Best For: Enterprise teams that want one controlled Claude connector, centralized policy enforcement, and a simpler rollout and experience for users.
What This Achieves
With this setup:- Claude Enterprise admins add one Barndoor connector to the Claude organization
- Claude users connect to the single connector instead of needing to select individual app connectors per prompt, command, or skill
- Barndoor controls which MCP servers and tool calls are available by user, group or role
- Fine grained access policies are enforced in Barndoor
- New MCP servers and policy changes can be rolled out via Barndoor without requiring any change in Claude
Before You Begin
Before setting this up, make sure you have:- Claude Enterprise owner or admin access with permission to manage organization connectors
- Your Barndoor ToolIQ MCP URL from the Barndoor AI Client Setup at https://app.barndoor.ai/settings/ai-client-setup
- At least one registered Barndoor agent
- At least one connected MCP server in Barndoor
- Production policies prepared or in draft for the users and agents you plan to roll out
This guide assumes you want Claude users to enter through one Barndoor-controlled MCP endpoint. The governance model lives in Barndoor, so Claude stays simple while Barndoor handles server access, policy enforcement, and auditability.
Step 1: Prepare Barndoor First
Before touching Claude, confirm the Barndoor side is ready. If these pieces are not in place first, Claude users may connect successfully but see the wrong tools or fail policy checks later. References:Step 2: Copy the Barndoor ToolIQ URL
Go to your Barndoor AI Client Setup page and copy the ToolIQ MCP endpoint for your organization. This will be the single connector URL you want Claude Enterprise to expose to users.Step 3: Add the Connector in Claude Enterprise
In Claude Enterprise, the organization owner adds the connector once for the whole organization.Enter the Barndoor ToolIQ URL
Paste your Barndoor MCP URL, for example:You won’t need to configure any Claude side OAuth Credentials, only the Barndoor URL is required.
Step 4: Expose the Connector to Claude Org Users
After the owner adds the connector, Claude users can connect to it individually.Locate the Organization Connector
Users find the Barndoor connector that was added by the Claude Enterprise admin. It will appear under the organization connectors section, distinct from any personal or directory connectors.
Users are connecting to one Claude-approved Barndoor entry point. They are not managing separate Salesforce, Slack, Notion, Snowflake, etc. connectors inside Claude.
Step 5: Control Access in Barndoor, Not in Claude
This is the key operational model. Claude should expose one enterprise-approved connector. Barndoor should decide:- which MCP servers the user can reach
- which tool calls are available
- which policies allow or deny actions
- how identity, groups, and roles affect runtime access
- Allow Claude users to access Slack and Notion, but not Salesforce
- Allow read-only Snowflake queries while blocking destructive SQL
- Restrict outbound Gmail actions to corporate domains only
- Deny sensitive Slack or CRM actions for certain user groups
Step 6: Validate the Runtime Experience
Before broad rollout, test the connector with pilot users. The pilot users should have the “User” role in Claude. References:Step 7: Roll Out Safely Across the Claude Org
Once pilot validation is complete:- Roll the connector out to the rest of the Claude organization
- Keep the connector URL stable
- Add or remove MCP server access in Barndoor as needed
- Update policies in Barndoor without retraining users on connector setup
- Use Barndoor logs and policy summary views to monitor adoption and enforcement
Preventing Employees from Bypassing Barndoor
Adding the Barndoor connector at the org level is the right foundation, but it does not automatically prevent users from adding their own custom MCP connectors that bypass Barndoor entirely. By default, Claude Enterprise users can navigate to Customize > Connectors in their personal settings and add any custom MCP server URL directly — including raw endpoints for Salesforce, Slack, Snowflake, or other systems — which would skip Barndoor’s policy enforcement and audit logging. Use the following controls to close this gap before rolling out to your organization.Option 1: Network-Level Enforcement (Recommended)
The most reliable way to ensure all MCP traffic routes through Barndoor is to enforce it at the network layer.- Allowlist only your Barndoor production URL at the corporate firewall or proxy
- Block outbound connections to known MCP endpoints for systems like Salesforce, Slack, Snowflake, and others that are governed by Barndoor
- This ensures that even if a user adds a direct connector in Claude, the connection will fail at the network boundary
Option 2: Claude Desktop Managed Configuration
If your organization uses Claude Desktop, you can deploy a managed MCP configuration that takes exclusive control of all MCP server connections on the machine. Create and deploy amanaged-mcp.json file that defines only the Barndoor URL:
The managed MCP configuration applies to Claude Desktop only. It does not control connectors added through the Claude.ai web interface or mobile apps. Pair this with network controls for full coverage.
Option 3: Acceptable Use Policy
For organizations that cannot enforce controls at the network or desktop level, pair your rollout with a clear acceptable use policy that:- Requires all Claude MCP connections to route through the approved Barndoor URL
- Prohibits adding custom MCP connectors that connect directly to governed systems
- Uses Barndoor enforcement logs to detect unexpected tool usage patterns
Current Limitation: Claude Enterprise does not currently provide a native admin toggle to block users from adding their own custom connector URLs entirely. Network-level enforcement or Claude Desktop managed configuration are the recommended controls until a Claude-native restriction is available.
Summary: Layered Defense
For a complete lockdown, combine all three approaches:| Layer | Control | Coverage |
|---|---|---|
| Network | Firewall allowlist for Barndoor URL only | Claude.ai, Desktop, Code, Mobile |
| Desktop | managed-mcp.json deployment | Claude Desktop only |
| Policy | Acceptable use policy + Barndoor audit logs | All surfaces |
Operational Best Practices
- Use one Claude Enterprise connector per Barndoor environment, not per downstream app
- Keep production users on the production Barndoor URL only
- Test policy changes in
DRAFTbefore activating them - Use Barndoor policies to control access instead of relying on user behavior inside Claude
- Keep the Claude connector rollout narrow at first, then expand by user group or team
- Use Barndoor enforcement logs to investigate denied or unexpected actions
Troubleshooting
Users can see the connector but not the expected tools
Users can see the connector but not the expected tools
Check Barndoor first. The most common causes are:
- the wrong MCP servers are connected
- policies are still in
DRAFT - the user or agent is out of scope for the active policy
- the allowed tools were not enabled in the policy model
Users can connect but actions are denied
Users can connect but actions are denied
Review the active Barndoor policies and enforcement logs. Confirm whether the denial is expected and which policy caused it.
Different teams want different systems through the same Claude connector
Different teams want different systems through the same Claude connector
Keep the single connector model and separate access in Barndoor through server selection, user identity, group mapping, and policies. Do not solve this by creating many duplicate Claude connectors unless you have a strict org-level reason.
We want to add more MCP servers later
We want to add more MCP servers later
You can keep the same Claude connector and expand the governed systems behind it in Barndoor, as long as you update server connectivity and policies before rollout.
Next Steps
- Review the Go-Live Checklist before organization-wide release
- Finalize your v2 policies in Managing Policies
- Use Connect AI clients to Barndoor for the broader multi-client connection guide
