Managing least-privilege access to enterprise services is a complex undertaking. Numerous security mechanisms must be painstakingly configured and maintained, often by different administrators in different organizations and at different sites. This piecemeal approach results in labor-intensive security management practices that are expensive, slow to adapt, and often lead to unintended consequences. We present a systematic approach to bridge the gap between high-level access policies and their distributed implementation. Our techniques enable automated validation and generation of access control configurations against end-to-end access policies. This talk will describe our approach and laboratory prototype, and present questions for further research. This is joint work with Bill Horne, S. Rajagopalan and Prasad Rao at HP Labs.