Once basic OIDC auth has been setup, we will need to differentiate between Keycloak users that should have read-only permissions or read and write permissions. Later on we will expand upon this to include more fine grained access control based on data the user is authorized to act on.
[ ] Remember to test a client without a FHIR role assigned to it
Once basic OIDC auth has been setup, we will need to differentiate between Keycloak users that should have read-only permissions or read and write permissions. Later on we will expand upon this to include more fine grained access control based on data the user is authorized to act on.