Identity and Access Management
Learn how to configure user authentication, authorization, and access controls for Claude Code in your organization.
Authentication methods
Setting up Claude Code requires access to Anthropic models. For teams, you can set up Claude Code access in one of three ways:
- Anthropic API via the Anthropic Console
- Amazon Bedrock
- Google Vertex AI
Anthropic API authentication
To set up Claude Code access for your team via Anthropic API:
- Use your existing Anthropic Console account or create a new Anthropic Console account
- You can add users through either method below:
- Bulk invite users from within the Console (Console -> Settings -> Members -> Invite)
- Set up SSO
- When inviting users, they need one of the following roles:
- “Claude Code” role means users can only create Claude Code API keys
- “Developer” role means users can create any kind of API key
- Each invited user needs to complete these steps:
- Accept the Console invite
- Check system requirements
- Install Claude Code
- Login with Console account credentials
Cloud provider authentication
To set up Claude Code access for your team via Bedrock or Vertex:
- Follow the Bedrock docs or Vertex docs
- Distribute the environment variables and instructions for generating cloud credentials to your users. Read more about how to manage configuration here.
- Users can install Claude Code
Access control and permissions
We support fine-grained permissions so that you’re able to specify exactly what the agent is allowed to do (e.g. run tests, run linter) and what it is not allowed to do (e.g. update cloud infrastructure). These permission settings can be checked into version control and distributed to all developers in your organization, as well as customized by individual developers.
Permission system
Claude Code uses a tiered permission system to balance power and safety:
Tool Type | Example | Approval Required | ”Yes, don’t ask again” Behavior |
---|---|---|---|
Read-only | File reads, LS, Grep | No | N/A |
Bash Commands | Shell execution | Yes | Permanently per project directory and command |
File Modification | Edit/write files | Yes | Until session end |
Configuring permissions
You can view & manage Claude Code’s tool permissions with /permissions
. This UI lists all permission rules and the settings.json file they are sourced from.
- Allow rules will allow Claude Code to use the specified tool without further manual approval.
- Deny rules will prevent Claude Code from using the specified tool. Deny rules take precedence over allow rules.
- Additional directories extend Claude’s file access to directories beyond the initial working directory.
- Default mode controls Claude’s permission behavior when encountering new requests.
Permission rules use the format: Tool(optional-specifier)
A rule that is just the tool name matches any use of that tool. For example, adding Bash
to the list of allow rules would allow Claude Code to use the Bash tool without requiring user approval.
Permission modes
Claude Code supports several permission modes that can be set as the defaultMode
in settings files:
Mode | Description |
---|---|
default | Standard behavior - prompts for permission on first use of each tool |
acceptEdits | Automatically accepts file edits within the working directories |
plan | Plan mode - Claude can analyze but not modify files or execute commands |
bypassPermissions | Skips all permission prompts. (Dangerous, use with caution) |
Working directories
By default, Claude has access to files in the directory where it was launched. You can extend this access:
- During startup: Use
--add-dir <path>
CLI argument - During session: Use
/add-dir
slash command - Persistent configuration: Add to
additionalDirectories
in settings files
Files in additional directories follow the same permission rules as the original working directory - they become readable without prompts, and file editing permissions follow the current permission mode.
Tool-specific permission rules
Some tools use the optional specifier for more fine-grained permission controls. For example, an allow rule with Bash(git diff:*)
would allow Bash commands that start with git diff
. The following tools support permission rules with specifiers:
Bash
Bash(npm run build)
Matches the exact Bash commandnpm run build
Bash(npm run test:*)
Matches Bash commands starting withnpm run test
.
Claude Code is aware of shell operators (like &&
) so a prefix match rule like Bash(safe-cmd:*)
won’t give it permission to run the command safe-cmd && other-cmd
Read & Edit
Edit
rules apply to all built-in tools that edit files. Claude will make a best-effort attempt to apply Read
rules to all built-in tools that read files like Grep, Glob, and LS.
Read & Edit rules both follow the gitignore specification. Patterns are resolved relative to the directory containing .claude/settings.json
. To reference an absolute path, use //
. For a path relative to your home directory, use ~/
.
Edit(docs/**)
Matches edits to files in thedocs
directory of your projectRead(~/.zshrc)
Matches reads to your~/.zshrc
fileEdit(//tmp/scratch.txt)
Matches edits to/tmp/scratch.txt
WebFetch
WebFetch(domain:example.com)
Matches fetch requests to example.com
MCP
mcp__puppeteer
Matches any tool provided by thepuppeteer
server (name configured in Claude Code)mcp__puppeteer__puppeteer_navigate
Matches thepuppeteer_navigate
tool provided by thepuppeteer
server
Enterprise managed policy settings
For enterprise deployments of Claude Code, we support enterprise managed policy settings that take precedence over user and project settings. This allows system administrators to enforce security policies that users cannot override.
System administrators can deploy policies to:
- macOS:
/Library/Application Support/ClaudeCode/managed-settings.json
- Linux and Windows (via WSL):
/etc/claude-code/managed-settings.json
These policy files follow the same format as regular settings files but cannot be overridden by user or project settings. This ensures consistent security policies across your organization.
Settings precedence
When multiple settings sources exist, they are applied in the following order (highest to lowest precedence):
- Enterprise policies
- Command line arguments
- Local project settings (
.claude/settings.local.json
) - Shared project settings (
.claude/settings.json
) - User settings (
~/.claude/settings.json
)
This hierarchy ensures that organizational policies are always enforced while still allowing flexibility at the project and user levels where appropriate.
Credential management
Claude Code supports authentication via Claude.ai credentials, Anthropic API credentials, Bedrock Auth, and Vertex Auth. On macOS, the API keys, OAuth tokens, and other credentials are stored on encrypted macOS Keychain. Alternately, the setting apiKeyHelper can be set to a shell script which returns an API key. By default, this helper is called after 5 minutes or on HTTP 401 response; specifying environment variable CLAUDE_CODE_API_KEY_HELPER_TTL_MS
defines a custom refresh interval.