Skip to main content

N-able N-Central | Error 401

N-able, N-Central, 401, Error calling customerList: Credentials are incorrect or expired. Please update API Key, status code 401

Updated over a week ago

Overview πŸ’₯

When the Liongard N-Central Inspector fails with a "401" error, it means the authentication details being used to connect to N-Able N-Central are no longer considered valid. This typically occurs when the service account password or API key has expired, been rotated, revoked, or mismatched.


​Error :

This article provides a structured and detailed troubleshooting process to restore successful authentication, along with best practices to prevent recurrence.


Why This Happens? πŸ€”

A 401 error confirms that the request reached the N-Central server, but it was rejected due to invalid authentication.

Common root causes include:

  • The service account password was changed, but the API key was not regenerated.

  • The API key was revoked, expired, or deleted in N-Central.

  • The service account is locked, disabled, or missing required permissions.

  • The API key was updated in N-Central but not updated inside Liongard.

  • SSO or MFA was enabled on the service account (API access does not support SSO/MFA).

  • N-Central server upgrades or policy changes invalidated existing tokens.

  • The account was converted from local to SSO-managed.


Troubleshooting Flow πŸš€

Step

Check

Expected Result

Next Action

1

Run Inspector in Debug + Clear Cache

Logs generated

Review authentication errors

2

Validate Account Status

Account is Active

Unlock or re-enable if needed

3

Reset Password

Login succeeds

Regenerate API key

4

Regenerate API Key

New key created

Update Liongard

5

Verify MFA / SSO

Disabled

Switch to non-SSO account

6

Re-run Inspector

Status = Completed

Escalate if still failing


Steps to Resolution πŸ‘¨β€πŸ’»

1️⃣ – Reset the N-Central Service Account Password

  1. Log into the N-Central admin portal.

  2. Locate the Liongard service account.

  3. Reset the password.

  4. Confirm you can log in interactively with the new password.

Even API-only accounts often require valid password authentication internally.

2️⃣ – Regenerate the API Key

  1. In N-Central, navigate to:

    • Administration β†’ API Keys

  2. Locate the key associated with the service account.

  3. Revoke or delete the old key.

  4. Generate a new API key.

3️⃣ – Update the API Key in Liongard

  1. Open the N-Central Parent Inspector config in Liongard.

  2. Paste the newly generated API key.

  3. Carefully verify:

    • No extra spaces before or after the key

    • No line breaks

    • No hidden characters

Even a single hidden character will cause a 401 error.

4️⃣ – Run Inspector in Debug + Clear Cache

This forces Liongard to:

  • Discard stale tokens

  • Rebuild authentication cache

  • Generate clean logs

5️⃣ – Perform Additional Authentication Checks

Check

How to Validate

Required State

Account Status

N-Central User Manager

Active / Unlocked

Permissions

Account role

API / Integration permissions enabled

MFA / 2FA

Security settings

Must be disabled

SSO

Authentication method

Must be local account

API Key

Key list

Active and unexpired

6️⃣ – Re-Run the Inspector

After completing all changes:

  • Run the inspector again.

  • Verify status = Completed.

  • Confirm data prints successfully.


Credential Relationship 🌟

Liongard Inspector
↓
Service Account Password (N-Central)
↓
API Key
↓
N-Central API Endpoint
↓
Authentication Success

If any layer in this chain is broken β†’ 401 error occurs


Best Practices πŸ§‘β€πŸ«

Practice

Reason

Use dedicated service account

Avoids user-based policy changes

Disable MFA/SSO on API accounts

API authentication doesn't support them

Rotate both password and API key together

Prevents mismatches

Document credential changes

Simplifies troubleshooting

Monitor release notes

Prevents surprise authentication breakage


When to Contact Support 🦁

Contact Liongard Support if:

  • 401 errors persist after password + API key reset.

  • Account is confirmed active and non-SSO.

  • Debug logs still show authentication failures.

What to Collect for Support

Item

Description

Debug logs

Export from Debug + Clear Cache run

Screenshots

Inspector configuration (without exposing full keys)

Account status

Proof account is active

Recent changes

Any password, MFA, or server policy updates

N-Central version

Server version and recent upgrades


External References πŸ“š

Third-Party Link Disclaimer ‼️

We may reference external third-party resources solely as additional guidance.

Liongard does not own, control, or guarantee the accuracy, security, or reliability of third-party sites. Please use them at your own discretion and risk.

Did this answer your question?