Skip to main content

Why Turnkey for Embedded WaaS?

Turnkey provides the infrastructure to embed wallets directly into your developer product without building or managing key management yourself. Use it to provision isolated user wallets, enforce signing policies, and create your own APIs, SDKs, and UI components on top of Turnkey.

Core Principles

  • Segregated environments per end user: Each end user’s wallets, credentials, policies, and activity logs are fully isolated from other users and from your platform’s management layer.
  • Configurable admin and billing controls: For every fund-moving transaction, you can require approval from both the end user and your platform, enforced directly at the signing layer.
  • User-authenticated action: No transaction executes without the end user’s authentication (e.g., passkey).
  • Non-custodial by design: End users remain in control of their keys, while platform controls allow you to manage transaction-level approvals.
  • User-controlled key export: End users can export their wallet independently if they choose to leave, or if your platform goes offline.
  • Quorum control: 2-of-2 root quorum ensures billing, compliance, and risk controls are enforced at the cryptographic layer, while guaranteeing explicit user consent on every transaction.

Architecture

The diagram below shows the recommended sub-org structure for a WaaS deployment using 2-of-2 root quorum signing.
typical waas provider and end user co-signing model

Transaction Authorization Flow

The sequence below describes the default funds-moving flow under the 2-of-2 root quorum model:
  • End user initiates a transaction from your embedded wallet UI.
  • End user approves via their authenticator (e.g., passkey). Turnkey records the activity as partially approved.
  • Your platform evaluates on its own backend: billing status, risk/compliance rules, and any other checks.
  • Your platform approves via API key and the transaction executes.
  • If the platform withholds approval, the transaction does not execute.
typical waas negative control for transaction permission
Relevant docs: Activities & approvals | Root quorum

How to Get Started on Embedded WaaS with Turnkey

Step 1: Define the Tenant Model and Ownership Boundaries

Map each end user to a Turnkey sub-organization. The standard approach is one sub-org per end user.
  • Isolated tenants: Each sub-org is a self-contained data boundary, with wallets, policies, authenticators, and activity logs fully isolated from one another.
  • Scoped parent org permissions: Your parent organization has read-only access to sub-orgs and can initiate auth and recovery flows, but cannot sign transactions or modify policies within them.
  • External mapping: Track the relationship between your platform’s user IDs and their corresponding Turnkey sub-org IDs in your own database.
Relevant docs: Sub-organizations | Root quorum

Step 2: Design the Sub-Organization Control Model

Define what lives inside each sub-org and how control is shared between your platform and the end user.
  • End user (root): Authenticated via passkey or equivalent user-controlled authenticator.
  • WaaS provider (root): Authenticated via API key. Used to approve or block transactions based on your service rules.
  • Delegated Access (optional): If needed for automation or backend-initiated workflows, add a scoped non-root API key via Delegated Access. DA must be tightly policy-scoped and should never have broad signing authority or bypass user consent.
Relevant docs: Delegated Access | Policy scoping

Step 3: Define Default Wallet and Policy Template

Specify what gets created in every sub-org by default: wallet structure, supported chains/accounts, and baseline policies. For the 2-of-2 quorum model, establish the threshold last so the backend can configure policies (including export) with only your platform’s approval. Start by creating a sub-org with both root users and wallets (Step 3a). Then, create the export policy while the platform has sole root access (Step 3b). Once the 2-of-2 quorum is established (Step 3c), the end user can trigger exports via this policy without needing your platform’s co-signature. This keeps the co-managed model non-custodial because end users can always export their keys and access their funds directly, independent of your platform.
StepActionQuorum State
3aCreate sub-org with both root users + wallet1-of-2
3bCreate export policy for end user1-of-2
3cUpdate threshold to 22-of-2
3a. Create sub-org with both root users at 1-of-2 threshold
const subOrg = await turnkeyClient.createSubOrganization({
  parameters: {
    subOrganizationName: `User Wallet - ${userId}`,
    rootUsers: [
      { userName: "Platform", apiKeys: [{ publicKey: PROVIDER_KEY }] },
      {
        userName: "End User",
        authenticators: [
          {
            /* passkey */
          },
        ],
      },
    ],
    rootQuorumThreshold: 1,
    wallet: {
      walletName: "Primary Wallet",
      accounts: [
        {
          /* eth account */
        },
      ],
    },
  },
});
3b. Create export policy (user escape hatch)
await turnkeyClient.createPolicy({
  organizationId: subOrgId,
  parameters: {
    policyName: "Allow User Wallet Export",
    effect: "EFFECT_ALLOW",
    consensus: `approvers.any(user, user.id == '${endUserId}')`,
    condition: `activity.type == 'ACTIVITY_TYPE_EXPORT_WALLET'
      && wallet.id == '${walletId}'`,
  },
});
3c. Raise threshold to 2-of-2
await turnkeyClient.updateRootQuorum({
  organizationId: subOrgId,
  parameters: {
    threshold: 2,
    userIds: [providerUserId, endUserId],
  },
});
Relevant docs: Export wallets | Policy examples

