Shawn Freeman
Founder, CEO

If your business is adopting Claude — Anthropic's AI assistant — for your team, getting the account set up correctly from the start is one of the most important things you can do. An improperly configured Claude for Work deployment can expose your confidential business data, allow employees to connect unauthorized third-party applications, and leave your organization vulnerable to the same "shadow AI" risks that security teams are increasingly worried about.
This guide is written for business owners who want to deploy Claude for Work the right way. We have flagged every step that requires technical expertise so you know exactly when to loop in your IT provider — and what to ask them to do.
This guide covers Claude for Work on the Team and Enterprise plans (claude.ai). If you are using the free, Pro, or Max consumer plans, different — and weaker — data privacy defaults apply. See the data training section below for why this matters.
Before signing up, have these ready:
✅ YOU CAN DO THIS: Signing up and creating your organization at claude.ai is straightforward — no technical knowledge required. Just use your business email.
Navigate to claude.ai and select "Create a Team." During setup you will designate a Primary Owner — the single account with full organizational control. This should be an IT administrator or a named business owner, not a shared inbox or a departing employee's account.
⚠️ There is only one Primary Owner per organization. Choose this account carefully. Ownership can be transferred later but requires deliberate action. The Primary Owner can export all member data, manage billing, and configure every security setting.
✅ YOU CAN DO THIS: Assigning roles to team members is done through the admin dashboard — you are simply choosing from a dropdown menu.
Claude for Work uses a role-based structure. Assigning roles correctly from day one limits your exposure if an account is compromised:
Assign the minimum role necessary for each user's job. An employee who only needs Claude for writing and research has no need for Admin access.
Single Sign-On is one of the most important security controls you can enable for any tool your team uses. Here is why it should be a priority:
🔧 NEEDS IT HELP: SSO setup requires access to your Microsoft Entra ID (Azure AD) or Google Workspace admin console, the ability to create enterprise app registrations, and editing DNS records. Hand this section to your IT provider with the instructions below.
Claude uses WorkOS as its underlying provider for domain verification and SSO. It supports SAML 2.0 and OIDC, making it compatible with Microsoft Entra ID, Google Workspace, Okta, Ping Identity, and most modern enterprise Identity Providers. SSO operates through a "parent organization" that stores your SSO settings and can be shared across multiple Claude organizations.
🔧 NEEDS IT HELP: All steps in this section require Microsoft Entra ID admin access and DNS management rights. Your IT provider should own this process end-to-end.
Step 1: Verify your domain in Claude — Navigate to Organization Settings > Identity and Access > Domains. Add your company domain and copy the DNS TXT verification record provided.
Step 2: Add the DNS TXT record — Log in to your DNS provider and add the TXT record. Verification typically takes 5–15 minutes.
Step 3: Configure SSO in Claude — Go to Organization Settings > Identity and Access > Single Sign-On. Select Microsoft Entra ID and follow the WorkOS guided setup. Create an enterprise application in Entra and provide the metadata URL or upload the metadata XML.
Step 4: Configure in Microsoft Entra ID — In the Entra admin center, create a new Enterprise Application for Claude. Provide the ACS URL and Entity ID from Claude's setup flow. Assign the app to the relevant users or groups.
Step 5: Test with a non-admin account — Before enforcing SSO organization-wide, test the flow with a standard employee account to confirm everything works.
Step 6: Enable 'Require SSO for Claude' — Toggle on Require SSO in Claude's admin settings. This prevents any member from logging in with a username and password — all logins must go through your IdP.
⚠️ Enabling 'Require SSO for Claude' will lock out any employees not yet assigned to the Claude enterprise app in your IdP. Notify all employees and confirm assignments in Entra before flipping this switch.
🔧 NEEDS IT HELP: Google Workspace SSO requires Google Admin Console access and the ability to create SAML app registrations. Your IT provider should handle this.
In Claude's admin settings, select Google Workspace as your Identity Provider. You will use SAML 2.0 to connect. In the Google Admin Console, navigate to Apps > Web and Mobile Apps, add a custom SAML app, and enter the ACS URL and Entity ID from Claude's setup. Download the Google IdP metadata and upload it to Claude. Assign the app to the appropriate organizational units or groups, then test and enforce.
Once your domain is verified (the IT step above is complete), there is a simple toggle you can enable yourself:
✅ YOU CAN DO THIS: The 'Restrict Organization Creation' toggle lives in Organization Settings > Identity and Access > Security. Once your domain is verified, you can flip this on yourself — no technical knowledge required.
This toggle prevents any employee from creating a separate personal Claude account or shadow organization using your company email domain. Without it, a staff member could spin up their own unmanaged Claude workspace with their work email — entirely outside your security controls.
