See Spring Security for advice on assembling Fedora's authentication filters to meet your needs.