Ledger Wallet™ just got a major upgrade.

Take control today

A whole new level of choice, clarity and control

Trade different via Ledger Wallet 4.0

Download now Learn more

Session Keys

Mar 14, 2026 | Updated Mar 14, 2026
Session keys are temporary, limited-permission cryptographic keys that a human grants to an AI agent to perform specific actions.

What Are Session Keys?

As the digital asset ecosystem moves toward automation, the requirement for a human to sign every individual transaction can create significant friction. Session keys solve this by acting as a form of delegated authority. Instead of giving an AI agent full access to your primary private keys, you use your signer (hardware wallet) to issue a temporary, restricted key that allows the agent to perform a specific set of actions on your behalf.

The session key is a separate cryptographic entity that is only valid under the conditions you set. This approach allows a user to define the boundaries of what an autonomous system can do. By using session keys, you can authorize an agent to manage high-frequency tasks, such as rebalancing a portfolio or claiming rewards, without needing to manually verify every sub-task.

How Do Session Keys Work?

The issuance of a session key is a structured process of cryptographic delegation. To ensure security and cross-platform interoperability, this workflow utilizes ERC-4337 (Account Abstraction), which enables programmable transactions known as “UserOperations,” and ERC-6900, which provides a modular framework for adding specific session logic to a smart account. Together, these standards ensure every action is verified through the following stages:

  1. Define Scope: The user establishes permissions, volume limits (a daily “budget”), and a Time-to-Live (TTL) expiration window. These rules are codified within the smart account’s policy engine (the specific set of rules, such as spending limits and allowed addresses, currently enforced by the owner).
  2. Human Approval: The user employs their signer to authorize the session. By verifying these parameters with their personal hardware, the human owner provides the root of trust for the agent’s temporary authority.
  3. Agent Uses Session Keypair: Once authorized, the AI agent uses its own session keypair to sign transactions. The agent never gains access to the user’s private keys.
  4. Smart Account Validates: When an agent submits a transaction, it is first processed by the EntryPoint (a high-security gatekeeper contract on the blockchain) or the smart account’s internal validator. These systems act as a digital judge, verifying the agent’s cryptographic signature and ensuring the action strictly follows the policy engine. 
  5. Auto-Expiry and Revocation: The session key automatically becomes invalid once the Time-to-Live window expires. Additionally, the human owner can manually revoke the key at any time via a physical button press on their device (kill switch), instantly cutting off the agent’s access.

Without session keys, a user would be forced to choose between total delegation (highly risky) or constant manual intervention (inefficient). As such, session keys provide the necessary balance between the efficiency of Autonomous Agents and the security of human ownership.

Time in Force (TIF)

Time in force refers to how long an order remains active in the market before it is either executed or canceled.

Full definition

Cold Storage

Cold storage is a method of holding data or crypto assets in devices that are not connected to the internet, which provides added security for its users.

Full definition

OP_Return

OP_Return is a special data storage function in a blockchain transaction. It allows users to include arbitrary data in transactions and transmit them to the entire network.

Full definition

Own your crypto future

Stay informed with security tips, updates, and exclusive offers from Ledger

Your email address will only be used to send you our newsletter, as well as updates and offers. You can unsubscribe at any time. Learn more

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.