Status: Claude Connectors are available upon request.
How do Connectors get approved? The ITC Third-Party Application Review process evaluates for security risk and alignment with Dartmouth's policies. Once an app is approved, other users can find and install it without needing subsequent reviews, unless the app's scope changes. Here is the link to request a Third-Party Application Review. Please see this link for allowed Claude Connectors.
Reason: Many connectors provide various access and permissions such as:
Each Connector is Essentially a New Data Pipeline - When you add a connector in Claude, you are authorizing Claude to read from and potentially write to that external service. Every connector is a new data flow that needs to be evaluated on its own merits. Google Drive, Slack, GitHub, Salesforce, they each carry different data types, different sensitivity levels, and different risk profiles.
Scope of Access is Broad by Design - Connectors are not read-only in many cases. Claude can take actions on your behalf through those connections. That means a compromised session, a misconfigured permission, or an unvetted connector could result in data being moved, modified, or exfiltrated without the user fully realizing it.
FERPA, HIPAA, and Research Data Exposure - At Dartmouth specifically, any connector touching systems that could surface student records, health data, or sensitive research outputs triggers compliance obligations. Information Security needs to verify that the connector vendor has appropriate data handling agreements and that the data flowing through Claude is not being retained or used downstream.
Chain of Custody Problem - Once data passes through Claude and into a connector, you now have a multi-party data chain. Anthropic, the connector vendor, and the destination service all become relevant parties. Without a review, Dartmouth has no visibility into that chain.
Insider Threat and Credential Risk - Connectors authenticate using credentials or OAuth tokens. If those are not properly scoped and managed, a bad actor with access to the Claude instance could potentially leverage those connections in ways the user never intended.
The ITC Third-Party Application Review process requires administrator approval before any third-party app from platforms like Microsoft, Slack, or Zoom can be made available in the Dartmouth tenant, ensuring each app is evaluated for security risk and alignment with Dartmouth's policies. Once an app is approved, other users can find and install it without needing subsequent reviews, unless the app's scope changes. Here is the link to request a Third-Party Application Review. Below are approved connectors with their recommended and safe uses.
Timeline: The approval process can up to two weeks, if approved. Please use the Third-Party Application Review to submit a new request for any connector you would like to be reviewed.