# Auth-Providers

With an auth provider, you can store access data of target systems to obtain more information. Access to the target system allows getting the operating system and installed software. Therefore, Hacktor can detect and validate more vulnerabilities (CVEs) than if only the publicly accessible information is available to it.

Use the search bar to display the desired entries.

<figure><img src="/files/3UFuUygZsxjrINEuy74T" alt=""><figcaption></figcaption></figure>

Access data can be stored for the following services:

* SSH (Secure Shell): Protocol for remote maintenance and administration of servers and clients, which is mainly used for Linux servers and clients.
* WMI (Windows Management Instrumentation): Service for remote maintenance and administration of Windows servers and clients.
* SNMP v1/v2/v3 (Simple Network Management Protocol): Protocol for monitoring and controlling network devices, which is mainly used for printers, switches or industrial installations.

#### Field Level Encryption

By implementing field-level encryption, sensitive fields are now individually encrypted, ensuring a much higher level of protection for your data. This encryption technology allows you to specifically secure certain data fields, which significantly minimizes potential security risks.

Learn how to set up Field Level Encryption in our [**guide**](/docs/manual/english/on-premises/configuration/field-level-encryption.md).

{% hint style="info" %}
For servers and clients running a version of Windows or Linux, we still recommend installing an [Enginsight Pulsar Agent](/docs/manual/english/operation/platform/legacy/hosts-agent-pulsar/pulsar-agent.md#installation-creating-a-new-host) to monitor vulnerabilities from the inside. The scope and validity of the results of the CVE scan from the inside are superior to the hacktor scan, even with the auth provider stored. In addition, the CVE scan with Pulsar agent installed allows more convenient administration and is preferable from a security point of view, since no credentials have to be stored or accesses enabled.
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.enginsight.com/docs/manual/english/operation/platform/penetration-testing/auth-providers.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
