What you're describing is called "impersonation". Keycloak does support impersonation, as discussed in keycloak's documentation . Just recognize that you'll want to make sure you limit which clients can impersonate users as this is a very security-sensitive operation.