Turnkey provides enterprise-grade key management infrastructure built on secure enclaves. Store, recover, and manage cryptographic keys with programmable access controls, quorum approvals, and end-to-end encryption. With Key Management, you can:Documentation Index
Fetch the complete documentation index at: https://turnkey-0e7c1f5b-ip-allowlisting.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
- Securely store cryptographic keys in hardware-backed secure enclaves
- Implement disaster recovery with cryptographic guarantees
- Protect sensitive material like API secrets, credentials, and recovery bundles
Secure Enclaves
At the foundation of Key Management is Turnkey’s secure enclave infrastructure. Keys are generated and stored inside hardware-backed enclaves, and key material never exists in plaintext outside the enclave boundary.What can you build?
| Example | Description |
|---|---|
| Enterprise Disaster Recovery | Recover wallets and cryptographic material when incidents occur or credentials are compromised |
| Encryption Key Storage | Use Turnkey as a secure key storage and retrieval service to build user-controlled recovery with risk separation between your infrastructure and Turnkey |