HTTP 401 Unauthorized

HTTP 401 Unauthorized means the request lacks valid authentication credentials. Despite its name, this status is about authentication (who are you?), not authorization (what are you allowed to do?). The server MUST include a WWW-Authenticate header indicating the authentication scheme(s) accepted. This is the gateway status for protected resources — before any authorization check, the server verifies identity.

Debug HTTP 401 live
Analyze real 401 behavior — headers, caching, CORS, redirects
Open Inspector →

Try it (live endpoint)

Response includes the status code, standard headers (including Content-Type), and a small diagnostic JSON body describing the request and returned status.

Simulator URL (copy in the app after load — not a normal link):

https://httpstatus.com/api/status/401

Example request:

curl -i "https://httpstatus.com/api/status/401"
Try in playground

Meaning

Authentication is required and has failed or has not yet been provided. Response must include WWW-Authenticate header.

What it guarantees
  • The request was not fulfilled due to a client-side issue.
  • Authentication is required or did not succeed.
What it does NOT guarantee
  • Retries will succeed without changing request inputs.
  • The server is healthy; it may still be failing for other reasons.

When to use this status

  • Missing credentials or invalid/expired credentials.
  • APIs that require a challenge via WWW-Authenticate.
  • Browser flows where sign-in is required before access.

When NOT to use this status (common misuses)

Using 400 for authentication/authorization failures.
Clients cannot distinguish validation vs auth; retry/login flows break.
Using 404 to mask permission issues everywhere.
Monitoring misclassifies access bugs; SEO can degrade if real pages appear missing.
Returning 4xx for server-side bugs.
Clients stop retrying; incidents are masked as client behavior.
Returning 401 without WWW-Authenticate when required.
Clients cannot determine how to authenticate; browser/API flows break.

Critical headers that matter

Content-Type
Defines error body format (JSON/text/problem+json).
Clients can’t parse structured errors; observability loses fidelity.
Cache-Control
Prevents caching transient errors unless intended.
CDNs cache failures; prolonged user-visible outages.
WWW-Authenticate
Communicates auth scheme and challenge.
Clients cannot negotiate auth; automated refresh flows fail.

Tool interpretation

Browsers
Displays an error state; devtools exposes status and headers. Cache headers can accidentally cache error documents.
API clients
Classifies as failure; retry policy depends on idempotency and code class. Structured errors improve handling.
Crawlers / SEO tools
Persistent failures reduce crawl rate; soft-404 patterns cause indexing instability.
Uptime monitors
Typically alerts based on rate/threshold. Consistent classification reduces false positives.
CDNs / reverse proxies
May cache errors if misconfigured; respects Cache-Control and can serve stale on origin failure.

Inspector preview (read-only)

On this code, Inspector focuses on semantics, headers, and correctness warnings that commonly affect clients and caches.

Signals it will highlight
  • Status semantics vs method and body expectations
  • Header sanity (Content-Type, Cache-Control, Vary) and evidence completeness
  • Error cacheability and retry guidance signals
Correctness warnings
  • Missing WWW-Authenticate breaks standard auth negotiation.

Guided Lab outcome

  • Reproduce HTTP 401 Unauthorized using a controlled endpoint and capture the full exchange.
  • Practice distinguishing status semantics from transport issues (redirects, caching, proxies).
  • Identify the minimum request changes required to move from client error to success.

Technical deep dive

HTTP 401 Unauthorized has specific technical implications for API design, caching, and client behavior. Understanding the precise semantics helps distinguish it from similar status codes and implement correct error handling. The response should include a descriptive body following a consistent error schema (like RFC 7807 Problem Details) so clients can programmatically handle the error.

Real-world examples

REST API returning 401
A well-designed API returns 401 Unauthorized with a structured error body containing the error type, human-readable message, and machine-readable code. The client uses this to display an appropriate error message or take corrective action.
Web application encountering 401
A web application receives 401 from an API call. The frontend error handler maps the status code to a user-friendly message and either prompts the user to correct their input, retry the request, or contact support.
Monitoring and alerting for 401
An observability system tracks 401 Unauthorized responses. Client errors (4xx) are typically logged at WARN level since they indicate client issues, not server problems. Spikes in 401 responses may indicate a broken client deployment or API contract change.

Framework behavior

Express.js (Node)
Express: res.status(401).json({ error: 'Unauthorized', message: 'Descriptive error' }). Custom error middleware: app.use((err, req, res, next) => { if (err.status === 401) res.status(401).json(err.body); });
Django / DRF (Python)
Django REST Framework handles 401 through exception classes. Custom: raise APIException(detail='Error message', code=401). DRF's exception_handler formats consistent error responses.
Spring Boot (Java)
Spring: throw new ResponseStatusException(HttpStatus.valueOf(401), "Error message"). Or use @ControllerAdvice to handle specific exception types and return 401 with structured error bodies.
FastAPI (Python)
FastAPI: raise HTTPException(status_code=401, detail='Error message'). Custom exception handler: @app.exception_handler(CustomError) to return 401 with structured error responses.

Debugging guide

  1. Read the full response body — well-designed APIs include error details explaining why 401 was returned
  2. Check request headers (Authorization, Content-Type, Accept) — many 401 errors stem from missing or incorrect headers
  3. Compare your request against the API documentation — verify required fields, parameter types, and URL format
  4. Use curl -v or httpie to reproduce the request and see the full HTTP exchange
  5. Check server logs for additional context — the response body may be a sanitized version of a more detailed server-side error

Code snippets

Node.js
// Handle 401 Unauthorized in Express
app.use((err, req, res, next) => {
  if (err.status === 401) {
    return res.status(401).json({
      type: 'https://api.example.com/errors/unauthorized',
      title: 'Unauthorized',
      status: 401,
      detail: err.message
    });
  }
  next(err);
});
Python
from fastapi import HTTPException

# Raise 401 Unauthorized
raise HTTPException(
    status_code=401,
    detail={
        'type': 'unauthorized',
        'message': 'Descriptive error for 401 Unauthorized'
    }
)
Java (Spring)
// Spring Boot 401 Unauthorized handling
@ExceptionHandler(CustomUnauthorizedException.class)
public ResponseEntity<ErrorResponse> handleUnauthorized(
        CustomUnauthorizedException ex) {
    return ResponseEntity.status(401)
        .body(new ErrorResponse("Unauthorized", ex.getMessage()));
}
Go
// Return 401 Unauthorized
func errorHandler(w http.ResponseWriter, message string) {
	w.Header().Set("Content-Type", "application/json")
	w.WriteHeader(401)
	json.NewEncoder(w).Encode(map[string]any{
		"status":  401,
		"error":   "Unauthorized",
		"message": message,
	})
}

FAQ

What is the difference between 401 Unauthorized and similar status codes?
401 Unauthorized has specific semantics that distinguish it from other 4xx codes. Understanding these distinctions is crucial for proper API design and client error handling.
Should my API return 401 Unauthorized or a different status code?
Use 401 when the error precisely matches Unauthorized's definition. If the error is more general, consider 400 Bad Request. If it's about permissions, use 401/403. Always prefer the most specific status code that accurately describes the error.
How should clients handle 401 Unauthorized?
Clients should: (1) read the response body for error details, (2) determine if the error is retryable, (3) take corrective action if possible (fix input, refresh auth, wait and retry), (4) display an appropriate message to the user.
How does 401 Unauthorized affect monitoring and SLA calculations?
4xx errors are generally not counted against server-side SLAs since they indicate client errors. However, sudden spikes in 401 responses may indicate server-side issues (broken deployment, configuration change) even though they manifest as client errors.

Client expectation contract

Client can assume
  • The request failed due to client-side inputs or policy.
Client must NOT assume
  • Retries without changes will succeed.
Retry behavior
Do not retry until the request is corrected (or credentials refreshed).
Monitoring classification
Client error
Use payload and header checks to avoid false positives; cacheability depends on Cache-Control/ETag/Vary.

Related status codes

400 Bad Request
The server cannot or will not process the request due to an apparent client error.
403 Forbidden
The request was valid, but the server is refusing action.

Explore more

Related guides
Related tools
Related utilities