All environment variables shown on this page can also be configured in
settings.json.Proxy configuration
Environment variables
Claude Code respects standard proxy environment variables:Claude Code does not support SOCKS proxies.
Basic authentication
If your proxy requires basic authentication, include credentials in the proxy URL:CA certificate store
By default, Claude Code trusts both its bundled Mozilla CA certificates and your operating system’s certificate store. Enterprise TLS-inspection proxies such as CrowdStrike Falcon and Zscaler work without additional configuration when their root certificate is installed in the OS trust store.System CA store integration requires the native Claude Code binary distribution. When running on the Node.js runtime, the system CA store is not merged automatically. In that case, set
NODE_EXTRA_CA_CERTS=/path/to/ca-cert.pem to trust an enterprise root CA.CLAUDE_CODE_CERT_STORE accepts a comma-separated list of sources. Recognized values are bundled for the Mozilla CA set shipped with Claude Code and system for the operating system trust store. The default is bundled,system.
To trust only the bundled Mozilla CA set:
CLAUDE_CODE_CERT_STORE has no dedicated settings.json schema key. Set it via the env block in ~/.claude/settings.json or directly in the process environment.Custom CA certificates
If your enterprise environment uses a custom CA, configure Claude Code to trust it directly:mTLS authentication
For enterprise environments requiring client certificate authentication:Network access requirements
Claude Code requires access to the following URLs:api.anthropic.com: Claude API endpointsclaude.ai: authentication for claude.ai accountsplatform.claude.com: authentication for Anthropic Console accounts
storage.googleapis.com while plugin downloads use downloads.claude.ai. If you install Claude Code through npm or manage your own binary distribution, end users may not need access:
storage.googleapis.com: download bucket for the Claude Code binary and auto-updaterdownloads.claude.ai: CDN hosting the install script, version pointers, manifests, signing keys, and plugin executables
bridge.claudeusercontent.com for outbound WebSocket connections.
Claude Code on the web and Code Review connect to your repositories from Anthropic-managed infrastructure. If your GitHub Enterprise Cloud organization restricts access by IP address, enable IP allow list inheritance for installed GitHub Apps. The Claude GitHub App registers its IP ranges, so enabling this setting allows access without manual configuration. To add the ranges to your allow list manually instead, or to configure other firewalls, see the Anthropic API IP addresses.
For self-hosted GitHub Enterprise Server instances behind a firewall, allowlist the same Anthropic API IP addresses so Anthropic infrastructure can reach your GHES host to clone repositories and post review comments.