Skip to main content

Why Turnkey for Embedded WaaS?

Turnkey provides the infrastructure to embed wallets directly into your product without building or managing key management yourself. Every wallet runs inside Turnkey’s secure enclaves, giving your users hardware-backed key security with sub-100ms signing latency. The 2-of-2 root quorum model lets you enforce billing, compliance, and risk controls at the cryptographic layer, not just the application layer, while keeping your platform non-custodial by design.

Core Principles

  • Segregated environments per end user: Each end user gets a fully isolated environment containing their wallets, credentials, policies, and activity logs. User data and key material are segregated from other users and from your platform’s management layer.
  • Configurable admin and billing controls: The recommended model requires both the end user and the platform to co-approve any funds-moving transaction. This gives you a cryptographic enforcement point for billing, compliance, and abuse prevention at the infrastructure layer, not just the application layer.
  • Explicit user consent: End users authenticate via passkey or equivalent authenticator for every funds-moving action. No transaction executes without the user’s direct approval.
  • Non-custodial by default: Your platform can block transactions but cannot move funds unilaterally. This keeps you non-custodial while retaining the service-level controls your business requires.
  • Portable key ownership: A built-in key export mechanism ensures end users are never locked in. Users can export their wallet independently if the provider goes offline or they choose to leave the platform.

Architecture

The diagram below shows the recommended sub-org structure for a WaaS deployment using 2-of-2 root quorum signing.
typical waas provider and end user co-signing model
Each sub-organization contains two root users (end user and WaaS provider), one or more wallets, and optional policies. The parent organization has read-only visibility into sub-orgs and can initiate authentication or recovery activities, but cannot sign transactions or modify sub-org policies.

Transaction Authorization Flow

The sequence below describes the default funds-moving flow under the 2-of-2 root quorum model:
  • End user initiates a transaction from the embedded wallet UI.
  • End user approves via their authenticator (e.g. passkey). Turnkey records the activity as partially approved.
  • The WaaS provider evaluates on its own backend: billing status, risk/compliance rules, and any other checks.
  • Provider approves via API key. The transaction executes.
  • If the provider withholds approval, the transaction does not execute.
typical waas negative control for transaction permission
Relevant docs: Activities & approvals | Root quorum

How to Get Started on Embedded WaaS with Turnkey

Step 1: Define the Tenant Model and Ownership Boundaries

Map your platform’s user model to Turnkey’s sub-organization primitive. The standard approach is one sub-org per end user.
  • Tenant isolation: Each sub-org is a self-contained data boundary. Wallets, users, authenticators, policies, and activity logs are fully isolated between sub-orgs.
  • Parent-child relationship: Your parent organization has read-only access to sub-orgs and can initiate auth/recovery flows, but cannot sign transactions or modify policies within them.
  • External mapping: Track the relationship between your platform’s user IDs and Turnkey sub-org IDs in your own database. Turnkey does not enforce or require a specific external ID scheme.

Choose Your Custody Model

Turnkey’s primitives are flexible enough to support a wide range of custody configurations. The three below are the most common paths for WaaS products:
ConsiderationCo-managed (Recommended)Self-custodyFully Custodial
Transaction controlBoth user and provider must approve. Cryptographic enforcement of billing, compliance, and risk controls.User has full unilateral signing authority. Provider controls are application-layer only.Provider signs on behalf of the user. Full operational control over wallets.
Custody classificationNon-custodial. Provider can block but not move funds alone.Non-custodial. Provider has no signing authority.Custodial. Provider holds signing authority and must manage regulatory obligations accordingly.
Setup complexityStaged sub-org creation (create at 1-of-2, configure policies, raise to 2-of-2).Single-step sub-org creation. No staged threshold changes.Single-step. Provider is sole root user with full API key access.
Best fitMost WaaS products needing billing gates, compliance holds, or service-level transaction approval.Products emphasizing maximum user sovereignty where application-layer controls are sufficient.Platforms managing wallets entirely on behalf of users (e.g. operational treasury, backend automation).
These models can coexist. For example, use co-managed for institutional accounts, self-custody for consumer wallets, and fully custodial for operational treasury. Because custody configuration is a property of each sub-org’s root quorum and policies, you can migrate between models over time without moving wallets or re-generating keys. Relevant docs: Sub-organizations | Root quorum The remaining steps assume the co-managed model (2-of-2 co-signing). The self-custody and fully custodial paths are simpler variations of the same flow and noted where they diverge.

