Loading...
  • Messages
  • Managed Agents
  • Admin
Search...
⌘K
Organization
Admin APIWorkspaces
Authentication
OverviewWorkload Identity FederationWIF reference
Monitoring
Usage and Cost APIRate Limits APIClaude Code Analytics API
Data & compliance
Data residencyAPI and data retention
Compliance API
OverviewGet accessActivity FeedChats, files, and projectsOrganizations, users, roles, and groupsDesign your integrationErrorsFAQ
Log in
WIF reference
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Solutions

  • AI agents
  • Code modernization
  • Coding
  • Customer support
  • Education
  • Financial services
  • Government
  • Life sciences

Partners

  • Amazon Bedrock
  • Google Cloud's Vertex AI

Learn

  • Blog
  • Courses
  • Use cases
  • Connectors
  • Customer stories
  • Engineering at Anthropic
  • Events
  • Powered by Claude
  • Service partners
  • Startups program

Company

  • Anthropic
  • Careers
  • Economic Futures
  • Research
  • News
  • Responsible Scaling Policy
  • Security and compliance
  • Transparency

Learn

  • Blog
  • Courses
  • Use cases
  • Connectors
  • Customer stories
  • Engineering at Anthropic
  • Events
  • Powered by Claude
  • Service partners
  • Startups program

Help and security

  • Availability
  • Status
  • Support
  • Discord

Terms and policies

  • Privacy policy
  • Responsible disclosure policy
  • Terms of service: Commercial
  • Terms of service: Consumer
  • Usage policy
Admin/Authentication

WIF reference

Environment variables, validation rules, profile configuration, and error reference for Workload Identity Federation.

Was this page helpful?

  • Token exchange request
  • Token exchange response
  • Environment variables
  • Credential precedence
  • Profile configuration file
  • Configuration directory
  • Active profile
  • File layout
  • Federation profile example
  • OAuth scopes
  • Validation rules
  • Resource fields
  • URL fields
  • JWT verification
  • Rule matching semantics
  • CEL evaluation environment
  • Errors
  • Token exchange errors
  • Common SDK-side failures
  • Troubleshoot a failed exchange
  • JWKS source modes
  • Key rotation and caching

This page collects the configuration surfaces, validation constraints, and error mappings for Workload Identity Federation. For setup walkthroughs, see the provider guides.

Token exchange request

POST /v1/oauth/token accepts a JSON body using the RFC 7523 jwt-bearer grant. The SDKs build this request for you from the environment variables below; the cURL examples on each provider guide show the raw body.

FieldRequiredDescription
grant_typeYesAlways urn:ietf:params:oauth:grant-type:jwt-bearer.
assertionYesThe OIDC JWT issued by your identity provider.
federation_rule_idYesTagged ID (fdrl_...) of the federation rule to evaluate.
organization_idYesUUID of your Anthropic organization.
service_account_idYesTagged ID (svac_...) of the target service account.
workspace_idConditionalTagged ID (wrkspc_...) of the workspace to scope the minted token to, or the literal default for the organization's default workspace. Required when the rule is enabled for more than one workspace. When omitted, the server selects the rule's sole enabled workspace.

Token exchange response

POST /v1/oauth/token returns a standard OAuth 2.0 token response (RFC 6749 §5.1):

FieldTypeDescription
access_tokenstringThe short-lived Anthropic token, prefixed sk-ant-oat01-.... Pass it as Authorization: Bearer <token>.
token_typestringAlways Bearer.
expires_inintegerSeconds until the token expires.
scopestringThe OAuth scope granted by the matched rule.

Environment variables

The SDK reads these variables to perform a federated token exchange with no constructor arguments.

