How Privy works
Privy provides three interconnected layers that work together to create secure, flexible onchain applications. 1. Authentication Authentication verifies who your users are and manages their access to your application. Privy supports multiple authentication methods including email, social logins, passkeys, and wallet-based authentication. You can use Privy’s built-in authentication system or integrate Privy wallets with your existing authentication provider. 2. Wallets Wallets enable users and applications to interact with blockchains for signing transactions, managing assets, and participating in onchain protocols. Privy supports both embedded wallets (created and managed by Privy’s infrastructure) and external wallets (third-party wallets like MetaMask or Phantom that users bring to your application). 3. Controls Controls determine who can take actions with wallets and what they’re allowed to do. Every embedded wallet has an owner with full control, and can have additional signers with scoped permissions. Policies define rules that constrain what actions each party can perform.Authentication
You can use Privy’s authentication system or integrate Privy wallets with your existing authentication provider.Privy authentication
Privy’s built-in authentication supports multiple login methods (listed below). Learn more.- Email and phone - Email, SMS, and WhatsApp
- Social - Google, Discord, Twitter, and more
- Crypto-native - MetaMask, Phantom, Farcaster, and Telegram
- Biometric - Passkeys and biometric authentication
- Additional security - MFA and hCaptcha
JWT-based authentication
You can integrate Privy wallets with your existing JWT-based authentication system. Learn more. Best for: Applications with established authentication that want to add wallet functionalityWallets
Privy enables users and applications to interact with blockchains through wallets for signing transactions, managing assets, and participating in onchain protocols.Embedded wallets
Embedded wallets are created and managed by Privy’s infrastructure. Learn more. Key features:- Created automatically or on-demand
- Secured by Privy’s key management system
- Users can export keys for self-custody
- Work across 50+ blockchains
External wallets
External wallets are managed by third-party providers like MetaMask, Phantom, or Rainbow that users bring to your application. Learn more. Key features:- Users bring existing wallets
- Users control keys directly
- Familiar to crypto-native users
- Can be linked to Privy accounts
Controls
Controls define who can take actions with wallets and what actions they’re allowed to perform. Embedded wallets always have an owner and can have additional signers. These roles are distinct and have different permissions.Owners
Owners are an entity that has ultimate control over a resource, including the ability to update policies or modify ownership configurations. Owners can be users, authorization keys, or key quorums. Learn more.Signers
Signers are an additional party that can perform actions with a wallet, subject to the policies and permissions applied to them. Signers can sign transactions but cannot modify policies, change ownership, or export keys. Common use cases include server automation for limit orders, portfolio rebalancing, and delegated access. Learn more.Policies
Policies are rules that constrain what actions owners and signers can perform. These are key-level enforceable guardrails that prevent unauthorized or unintended actions. Policies can control transaction amounts, recipient addresses, smart contract interactions, time windows, and asset types. Policies are evaluated at request time and can be different for wallet owners vs signers. Learn more.Wallet control models
Wallets are typically set up using one of three models, each suited for different use cases and security requirements: Model 1: User-owned- User has full control
- Keys only accessible to user
- Use case: Self-custodial consumer wallets
- User retains ownership
- Server has scoped permissions
- Use case: Automated trading, limit orders
- Application has full control
- Managed via authorization keys
- Use case: Treasury, trading bots, agent wallets

