3 min readfrom VentureBeat

Claude agents can finally connect to enterprise APIs without leaking credentials

Our take

Claude agents can now connect to enterprise APIs securely, addressing a key barrier to adoption: credential leakage. Traditionally, agents carried authentication tokens, risking exposure in compromised scenarios. Anthropic introduces self-hosted sandboxes and MCP tunnels, allowing tool execution within an enterprise's infrastructure, thus shifting credential control to the network boundary. This innovative approach enhances security while improving agent performance. Currently, self-hosted sandboxes are in public beta, and MCP tunnels are in research preview.
Claude agents can finally connect to enterprise APIs without leaking credentials

The slow integration of AI agents within enterprise APIs and databases has often been attributed to concerns about the models themselves; however, the real challenge lies in credential management. As highlighted in the recent developments around Claude Managed Agents, the existing method of carrying authentication tokens poses a significant security risk. A compromised agent effectively becomes a gateway to sensitive data, taking credentials along with it when executing tool calls. This situation has led to hesitancy among enterprises, as they weigh the risks of deploying AI solutions against the potential benefits. With advancements like self-hosted sandboxes and MCP tunnels, Anthropic is taking notable steps to enhance security while promoting the adoption of AI agents in more sensitive environments.

The introduction of self-hosted sandboxes allows teams to execute tool operations within their own infrastructure, thereby minimizing exposure to credential leakage. By controlling the environment in which these agents operate, enterprises can manage their security protocols more effectively, ensuring that sensitive data remains protected. Similarly, MCP tunnels facilitate secure connections to private servers without exposing credentials in the agent's context. Together, these innovations not only alleviate immediate security concerns but also represent a shift in how organizations can deploy AI solutions. This pivot is crucial in an era where security breaches can have far-reaching consequences, as seen in discussions surrounding initiatives like AWS nabs white hot gen AI media creation startup fal, becoming its preferred cloud provider.

Beyond the immediate technical advancements, these developments have broader implications for the future of AI in enterprise settings. By separating the agent loop from tool execution, Anthropic effectively changes the threat model associated with AI deployment. This architectural distinction allows enterprises to manage workflows more efficiently while maintaining tighter control over their resources. It empowers orchestration teams to map agent workflows in a way that enhances both performance and security, indicating a maturation in the approach to AI deployment. As competition in this space intensifies, evidenced by similar moves from other providers like OpenAI, organizations must adapt quickly to leverage these innovations for improved productivity and security.

Looking ahead, the most pressing question is how quickly other enterprise solutions will adopt similar security measures. With the rapid pace of AI advancements and increasing integration into critical business functions, organizations that prioritize robust security frameworks will likely gain a competitive edge. As we witness more enterprises shifting to a mindset that embraces innovation while safeguarding sensitive data, it will be fascinating to see how this balance evolves. The deployment of AI technologies should not only focus on enhancing operational efficiency but also on fostering an environment where security concerns are addressed proactively. How organizations navigate these challenges will shape the future landscape of AI in business, marking a pivotal moment for both technology and enterprise strategy.

The reason enterprises have been slow to connect AI agents to internal APIs and databases isn't the models — it's the credentials. In most production deployments, the agent carries authentication tokens with it as it executes tool calls, which means a compromised or misbehaving agent takes the keys with it.

Anthropic is addressing that problem with two new capabilities for Claude Managed Agents: self-hosted sandboxes, which let teams run tool execution inside their own infrastructure perimeter, and MCP tunnels, which connect agents to private MCP servers without exposing credentials in the agent's context. Together they move credential control to the network boundary rather than leaving it inside the agent.

Right now, self-hosted sandboxes are available to Claude Managed Agent users in public beta, while MCP tunnels are currently in research preview.  

Anthropic isn't the only model provider making this bet. OpenAI added local execution to its Agents SDK in April in response to similar demand. The architectural distinction Anthropic draws is a split: the agent loop runs on Anthropic's infrastructure, while tool execution runs on the enterprise's own system — a separation that existing sandbox approaches, including OpenAI's, don't make.

The architecture problem in sandboxes and agents

MCP moved to enterprise production faster than the security architecture around it matured. In most deployments, credentials travel through the agent itself as it executes tool calls against internal systems — meaning a compromised or misbehaving agent has everything it needs to cause damage.

Self-hosted sandboxes, such as those offered on Claude Managed Agents, help keep files and packages within an enterprise's infrastructure. The agentic loop—orchestration, context management and error recovery—moves to the platform, and ideally, enterprises control compute resources. 

This allows the agent to complete tool calls without holding the keys that unlock it. 

Private network connectivity works similarly — a lightweight outbound-only gateway inside the organization's network, with no credentials passing through the agent.

Orchestration teams get some control

For orchestration teams, the capabilities represent more than just a security update; they help agents run better. But the first thing they need to understand is how this split architecture can affect their deployment. 

Since sandboxes determine tool execution locations and the resources agents access, and MCP tunnels tell agents how to reach internal systems, these are separate concerns—splitting them up enables enterprises to map agents' workflows more effectively.

For teams already on Claude Managed Agents, the practical starting point is sandboxes — move tool execution onto your own infrastructure and test the boundary before touching MCP tunnels, which are still in research preview. Teams evaluating the platform for the first time should treat the sandbox architecture as the primary technical differentiator: it's the piece that changes the threat model, not just the deployment model.

Read on the original site

Open the publisher's page for the full experience

View original article

Related Articles

Tagged with

#enterprise data management#natural language processing for spreadsheets#generative AI for data analysis#Excel alternatives for data analysis#financial modeling with spreadsheets#enterprise-level spreadsheet solutions#self-service analytics tools#self-service analytics#AutoML capabilities#big data management in spreadsheets#rows.com#real-time data collaboration#automation in spreadsheet workflows#real-time collaboration#Claude agents#credentials#enterprise APIs#MCP tunnels#self-hosted sandboxes#tool execution