Step 2: Design the Sub-Organization Control Model

Define what lives inside each sub-org and how control is shared between the platform and the end user.
  • End user (root): Authenticated via passkey or equivalent user-controlled authenticator.
  • WaaS provider (root): Authenticated via API key. Used to approve or block transactions based on your service rules.
  • Delegated Access (optional): If needed for automation or backend-initiated workflows, add a scoped non-root API key via Delegated Access. DA must be tightly policy-scoped and should never have broad signing authority or bypass user consent.
Guidance on Delegated Access: DA is not required for the default WaaS model. If used, it must not be root, must be tightly policy-scoped, and should be treated as a convenience mechanism rather than a substitute for root quorum approval. Relevant docs: Delegated Access | Policy scoping

Step 3: Define Default Wallet and Policy Template

Specify what gets created in every sub-org by default: wallet structure, supported chains/accounts, and baseline policies.

Staged Sub-Org Creation (Option A)

For the 2-of-2 quorum model, establish the threshold last so the backend can configure policies (including export) with only provider approval: 3a. Create sub-org with both root users at 1-of-2 threshold
const subOrg = await turnkeyClient.createSubOrganization({
  parameters: {
    subOrganizationName: `User Wallet - ${userId}`,
    rootUsers: [
      { userName: "WaaS Provider", apiKeys: [{ publicKey: PROVIDER_KEY }] },
      {
        userName: "End User",
        authenticators: [
          {
            /* passkey */
          },
        ],
      },
    ],
    rootQuorumThreshold: 1,
    wallet: {
      walletName: "Primary Wallet",
      accounts: [
        {
          /* eth account */
        },
      ],
    },
  },
});
3b. Create export policy (user escape hatch)
await turnkeyClient.createPolicy({
  organizationId: subOrgId,
  parameters: {
    policyName: "Allow User Wallet Export",
    effect: "EFFECT_ALLOW",
    consensus: `approvers.any(user, user.id == '${endUserId}')`,
    condition: `activity.type == 'ACTIVITY_TYPE_EXPORT_WALLET'
      && wallet.id == '${walletId}'`,
  },
});
3c. Raise threshold to 2-of-2
await turnkeyClient.updateRootQuorum({
  organizationId: subOrgId,
  parameters: {
    threshold: 2,
    userIds: [providerUserId, endUserId],
  },
});
StepActionQuorum State
1Create sub-org with both root users + wallet1-of-2
2Create export policy for end user1-of-2
3Update threshold to 22-of-2
Why this works: The export policy is created while the provider has sole root access (Step 2). Once the 2-of-2 quorum is established, the user can trigger exports via this policy without needing provider co-signature. This escape hatch is what keeps the co-managed model non-custodial: because the user can always export their keys for direct access to funds independent of the provider, the provider’s co-signing role is a service control rather than a custody gate. Relevant docs: Export wallets | Policy examples

Step 4: Build the Developer-Facing SDK or Integration Surface

Create the SDK, APIs, or UI components that downstream developers integrate with. Abstract away Turnkey internals and expose only your platform’s intended wallet, auth, and signing flows.
  • Embedded Wallet Kit (EWK): Use and extend the Embedded Wallet Kit for user authentication, wallet UI, and approval prompts. Fork or wrap EWK components to match your branding and surface “pending provider approval” states.
  • Backend service: Your backend is required to handle provider root approvals (via API key), billing and risk evaluation, and activity monitoring.
  • SDK abstraction layer: Wrap Turnkey’s SDK calls behind your own interface so downstream integrators never interact with Turnkey directly. This gives you full control over the developer experience and allows you to swap or upgrade infrastructure without breaking integrations.
Relevant docs: Embedded Wallet Kit | SDK reference

