What is Turnkey?

Turnkey is the infrastructure layer that keeps your digital assets safe and accessible.

When you use a platform powered by Turnkey, your wallets and transactions are secured by the same technology trusted by leading teams apps like Bridge (a Stripe company), Polymarket, Moonshot, Alchemy, Magic Eden, World, and more.

Security first

Turnkey was built to solve one problem above all: securing private keys. We designed a new, verifiable security model that ensures private keys are never exposed – not to us, not to the platform you’re using, and not to anyone else.

Non-custodial by design

You stay in control of your keys.

Hardware-isolated environments

All critical operations are executed within secure enclaves.

Learn more

Verifiable infrastructure

Independent proofs verify that every critical system is operating exactly as intended.

Learn more

External assurance

Formal assessments by accredited auditors provide ongoing validation of critical system correctness.

Embedded wallets

Automatically created and secured; no manual key management.

Flexible sign-in

Applications can enable access via email, phone, social accounts, biometrics, or connected wallets.

Multichain support

Compatible with all major chains.

Flexible access

Wallets can support shared access or co-ownership when needed.

Wallets made simple

Platforms that use Turnkey can instantly create secure wallets for every user, embedded directly in the apps you use. That means you can start sending, receiving, and storing crypto without complicated setups or seed phrases.

Smarter transactions

Turnkey also powers safe, automated transactions under the hood. Platforms can streamline onchain actions while keeping full security controls in place.

Seamless automation

No need to login or sign in every time you transact.

Built-in protection

Customizable policies help block suspicious or fraudulent activity.

Flexible approvals

High-value transactions can require multiple approvers.

Full audit trail

Every action is tracked for accountability.

Built for trust and proof

Today, millions of wallets are secured by Turnkey. The crypto platforms you use choose Turnkey because our security isn’t just trusted, it’s verifiable.

Every operation is protected and attested by hardware-backed enclaves, so platforms can prove how keys are managed and how actions are authorized. When you see that a platform is powered by Turnkey, you know your digital assets are  protected by infrastructure that’s both trusted and provable.

Learn more about our verifiability roadmap here.

Frequently asked questions

Got any other questions?
Connect with our Support team on Slack

What is Turnkey?

Turnkey is a third-party wallet infrastructure solution which is used to generate the in-app wallets used for signing. These wallets are not accessible to us, or to Turnkey. Signing onchain transactions with your in-app wallets requires explicit, cryptographic authentication using your personal authenticators, like a passkey. Secure key management through Turnkey allows us to offer a more seamless in-app experience compared to traditional wallets. 

How does Turnkey secure private keys?

Turnkey uses AWS Nitro secure enclaves, a type of tamper-proof Trusted Execution Environment (TEE), for all sensitive operations. Private keys are never decrypted outside of these enclaves, and only you can authorize key usage with your credentials. Turnkey has also implemented stringent protocols to prevent individual engineers from altering enclave code, ensuring a secure end-to-end deployment process. 

How does the in-app wallet work?

We work with Turnkey to provide secure, non-custodial in-app wallets. These wallets function much like traditional non-custodial wallets (e.g., Metamask, Rainbow), but remove the need to rely on phishable seed phrases, employ familiar authentication methods, and are more deeply embedded into our application for a seamless user experience.

Your wallet is secured by authenticators that only you control, ensuring you maintain self-custody while eliminating the risks associated with password-based security and providing an easier login experience. 

Can Turnkey or the platform using Turnkey ever access my funds?

No. Neither Turnkey or the platform using Turnkey’s infrastructure can access, transfer, or manage your assets. All sensitive wallet operations require your explicit authentication and all private key material stays encrypted within secure enclaves.

How is Turnkey different from traditional crypto wallets?

Traditional crypto wallets require you to store and protect a seed phrase - if it's lost or stolen, your assets can be too. Turnkey-powered wallets remove that risk by enabling users to authenticate via email, phone, biometrics, social logins, external wallets, and more. Plus users can regain access to lost wallets with email verification.

Is Turnkey open source or auditable?

Turnkey's security model is verifiable through cryptographic attestations produced by its hardware enclaves. These attestations allow platforms and third parties to independently confirm that Turnkey’s infrastructure is operating securely and as intended.

How does Turnkey handle user authentication and sensitive information?

Turnkey, as a principle, does not store any user authentication secret. Our authentication methods rely on public/private key cryptography. We store public keys only, and authentication happens with cryptographic signatures verified against them. To bridge traditional authentication protocols like email and OAuth to strong cryptographic key pairs we leverage Trusted Execution Environments (TEEs) to perform a key exchange.

Get started with Turnkey today

Contact Us