Skip to main content
Turnkey provides enterprise-grade key management infrastructure built on secure enclaves. Store, recover, and manage cryptographic keys with programmable access controls, quorum approvals, and end-to-end encryption. With Key Management, you can:
  • Securely store cryptographic keys in hardware-backed secure enclaves
  • Implement disaster recovery with cryptographic guarantees
  • Protect sensitive material like API secrets, credentials, and recovery bundles

Secure Enclaves

At the foundation of Key Management is Turnkey’s secure enclave infrastructure. Keys are generated and stored inside hardware-backed enclaves, and key material never exists in plaintext outside the enclave boundary.

What can you build?

ExampleDescription
Enterprise Disaster RecoveryRecover wallets and cryptographic material when incidents occur or credentials are compromised
Encryption Key StorageUse Turnkey as a secure key storage and retrieval service to build user-controlled recovery with risk separation between your infrastructure and Turnkey

Other use cases

Secrets management

Store encryption keys in Turnkey that protect API secrets, credentials, or other sensitive configuration. Your infrastructure holds the encrypted secrets; Turnkey holds the decryption key.

Provider migration

Migrate keys from another custody provider into Turnkey’s secure enclaves with no plaintext exposure during transit.

Next Steps

Explore the code examples for detailed implementation guides, or learn more about secure enclaves and quorum policies.