⚠️ This toggle only appears after your domain has been verified via DNS. If you do not see it yet, the DNS verification step has not been completed. Ask your IT provider to complete Step 1 of the SSO setup above first.
Step 3: Controlling Who Can Join and Invite
✅ YOU CAN DO THIS: Both settings in this section are simple dropdowns in Organization Settings — no technical knowledge required.
By default on Team plans, any member can invite new teammates and the invite is sent automatically without admin review. Change the new member approval setting to "Approve one-by-one" under Organization Settings > Organization. With this on, invitations go to an admin for review before the email is ever sent — giving you a gate against accidental access by contractors or former employees.
Configure allowed domains so only email addresses matching your verified company domain(s) can join the organization. Even if an invitation is accidentally sent to an outside email, the recipient will be unable to join your workspace.
Connectors are integrations that allow Claude to access data from external platforms — Microsoft 365, Google Drive, Slack, and a growing catalog of other tools. When active, Claude can read emails, search documents, and pull information from connected systems to give your team more relevant answers.
This is genuinely valuable. But without oversight, employees can connect Claude to third-party services your IT team has not reviewed or approved — creating shadow IT risk.
⚠️ On Team plans, the connector catalog is open by default. Any member can enable connectors without admin approval. If you have not reviewed connector settings, employees may already be connecting Claude to tools you have not authorized.
✅ YOU CAN DO THIS: Restricting the connector catalog is done in Organization Settings > Connectors — you are toggling things on or off. The Microsoft 365 connector setup, however, requires IT help (see below).
🔧 NEEDS IT HELP: Enabling the Microsoft 365 connector requires a Microsoft Entra Global Administrator to complete an organization-wide consent flow. This is not something a standard user can do. Your IT provider must complete step 2 below.
To restrict which employees can use the connector after setup, your IT provider should navigate to the M365 MCP Server enterprise application in Entra Admin Center, set "Assignment required?" to Yes, and assign only approved users or groups.
The Microsoft 365 connector is read-only — Claude can search and retrieve emails, SharePoint files, and Teams messages, but cannot send emails, create documents, or post messages.
✅ YOU CAN DO THIS: Reviewing and disabling unused connectors in the admin dashboard is a straightforward task. Think of it like reviewing which apps have access to your Google account.
Desktop extensions (also called MCP Bundles or MCPBs) are integrations that run directly on an employee's computer through the Claude Desktop app. They can connect Claude to local files, internal tools, databases, and other systems on the employee's machine. Think of them as plug-ins for the desktop version of Claude.
Common examples include extensions that let Claude read local files, connect to a company database, or integrate with developer tools. They are powerful — and that power means they deserve deliberate governance.
⚠️ The desktop extension allowlist is OFF by default. Until you turn it on, employees can install any extension from the public registry without admin approval. This is one of the most important settings to address early.
This is the opposite of what most business owners would expect. With the allowlist disabled, your employees have unrestricted access to any publicly available desktop extension — including ones your IT team has never reviewed. Enabling the allowlist immediately locks this down and puts you in control.
✅ YOU CAN DO THIS: Enabling the allowlist and approving specific extensions is done entirely in the admin dashboard under Organization Settings > Connectors > Desktop tab. No technical knowledge required — you are simply toggling the allowlist on and then clicking 'Add to your team' for the extensions you want to permit.
Here is how to set it up:
Your organization can also upload custom extensions — for example, an internal tool built specifically for your workflows — via Organization Settings > Connectors > Desktop. These custom extensions are only visible to your team, not the public registry.
🔍 Treat desktop extension approvals the same way you would treat approving new software on a company computer. Each one deserves a quick review of what it can access before your team installs it.
🔧 NEEDS IT HELP: If your organization uses machine-level enterprise policy controls for the Claude Desktop app (via Windows Registry or macOS MDM configuration), those settings override the in-app allowlist. Specifically, if 'isDesktopExtensionEnabled' or 'isDesktopExtensionDirectoryEnabled' are set to false at the system level, the in-app allowlist cannot function. Your IT provider needs to ensure those flags are not blocking the allowlist before you configure it in the dashboard.
This is the most misunderstood aspect of Claude for businesses, and getting it wrong has real compliance implications. Claude operates under two fundamentally different sets of data terms depending on account type:
⚠️ If employees are using personal Free, Pro, or Max accounts for company work, your confidential data may be training Anthropic's AI models. Audit your organization's Claude usage and ensure all business use is happening through your managed Work account.
✅ YOU CAN DO THIS: All of the following settings live under Organization Settings > Data and Privacy and are simple toggles — no technical knowledge required.