VariableRequiredDescriptionExample
ANTHROPIC_FEDERATION_RULE_IDYesTagged ID of the federation rule to evaluate.fdrl_...
ANTHROPIC_ORGANIZATION_IDYesUUID of your Anthropic organization. Find it in the Claude Console under Settings > Organization.00000000-0000-0000-0000-000000000000
ANTHROPIC_IDENTITY_TOKEN_FILEOne of _TOKEN_FILE or _TOKENFilesystem path to the JWT issued by your identity provider (IdP). The SDK re-reads this file on every exchange so that projected tokens which rotate on disk are always current./var/run/secrets/anthropic.com/token

The direct environment-variable federation path activates only when ANTHROPIC_FEDERATION_RULE_ID, ANTHROPIC_ORGANIZATION_ID, ANTHROPIC_SERVICE_ACCOUNT_ID, and one of ANTHROPIC_IDENTITY_TOKEN_FILE or ANTHROPIC_IDENTITY_TOKEN are all set. ANTHROPIC_WORKSPACE_ID is read alongside but does not gate activation.

A variable that is set to an empty string still occupies its slot in the credential precedence chain. If ANTHROPIC_API_KEY="" is exported, the SDK selects the API-key path with an empty key rather than falling through to federation. Unset unused credential variables rather than blanking them.

Credential precedence

The SDK resolves credentials in this order. The first source that yields a credential wins.

OrderSourceNotes
1Constructor argument (api_key=, auth_token=, credentials=)Always overrides everything else.
2ANTHROPIC_API_KEY or ANTHROPIC_AUTH_TOKENShadows federation entirely. Unset these when migrating from API keys.
3ANTHROPIC_PROFILELoads <config_dir>/configs/<name>.json. A missing named profile is an error, not a fall-through.
4Federation environment variablesANTHROPIC_FEDERATION_RULE_ID + ANTHROPIC_ORGANIZATION_ID + ANTHROPIC_SERVICE_ACCOUNT_ID + .

When a profile is loaded, environment variables fill any fields the profile omits but never override fields the profile sets explicitly. For example, ANTHROPIC_WORKSPACE_ID fills workspace_id only when the active profile does not set it.

Profile configuration file

A profile is a named configuration file that the SDK and the ant CLI both read. Profiles let you ship federation parameters with your container image or switch between environments without changing code.

Configuration directory

The SDK locates the configuration directory in this order:

  1. $ANTHROPIC_CONFIG_DIR
  2. ~/.config/anthropic on Linux and macOS
  3. %APPDATA%\Anthropic on Windows

Active profile

The active profile name resolves in this order:

  1. $ANTHROPIC_PROFILE
  2. The contents of <config_dir>/active_config (a one-line file written by ant profile activate <name>)
  3. The literal name default

Claude Code and the Claude Agent SDK honor this same resolution order, so a federation profile configured here also authenticates those tools without additional setup.

File layout

PathContentsSensitivity
<config_dir>/configs/<profile>.jsonversion, the authentication block, organization_id, workspace_id, and base_url.Non-secret. Safe to commit or bake into an image.
<config_dir>/credentials/<profile>.jsonversion, the cached access_token, expires_at, and (for interactive login) refresh_token.Secret. Written by the SDK with mode 0600.

Both the config file and the credentials file carry a top-level string version field in major.minor format (currently "1.0"). The SDK writes this field automatically so future releases can detect and migrate older formats; omit it when authoring a config by hand and the SDK treats the file as the current version.

Federation profile example

configs/production.json
{
  "version": "1.0",
  "authentication": {
    "type": "oidc_federation",
    "federation_rule_id": "fdrl_...",
    "service_account_id": "svac_...",
    "identity_token": {
      "source": "file",
      "path": "/var/run/secrets/anthropic.com/token"
    }
  },
  "organization_id": "00000000-0000-0000-0000-000000000000",
  "workspace_id": "wrkspc_...",
  "base_url": "https://api.anthropic.com"
}

If authentication.identity_token is omitted, the SDK falls back to ANTHROPIC_IDENTITY_TOKEN_FILE or ANTHROPIC_IDENTITY_TOKEN from the environment.

OAuth scopes

The oauth_scope you set on a federation rule determines which Claude API endpoints the minted access token can call.

