Platform Compatibility & Deployment

Deploy Your Constitution

Your constitution is a markdown file. Getting it into production means placing it where the AI reads its system instructions — before the first user prompt. This guide maps that process to every major enterprise AI platform.

Testing Status

The Enterprise AI Constitution standard has been validated in production with Claude Code (Anthropic) using managed CLAUDE.md files and managed-settings.json. Platform mappings for other tools are based on documented platform capabilities and deployment mechanisms as of March 2026. If you deploy to another platform, we welcome your feedback via GitHub Issues.

Contents

Why Deploy Layer 1 First

Layer 1 — the Corporate Constitution — provides the highest-impact governance improvement with the lowest implementation complexity.

Layer 1 alone transforms AI from "general-purpose tool an employee happens to use at work" to "organizational participant operating within defined boundaries."

Deployment Methods

Enterprise AI tools fall into four categories based on how they accept constitutional instructions:

CategoryMechanismDeployment Method
File-basedInstruction files in repos or on endpointsDeploy constitution as a managed file
API-levelSystem prompt parameter in API callsInject constitution server-side in application code
Builder UIAgent/assistant configuration interfacesPaste constitution into instructions field
Policy-layerGuardrails, trust layers, governance gatewaysEncode constitutional rules as platform policies

Most organizations use tools across multiple categories. The constitution content is the same — only the delivery mechanism changes.

Token Budget Considerations

AI models have finite context windows. The constitution consumes tokens from that budget:

Constitution typeApproximate tokens
Corporate only (minimal)800 - 1,200
Corporate only (full)1,500 - 2,500
Corporate + Team2,000 - 3,500
Corporate + Team + Practitioner2,500 - 4,500

The Constitution Builder tracks token count in real time as you fill in each section, so you can stay within your deployment target's limits.

AI Coding Agents

These tools operate in developer environments. Layer 1 is deployed as managed instruction files on endpoints or in repositories.

Claude Code (Anthropic) Tested in production
FileCLAUDE.md (project root) for project-level; ~/.claude/CLAUDE.md for user-level
Enterprise lockmanaged-settings.json deployed at OS level
Lock file pathsLinux: /etc/claude-code/managed-settings.json
macOS: /Library/Application Support/ClaudeCode/managed-settings.json
Drop-in directorymanaged-settings.d/*.json for modular policy deployment
Deployment toolsMDM (Intune, JAMF), configuration management (Ansible, Chef, Puppet)
HierarchyServer-managed > OS-level managed-settings > user settings > project settings
Layer 1 approachDeploy the corporate constitution as a managed CLAUDE.md at the enterprise level via MDM. Use managed-settings.json to enforce behavioral policies. The constitution text goes in CLAUDE.md; the enforcement rules go in managed-settings.
Implementation
  1. Author the corporate constitution using the Builder
  2. Deploy to all managed endpoints via MDM or configuration management
  3. Lock file permissions so users cannot modify
  4. Use managed-settings.json to enforce tool-level restrictions that complement the constitution
GitHub Copilot Platform mapped
File.github/copilot-instructions.md (repo root)
Granular files.github/instructions/**/*.instructions.md
Enterprise lockEnterprise-level policies in GitHub Enterprise Cloud admin; cascade: Enterprise > Organization > Repo > Personal
Layer 1 approachSet organization-level instructions in the GitHub Enterprise admin console. These apply to all repos and cannot be overridden. Supplement with repo-level files for Layer 2.
Implementation
  1. Adapt the corporate constitution for Copilot's instruction format
  2. Deploy organization-level instructions via GitHub Enterprise Cloud admin
  3. Enforce at enterprise level so org admins cannot relax the policy
  4. Use repo-level copilot-instructions.md for Layer 2 context only
Cursor Platform mapped
File.cursor/rules/*.md (project-level rules with glob matching)
Enterprise lockBusiness/Enterprise dashboard distributes team-wide rules via deeplinks
Admin controlsSSO (SAML), SCIM, RBAC, MDM policies; admins control model access, MCP servers, extensions
Layer 1 approachDefine the corporate constitution as team-wide rules in the Cursor Enterprise dashboard. Auto-distributes to all team members. Per-project .cursor/rules/ files serve as Layer 2.
Implementation
  1. Author constitutional rules in the Cursor Enterprise admin dashboard
  2. Distribute to all seats via centralized team rules
  3. Use project-level .cursor/rules/*.md for team-specific context
Windsurf (Codeium) Platform mapped
File.windsurf/rules/*.md (project-level)
Enterprise lockSystem-level workflows deployed to OS-specific directories (read-only)
Lock pathsmacOS: /Library/Application Support/Windsurf/workflows/*.md; deployable via MDM
Layer 1 approachDeploy the corporate constitution as a system-level workflow file via MDM. Read-only. Project-level files serve as Layer 2.
Amazon Q Developer Platform mapped
File.amazonq/rules/*.md (project root)
Enterprise lockAWS Organizations SCPs control feature availability org-wide
Layer 1 approachUse SCPs in AWS Organizations to enforce baseline AI governance. Deploy customizations centrally via AWS console. Supplement with repo-level rules for project context.
Google Gemini Code Assist Platform mapped
File.gemini/styleguide.md (repo root)
Enterprise lockGroup-level style guides in Google Cloud console (Enterprise tier)
Layer 1 approachDefine the corporate constitution as a group-level style guide via Google Cloud console. Repo-level files are merged with (not override) the group guide.
JetBrains AI Assistant Platform mapped
File.aiassistant/rules/*.md (project root)
Enterprise lockJetBrains IDE Services manages AI profiles centrally
Layer 1 approachDeploy centrally managed AI profiles with constitutional language via IDE Services. Supplement with project-level rules files for Layer 2.
Tabnine Platform mapped
File/.tabnine/guidelines/*.md (per-project) or ~/.tabnine/guidelines/*.md (global)
Enterprise lockAdmin UI > Agent Guidelines; admin guidelines override personal files
Layer 1 approachDeploy the corporate constitution as organization-wide guidelines in the Tabnine Admin UI. These take precedence over all user-level guidelines.
AGENTS.md (Cross-Tool Convention) Platform mapped
FileAGENTS.md (repository root)
Supported byGitHub Copilot, Cursor, Windsurf, OpenAI Codex, Zed, Aider, Semgrep, Warp, Factory
Governed byAgentic AI Foundation (Linux Foundation)
Layer 1 approachDeploy an AGENTS.md containing the corporate constitution at the root of every repo. Tool-agnostic baseline. Best used as a complement to tool-specific mechanisms — has no enterprise lock since it lives in the repo.

