Some success....
Within my docker-compose.yml file, in the ldap: section I modified the environment sub-section to include (thanks fleetwoodfc):
environment:
STORAGE_DIR: /storage/fs1
REGULAR_USER: user
REGULAR_USER_ROLE: user
AUTH_USER_ROLE: auth
Took down the old container (docker-compose -p dcm4chee down) and brought it back up again: docker-compose -p dcm4chee up -d
Waited for things to settle down (important - check with top). Then went into https://<archive-host>:8843/admin/dcm4che/console logged in using user "root"
Fixed the problem with the redirect_URI for the wildfly-console client (see other thread)
From the main menu looked at Realm roles, user and auth were not present.
From main menu, went to User Federation, clicked on "ldap" (above ldap Enabled), on the right hand side of the page that opens, there is a drop down action button (I selected sync all users), which resulted in the message:
"2 users added, 1 user updated".
On the same screen, next to settings I clicked on the tab "Mappers", and chose "role", on the page that opens go to the top right and the drop down action button, select "Sync LDAP roles to Keycloak".
Now if you go back to the main menu and select Realm roles you should now additionally see user and auth as available roles.
Under Users created a new user: "Add User" - don't forget to give it an initial password under credentials (press Set password).
IMPORTANT:
When creating the new user, on the Role mapping tab, click on assign role - and select auth and user (click Assign). Then click on the top left drop-down (probably says Filter by realm roles) - change to Filter by clients - check the option for (account) view-profile then click Assign. Thanks Shefki.
Roles for the user should look like the following:
This user can now browse the database and download data...
I just need to restrict what a regular user has permissions to do now... using the information
here (thanks Marius/Shefki).
I suspect that I will have some fun trying to get all these roles automatically assigned to people authenticating with SAML, and will report back...
Cheers, Jon