Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs.json
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@
{
"group": "LANDING PAGE PLACEHOLDER",
"pages": [
"solutions/overview"
"welcome"
]
},
{
Expand Down
119 changes: 119 additions & 0 deletions welcome.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,119 @@
---
title: "Welcome to Turnkey"
description: "Secure, flexible, and scalable wallet infrastructure"
---

# Turnkey: Secure, flexible, and scalable wallet infrastructure

Turnkey provides the infrastructure to create and manage wallets, sign transactions, and secure cryptographic keys — where every key operation is hardware-isolated, policy-governed, and cryptographically auditable. Build on a foundation where security isn't a tradeoff.

<br />

{/* SEARCH */}

## Where do you want to start?

<br />

<Note>
Use the search bar above (⌘K) to find anything across the docs.
</Note>

---

## Explore Turnkey's products

<CardGroup cols={2}>

<Card
title="Embedded Wallets"
icon="wallet"
href="/embedded-wallets/overview"
>
**Wallet experiences built into your product**

Build wallets directly into your app — for consumers, business accounts, or as the foundation for your own wallet product. Users authenticate with email, passkeys, or social login. You control the experience.

{/*
⚠️ INTERNAL NOTE — NOT FOR PUBLICATION
Are embedded wallets always non-custodial? Previous description said "non-custodial"
but the product supports non-custodial and hybrid custody models.
Needs stakeholder confirmation before finalizing this description.
*/}
</Card>

<Card
title="Company Wallets"
icon="building"
href="/company-wallets/overview"
>
**Wallets your organization operates for onchain automation**

Run high-volume signing workflows with programmable controls — spending limits, multi-party approvals, role-based access, and automated policy execution. Purpose-built for teams that need to operate onchain at scale.
</Card>

<Card
title="Key Management"
icon="key"
href="/products/key-management/overview"
>
**Enterprise-grade security for your most sensitive keys**

Hardware-backed key storage with programmable access controls, quorum approvals, and tamper-evident audit logs. The security model your most critical infrastructure deserves.
</Card>

<Card
title="Verifiable Cloud"
icon="shield-check"
href="/tvc/overview"
>
**Run code inside hardware-isolated enclaves** `Beta`

Execute workloads with verifiable computation guarantees — built for applications where trust and auditability are non-negotiable.
</Card>

</CardGroup>

---

## How Turnkey works

<Card
title="How Turnkey works"
icon="book-open"
href="/concepts/overview"
>
Understand the core architecture behind Turnkey's key infrastructure.
</Card>

---

## Start building

<CardGroup cols={2}>

<Card
title="Account setup"
icon="circle-play"
href="/getting-started/quickstart"
>
Create your organization and generate an API keypair — the two steps every Turnkey integration starts with.
</Card>

<Card
title="Embedded Wallets quickstart"
icon="code"
href="/getting-started/embedded-wallet-quickstart"
>
Jump into code with a step-by-step guide for building embedded wallets.
</Card>

<Card
title="Verifiable Cloud quickstart"
icon="code"
href="/getting-started/verifiable-cloud-quickstart"
>
Get started running workloads inside Turnkey's secure enclave infrastructure.
</Card>

</CardGroup>