Step 5: Incorporate the Embedded Wallet into the Platform Flow

Wire the Turnkey-backed wallet into your application’s onboarding and runtime flows so every downstream integration inherits a working embedded wallet experience.
  • Onboarding: Handle Turnkey org setup, auth configuration, and the staged sub-org creation flow as part of your user registration. The end user should experience passkey registration (or equivalent) as a natural part of sign-up.
  • Client initialization: Initialize the Turnkey client with the user’s sub-org context on each session. Use sessions for batched signing workflows to reduce authentication friction during active use.
  • Transaction flow: Surface the approval prompt via EWK components, submit the user’s approval to Turnkey, run your backend checks, then co-sign or withhold.
  • Recovery: Expose the export flow in your settings UI so users can self-serve wallet recovery. Turnkey’s enclave encrypts the mnemonic to a user-generated target key via HPKE. Neither Turnkey nor your platform can view the exported material.

Use Cases

NeedConfiguration
Fintech or neobank with card-linked crypto walletsCo-managed with billing gates: Provider co-signs after verifying account standing. Export policy as user escape hatch. Passkey auth for consumer UX.
Dev tooling platform reselling embedded walletsWhite-labeled EWK with SDK abstraction: Downstream developers integrate with your SDK, never touching Turnkey directly. Segregated environments per end user, provider co-sign for compliance.
Self-custody consumer walletSelf-custody model: Maximum user sovereignty. Provider handles auth initiation and UX but has no signing authority. Application-layer controls for billing.
Institutional or high-value accountsCo-managed with policy-based limits: Transaction-aware policies for amount thresholds, sanctioned address deny-lists, and chain restrictions.

The Result: Non-Custodial Control at the Infrastructure Layer

Embedded WaaS with Turnkey gives your platform a cryptographic enforcement point for billing, compliance, and risk controls, without taking custody of user funds. The 2-of-2 root quorum model guarantees explicit user consent on every transaction while preserving provider-level service control. Users are never locked in: the export policy escape hatch ensures they can always recover their wallet independently. This architecture is easy to audit and reason about: nothing moves unless both the user and provider approve. Customers can evolve the model over time by introducing scoped Delegated Access, adding policy-based limits, or migrating high-throughput flows off root quorum as needs change.

DIMO Case Study

DIMO is a decentralized transportation network connecting over 165,000 vehicles. Drivers share vehicle data to access apps for insurance, fleet management, and predictive maintenance. DIMO uses Turnkey to power its embedded wallet infrastructure, replacing a fragmented onboarding flow that required external wallet apps and seed phrases. With Turnkey, DIMO delivered:
  • Passkey-first onboarding: DIMO replaced seed phrases and external wallet installs with Turnkey’s passkey authentication, cutting sign-in time from 2 minutes to 10 seconds and boosting onboarding completion by 30%.
  • Sub-org per user with full ownership: Each driver gets an independent sub-organization, giving them complete control of their credentials and transactions while DIMO retains the governance layer needed for enterprise compliance.
  • On-chain transaction SDK: DIMO’s open-source transactions SDK uses Turnkey’s stamper and signer primitives directly, supporting vehicle registration, data permissions (SACD), staking, and device pairing, all backed by smart account sessions to minimize signature prompts.
  • 2-3 week integration: Full deployment into DIMO’s global login stack completed in under three weeks using Turnkey’s SDKs and responsive support.
Read the full case study: How DIMO is bringing transportation solutions onchain with Turnkey

Resources