Claude Desktop Fleet Configuration
Headless workflow for browser-first Thoth rollout across managed fleets with Jamf/Intune plus manual endpoint enrollment.
This guide is the headless path for fleet rollout.
Use it when you want policy and endpoint operations driven by CLI/API/GitOps instead of a UI workflow.
For full IaC orchestration patterns (Terraform, Pulumi, Argo CD, API workflows), see GitOps Headless Control Plane.
Choose the right guide
| Goal | Guide |
|---|---|
| Validate one endpoint quickly | Claude Desktop Proxy |
| Run full headless E2E validation | Headless E2E Runbook |
| Roll out to managed endpoints | This page |
| Jamf packaging and policy mechanics | Jamf Onboarding Overview |
| Intune packaging and assignment mechanics | Intune Onboarding Overview |
Browser-first architecture
Prerequisites
thothbinary available for endpoint runtime.thothctlavailable for control-plane bootstrap.- Admin bearer token for GovAPI.
- MDM delivery path in place (Jamf or Intune).
- Tenant DNS routes reachable (
enforce,grid, and control-plane host).
Step 1 — Bootstrap control-plane settings (headless)
Run this from a secure CI runner or admin workstation:
For Intune, switch --mdm-provider intune and pass an Intune config JSON.
This command can:
- update tenant policy settings,
- test webhook delivery,
- upsert MDM provider config,
- start MDM inventory sync.
Step 2 — Generate governed Claude config artifact
Create a governed claude_desktop_config.json artifact from your base config:
Use your normal review process for this file in Git (PR + approvals).
Step 3 — Distribute through Jamf or Intune
Deploy two artifacts through MDM:
thothbinarygoverned_claude_config.json
Target paths:
| Platform | Target path |
|---|---|
| macOS | ~/Library/Application Support/Claude/claude_desktop_config.json |
| Windows | %APPDATA%\\Claude\\claude_desktop_config.json |
Keep tenant/runtime values in managed secrets or profile variables, not in repo plaintext.
Step 4 — Manual enrollment for unmanaged endpoints
For sandboxes or unmanaged hosts:
The proxy registers the endpoint and continues periodic check-ins automatically.
Step 5 — Validate health and policy coverage
On endpoint:
Control-plane checks:
Expected outcomes:
- endpoint registration is healthy,
- governed MCP servers are visible in
thoth status, - policy decisions are consistent with configured mode,
- check-ins continue on schedule.
Native SIEM/PAM integration (no UI dependency)
Use the control-plane integration APIs to register and sync platform integrations in automation pipelines.
- Integration create/list/sync routes live under
/:tenant-id/governance/integrations. - MDM providers and sync routes live under
/:tenant-id/thoth/mdm/*.
This lets operations run from CI/CD and existing security tooling instead of a standalone console.
Rollout strategy
Use staged rollout:
- Canary (1-5 endpoints)
- Pilot (5-15% of fleet)
- Full deployment
If behavior regresses, use existing ops playbooks: