See
Spring Security
for advice on assembling Fedora's authentication filters to meet your needs.