ScopeGrants access to
workspace:developerAll non-administrative Claude API endpoints in the rule's workspace: Messages (including streaming and token counting), Models, Managed Agents and their sessions, Files, and Skills. This matches the access an API key issued for the same workspace has.

A request to an endpoint outside the token's scope returns HTTP 403. Finer-grained scopes (per resource, or read versus write) are not currently available.

Validation rules

Anthropic enforces these constraints when you create or update issuers and rules, and when verifying an incoming JWT at exchange time.

Resource fields

FieldConstraint
Issuer, rule, and service account nameMust match ^[a-z0-9-]+$, length 1 to 255 characters.
workspace_idOptional. The workspace (wrkspc_...) whose quota, billing, and rate limits apply to tokens minted under this rule. Must be a workspace in the same organization, and the target service account must be a member of that workspace. May be omitted for rules that are configured for only one workspace.
token_lifetime_secondsInteger between 60 and 86400 (1 minute to 24 hours). Default 3600. Values outside this range are rejected at request time. See Token lifetime and refresh.

URL fields

The issuer_url, jwks.discovery_base, and jwks.url fields are validated:

ConstraintDetail
SchemeMust be https.
PortMust be 443 (explicit or default).
HostMust be a public DNS host name for your OIDC provider. Must resolve to public IP addresses; IP literals are not accepted.

URL validation failures return 400 invalid_request_error with the field name as a prefix on the error message (for example, issuer_url: url must use https scheme).

URL constraints apply only to URLs that Anthropic dials. In explicit_url and inline JWKS modes, and in discovery mode when jwks.discovery_base is set, the issuer_url is compared against the JWT iss claim as a string and is never fetched, so it may reference an internal hostname or non-standard port.

JWT verification

ConstraintDetail
Maximum sizeThe assertion JWT must be at most 16 KiB.
Signing algorithmOnly asymmetric algorithms (RSA and ECDSA families: ES256, ES384, ES512, RS256, RS384, RS512, PS256, PS384, PS512) are accepted. HMAC (HS256, HS384, HS512) and none are rejected.
Key IDThe JWT header must carry a kid that matches a key in the issuer's JWKS. Tokens without kid are rejected.
Required claimssub must be present. iat must be present and not in the future. exp must be present and in the future.
Maximum lifetimeThe token's lifetime ( minus ) must not exceed the issuer's configured maximum (1 hour by default, configurable for each issuer in the Claude Console).

Rule matching semantics

A federation rule's match block determines whether an incoming JWT is accepted. All populated fields are evaluated with AND semantics: the JWT must satisfy every populated matcher. At least one of subject_prefix, claims, or condition must be set; a match block that contains only audience (or no matchers at all) is rejected. This guards against rules that would accept every token from an issuer.

MatcherTypeSemantics
subject_prefixstringExact match against the JWT sub claim. A trailing * makes it a prefix match (the sub value must begin with the characters before the *). Case-sensitive.
audiencestringThe JWT aud claim must contain this exact string. When aud is an array, any element matching exactly satisfies the check.
claimsmap<string, string>Each key is a top-level claim name and each value is the required exact string value. For nested, numeric, boolean, or complex claims like lists and maps, use condition with a CEL expression instead.

CEL evaluation environment

The condition expression has access to a single variable:

VariableTypeContents
claimsmapThe full decoded JWT claim set. Nested objects are accessible as nested maps.

Example:

claims.sub.startsWith("repo:acme-corp/") && claims.ref in ["refs/heads/main", "refs/heads/release"]

CEL conditions are security boundaries. An expression that evaluates to true for more inputs than intended grants broader access than intended. Prefer the static matchers when they express your constraint.

Errors

Token exchange errors

POST /v1/oauth/token returns errors in the standard API error shape. The SDK wraps exchange failures in a typed FederationExchangeError (or language equivalent) that exposes the HTTP status, the response body, and the request_id.

