A Sensible Approach to Access Control in Configuration Management