Learn more about cloning repositories
You have read-only access
Added comments explaining what each authentication strategy is used for.