StatusErrorCauseResolution
400invalid_requestfederation_rule_id is malformed or a required request field is missing.Verify the fdrl_ ID and that the request body includes all required fields.
400invalid_requestworkspace_id_required: the federation rule is enabled for more than one workspace and the request omits workspace_id.Set ANTHROPIC_WORKSPACE_ID (or the workspace_id body field on a raw request) to the wrkspc_... ID you want the token scoped to. See Token exchange request.
400

All invalid_grant failures return HTTP 400; the specific cause is logged server-side only and not exposed in the response.

Common SDK-side failures

SymptomCauseResolution
SDK reports "no credentials" instead of exchangingOne of ANTHROPIC_FEDERATION_RULE_ID, ANTHROPIC_ORGANIZATION_ID, ANTHROPIC_SERVICE_ACCOUNT_ID, or ANTHROPIC_IDENTITY_TOKEN[_FILE] is unset and no profile is active.Set all four variables, or configure a profile.
SDK authenticates with an API key instead of federatingANTHROPIC_API_KEY or ANTHROPIC_AUTH_TOKEN is set and wins precedence.Unset the key or token variable.
FileNotFoundError on first requestThe path in ANTHROPIC_IDENTITY_TOKEN_FILE does not exist. The SDK opens the file lazily at exchange time.Confirm the projected-token volume is mounted and the path matches.
Token exchange succeeds but a Claude API request returns 403

Troubleshoot a failed exchange

A 400 invalid_grant response is intentionally opaque; the specific cause is logged server-side only.

Start with the authentication history page in the Claude Console. Recent exchange attempts surface the issuer and rule that were evaluated, the JWT claims that were inspected, and which validation step failed, which usually short-circuits the following checks.

If you still need to debug from the JWT itself, work through these checks in order:

JWKS source modes

When you register a federation issuer, the jwks field controls how Anthropic obtains the public keys used to verify JWT signatures from that issuer. It is a discriminated union keyed on type:

jwks.typejwks shapeBehaviorUse when
discovery (default){ "type": "discovery", "discovery_base": "https://..." } (discovery_base is optional; set it when the discovery URL differs from issuer_url)Anthropic fetches <discovery_base or issuer_url>/.well-known/openid-configuration, reads jwks_uri from the discovery document, and fetches the JWKS from there.Your IdP serves a standard OIDC discovery document on the public internet. Most managed providers (EKS, GKE, Cloud Run, GitHub Actions, Entra ID) support this.
explicit_url{ "type": "explicit_url", "url": "https://..." }Anthropic fetches the JWKS directly from url. The is used only for string comparison against the JWT claim and is never dialed.

The discriminated union makes the companion fields mutually exclusive by construction. Both discovery and explicit_url also accept an optional ca_cert_pem string for issuers that serve TLS from a private CA.

Key rotation and caching

In discovery and explicit_url modes, Anthropic caches the fetched JWKS. If your identity provider publishes a new signing key and immediately starts signing tokens with it, exchanges that present those tokens may fail with a signature error for up to one minute while the cache refreshes.

To avoid this window, publish a new signing key in the JWKS at least 15 minutes before your identity provider starts signing tokens with it, and keep the superseded key in the JWKS until tokens it signed have expired. Managed identity providers typically follow this discipline on their own. If you operate your own issuer (a self-managed Kubernetes cluster, a SPIRE OIDC discovery provider, or an Okta custom authorization server with a configured rotation cadence), confirm that your rotation policy publishes new keys ahead of first use.

In inline mode there is no automatic key refresh. When your identity provider rotates its signing keys, you must update the issuer configuration with the new JWKS or all token exchanges will fail signature verification.

