Overview
Welcome to Turnkey!
Turnkey provides secure, scalable and programmable crypto infrastructure for embedded wallets and onchain transaction automation.
Whether you’re building a DeFi platform, a payments app, an AI agent, or anything requiring a private key, Turnkey’s modular components empower you to build fully customizable, innovative products - offering complete flexibility without limitations.
Seamlessly create in-app wallets, sign millions of transactions at millisecond speed, create superior end-user experiences and set granular controls without sacrificing security.
Our documentation makes it easy for you to integrate with Turnkey, no matter what you’re building.
Turnkey’s Products
Turnkey covers two main use cases: Embedded Wallets and Transaction Automation.
Embedded Wallets
Turnkey’s Embedded Wallets offer the most secure way to integrate wallets into your app. With Turnkey, you can create millions of embedded wallets on behalf of your users for a flawless onboarding and in-app experience.
Features
Feature | Description |
---|---|
Embedded Wallet Kit | Speed up your integration with pre-built UI components |
Authentication | Authenticate users via email, phone number, biometrics, social logins, etc. |
Policies | Determine delegated access and co-ownership controls. |
Multi-Chain Support | Sign transactions across chains with out-of-the-box support for most chains and assets. |
Pre-Generated Wallets | Streamline onboarding by generating wallets for your users before authentication. |
Sessions | Sign multiple transactions without requiring additional approvals. |
Account Abstraction | Access simple integrations for gas sponsorship and smart contract wallets. |
Import / Export | Migrate existing wallets in and out of Turnkey without exposure. |
Delegated Access | Onchain wallets with flexible co-ownership controls. |
Transaction Automation
Turnkey’s Transaction Automation empowers teams to automate complex workflows at scale with granular policies for transaction limits, user permissions, and more.
Features
Feature | Description |
---|---|
Multi-Chain Support | Sign transactions across chains with out-of-the-box support for most chains and assets. |
Authentication | Access wallets via email, phone number, biometrics, social logins, etc. |
API-based Authentication | Create API keys with limited permissions for specific applications or use cases. |
Dashboard | View activities, approve or deny sensitive transactions, manage wallets, and create policies for your Turnkey organization. |
Compliance (Audit Trail) | Track events and changes across the stack, ensuring accountability. |
Import / Export | Easily migrate existing private keys without exposure. |
QuorumOS | Run applications inside Trusted Execution Environments (TEEs). |
CLI | Use Turnkey’s command-line interface to interact with our API. |
Remote Attestation | Verify that our code is running the way it should be. |
Offchain Smart Contracts | Deploy smart contracts that are cryptographically verified off-chain. |
Multi-signature approvals | Set a quorum of users for approving and/or denying transactions. |
Secure Hardware | Ensure that private keys are never generated, stored, or accessed outside of TEEs. |
Concepts
Before getting started, we highly recommend familiarizing yourself with Turnkey’s core concepts to ensure a smooth implementation. At the core of Turnkey is an important concept: instead of directly managing private keys, wallets are accessed through authenticators like passkeys, social logins, or API keys.
Here’s how that works:
- Organizations (parent orgs): The initial parent organization typically represents an entire Turnkey-powered application.
- Sub-Organizations (sub-orgs): Fully segregated organizations, typically representing an end user, nested under the parent organization. Parent orgs cannot modify the contents of a sub-org.
- Resources: All identifiers within parent orgs such as users, policies, and wallets are collectively referred to as resources.
- Users: Resources within organizations or sub-organizations that can submit activities to Turnkey via a valid credential.
- Authenticators: Each parent org, sub-org and user contain their own sets of authenticators that you can configure, including their own wallets, API keys, and private keys.
- Activities: All actions Organizations can take such as signing transactions or creating users are known as activities.
- Policies: Policies govern all activities and permissions within Organizations.
- Root Users: Users with root permissions, meaning they can bypass the policy engine to take any action within that specific organization.
- Root Quorum: A pre-determined consensus threshold that consists of a set of Root Users. This consensus threshold must be reached in order for any root permissions to take place.
- Wallets: A collection of cryptographic private/public key pairs that share a common seed. HD seed phrases can generate multiple wallet accounts (addresses) for signing operations.
There is no set relationship between organizations, sub-organizations, activities, wallets, and resources. This makes Turnkey highly flexible and configurable to any use case.
For a more in-depth overview, learn more here.
SDKs
Turnkey provides a variety of client libraries for building with Embedded Wallets, Transaction Automation, and other common workflows. We also have several wrappers for popular web3 libraries for easy integration into existing dApps. We recommend reviewing our concepts, account setup and solution pages before moving forward with our SDKs.
Embedded Wallets
Transaction Automation
AI-Ready Docs
Turnkey documentation is fully integrated with AI tooling. Whether you’re chatting with GPT, coding with Cursor, or building your own LLM assistant, our docs are structured for direct ingestion and deep context—plus, search and chat with specific pages right from your IDE or browser. Explore the docs.
Security
Turnkey is the first verifiable key management system of its kind, securing millions of wallets and private keys for a wide variety of use cases. Turnkey’s security architecture ensures that raw private keys are never exposed to Turnkey, your software, or your team. We provide end-to-end private key generation and access control within secure enclaves. Our whitepaper covers our holistic security model in-depth, and speaks to our vision for building verifiable key management infrastructure. Learn more about our approach to security here.
Account Setup
Before diving into the code, let’s set up your organization and spin up an API keypair to unlock the full potential of Turnkey! Get started here.
Support
To chat with our account team, please reach out here.
For support, product feedback, and input, join our community Slack channel
here.