Hello Alexandre,
I'll try to give you a brief description of what every standard client in every realm does:
#account
This client represents the account-api (backend) and contains account related roles as an OIDC confidential client.
#account-console
This client represents the react (SPA) based account frontend as a OIDC public client.
#admin-cli
This client can be combined with kcadm.sh for managing a Keycloak realm. However, for automating realm provisioning,
a custom client like "keycloak-config-cli" with client credentials as the only grant is often preferred to admin-cli.
#broker
This client can be used as the backend for an identity broker. However, it is recommended to create dedicated backends to connect
with identity providers to have more control over allowed redirect URIs, scopes, and mappings.
# realm-management
This client represents the realm-management API backend and contains realm-management related roles.
Note that this client does not exist in the master realm. See: Realm Management Clients.
# security-admin-console
This client represents the admin-ui scoped to that particular realm, and this means that if one uses the security-admin-console
of a specific (non-master) realm, then only this realm can be managed via this client.
# Realm Management Clients
In the master realm, in addition to the clients mentioned above, you have special management clients for every realm
within the Keycloak system. That means that if you have a realm named "acme", the master realm will contain a client called "acme-realm".
These management clients allow users in the master realm access to a subset of realms with realm-specific roles.
Cheers,
Thomas