Transaction Automation

Automate complex signing workflows at scale

From smart contract interactions to staking management, manage onchain transactions without compromising on security or flexibility.

Custom Permissions

Secure transactions with flexible controls and permissions

Policies

Write granular policies and scope permissions with a simple API.

Multi-signature approvals

Set a quorum of users for approving and/or denying transactions.

Scoped API Keys

Create API keys with limited permissions for specific applications or use cases.

Key Infrastructure

Power your onchain workflows with secure, programmable key management

Private Key Management

Generate, store and access keys within secure enclaves.

Import & Export Keys

Easily migrate existing wallets and keys in and out of Turnkey.

Multichain Support

Support any blockchain or asset type with our chain-agnostic, arbitrary signing capabilities.

Secured Transactions

Minimize attack surface area with our paranoid security model

Compliance (Audit Trail)

Track events and changes across the stack, ensuring accountability.

Remote Attestation

Verify that the secure environment handling your private keys is running the expected, unmodified code.

Offchain Smart Contracts

Deploy smart contracts that are cryptographically verified off-chain.

Secure, flexible, and scalable

Secure by Default

Turnkey provides end-to-end private key generation and access control within Trusted Execution Environments (TEEs), ensuring raw private keys are never exposed to Turnkey, your software, or your team.

Independently Verifiable

Turnkey's code can be independently verified in real-time, replacing bling trust with cryptographic proof.

Built for Scale

Turnkey's verifiable infrastructure has been battle-tested at scale with 99.9% uptime and 50-11ms latency for signing, 50-100x faster than MPC solutions.

Frequently asked questions

Got any other questions?
Email — support@turnkey.com

What are policies?

Policies in Turnkey are the foundation for flexible controls and permissions within your organization. They define what actions are allowed or denied based on specific conditions.

How does Turnkey secure private keys?

Turnkey uses AWS Nitro Enclaves, a type of tamper-proof Trusted Execution Environment (TEE), for all sensitive operations. Private keys are never decrypted outside these enclaves, and only you can authorize key usage with your credentials. Turnkey has also implemented stringent protocols to prevent individual engineers from altering enclave code, ensuring a secure end-to-end deployment process.

How can I use the Turnkey dashboard?

The Turnkey dashboard provides a comprehensive interface for managing your digital asset infrastructure. Here's what you can do:

- Organization Management
- User Management
- Wallet Management
- Policy Configuration
- Activity Monitoring
- API Key Management

The dashboard serves as the control center for both manual operations and setting up your transaction automation infrastructure.

How are customers integrating Turnkey?

Turnkey is flexible infrastructure meant for a wide range of use cases. Teams use Turnkey to create embedded wallets, automate payments, deploy smart contracts, streamline treasury operations, provision wallets to AI agents, and more. Check out our Solutions page for how specific customers are integrating our product and feature suite.

Which ecosystems and chains do you support?

Turnkey's primitive for private keys and wallets is the cryptographic curve rather than specific cryptocurrencies. Our approach to supporting assets is tiered — Check out our Solutions pages for how specific customers are integrating our product and feature suite..

Get started with Turnkey today

Contact Us