MCP Server for Claude

How does Claude access
your internal APIs?

Internal APIs require client certificates. Zero-trust networks need proof of identity. The Cyphers HTTPS MCP Server gives Claude the credentials to access enterprise systems.

Unlock enterprise connectivity for Claude.

Claude Code is powerful. But connecting to internal APIs, zero-trust networks, and regulated systems often requires security controls beyond standard HTTPS. Claude HTTPS bridges that gap—giving your AI assistant the credentials to operate in enterprise environments.

Connect to Zero-Trust APIs

Many internal services require mutual TLS authentication. Claude HTTPS adds client certificate support so Claude can access APIs that demand cryptographic identity.

Meet Compliance Requirements

FIPS 140-3, certificate pinning, revocation checking. When your security policy has specific transport requirements, Claude HTTPS delivers them.

Keep Control Centralised

One JSON config file governs all TLS behaviour. No per-request configuration. No scattered settings. Security teams get visibility and control.

Protocol: TLS v1.3 (Strict)
Auth: Mutual (mTLS)
Crypto: FIPS 140-3 Validated
Pinning: Leaf + Intermediate
const config = {
  mode: "FIPS_STRICT",
  mtls: {
    cert: env.CLIENT_CERT,
    key: env.CLIENT_KEY
  },
  pinning: ["sha256/...", "sha256/..."]
};

One Config File. Complete Control.

Configure at ~/.claude/https-config.json. All TLS behaviour governed from a single location.

Cipher Profiles: Modern, Intermediate, Compatible, FIPS, or Custom
CA Modes: Bundled Mozilla CAs, OS trust store, or custom paths
Proxy Support: HTTP/HTTPS proxy with authentication and bypass rules

Install in 60 Seconds

Add hardened TLS to Claude with a single command.

# Install globally
npm install -g claude-https-mcp
# Add to Claude Code
claude mcp add --scope user --transport stdio claude-https-mcp -- claude-https-mcp
# Verify
claude mcp list

Zero-install option

Don't want to install globally? Use npx to run directly:

# Add to Claude Code with npx
claude mcp add --scope user --transport stdio claude-https-mcp -- npx -y claude-https-mcp

The -y flag auto-confirms the install prompt. Claude Code will fetch the latest version each time.

From Prototype to Production

Everything you need to ship with confidence.

FIPS 140-3 Cryptography

Built on a validated cryptographic module. Ensures all data in transit meets federal security requirements for classified and sensitive workloads.

First-Class mTLS

Configure client certificates directly in JSON or reference them from secure storage. PKCS#12 and PEM formats both supported natively.

Certificate Pinning

Prevent Man-in-the-Middle attacks by pinning server certificates or public keys. Supports leaf, intermediate, root, and SPKI hash pinning.

Custom CA Bundles

Trust private internal Certificate Authorities alongside or instead of public roots. Bundled Mozilla NSS CA bundle included.

Revocation Checking

Perform real-time OCSP and CRL checks to ensure server certificates haven't been revoked. Configurable soft or hard fail modes.

Detailed Auditing

Log every handshake detail, cipher negotiation, and validation failure. Export to SIEM in JSON, CEF, or Syslog format.

Built For

Financial Services

Connect Claude to trading APIs, payment gateways, and internal systems that require mTLS and strict cipher policies.

Healthcare & Life Sciences

Access HIPAA-compliant services with certificate pinning and full audit trails for every request.

Government & Defence

FIPS 140-3 mode ensures Claude meets federal cryptographic requirements for sensitive workloads.

Enterprise IT

Let developers use Claude while maintaining centralised control over transport security policies.

Free vs Pro

Same security. Different scale.

Free

Get started with Server Authenticated TLS (HTTPS) + mTLS

  • Server Authenticated TLS (HTTPS) (TLS 1.3, Authenticated Encryption with Associated Data (AEAD))
  • mTLS with 5 client certificates
  • 2 server certificates
  • Bundled Mozilla CA Bundle
  • Custom CA Paths
  • Cyphers Hub access
Get Started Free

Pro

Scale + compliance for production

Everything in Free, plus:

  • Unlimited client certificates
  • Unlimited server certificates
  • FIPS 140-3 mode
  • Certificate pinning
  • Hard-fail revocation
  • SIEM export (JSON, CEF, Syslog)
Contact Sales
For Security Teams

Visibility into what your systems are doing.

Developers build integrations and automations fast. Cyphers Hub gives security teams a single dashboard to monitor the systems they create—TLS policies, certificate status, and connection health across every deployment.

  • Centralised policy enforcement across all systems
  • Certificate expiration alerts before outages happen
  • Configuration drift detection
  • Audit-ready compliance reports
Learn About Cyphers Hub
Cyphers Hub Security Operations Dashboard

Give Claude access to your internal APIs.

5 minutes to set up. Free tier includes Server Authenticated TLS (HTTPS) + 5 client certificates.