A collection of security schemes, where the key is the name of the security scheme and the value is the list of scopes required for that scheme. All schemes in the collection must be satisfied for authentication to be successful.
A collection of security schemes, where the key is the name of the security scheme and the value is the list of scopes required for that scheme. All schemes in the collection must be satisfied for authentication to be successful.