Support Center
Get the help you need to maximize your IoT control experience
Documentation
Comprehensive guides and API references to help you get started and master advanced features.
View DocsFrequently Asked Questions
Api
No, you can use the full UHaveControl system through our web interface without any API keys. API keys are only needed if you want to build custom applications or integrations.
Go to Settings > API Keys in your dashboard. You can create new keys with custom names, deactivate existing ones (which pauses them immediately), or delete keys (which removes them permanently and immediately).
Deactivating an API key pauses it immediately - API access stops until reactivated. Deleting an API key removes it permanently and immediately - you'll need to create a new key for future API access.
General
UHaveControl is an IoT device management platform that allows you to remotely monitor, control, and manage your connected devices from anywhere in the world.
Sign up for an account, register your devices using the provided device ID, and start controlling them through our web dashboard.
Yes, we use industry-standard encryption and security practices to protect your data. All communications are encrypted and we follow strict data privacy guidelines.
UHaveControl has three user types: Root User (account owner), Account Administrator, and User. Each has different permission levels for managing devices and users.
Yes, Root Users and Account Administrators can create sub-users and manage their permissions for specific devices.
Yes, we offer partnership opportunities for development partners, technology partners, industry partners, and integration partners. You can apply through our partnership application form.
We offer Development Partnerships (influence product roadmap), Technology Partnerships (system integration services), Industry Partnerships (vertical expertise), and Integration Partnerships (third-party system connections).
Technical
Device permissions include Viewer, User/Operator, Device Manager, and Device Administrator roles. You can assign users specific roles for individual devices.
Check the device's internet connection, power supply, and ensure it's properly registered with your account. Restart the device if necessary.
Use the "Add Device" button in your dashboard, enter the device ID found on your hardware, and follow the setup wizard.
Yes, you can assign specific permission roles to other users for individual devices, allowing controlled access based on their needs.
These changes must first be enabled by your Admin or Root User in the enterprise settings. Once enabled, you can update your email or username in your account settings.
Enterprise accounts can enable two-factor authentication requirements, set password expiration policies, and configure session timeout settings.