Enterprise Chat & Assistant Platforms

These platforms serve non-developer employees through conversational interfaces. Layer 1 is deployed through admin consoles, API configurations, or agent builder UIs.

Microsoft Copilot (M365 + Copilot Studio) Platform mapped
Prompt mechanismDeclarative Agent instructions in Copilot Studio
Enterprise lockCopilot Control System (CCS) + Agent 365 unified control plane; Entra ID governance
Layer 1 approachCreate a base Declarative Agent in Copilot Studio whose instructions contain the constitution. Use CCS policies to enforce organizational boundaries. All custom agents inherit organizational policies.
ChatGPT Enterprise (OpenAI) Platform mapped
Prompt mechanismCustom GPTs with natural-language instructions; API developer messages
Enterprise lockDomain allowlists, sharing scope restrictions, group permissions
Layer 1 approachCreate an org-standard Custom GPT whose instructions contain the constitution. Restrict the workspace so employees use it by default. For API: inject as the developer message server-side.

Limitation: OpenAI does not currently support forcing all users to use a specific GPT. Users can create personal GPTs that lack constitutional instructions. Mitigate via policy + monitoring.

Google Gemini for Workspace Platform mapped
Prompt mechanismAdmin Console toggles per OU; Vertex AI Agent Builder for custom agents
Enterprise lockGoogle Admin Console, DLP policies, IAM
Layer 1 approachControl Gemini access per OU in Admin Console. Build custom agents in Vertex AI Agent Builder with constitutional instructions. Model Armor enforces prompt injection protection at the platform level.
Amazon Bedrock Platform mapped
Prompt mechanismSystem prompts set server-side via API; agent instructions in Bedrock console
Enterprise lockIAM-enforced mandatory guardrails; AWS Organizations Bedrock Policies
Layer 1 approachCreate Bedrock Guardrails encoding the constitutional rules. Enforce via IAM policies so they apply to every inference call across the organization. System prompts are set server-side and never exposed to end users.

This is the strongest centralized enforcement model among the platforms listed. Guardrails are deterministic and IAM-enforced.

Claude Enterprise (claude.ai Teams/Enterprise) Platform mapped
Prompt mechanismProjects with custom instructions on claude.ai; API system parameter
Enterprise lockManaged policy settings; Compliance API for monitoring
Layer 1 approachCreate organization-standard Projects with constitutional instructions. For API: inject as the system parameter. For Claude Code: deploy via managed-settings and managed CLAUDE.md. Use Compliance API for monitoring.
Salesforce Agentforce Platform mapped
Prompt mechanismAgent instructions + Agent Script (deterministic guardrails)
Enterprise lockEinstein Trust Layer; agents inherit Salesforce user permission model
Layer 1 approachEncode constitutional behavioral rules as Agent Script constraints (deterministic, not probabilistic). Set organizational identity in agent instructions. Einstein Trust Layer enforces PII masking, toxicity detection, and audit trails.
ServiceNow AI Agents Platform mapped
Prompt mechanismWorkflow-embedded agent configurations
Enterprise lockAI Control Tower — cross-platform governance
Layer 1 approachEmbed constitutional rules in ServiceNow agent configurations. AI Control Tower can discover and manage agents from ServiceNow, Microsoft, and other platforms — potential single pane of glass for Layer 1 enforcement.
IBM watsonx Platform mapped
Prompt mechanismVersioned prompt templates in watsonx.ai Prompt Lab
Enterprise lockwatsonx.governance — dedicated governance product
Layer 1 approachAuthor the constitution as a versioned prompt template. Use watsonx.governance for lifecycle management and compliance monitoring. Agent monitoring tracks behaviors against constitutional rules in real time.
Cohere (North) Platform mapped
Prompt mechanism"Preamble" system prompt via API; safety mode settings
Enterprise lockNorth platform with built-in security and compliance
Layer 1 approachSet the constitution as the preamble in all API calls. Controlled server-side — end users never see or modify it. Supports private cloud and on-premises deployment for data sovereignty.

Agent Orchestration Frameworks

Used by development teams building custom AI applications. Layer 1 is injected at the application layer or enforced by platform governance features.

Cross-Platform Deployment Strategy

For organizations using multiple AI tools, deploy Layer 1 in priority tiers:

Tier A — Immediate (highest impact, lowest effort)

These mechanisms lock the constitution at the platform level. Users cannot bypass them.

  1. Claude Code — Deploy managed-settings.json + managed CLAUDE.md via MDM
  2. Amazon Bedrock — IAM-enforced guardrails via AWS Organizations
  3. Tabnine — Admin guidelines in the Admin UI (override user-level)
  4. GitHub Copilot — Enterprise-level policies in admin console

Tier B — Standard (requires admin console configuration)

  1. Microsoft Copilot — Copilot Control System policies + Declarative Agent instructions
  2. ChatGPT Enterprise — Corporate Custom GPT + workspace restrictions
  3. Cursor — Enterprise dashboard team-wide rules
  4. Salesforce Agentforce — Agent Script + Einstein Trust Layer
  5. Windsurf — OS-level system workflows via MDM

Tier C — Application-layer (requires development work)

  1. Any API-based deployment — Inject constitution as system/developer message server-side
  2. LangChain/LangSmith — Publish as versioned Hub template
  3. Custom internal platforms — Embed in prompt management layer

Tier D — Supplementary (defense in depth)

  1. AGENTS.md — Commit to all repos; protect via branch rules
  2. Repo-level instruction files — For Layer 2 context; not a substitute for enterprise enforcement
  3. ServiceNow AI Control Tower — Cross-platform governance overlay

Adapting for Different Platforms

Token / length constraints

If a platform constrains system prompt length, prioritize in this order:

  1. Sections 01 (Identity) and 02 (Organizational Context) — the constitutional foundation
  2. Sections 04 (Data Classification) and 05 (Behavioral Mandates) — the enforcement core
  3. Sections 06-08 (Misuse, Refusal, Scope) — can be condensed

Platform-specific formatting

What stays constant across all platforms

  1. Organizational identity — Who the AI works for
  2. Regulatory context — What frameworks govern the work
  3. Authority hierarchy — This constitution overrides all other instructions
  4. Data classification — How to handle information at different sensitivity levels
  5. Behavioral baseline — Non-negotiable rules for every session

Verification

After deploying Layer 1 to any platform, validate using the test suite:

Troubleshooting

Users report the AI is "too restrictive"

Users report the AI "doesn't know who it is"

Prompt injection tests fail

This guide covers platforms as of March 2026. The enterprise AI governance landscape is evolving rapidly. Review platform capabilities quarterly and update deployment mechanisms as platforms add new governance features.