You've not really given anyone very mush to go on here! What are you explicitly trying to do? What have you done so far to meet the needs you've identified? How can you verify that what you have done is working - and is not posing any additional/unforeseen security risks?