* SONAR-13472 Create 'SESSION_TOKENS' table
* SONAR-13472 Remove 'SESSION_TOKENS' from user when disabling an user
* SONAR-13472 Replace JwtSession expiration duration by a time
* SONAR-13472 Create, update and delete SessionToken during authentication lifecycle
* SONAR-13472 Purge expired session tokens at start-up and every day
* SONAR-13472 Improve log during session tokens cleaning
* Add example to start a Keycloak server already configured
* Rename organisation to organization in some SonarCloud directories/classes
* Add WS api/organizations/sync_members
* Get list of members from a GitHub organization
* sync_members fails when members sync is disabled
* SONAR-10597 Update USER_TOKENS#LOGIN to USER_UUD in DB
* SONAR-10597 Update UserTokenDao to return user uuid
* SONAR-10597 Fix api/user_tokens/generate to correctly use user uuid
* SONAR-10597 Fix api/user_tokens/revoke to correctly use user uuid
* SONAR-10597 Fix authentication by token to correctly use user uuid
* SONAR-10597 Fix api/user_tokens/search to correctly use user uuid
* SONAR-10597 Fix api/users/search to correctly use user uuid
* SONAR-10597 Add ITs to check user tokens after login update
SONAR-10598 Display warning page when detecting login update during authentication
* SONAR-10598 Refactor UserIdentityAuthenticator#authenticate to use a ParameterObject
* SONAR-10598 Redirect user when login is updated and update personal org
* SONAR-10598 Improve update of personal organization key
* SONAR-10598 Improve IT stability related to generation of provider ID
* SONAR-10598 Add USERS#ORGANIZATION_UUID
* SONAR-10598 Replace usage of Organizaions#UserId by Users#OrganizationUuid
Extract hash mechanism into a single class LocalAuthentication
Implements SHA1 (deprecated) and bcrypt hash
Set bcrypt as default
Update the hash of a user during authentication if hash method was SHA1