How fast are changes to the access control configuration updated on the controlled machines?