CodeEdit
CodeEdit copied to clipboard
✨ Clone Via SSH
Description
With our current implementation, SSH only works if the user has both one key configured per host, and no password protected keys. Our implementation needs to be built out to handle any additional prompts the SSH session may ask for. For instance a system password to unlock a protected key, a two-factor authentication prompt from the session, etc.