Enterprise network configuration
Configure Claude Code for enterprise environments with proxy servers, custom Certificate Authorities (CA), and mutual Transport Layer Security (mTLS) authentication.
Claude Code supports various enterprise network and security configurations through environment variables. This includes routing traffic through corporate proxy servers, trusting custom Certificate Authorities (CA), and authenticating with mutual Transport Layer Security (mTLS) certificates for enhanced security.
All environment variables shown on this page can also be configured in settings.json
.
Proxy configuration
Environment variables
Claude Code respects standard proxy environment variables:
Claude Code does not support SOCKS proxies.
Basic authentication
If your proxy requires basic authentication, include credentials in the proxy URL:
Avoid hardcoding passwords in scripts. Use environment variables or secure credential storage instead.
For proxies requiring advanced authentication (NTLM, Kerberos, etc.), consider using an LLM Gateway service that supports your authentication method.
Custom CA certificates
If your enterprise environment uses custom CAs for HTTPS connections (whether through a proxy or direct API access), configure Claude Code to trust them:
mTLS authentication
For enterprise environments requiring client certificate authentication:
Network access requirements
Claude Code requires access to the following URLs:
api.anthropic.com
- Claude API endpointsclaude.ai
- WebFetch safeguardsstatsig.anthropic.com
- Telemetry and metricssentry.io
- Error reporting
Ensure these URLs are allowlisted in your proxy configuration and firewall rules. This is especially important when using Claude Code in containerized or restricted network environments.