managed values take precedence over user and project settings. Array settings such as permissions.allow and permissions.deny merge entries from all sources, so developers can extend managed lists but not remove from them.

See Server-managed settings and Settings files and precedence.

Decide what to enforce

Managed settings can lock down tools, sandbox execution, restrict MCP servers and plugin sources, and control which hooks run. Each row is a control surface with the setting keys that drive it.

Control What it does Key settings
Permission rules Allow, ask, or deny specific tools and commands permissions.allow, permissions.deny
Permission lockdown Only managed permission rules apply; disable --dangerously-skip-permissions allowManagedPermissionRulesOnly, permissions.disableBypassPermissionsMode
Sandboxing OS-level filesystem and network isolation with domain allowlists sandbox.enabled, sandbox.network.allowedDomains
Managed policy CLAUDE.md Org-wide instructions loaded in every session, cannot be excluded File at the managed policy path
MCP server control Restrict which MCP servers users can add or connect to, or deploy a fixed set allowedMcpServers, deniedMcpServers, allowManagedMcpServersOnly, or a deployed managed-mcp.json file
Plugin marketplace control Restrict which marketplace sources users can add and install from strictKnownMarketplaces, blockedMarketplaces
Customization lockdown Block skills, agents, hooks, and MCP servers from user and project sources, so they can only come from plugins or managed settings strictPluginOnlyCustomization
Hook restrictions Only managed hooks load; restrict HTTP hook URLs allowManagedHooksOnly, allowedHttpHookUrls
Disable agent view Turn off claude agents, --bg, /background, and the on-demand supervisor disableAgentView
Version floor Prevent auto-update from installing below an org-wide minimum minimumVersion

Permission rules and sandboxing cover different layers. Denying WebFetch blocks Claude's fetch tool, but if Bash is allowed, curl and wget can still reach any URL. Sandboxing closes that gap with a network domain allowlist enforced at the OS level.

For the threat model these controls defend against, see Security.

Set up usage visibility

Choose monitoring based on what you need to report on.

Capability What you get Availability Where to start
Usage monitoring OpenTelemetry export of sessions, tools, and tokens All providers Monitoring usage
Analytics dashboard Per-user metrics, contribution tracking, leaderboard Anthropic only Analytics
Cost tracking Spend limits, rate limits, and usage attribution Anthropic only Costs

Cloud providers expose spend through AWS Cost Explorer, GCP Billing, or Azure Cost Management. Claude for Teams and Enterprise plans include a usage dashboard at claude.ai/analytics/claude-code.

Review data handling

On Team, Enterprise, Claude API, and cloud provider plans, Anthropic does not train models on your code or prompts. Your API provider determines retention and compliance posture.

Topic What to know Where to start
Data usage policy What Anthropic collects, how long it's retained, what's never used for training Data usage
Zero Data Retention (ZDR) Nothing stored after the request completes. Available on Claude for Enterprise Zero data retention
Security architecture Network model, encryption, authentication, audit trail Security

If you need request-level audit logging or to route traffic by data sensitivity, place an LLM gateway between developers and your provider. For regulatory requirements and certifications, see Legal and compliance.

Verify and onboard

After configuring managed settings, have a developer run /status inside Claude Code. The output includes a line beginning with Enterprise managed settings followed by the source in parentheses, one of (remote), (plist), (HKLM), (HKCU), or (file). See Verify active settings.

Share these resources to help developers get started:

For login issues, point developers to authentication troubleshooting. The most common fixes are:

  • Run /logout then /login to switch accounts
  • Run claude update if the enterprise auth option is missing
  • Restart the terminal after updating

If a developer sees "You haven't been added to your organization yet," their seat doesn't include Claude Code access and needs to be updated in the admin console.

Next steps

With provider and delivery mechanism chosen, move on to detailed configuration: