HTTP Headers

IANA HTTP field names per RFC 9110 and RFC 9111.

HeaderDirectionDescriptionStatusRFC
AcceptRequestInforms the server of the media types the client can handle in the response.StandardRFC 9110
Accept-CharsetRequestInforms the server of acceptable character sets. Obsolete — UTF-8 is now assumed.ObsoleteRFC 9110
Accept-EncodingRequestInforms the server of the content encodings (compressions) the client supports, such as gzip or br.StandardRFC 9110
Accept-LanguageRequestInforms the server of the human languages preferred by the client for the response.StandardRFC 9110
Accept-PatchResponseAdvertises which media types the server accepts in PATCH request bodies.StandardRFC 5789
Accept-PostResponseAdvertises which media types the server accepts in POST request bodies.Standard
Accept-RangesResponseIndicates whether the server supports range requests and which units are acceptable (bytes or none).StandardRFC 9110
Access-Control-Allow-CredentialsResponseIndicates whether the response can be shared with the requesting page when credentials (cookies) are included.Standard
Access-Control-Allow-HeadersResponseSpecifies which headers can be used in the actual CORS request.Standard
Access-Control-Allow-MethodsResponseSpecifies which HTTP methods are allowed in CORS requests.Standard
Access-Control-Allow-OriginResponseSpecifies which origins may access the resource in a CORS response. Value is a specific origin or *.Standard
Access-Control-Expose-HeadersResponseIndicates which response headers can be exposed to the browser in a CORS response.Standard
Access-Control-Max-AgeResponseHow long (in seconds) the result of a CORS preflight request can be cached.Standard
Access-Control-Request-HeadersRequestUsed in preflight requests to tell the server which headers will be used in the actual CORS request.Standard
Access-Control-Request-MethodRequestUsed in preflight requests to tell the server which HTTP method will be used in the actual CORS request.Standard
AgeResponseThe number of seconds the response has been in a proxy cache.StandardRFC 9111
AllowResponseLists the HTTP methods supported by the resource. Sent with 405 Method Not Allowed responses.StandardRFC 9110
AuthorizationRequestCarries credentials to authenticate a user-agent with a server, typically as Bearer token or Basic base64 pair.StandardRFC 9110
Cache-ControlBothDirectives that control caching in requests and responses, including max-age, no-store, and must-revalidate.StandardRFC 9111
Clear-Site-DataResponseClears browsing data (cookies, storage, cache) associated with the requesting site.Standard
ConnectionBothControls whether the network connection stays open after the current transaction. Values: keep-alive or close.StandardRFC 9110
Content-EncodingBothLists the encodings applied to the payload body, in the order in which they were applied.StandardRFC 9110
Content-LanguageBothDescribes the human language(s) intended for the audience of the payload.StandardRFC 9110
Content-LengthBothThe size of the request or response body in bytes.StandardRFC 9110
Content-LocationBothAn alternate URL for the returned data, indicating the specific resource represented in the payload.StandardRFC 9110
Content-RangeBothIndicates where in the full body a partial response body belongs (used with range requests).StandardRFC 9110
Content-Security-PolicyResponseCSP — controls the resources the browser is allowed to load, mitigating XSS and injection attacks.Standard
Content-Security-Policy-Report-OnlyResponseLike CSP but only reports violations without enforcing them. Used for testing new policies.Standard
Content-TypeBothDescribes the media type of the resource or request body, including optional charset and boundary parameters.StandardRFC 9110
CookieRequestSends stored HTTP cookies to the server. Cookies were set by the server using Set-Cookie.StandardRFC 6265
Cross-Origin-Embedder-PolicyResponseCOEP — prevents a document from loading cross-origin resources that do not explicitly grant permission.Standard
Cross-Origin-Opener-PolicyResponseCOOP — isolates the browsing context from cross-origin popups to prevent cross-origin attacks.Standard
Cross-Origin-Resource-PolicyResponseCORP — allows a server to opt in to protection against certain cross-origin resource loads.Standard
ETagResponseAn identifier for a specific version of a resource, used for cache validation and optimistic concurrency.StandardRFC 9110
ExpiresResponseThe date and time after which the response is considered stale. Superseded by Cache-Control max-age.StandardRFC 9111
ForwardedRequestStandardised header for proxy-forwarded request information (original IP, host, protocol). Supersedes X-Forwarded-*.StandardRFC 7239
FromRequestThe email address of the user making the request. Used by automated bots to identify themselves.StandardRFC 9110
HostRequestThe domain name and port of the target server. Mandatory in HTTP/1.1 requests for virtual hosting.StandardRFC 9110
If-MatchRequestMakes the request conditional on the ETag matching. Used for safe updates with optimistic locking.StandardRFC 9110
If-Modified-SinceRequestReturns the resource only if it has been modified after the specified date. Otherwise returns 304.StandardRFC 9110
If-None-MatchRequestMakes the request conditional on the ETag not matching. Returns 304 if the resource has not changed.StandardRFC 9110
If-RangeRequestMakes a range request conditional — only returns the range if the ETag or date matches, otherwise the full body.StandardRFC 9110
If-Unmodified-SinceRequestMakes the request conditional on the resource not having been modified after the specified date.StandardRFC 9110
Keep-AliveBothParameters for persistent connections. Obsolete in HTTP/2 — persistent connections are the default.Obsolete
Last-ModifiedResponseThe date and time at which the server believes the resource was last modified.StandardRFC 9110
LocationResponseThe URL to redirect to in 3xx responses, or the URL of the newly created resource in 201 responses.StandardRFC 9110
Max-ForwardsRequestLimits the number of times the request can be forwarded by proxies. Used with TRACE and OPTIONS methods.StandardRFC 9110
OriginRequestIndicates the origin (scheme, host, port) of the cross-site request. Used in CORS preflight and actual requests.StandardRFC 6454
Permissions-PolicyResponseControls which browser features and APIs the page is allowed to use (camera, geolocation, etc.).Standard
PragmaBothAn HTTP/1.0 cache control header. The Pragma: no-cache directive has been superseded by Cache-Control.ObsoleteRFC 9111
Proxy-AuthenticateResponseSent with a 407 response to define the authentication method required by the proxy.StandardRFC 9110
Proxy-AuthorizationRequestCarries credentials to authenticate a user-agent with a proxy server.StandardRFC 9110
RefererRequestThe URL of the page that linked to the requested resource. Note: intentionally misspelled in the specification.StandardRFC 9110
Referrer-PolicyResponseControls how much referrer information is included in requests. Values range from no-referrer to unsafe-url.Standard
Retry-AfterResponseIndicates how long to wait before making a follow-up request. Used with 503 and rate-limiting 429 responses.StandardRFC 9110
Sec-WebSocket-AcceptResponseThe server's response to the Sec-WebSocket-Key, confirming the upgrade to WebSocket.StandardRFC 6455
Sec-WebSocket-ExtensionsBothNegotiates extensions to the WebSocket protocol during the handshake.StandardRFC 6455
Sec-WebSocket-KeyRequestA base64-encoded random value sent by the client to initiate the WebSocket handshake.StandardRFC 6455
Sec-WebSocket-ProtocolBothNegotiates a subprotocol to use over the WebSocket connection.StandardRFC 6455
Sec-WebSocket-VersionRequestIndicates the WebSocket protocol version the client wishes to use.StandardRFC 6455
ServerResponseInformation about the software used by the origin server to handle the request.StandardRFC 9110
Set-CookieResponseSends one cookie from the server to the client, with optional attributes like Secure, HttpOnly, and SameSite.StandardRFC 6265
Strict-Transport-SecurityResponseHSTS — instructs browsers to only connect via HTTPS for a specified duration, with optional subDomain inclusion.StandardRFC 6797
TERequestIndicates the transfer encodings the client is willing to accept, and whether trailer fields are accepted.StandardRFC 9110
TraceparentBothW3C Trace Context — propagates a distributed trace identifier across services in a standardised format.Standard
TracestateBothW3C Trace Context — carries vendor-specific trace state alongside the traceparent header.Standard
TrailerBothLists headers that will be present in the trailer of a chunked transfer-encoded message.StandardRFC 9110
Transfer-EncodingBothSpecifies the encoding used to transfer the payload body. Common value: chunked.StandardRFC 9110
UpgradeBothAsks the server to upgrade the connection to a different protocol, such as WebSocket or HTTP/2.StandardRFC 9110
User-AgentRequestA string identifying the client software — browser, version, OS, and rendering engine.StandardRFC 9110
VaryResponseLists request headers that influenced this response, guiding caches on whether they can reuse the response.StandardRFC 9110
ViaBothAdded by proxies to track intermediate nodes a request or response has passed through.StandardRFC 9110
WarningBothCarried additional information about warnings for cached or transformed messages. Removed in RFC 9110.ObsoleteRFC 9110
WWW-AuthenticateResponseSent with a 401 response to define the authentication method the client must use to gain access.StandardRFC 9110
X-Content-Type-OptionsResponsePrevents the browser from MIME-sniffing the Content-Type. The only valid value is nosniff.De-facto
X-Forwarded-ForRequestDe-facto standard for conveying the originating IP address of a client through proxies.De-facto
X-Forwarded-HostRequestThe original host requested by the client before the proxy rewrote the Host header.De-facto
X-Forwarded-ProtoRequestThe protocol (HTTP or HTTPS) used by the client before a proxy rewrote the request.De-facto
X-Frame-OptionsResponseControls whether the page can be embedded in an iframe, protecting against clickjacking. Superseded by CSP.De-factoRFC 7034
X-Request-IDBothA unique identifier for the request, used for tracing and correlating logs across distributed systems.De-facto
X-XSS-ProtectionResponseEnabled the browser XSS auditor. Now obsolete — CSP is the recommended replacement.Obsolete
81 headers · IANA HTTP Field Name Registry RFC 9110 · RFC 9111