Skip to main content

Setting up Single Sign-On on the API Console

Updated this week

Important: If you are not already on an Enterprise plan, you will need to reach out to our Sales team to enable this feature before gaining access to the API Console Identity settings page.

Domain Capture, Single Sign-On (SSO), and Just-in-Time Provisioning (JIT) enable API Console organizations to enhance authentication security and streamline user access to console.anthropic.com. This guide assumes that:

  1. You are an Admin on your Console account

  2. You control the DNS settings for your company's email address domain

  3. You control the SSO Identity Provider your company uses to log in to third-party applications (e.g. Okta, Google Workspace, etc.)

If #2 and #3 are not true, please contact your organization's IT Administrator to continue.

Note: WorkOS is Anthropic's provider for domain verification and SSO setup. More details can be found in Anthropic's Subprocessor List.

Understanding Parent Organizations

Our Single Sign-On feature introduces the concept of a “Parent Organization.” This is an entity that stores SSO settings for an organization. For multiple organizations to share the same SSO configuration, each organization needs to be linked to the same parent organization.

Enterprise Claude for Work organizations are created with a parent organization by default, but API Console accounts don’t automatically have this feature when they’re set up.

Important: If you’re part of a Claude for Work Enterprise organization that already has SSO configured, your API Console organization may already be linked to the same parent organization. You can verify this by checking if the Identity settings page is accessible at console.anthropic.com/settings/identity.

If your organization does have an Enterprise Claude for Work account and you’d like to tie the organization’s API Console account to the same SSO settings/parent organization:

  • Reach out to your Account Manager to request a merge proposal.

  • Once they confirm this, it will be emailed to these approvers in both the organizations:

    • Console Admins

    • Enterprise Owners/Primary Owners

  • After one approver within each organization approves the proposal via the email, the merge will complete, and the two organizations will be attached to the same parent organization.

  • Once the merge is complete, the incoming organization will gain access to console.anthropic.com/settings/identity to configure SSO login options, and can enable features like “Advanced Group Mappings."

If your organization does not have an Enterprise Claude for Work account, and you’re hoping to create a new parent organization specifically for your organization’s API Console account to configure SSO settings:

  • Note that API Console accounts are not created with parent organizations by default.

  • To request that a parent organization is created for your organization’s API/Console account, please fill out our Contact Sales form.

  • Once the parent organization is created, the Identity settings page will appear in your Console account and you can continue with the SSO setup process.

Key points about parent organizations:

  • Domain verification is stored at the parent organization level - once one parent organization verifies a domain, other organizations cannot verify or claim that domain.

  • Multiple API Console organizations can be linked under the same parent organization.

  • If you have both Claude for Work Enterprise and API Console organizations, they can share the same parent organization and SSO configuration.

  • Advanced Group Mappings allow you to control user access to specific organizations under your parent organization.

Capturing your domain

“Domain Capture” proves that you own your company's domain. Once you have confirmed that you own your domain, Anthropic can intercept login attempts for emails on your domain and require your employees to sign in via SSO.

Follow these steps to verify your domain:

    • This section will not appear in your API Console account if you haven't done one of the following:

      1. Worked with our Sales team to enable the SSO feature for your Console organization.

      2. Completed a merge proposal to link your Console to an Enterprise organization.

  1. Click "Add Domain"

  2. Follow the instructions to add your TXT record.

    • Note: if you're using a subdomain (e.g. subdomain.yourcompany.com), you should set your new TXT record on that subdomain (e.g. _acme-challenge.subdomain.yourcompany.com).

  3. Wait up to 10 minutes for your DNS change to propagate. When you see the green "Verified" badge, you can close the instructions page.

  4. Back on console.anthropic.com/settings/identity, you should see your domain added to the page. If you do not see it, try refreshing your page.

  5. If your domain is listed as "Pending", click the button next to the word "Pending" to refresh your domain status.

  6. Your domain should now be listed as "Verified."

Domain memberships

To view or download information about your verified domains and their usage across Anthropic organizations:

  1. Click "View Domain Memberships" in the "Domain management" section

  2. Review the information or download your domain membership details in CSV or JSON format

Adding SSO

After capturing your domain, you can connect your SSO provider to your Console organization so users will be able to log in securely using that provider.

  1. Navigate to console.anthropic.com/settings/identity

  2. Click the "Add SSO" button

  3. Follow the steps provided for your SSO provider

  4. Once you've completed the steps for your SSO provider, navigate back to console.anthropic.com/settings/identity for further configuration options.

Note: Turning on SSO will end all current sessions of your users. They will need to log back in through SSO.

