Skip to main content
Claude Code enforces organization policy through managed settings that take precedence over local developer configuration. You deliver those settings from the Claude admin console, your mobile device management (MDM) system, or a file on disk. The settings control which tools, commands, servers, and network destinations Claude can reach. This page walks through the deployment decisions in order. Each row links to the section below and to the reference page for that area.
SSO, SCIM provisioning, and seat assignment are configured at the Claude account level. See the Claude Enterprise Administrator Guide and seat assignment for those steps.
DecisionWhat you’re choosingReference
Choose your API providerWhere Claude Code authenticates and how it’s billedAuthentication, Bedrock, Vertex AI, Foundry
Decide how settings reach devicesHow managed policy reaches developer machinesServer-managed settings, Settings files
Decide what to enforceWhich tools, commands, and integrations are allowedPermissions, Sandboxing
Set up usage visibilityHow you track spend and adoptionAnalytics, Monitoring, Costs
Review data handlingData retention and compliance postureData usage, Security

Choose your API provider

Claude Code connects to Claude through one of several API providers. Your choice affects billing, authentication, and which compliance posture you inherit.
ProviderChoose this when
Claude for Teams / EnterpriseYou want Claude Code and claude.ai under one per-seat subscription with no infrastructure to run. This is the default recommendation.
Claude ConsoleYou’re API-first or want pay-as-you-go billing
Amazon BedrockYou want to inherit existing AWS compliance controls and billing
Google Vertex AIYou want to inherit existing GCP compliance controls and billing
Microsoft FoundryYou want to inherit existing Azure compliance controls and billing
For the full provider comparison covering authentication, regions, and feature parity, see the enterprise deployment overview. Each provider’s auth setup is in Authentication. Proxy and firewall requirements in Network configuration apply regardless of provider. If you want a single endpoint in front of multiple providers or centralized request logging, see LLM gateway.

Decide how settings reach devices

Managed settings define policy that takes precedence over local developer configuration. Claude Code looks for them in four places and uses the first one it finds on a given device.
MechanismDeliveryPriorityPlatforms
Server-managedClaude.ai admin consoleHighestAll
plist / registry policymacOS: com.anthropic.claudecode plist
Windows: HKLM\SOFTWARE\Policies\ClaudeCode
HighmacOS, Windows
File-based managedmacOS: /Library/Application Support/ClaudeCode/managed-settings.json
Linux and WSL: /etc/claude-code/managed-settings.json
Windows: C:\Program Files\ClaudeCode\managed-settings.json
MediumAll
Windows user registryHKCU\SOFTWARE\Policies\ClaudeCodeLowestWindows only
Server-managed settings reach devices at authentication time and refresh hourly during active sessions, with no endpoint infrastructure. They require a Claude for Teams or Enterprise plan, so deployments on other providers need one of the file-based or OS-level mechanisms instead. If your organization mixes providers, configure server-managed settings for Claude.ai users plus a file-based or plist/registry fallback so other users still receive managed policy. The plist and HKLM registry locations work with any provider and resist tampering because they require admin privileges to write. The Windows user registry at HKCU is writable without elevation, so treat it as a convenience default rather than an enforcement channel. Whichever mechanism you choose, managed values take precedence over user and project settings. Array settings such as permissions.allow and permissions.deny merge entries from all sources, so developers can extend managed lists but not remove from them. See Server-managed settings and Settings files and precedence.

Decide what to enforce

Managed settings can lock down tools, sandbox execution, restrict MCP servers and plugin sources, and control which hooks run. Each row is a control surface with the setting keys that drive it.
ControlWhat it doesKey settings
Permission rulesAllow, ask, or deny specific tools and commandspermissions.allow, permissions.deny
Permission lockdownOnly managed permission rules apply; disable --dangerously-skip-permissionsallowManagedPermissionRulesOnly, permissions.disableBypassPermissionsMode
SandboxingOS-level filesystem and network isolation with domain allowlistssandbox.enabled, sandbox.network.allowedDomains
Managed policy CLAUDE.mdOrg-wide instructions loaded in every session, cannot be excludedFile at the managed policy path
MCP server controlRestrict which MCP servers users can add or connect toallowedMcpServers, deniedMcpServers, allowManagedMcpServersOnly
Plugin marketplace controlRestrict which marketplace sources users can addstrictKnownMarketplaces, blockedMarketplaces
Hook restrictionsOnly managed hooks load; restrict HTTP hook URLsallowManagedHooksOnly, allowedHttpHookUrls
Version floorPrevent auto-update from installing below an org-wide minimumminimumVersion
Permission rules and sandboxing cover different layers. Denying WebFetch blocks Claude’s fetch tool, but if Bash is allowed, curl and wget can still reach any URL. Sandboxing closes that gap with a network domain allowlist enforced at the OS level. For the threat model these controls defend against, see Security.

Set up usage visibility

Choose monitoring based on what you need to report on.
CapabilityWhat you getAvailabilityWhere to start
Usage monitoringOpenTelemetry export of sessions, tools, and tokensAll providersMonitoring usage
Analytics dashboardPer-user metrics, contribution tracking, leaderboardAnthropic onlyAnalytics
Cost trackingSpend limits, rate limits, and usage attributionAnthropic onlyCosts
Cloud providers expose spend through AWS Cost Explorer, GCP Billing, or Azure Cost Management. Claude for Teams and Enterprise plans include a usage dashboard at claude.ai/analytics/claude-code.

Review data handling

On Team, Enterprise, Claude API, and cloud provider plans, Anthropic does not train models on your code or prompts. Your API provider determines retention and compliance posture.
TopicWhat to knowWhere to start
Data usage policyWhat Anthropic collects, how long it’s retained, what’s never used for trainingData usage
Zero Data Retention (ZDR)Nothing stored after the request completes. Available on Claude for EnterpriseZero data retention
Security architectureNetwork model, encryption, authentication, audit trailSecurity
If you need request-level audit logging or to route traffic by data sensitivity, place an LLM gateway between developers and your provider. For regulatory requirements and certifications, see Legal and compliance.

Verify and onboard

After configuring managed settings, have a developer run /status inside Claude Code. The output includes a line beginning with Enterprise managed settings followed by the source in parentheses, one of (remote), (plist), (HKLM), (HKCU), or (file). See Verify active settings. Share these resources to help developers get started: For login issues, point developers to authentication troubleshooting. The most common fixes are:
  • Run /logout then /login to switch accounts
  • Run claude update if the enterprise auth option is missing
  • Restart the terminal after updating
If a developer sees “You haven’t been added to your organization yet,” their seat doesn’t include Claude Code access and needs to be updated in the admin console.

Next steps

With provider and delivery mechanism chosen, move on to detailed configuration: