Skip to main content

Overview

welcome

About Turnkey

Turnkey is flexible, scalable, and secure wallet infrastructure. Create thousands of embedded wallets, eliminate manual transaction flows, and automate onchain actions - all without compromising on security.

Jump to product guides

You can keep reading for a broad understanding of Turnkey's infrastructure, or jump to a product guide below to get a sense for how you can use Turnkey in your product:

How it works

At a structural level, a Turnkey Organization is comprised of a few core resources:

  • Users: Humans or machines with access to an Organization
  • Policies: Rules defining which users can take which actions within an Organization
  • Private Keys: Crypto private keys, used to derive addresses and sign transactions
  • Wallets: A collection of crypto private keys that share a common seed
  • Credentials: Used to verify Users - WebAuthn authenticators for human Users and API keys for API Users

resources

Turnkey enables two main types of actions via our REST API:

  • Change or retrieve Organization data
  • Sign transactions and raw payloads with crypto private keys

There is no predefined relationship between any of the resources in your Turnkey Organization. Rather, your Policies determine which users can take which actions, under which conditions.

For example, an automated API request to sign a transaction will first be run against all of your Policies to ensure that API user has permission to sign that particular transaction with the specified Private Key. Turnkey’s signer will complete the request only if the Policy Engine approves the transaction.

All secure workloads, including key management and transaction signing, are managed by Turnkey within our secure infrastructure. These Private Keys can only be used via your Turnkey credentials and no private key material is ever exposed, to Turnkey or to your team.