As an Owner or Primary Owner, you have several important controls in Organization Settings > Data and Privacy:
Not all data privacy settings are in the admin dashboard — some are controlled by individual employees in their own account settings. This is important to understand, because a setting you have not addressed organizationally may still be configured incorrectly at the user level.
✅ YOU CAN DO THIS: Creating and communicating a simple internal AI usage policy is something you can draft yourself — it does not require technical expertise, just a clear set of guidelines.
✅ YOU CAN DO THIS: This is a toggle in admin settings. Start with public projects disabled — you can relax this later.
Claude for Work lets employees create Projects — shared workspaces with uploaded documents and custom instructions. Start with public projects disabled. This prevents employees from creating organization-wide visible workspaces without admin review, which stops anyone from inadvertently uploading sensitive documents to a space visible to the entire company.
✅ YOU CAN DO THIS: Toggling Cowork and Claude in Chrome on or off is done in Admin Settings > Capabilities. You can do this yourself — but ask your IT provider what each one means for your security posture before deciding.
On Team plans, some powerful capabilities are enabled by default. Review each one consciously:
🔍 On Team plans, both Cowork and Claude in Chrome may be enabled by default. Check these settings now if you have not already done so.
One of the most overlooked risks: employees using personal Free or Pro Claude accounts on company devices to handle company work. Consumer accounts have weaker data terms, meaning any company information entered into a personal account falls outside your organizational controls.
🔧 NEEDS IT HELP: Enterprise plans support tenant restrictions that technically block personal Claude account usage on your corporate network. This requires configuring your network proxy to inject a specific HTTP header — a task for your IT provider.
✅ YOU CAN DO THIS: On Team plans (where tenant restrictions are not available), the practical fix is a clearly communicated, written AI usage policy: no company data in personal AI accounts, period. Draft a one-pager and include it in onboarding.
✅ = You can do this in the admin dashboard | 🔧 = Get your IT provider involved
For most small and mid-sized businesses, the Team plan provides sufficient controls — SSO, role-based access, connector management, the desktop extension allowlist, and data privacy settings. Enterprise adds SCIM automated provisioning, the Compliance API for audit trails, tenant restrictions to block personal account usage, IP allowlisting, and custom security addendums — all more relevant as your organization grows or compliance requirements increase.
No. Under Anthropic's Commercial Terms of Service — which govern Team and Enterprise plans — your conversations are not used to train AI models. This is a fundamental difference from the consumer plans. Make sure all business use of Claude happens through your managed Work account, not through personal employee accounts.
Yes. For web connectors like Microsoft 365, your IT provider can use Entra's app assignment features to restrict access to specific users or groups. For desktop extensions, enabling the allowlist in Organization Settings > Connectors > Desktop controls which extensions are available to everyone in your organization. Per-user desktop extension controls are organization-wide for now — either an extension is approved for the whole org or it is not.
With SSO configured and enforced, disabling or removing the employee from the Claude enterprise app in your IdP immediately revokes their Claude access — no separate step needed in Claude. Without SSO, you must manually remove them in Organization Settings.
On Enterprise plans, the Compliance API provides real-time access to usage data and conversation logs that can be integrated into your existing security tooling. On Team plans, you have member management and usage visibility in the admin dashboard. Microsoft 365 connector activity is separately logged in the M365 Compliance Center.
More than you might expect. Creating the organization, assigning roles, managing invites, controlling connectors, enabling the desktop extension allowlist, adjusting data privacy settings, toggling capabilities, and drafting your AI usage policy are all point-and-click tasks in the admin dashboard. The parts that genuinely need IT are DNS verification, SSO setup with Microsoft or Google, Entra app assignments, and enterprise network restrictions. For a managed IT provider, those are standard tasks — typically a few hours of work.
Claude for Work is a powerful AI tool that can meaningfully improve your team's productivity. But like any platform with access to your data and workflows, it rewards a thoughtful setup — and several important defaults are less secure than you would expect out of the box.
The good news: you can handle a significant portion of this yourself. The security controls that require IT expertise — SSO, DNS, Entra configuration, network controls — are well-defined tasks that any competent IT provider can complete quickly. Everything else is yours to configure directly in the dashboard.
Working with a managed service provider who understands both the Microsoft/Google identity stack and AI platform governance means you get a secure Claude deployment without needing to become an IT expert yourself.
📞 Ready to deploy Claude for Work securely in your organization? We help businesses set up, configure, and govern AI tools as part of a broader IT security strategy. Contact us for a free consultation — we will handle the technical setup and make sure your team is protected from day one.
See exactly how your current IT setup measures up to our Hack Free standards. Enter your business email to receive: