1. Run setup
Thesetup command generates CA certificates, creates a config file, and provides trust guidance for your environment.
- CA certificates at
~/.config/cordon/projects/<name>/certs/ - A
cordon.yamlconfig file in the current directory
2. Configure a route
Editcordon.yaml to add a route for the API you want to proxy. Here’s an example using the Anthropic API with a secret stored in 1Password:
3. Trust the CA certificate
For HTTPS interception to work, your system needs to trust the proxy’s CA certificate.curl, gh, Go, Rust, Python, Ruby — will then trust the proxy automatically.
4. Start the proxy
5. Route traffic through the proxy
In a separate terminal, set the proxy environment variables and run your application:x-api-key header and injects the real credential from 1Password before forwarding the request.
6. Use with a Procfile (optional)
For development, use a Procfile to start the proxy alongside your app:cordon wait command blocks until the proxy’s health endpoint reports ready, ensuring your app doesn’t start before credentials are loaded.
Next steps
Claude Code Setup
One-command setup for AI agent workflows
Configuration Reference
Full config file reference
Secret Sources
Configure 1Password and OS keyring
CLI Reference
All CLI commands and options