Step 4: Build the Developer-Facing SDK or Integration Surface

Create the SDK, APIs, or UI components that downstream developers will integrate with. Abstract away Turnkey and expose only your platform’s intended wallet, auth, and signing flows.
  • Embedded Wallet Kit (EWK): Fork or wrap Embedded Wallet Kit components (e.g., authentication, wallet UI, and approval prompts) with your branding and surface “pending platform approval” states.
  • Backend service: Handle platform root approvals (via API key), billing and risk evaluation, and activity monitoring through your backend.
  • SDK abstraction layer: Wrap Turnkey’s SDK calls behind your own interface for full control over the developer experience, with flexibility to swap or upgrade infrastructure without breaking integrations.
Relevant docs: Embedded Wallet Kit | SDK reference

Step 5: Incorporate the Embedded Wallet into the Platform Flow

Wire the wallet into your onboarding and runtime flows so every downstream integration inherits a working embedded wallet.
  • Onboarding: Handle Turnkey org setup, auth configuration, and the staged sub-org creation flow as part of your user registration. The end user should experience passkey registration (or equivalent) as a natural part of sign-up.
  • Client initialization: Initialize the Turnkey client with the user’s sub-org context on each session. Use sessions for batched signing workflows to reduce authentication friction during active use.
  • Transaction flow: Surface the approval prompt via EWK components, submit the user’s approval to Turnkey, run your backend checks, then co-sign or withhold.
  • Recovery: Expose the export flow in your settings UI so users can self-serve wallet recovery. Turnkey’s enclave encrypts the mnemonic to a user-generated target key via HPKE. Neither Turnkey nor your platform can view the exported material.

Use Cases

NeedConfiguration
Fintech or neobank with card-linked crypto walletsCo-managed with billing gates: Platform co-signs after verifying account standing. Export policy as user escape hatch. Passkey auth for consumer UX.
Dev tooling platform reselling embedded walletsWhite-labeled EWK with SDK abstraction: Downstream developers integrate with your SDK, never touching Turnkey directly. Segregated environments per end user, provider co-sign for compliance.
Self-custody consumer walletSelf-custody model: Maximum user sovereignty. Provider handles auth initiation and UX but has no signing authority. Application-layer controls for billing.
Institutional or high-value accountsCo-managed with policy-based limits: Transaction-aware policies for amount thresholds, sanctioned address deny-lists, and chain restrictions.

The Result: Non-Custodial Control at the Infrastructure Layer

Embedded WaaS with Turnkey lets you build wallets into your dev platform without owning custody or managing key infrastructure.
  • Tenant isolation: Isolated user wallets, credentials, and activity logs help protect end users’ key material and data.
  • Quorum control: 2-of-2 root quorum guarantees explicit user consent on every transaction.
  • Flexible models: Customers can evolve custody models over time as needs change.
  • Full auditability: Every operation is logged and nothing moves unless both the user and your platform approve.

DIMO Case Study

DIMO is a decentralized transportation network connecting over 165,000 vehicles. Drivers share vehicle data to access apps for insurance, fleet management, and predictive maintenance. DIMO uses Turnkey to power its embedded wallet infrastructure, replacing a fragmented onboarding flow that required external wallet apps and seed phrases. With Turnkey, DIMO delivered:
  • Passkey-first onboarding: DIMO replaced seed phrases and external wallet installs with Turnkey’s passkey authentication, cutting sign-in time from 2 minutes to 10 seconds and boosting onboarding completion by 30%.
  • Fully branded interface: DIMO built a native auth and signing experience on an open-source transactions SDK, powered by Turnkey’s Embedded WaaS passkey-based signing.
  • Sub-org per user with full ownership: Each driver gets an independent sub-organization, giving them complete control of their credentials and transactions while DIMO retains the governance layer needed for enterprise compliance.
  • 2-3 week integration: DIMO deployed into their global login stack in under three weeks.
Read the full case study: How DIMO is bringing transportation solutions onchain with Turnkey

Resources