Embedded Wallets

Securely integrate non-custodial wallets into your app

Create millions of embedded wallets on behalf of your users for a flawless onboarding and in-app experience.

a wallet interface
Wallet Creation

Create custom wallet experiences without compromising on security

Embedded Wallet Kit

Speed up your integration with pre-built UI components.

Import / Export

Migrate existing wallets in and out of Turnkey without exposure.

Pre-Generated Wallets

Streamline onboarding by generating wallets for your users before authentication.

User Onboarding

Build secure, user-friendly experiences across chains

Authentication & Recovery

Authenticate users via email, phone, biometrics, social logins and more, plus regain access to lost wallets with email verification.

Account Abstraction

Access simple integrations for gas sponsorship and smart wallet contracts.

Multichain Support

Support any blockchain or asset with chain-agnostic, arbitrary signing capabilities.

Custom Controls

Programmatically provision wallets and expertly manage access controls

Policies

Write granular policies and scope permissions with a simple API.

Delegated Access

Manage onchain wallets with flexible co-ownership controls.

Sessions

Sign multiple transactions without requiring additional approvals.

Secure, flexible, and scalable

Secure by Default

Turnkey provides end-to-end private key generation and access control within Trusted Execution Environments (TEEs), ensuring raw private keys are never exposed to Turnkey, your software, or your team.

Independently Verifiable

Turnkey's code can be independently verified in real-time, replacing bling trust with cryptographic proof.

Built for Scale

Turnkey's verifiable infrastructure has been battle-tested at scale with 99.9% uptime and 50-11ms latency for signing, 50-100x faster than MPC solutions.

Frequently asked questions

Got any other questions?
Email — support@turnkey.com

How do embedded wallets work?

Embedded wallets function like traditional non-custodial wallets (e.g., Metamask, Rainbow), but remove the need to rely on phishable seed phrases, employ familiar authentication methods, and are more deeply embedded into applications for a seamless user experience.

How does Turnkey secure private keys?

Turnkey uses AWS Nitro Enclaves, a type of tamper-proof Trusted Execution Environment (TEE), for all sensitive operations. Private keys are never decrypted outside these enclaves, and only you can authorize key usage with your credentials. Turnkey has also implemented stringent protocols to prevent individual engineers from altering enclave code, ensuring a secure end-to-end deployment process.

Is Turnkey non-custodial?

Yes! Turnkey is non-custodial. If you’re curious about how Turnkey works with your self-custodial setup, feel free to schedule a call with us to discuss your implementation.

How are customers integrating Turnkey?

Turnkey is flexible infrastructure meant for a wide range of use cases. Teams use Turnkey to create embedded wallets, automate payments, deploy smart contracts, streamline treasury operations, provision wallets to AI agents, and more. Check out our Solutions pages for how specific customers are integrating our product and feature suite.

Which ecosystems and chains do you support?

Turnkey's primitive for private keys and wallets is the cryptographic curve rather than specific cryptocurrencies. Our approach to supporting assets is tiered — check out our docs for how we support specific chains and assets.

Get started with Turnkey today

Contact Us