ANTHROPIC_IDENTITY_TOKENOne of _TOKEN_FILE or _TOKENThe literal JWT as a string. Use when your platform injects the token as an environment variable rather than a file.eyJhbGciOiJSUzI1NiIs...
ANTHROPIC_SERVICE_ACCOUNT_IDYesTagged ID of the target Anthropic service account that the issued access token acts as.svac_...
ANTHROPIC_WORKSPACE_IDConditionalTagged ID of the workspace to scope the minted token to, or the literal default. Required when the federation rule is enabled for more than one workspace; optional when the rule is bound to a single workspace. The minted token is scoped to this workspace at exchange time, so switching workspaces requires a new exchange.wrkspc_...
ANTHROPIC_PROFILENoName of a configuration profile to load. Takes precedence over the federation environment variables in this table.staging-profile
ANTHROPIC_IDENTITY_TOKEN[_FILE]
5Active profileResolved via <config_dir>/active_config, falling back to a profile named default.
exp
iat
Clock skewA 30-second leeway is applied to exp, nbf, and iat.
condition
string (CEL)
A CEL expression that must evaluate to true.
invalid_grant
The JWT iss claim does not equal the registered issuer_url exactly.
Compare byte-for-byte, including trailing slashes and scheme: jq -rR 'split(".")[1] | gsub("-";"+") | gsub("_";"/") | @base64d | fromjson | .iss' <<< "$JWT".
400invalid_grantJWKS fetch failed, JWKS is stale, or the JWT was signed with a key not in the JWKS.For inline mode, update the issuer with the rotated keys. For discovery and explicit_url, confirm the JWKS endpoint is reachable on port 443; if the issuer recently rotated its signing key, see Key rotation and caching.
400invalid_grantThe JWT exp claim is in the past (beyond the 30-second skew window).Confirm your identity provider is projecting a fresh token and the SDK is re-reading the token file.
400invalid_grantThe JWT was verified but its claims do not satisfy the rule's match block.Decode the JWT and compare each claim against the rule. subject_prefix is case-sensitive. audience requires an exact element match.
400invalid_grantThe federation_rule_id does not exist, is archived, or the JWT is not authorized for it (consolidated to prevent enumeration).Confirm the rule ID in the Claude Console and that the rule has not been archived.
The minted token's scope does not grant access to that endpoint.
Check the rule's oauth_scope against OAuth scopes.
Authentication fails with empty credentialA credential environment variable is exported but set to an empty string. Empty values still win their precedence slot.Unset the variable with unset VAR rather than VAR="".
  1. 1

    Decode the JWT

    Decode the assertion you sent so you can compare each claim against your issuer and rule configuration:

    cURL
    jq -rR 'split(".")[1] | gsub("-";"+") | gsub("_";"/") | @base64d | fromjson' <<< "$JWT"
  2. 2

    Check iss matches the issuer

    The decoded iss claim must equal the registered issuer_url byte for byte, including scheme, port, and any trailing slash. A mismatch on a single character fails verification.

  3. 3

    Check aud matches the rule

    The decoded aud claim must contain the rule's audience value as an exact match. When aud is an array, one element must match exactly.

  4. 4

    Check sub and each claims entry

    Compare sub against the rule's subject_prefix (case-sensitive; a trailing * is a prefix match, anything else is exact). Compare every key in the rule's claims map against the same-named top-level claim.

  5. 5

    Check exp, nbf, and iat

    exp must be in the future and nbf/iat must be in the past, within the 30-second skew window. If the workload host's clock has drifted, an otherwise valid token is rejected.

  6. 6

    Check JWKS reachability

    For discovery mode, fetch <jwks.discovery_base or issuer_url>/.well-known/openid-configuration over public HTTPS on port 443 and confirm jwks_uri resolves. For explicit_url, fetch the JWKS URL directly. For inline, confirm the issuer's signing key has not rotated since you registered the keys.

    If the issuer rotated its signing key and immediately started signing with it, exchanges can fail for up to a minute while Anthropic's JWKS cache refreshes. See Key rotation and caching.

issuer_url
iss
Your IdP does not serve a discovery document, or discovery is internal-only but the JWKS is publicly reachable.
inline{ "type": "inline", "keys": [...] }You supply the array of JWK objects inline (the keys array from the JWKS document, not the wrapper object). Anthropic makes no outbound request. The issuer_url is used only for iss comparison.Air-gapped environments, self-managed Kubernetes clusters with cluster-internal issuer URLs, or when you want explicit control over key rotation.