Turnkey provides secure, scalable and programmable crypto infrastructure for embedded wallets and onchain transaction automation.

Whether you’re building a DeFi platform, a payments app, an AI agent, or anything requiring a private key, Turnkey’s modular components empower you to build fully customizable, innovative products - offering complete flexibility without limitations.

Seamlessly create in-app wallets, sign millions of transactions at millisecond speed, create superior end-user experiences and set granular controls without sacrificing security.

Our documentation makes it easy for you to integrate with Turnkey, no matter what you’re building.

Turnkey’s Products

Turnkey covers two main use cases: Embedded Wallets and Transaction Automation.

Embedded Wallets

Turnkey’s Embedded Wallets offer the most secure way to integrate wallets into your app. With Turnkey, you can create millions of embedded wallets on behalf of your users for a flawless onboarding and in-app experience.

Features

FeatureDescription
Embedded Wallet KitSpeed up your integration with pre-built UI components
AuthenticationAuthenticate users via email, phone number, biometrics, social logins, etc.
PoliciesDetermine delegated access and co-ownership controls.
Multi-Chain SupportSign transactions across chains with out-of-the-box support for most chains and assets.
Pre-Generated WalletsStreamline onboarding by generating wallets for your users before authentication.
SessionsSign multiple transactions without requiring additional approvals.
Account AbstractionAccess simple integrations for gas sponsorship and smart contract wallets.
Import / ExportMigrate existing wallets in and out of Turnkey without exposure.
Delegated AccessOnchain wallets with flexible co-ownership controls.

Transaction Automation

Turnkey’s Transaction Automation empowers teams to automate complex workflows at scale with granular policies for transaction limits, user permissions, and more.

Features

FeatureDescription
Multi-Chain SupportSign transactions across chains with out-of-the-box support for most chains and assets.
AuthenticationAccess wallets via email, phone number, biometrics, social logins, etc.
API-based AuthenticationCreate API keys with limited permissions for specific applications or use cases.
DashboardView activities, approve or deny sensitive transactions, manage wallets, and create policies for your Turnkey organization.
Compliance (Audit Trail)Track events and changes across the stack, ensuring accountability.
Import / ExportEasily migrate existing private keys without exposure.
QuorumOSRun applications inside Trusted Execution Environments (TEEs).
CLIUse Turnkey’s command-line interface to interact with our API.
Remote AttestationVerify that our code is running the way it should be.
Offchain Smart ContractsDeploy smart contracts that are cryptographically verified off-chain.
Multi-signature approvalsSet a quorum of users for approving and/or denying transactions.
Secure HardwareEnsure that private keys are never generated, stored, or accessed outside of TEEs.

Concepts

Before getting started, we highly recommend familiarizing yourself with Turnkey’s core concepts to ensure a smooth implementation. At the core of Turnkey is an important concept: instead of directly managing private keys, wallets are accessed through authenticators like passkeys, social logins, or API keys.

Here’s how that works:

  • Organizations (parent orgs): The initial parent organization typically represents an entire Turnkey-powered application.
  • Sub-Organizations (sub-orgs): Fully segregated organizations, typically representing an end user, nested under the parent organization. Parent orgs cannot modify the contents of a sub-org.
  • Resources: All identifiers within parent orgs such as users, policies, and wallets are collectively referred to as resources.
  • Users: Resources within organizations or sub-organizations that can submit activities to Turnkey via a valid credential.
  • Authenticators: Each parent org, sub-org and user contain their own sets of authenticators that you can configure, including their own wallets, API keys, and private keys.
  • Activities: All actions Organizations can take such as signing transactions or creating users are known as activities.
  • Policies: Policies govern all activities and permissions within Organizations.
  • Root Users: Users with root permissions, meaning they can bypass the policy engine to take any action within that specific organization.
  • Root Quorum: A pre-determined consensus threshold that consists of a set of Root Users. This consensus threshold must be reached in order for any root permissions to take place.
  • Wallets: A collection of cryptographic private/public key pairs that share a common seed. HD seed phrases can generate multiple wallet accounts (addresses) for signing operations.

There is no set relationship between organizations, sub-organizations, activities, wallets, and resources. This makes Turnkey highly flexible and configurable to any use case.

For a more in-depth overview, learn more here.

SDKs

Turnkey provides a variety of client libraries for building with Embedded Wallets, Transaction Automation, and other common workflows. We also have several wrappers for popular web3 libraries for easy integration into existing dApps. We recommend reviewing our concepts, account setup and solution pages before moving forward with our SDKs.

Embedded Wallets

Transaction Automation

AI-Ready Docs

Turnkey documentation is fully integrated with AI tooling. Whether you’re chatting with GPT, coding with Cursor, or building your own LLM assistant, our docs are structured for direct ingestion and deep context—plus, search and chat with specific pages right from your IDE or browser. Explore the docs.

Security

Turnkey is the first verifiable key management system of its kind, securing millions of wallets and private keys for a wide variety of use cases. Turnkey’s security architecture ensures that raw private keys are never exposed to Turnkey, your software, or your team. We provide end-to-end private key generation and access control within secure enclaves. Our whitepaper covers our holistic security model in-depth, and speaks to our vision for building verifiable key management infrastructure. Learn more about our approach to security here.

Account Setup

Before diving into the code, let’s set up your organization and spin up an API keypair to unlock the full potential of Turnkey! Get started here.

Support

To chat with our account team, please reach out here.
For support, product feedback, and input, join our community Slack channel here.