Manage the Swivy platform.
This internal surface is for Swivy operators managing customers, organizations, environments, platform health, support, and break-glass control-plane access.
Enter your work email, then request a six-digit code.
Connect Swivy to your app.
Create a Swivy environment, choose the wallets and chains your app supports, test sign-in as an end user, then copy the generated keys and SDK snippets into your frontend and backend.
Your integration path
Swivy has two surfaces: this dashboard for your team, and the API/SDK your app calls for your users. Follow these three steps before touching the advanced controls.
What you copy into your app
Once setup is complete, use the Integrations section as your handoff checklist.
- FrontendApp ID and publishable key for Swivy Web SDK login and embedded wallet creation.
- BackendSecret key for server-side API calls, webhooks, and controlled admin operations.
- Users and walletsThe Users page shows user email, identity ID, linked wallets, managed wallets, and custody status.
createSwivyClient({ appId, publishableKey })
Overview
Recommended next steps
Create your Swivy app
This is the app record your product uses for login, wallets, policies, users, and API keys.
What this setup gives you
Use the generated credentials in your own frontend and backend. Your app users sign in through your UI, then Swivy creates and manages their wallets under this environment.
- 1Click Create my app. Keep the default development names unless you already know your production naming.
- 2Open Integrations and copy the frontend and backend snippets into your app.
- 3Open Test user flow, sign in as a test user, create wallets, then confirm that user and wallet appear in Users.
Step 2: Choose Wallet Features
Turn on the chains and runtime features your app should expose, then save them to the environment.
Wallet feature controls
Gas sponsorship
Choose whether Swivy can pay network fees for users and which networks are eligible.
Webhooks
Register backend endpoints that receive signed Swivy auth, wallet, and intent events.
Webhooks registered for this environment
Email delivery
Send dashboard and end-user login codes to a real inbox instead of Render or Docker logs.
Recommended: HTTP provider
Use this when you have an email service webhook, worker, or transactional email endpoint. Render stores the token as a secret env var.
SMTP provider
Use this for SendGrid, Postmark, Resend SMTP, Mailgun, or any hosted SMTP mailbox provider.
- 1Open Render, choose swivy-api, then open Environment.
- 2Set either the HTTP env vars or the SMTP env vars below, then keep SWIVY_LOG_CODES=false.
- 3Redeploy swivy-api, refresh this page, and request a new email code.
Chain routes
Configure the RPC routes Swivy will use for the enabled EVM and Solana networks.
API keys
Create and manage credentials: a publishable key for your frontend and a secret key for your backend.
- 1Rotate keypair creates a publishable key for your frontend and a secret key for your backend.
- 2The secret is shown once in Admin Output and the Integration Bundle, then the credential ID is used for revoke/rotation.
- 3Use Revoke keypair when a key is leaked or an app environment should stop accepting that key.
Advanced policy JSON
Advanced tenant and organization controls
Organization Access
Manage enterprise operators, org-scoped admin keys, and invite flows from the same environment context.
Organization Context
Organization Workspace
Browse projects and environments without manually chasing IDs through separate API calls.
Workspace Stats
Projects and Environments
Organization Members
Organization Invites
Organization Admin Keys
Environment Snapshot
Step 4: Deploy Handoff
Once the Test Wallets checklist is green, copy these into your app and deploy your own frontend/backend.
Integrations
Connect the Swivy environment to your app, backend, auth surfaces, and chain providers.
Integration Bundle
Quickstart Env Vars
Web SDK Snippet
Node SDK Snippet
Launch Readiness
Computed from the loaded environment policy, chain routes, runtime keys, webhook state, OIDC clients, and signer trust.
OIDC / Sign in with Swop
Create issuer clients on this environment so another app can use Swop as its login provider and then exchange that identity into its own runtime session.
OIDC Integration
Session Grants
Users
Inspect users, auth methods, and wallet records created through this Swivy environment.
Customer user directory
User Detail
Credentials
Chain Targets
Recent Intents
Webhooks
OIDC Clients
Audit Log
Admin Output
Step 3: Test the Wallet Flow
Use this as the acceptance pass before deploying: sign in as a user, create both embedded wallets, add a passkey, then prove the browser can sign with the local share.
- 1Copy the App ID and publishable key from Integrations into your frontend.
- 2Run the same sequence here that your app will run: request email code, verify user, create EVM wallet, create Solana wallet.
- 3Refresh the admin dashboard. The user and both wallets should appear under Users, proving Swivy issued real runtime wallet records for the app.
3A: App Config
These are the publishable credentials your frontend will use. The local setup wizard fills them automatically.
3B: Privy-style signup readiness
Check whether this environment is configured for email login, passkey step-up, and split-wallet auto-provisioning.
User authentication
Configure the auth posture and run a live email sign-in test.
Passkey enrollment
After a test user signs in, enroll a passkey here to prove Swivy can gate wallet signing and self-custody unlocks with WebAuthn.
Sign in a test user
Wallets
Create and inspect embedded EVM and Solana wallets for the signed-in test user.
Authorization
Manage the signing keys and user factors that authorize wallet operations.
Signing keys
3E: Prepare Self-Custody
Optional: Backend Session Grant
TOTP Enrollment
SMS Enrollment
Passkey Enrollment
Open User authentication to enable and enroll passkeys for the signed-in test user.