Identity provider-initiated login

While many applications support launching directly from your identity provider (e.g., clicking an app tile in Okta), Claude does not enable this flow due to security considerations. However, to provide a smoother experience for employees who are accustomed to launching apps from their identity provider:

  1. When configuring the SSO application in your identity provider, set the login URL to https://claude.ai/login?sso=true instead of https://claude.ai/login

  2. When employees click the Claude tile in your identity provider, they will be directed to a clear login page that guides them to authenticate via SSO

Testing SSO log-in

Before inviting your teammates, verify that everything works correctly.

  1. Log out of your account by navigating to console.anthropic.com/logout

  2. Try logging in again with your email address. You should be directed to your SSO provider. If you’re already logged in via your SSO provider, you may be immediately redirected and logged in to console.anthropic.com .

  3. If you use Google Workspace on your domain, try logging in with Google. This should fail and users should be required to log in via SSO.

Adding and removing users

Managing team members in your organization depends on whether you're using Single Sign-On (SSO) or not. Once SSO is enabled, your Identity Provider (IdP) becomes the primary controller for adding members, while removal involves steps in both your IdP and Console.

Before SSO is enabled

Adding members

  1. Click the “Invite” button to add new team members

Removing members

  1. Find the user you want to remove

  2. Click the trash icon on the row with their name

  3. Select "Remove"

After SSO is enabled

Adding members

  1. Ensure that the member is part of your SSO organization and has access to the Console application.

  2. When the user logs in for the first time, an account will be created for them (JIT provisioning) and that account will be a member of your organization.

Removing members

  1. First, revoke the user's access to Console in your SSO provider

  2. Find the user you want to remove

  3. Click the trash icon next to their name

  4. Select "Remove"

  5. Note that the user will remain logged in to console.anthropic.com until you click "Remove"

SCIM

Using SCIM, you can have group members added or deleted based on automatic updates from your IdP. This is the ideal setup for full control of group memberships.

Adding members

  1. Add users to the SSO application in your IdP

Removing members

  1. Remove users from the SSO application in your IdP

If you have multiple organizations under a single parent organization, then it's strongly advised that you enable “Advanced Group Mappings” for each organization. This will allow you to use IdP groups to control exactly which organizations accounts are given access to.

When Advanced Group Mappings is toggled within an organization's settings page, we'll show special "anthropic-" prefixed group names that can be added in your IdP. When members are added to these groups, they will then automatically be provisioned for access.

Manually syncing your directory

SCIM directory syncing happens automatically, but you can prompt a manual sync if needed:

  1. From your Identity and access settings, click "Sync Now" under the Directory sync (SCIM) section.

Advanced Group Mappings

Important: To enable Advanced Group Mappings, you must be an Admin on your Console account. If you can’t access the Identity settings page, contact your Console administrator to add you as an Admin first.

As mentioned above, Advanced Group Mappings can be used to provide not just access but also role assignment. These groups will be sent to Anthropic from your identity provider, and some of the configuration options are IdP specific. As an example, we'll outline how to set this up in Okta.

SAML

For JIT based provisioning, Advanced Group Mappings will be shared at login time via your IdP’s SAML response. To have Okta share groups on login, you will need to edit the SAML section of your SSO Application.

  1. Under “Applications” select the SSO Application you configured for Anthropic

  2. Select “Edit” on your SAML settings

  3. Create a “Group Attribute Statement” to share all groups prefixed with “anthropic-” to Anthropic on login.

  4. Hereafter, all members of group names that start with “anthropic-” will be shared with Anthropic at login time.

  5. Assign members to relevant groups in Okta before turning on Advanced Group Mapping in order to prevent lockout.

Where to edit SAML Settings

On the second page of the SAML integration page

Sharing groups by prefix

SCIM

Sharing groups via SCIM is through a different mechanism. In Okta, these are referred to as Push Groups

  1. Visit the Push Groups page for the SSO Application

  2. Click the “+ Push Groups” button

  3. Create a rule to push all groups starting with the “anthropic-” prefix

Creating a rule-based push group:

Troubleshooting Common Scenarios

My Enterprise organization has SSO already; how can we set this up on our Console organization?

You will need to add API Console access with different user groups:

  1. Verify your organizations are linked: Check if you can access console.anthropic.com/settings/identity. If you can't see this page, contact Sales to link your Console organization to your existing Parent Organization.

  2. Ensure you're a Console Admin: You must be added as an Admin on the Console side to enable Advanced Group Mappings. Have an existing Console Admin add you, or contact your Account Manager if no Console admins exist.

  3. Enable Advanced Group Mappings: Once you're a Console admin, navigate to console.anthropic.com/settings/identity and toggle on "Advanced Group Mappings."

  4. Copy the group names: Copy the Console-specific group names that appear after enabling Advanced Group Mappings.

  5. Configure your IdP: Add these new Console groups to your existing SSO application alongside your Enterprise groups.

  6. Assign users: Add Console users to the appropriate Console groups in your IdP without requiring them to have Enterprise group membership.

Did this answer your question?